Intrusion Detection for Sequence-Based Attacks with Reduced Traffic Models

被引:6
|
作者
Ferling, Benedikt [1 ]
Chromik, Justyna [2 ]
Caselli, Marco [3 ]
Remke, Anne [1 ,2 ]
机构
[1] Westfalische Wilhelms Univ Munster, Munster, Germany
[2] Univ Twente, Enschede, Netherlands
[3] Siemens AG, Munich, Germany
关键词
D O I
10.1007/978-3-319-74947-1_4
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Securing control networks (e.g. for power and gas distribution) requires dedicated approaches. Sequence-aware intrusion detection models the network traffic under normal operation to identify malicious behavior. Unfortunately, such models are often large and difficult to handle. This paper proposes a method that generates smaller traffic models and discusses the accuracy of those reduced models in the context of a real control infrastructure employing the IEC 60870-5-104 protocol.
引用
收藏
页码:53 / 67
页数:15
相关论文
共 50 条
  • [1] Adversarial Attacks for Intrusion Detection Based on Bus Traffic
    He, Daojing
    Dai, Jiayu
    Liu, Xiaoxia
    Zhu, Shanshan
    Chan, Sammy
    Guizani, Mohsen
    [J]. IEEE NETWORK, 2022, 36 (04): : 203 - 209
  • [2] Generalized Sequence-Based and Reverse Sequence-Based Models for Broadcasting Hot Videos
    Yu, Hsiang-Fu
    Ho, Pin-Han
    Yang, Hung-Chang
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2009, 11 (01) : 152 - 165
  • [3] On Generating Network Traffic Datasets with Synthetic Attacks for Intrusion Detection
    Cordero, Carlos Garcia
    Vasilomanolakis, Emmanouil
    Wainakh, Aidmar
    Muhlhauser, Max
    Nadjm-Tehrani, Simin
    [J]. ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2021, 24 (02)
  • [4] Sequence-based pangenomic core detection
    Schulz, Tizian
    Wittler, Roland
    Stoye, Jens
    [J]. ISCIENCE, 2022, 25 (06)
  • [5] Language models for detection of unknown attacks in network traffic
    Rieck, Konrad
    Laskov, Pavel
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2007, 2 (04): : 243 - 256
  • [6] A Fuzzy Intrusion Detection System Based on Categorization of Attacks
    Varshovi, Ali
    Rostamipour, Maryam
    Sadeghiyan, Babak
    [J]. 2014 6TH CONFERENCE ON INFORMATION AND KNOWLEDGE TECHNOLOGY (IKT), 2014, : 50 - 55
  • [7] Resource-sensitive intrusion detection models for network traffic
    Khoshgoftaar, TM
    Abushadi, ME
    [J]. EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING, PROCEEDINGS, 2004, : 249 - 258
  • [8] Probabilistic Models Based Intrusion Detection Using Sequence Characteristics in Control System Communication
    Onoda, Takashi
    [J]. ENGINEERING APPLICATIONS OF NEURAL NETWORKS (EANN 2014), 2014, 459 : 155 - 164
  • [9] Intrusion Detection Based on the Short Sequence Model
    Mao, Guojun
    Zhang, Jing
    Wu, Xindong
    [J]. 2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23, 2008, : 1449 - +
  • [10] Three level sequence-based Loop Closure Detection
    Rodrigues, Fernanda
    Neuland, Renata
    Mantelli, Mathias
    Pittol, Diego
    Maffei, Renan
    Prestes, Edson
    Kolberg, Mariana
    [J]. ROBOTICS AND AUTONOMOUS SYSTEMS, 2020, 133 (133)