Standard specification-based intrusion detection for hierarchical industrial control systems

被引:2
|
作者
Hotellier, Estelle [1 ,2 ]
Sicard, Franck [1 ]
Francq, Julien [1 ]
Mocanu, Stephane [2 ]
机构
[1] Naval Grp, Naval Cyber Lab, F-83190 Ollioules, France
[2] Univ Grenoble Alpes, Lab Informat Grenoble, CNRS, Inria,Grenoble INP, F-38000 Grenoble, France
关键词
Industrial control system; Intrusion detection system; Specification; Temporal logic; Runtime monitoring; SECURITY; SAFETY;
D O I
10.1016/j.ins.2024.120102
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we develop a specification -based, process -aware, Intrusion Detection System (IDS) for complex Industrial Control Systems (ICSs). Complex ICSs are distributed and hierarchical control systems built on top of local control loops which are the system's elementary building blocks. Process -aware attacks are sophisticated cyberattacks that aim to compromise the safety of the controlled physical process. Our approach aims to link safety specifications and security properties. Thus, we use international and industry standards specifications concerning local safety, global safety and networks of the industrial process, in order to obtain security properties. The obtained security properties are cybersecurity related requirements. They are translated into security patterns in order to be runtime monitored by our network IDS. This latter relies on a distributed monitoring framework, capturing network traffic between the local loops and the distributed control level, as well as between distributed control and supervisory control. We implemented and evaluated our IDS on a real ICS. We experimentally show that our IDS detects a large spectrum of attacks. We also show that our distributed IDS is scalable since its detection response time as a function of the number of monitored security patterns, is linear. A demonstrator comprising code extracts is made available.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] Specification-based intrusion detection in WLANs
    Gill, Rupinder
    Smith, Jason
    Clark, Andrew
    [J]. 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 141 - +
  • [2] Approach of specification-based mixed intrusion detection
    Mu, Wei
    Song, Hua
    Dai, Yiqi
    [J]. Jisuanji Gongcheng/Computer Engineering, 2005, 31 (09): : 132 - 134
  • [3] A specification-based intrusion detection model for OLSR
    Tseng, CH
    Song, T
    Balasubramanyam, P
    Ko, C
    Levitt, K
    [J]. RECENT ADVANCES IN INTRUSION DETECTION, 2006, 3858 : 330 - 350
  • [4] Intrusion detection aware component-based systems: A specification-based framework
    Hussein, Mohammed
    Zulkernine, Mohammad
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (05) : 700 - 710
  • [5] A Survey of Specification-based Intrusion Detection Techniques for Cyber-Physical Systems
    Nweke, Livinus Obiora
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (05) : 37 - 45
  • [6] Specification-based Intrusion Detection for Advanced Metering Infrastructures
    Berthier, Robin
    Sanders, William H.
    [J]. 2011 IEEE 17TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2011, : 184 - 193
  • [7] Toward Specification-Based Intrusion Detection for Web Applications
    Niksefat, Salman
    Ahaniha, Mohammad Mahdi
    Sadeghiyan, Babak
    Shajari, Mehdi
    [J]. RECENT ADVANCES IN INTRUSION DETECTION, 2010, 6307 : 510 - 511
  • [8] Using specification-based intrusion detection for automated response
    Balepin, I
    Maltsev, S
    Rowe, J
    Levitt, K
    [J]. RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2003, 2820 : 136 - 154
  • [9] Specification-based intrusion detection system for carrier ethernet
    Jieke, Pan
    Redol, Joao
    Correia, Miguel
    [J]. WEBIST 2007: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGIES, VOL IT: INTERNET TECHNOLOGY, 2007, : 426 - +
  • [10] Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems
    Mitchell, Robert
    Chen, Ing-Ray
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (01) : 16 - 30