Methodology to Determine the Device-Level Periodicity for Anomaly Detection in EtherCAT-Based Industrial Control Network

被引:17
|
作者
Akpinar, Kevser Ovaz [1 ]
Ozcelik, Ibrahim [1 ]
机构
[1] Sakarya Univ, Dept Comp Engn, TR-54040 Sakarya, Turkey
关键词
Integrated circuits; Protocols; Anomaly detection; Monitoring; TCPIP; Traffic control; Critical infrastructure; EtherCAT; critical infrastructure systems; industrial control systems; periodicity detection; SCADA security; zero-day attacks; INTRUSION DETECTION; DEMAND FORECAST;
D O I
10.1109/TNSM.2020.3037050
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Continuous operation and monitoring of critical infrastructure networks are crucial to ensure their sustainability and security. To achieve these, industrial control system (ICS) networks and supervisory control and data acquisition (SCADA) systems are deployed in critical infrastructure assets. Many events in ICS networks present strong periodical patterns because of process repetition or cyclic communication. From the security viewpoint, inferring the periodicity primarily in the device-level communications where the actuator/sensor, field, and the cell-level transmissions are performed is important for detecting anomalies. The synchronization period and traffic pattern need to be known for anomaly detection. This article presents a novel periodicity detection approach specifically for Ethernet for control automation technology (EtherCAT) networks. It uses protocol-specific operations and fields for detecting device-level periodicity. Using the period, an anomaly detection method that uncovers traffic pattern statistics is also proposed. The periodicity can be detected with different precision, significance levels, and lag sizes. Four programmable logic controller (PLC) programs were developed to demonstrate the feasibility of the periodicity detection approach, and the periodicity was automatically obtained with high accuracy. As any malicious activity on the system causes variances in the periodic pattern, the approach was also tested on synthetic traffic traces that contain denial of service (DoS) and code-injection attacks. The traffic patterns were uncovered by an anomaly detection module, which was developed on a Snort intrusion detection/prevention system (IDS/IPS) and used the captured period. The tests demonstrated that intrusions that exploit communication patterns are fully flagged.
引用
收藏
页码:2308 / 2319
页数:12
相关论文
共 50 条
  • [1] Analysis of Machine Learning Methods in EtherCAT-Based Anomaly Detection
    Akpinar, Kevser Ovaz
    Ozcelik, Ibrahim
    IEEE ACCESS, 2019, 7 : 184365 - 184374
  • [2] Anomaly Detection on EtherCAT Based Water Level Control Automation
    Akpinar, Kevser Ovaz
    Ozcelik, Ibrahim
    2020 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2020, : 79 - 82
  • [3] EtherCAT-based Impedance Control of a 6-DOF Industrial Robotic Manipulator
    Tsai, Ching-Chih
    Tai, Feng-Chun
    Lin, Chun-An
    Chan, Chun-Chieh
    2019 IEEE/ASME INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENT MECHATRONICS (AIM), 2019, : 80 - 85
  • [4] SDS: an open, device-level control network
    Honeywell Micro Switch Div, Freeport, United States
    Chilton's I&CS, 12 (39-40):
  • [5] SDS: An open, device-level control network
    Crovella, B
    I&CS-INSTRUMENTATION & CONTROL SYSTEMS, 1996, 69 (12): : 39 - 41
  • [6] DeviceNet-based device-level control in SSRF
    Leng, Yongbin
    Zheng, Lifang
    Lu, Chengmeng
    Miao, Haifeng
    Liu, Songqiang
    Shen, Guobao
    He Jishu/Nuclear Techniques, 2002, 25 (08):
  • [7] MADICS: A Methodology for Anomaly Detection in Industrial Control Systems
    Perales Gomez, Angel Luis
    Fernandez Maimo, Lorenzo
    Huertas Celdran, Alberto
    Garcia Clemente, Felix J.
    SYMMETRY-BASEL, 2020, 12 (10):
  • [8] Anomaly Detection for Industrial Control System Based on Autoencoder Neural Network
    Wang, Chao
    Wang, Bailing
    Liu, Hongri
    Qu, Haikuo
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020 (2020):
  • [9] Industrial Control System Anomaly Detection and Classification Based on Network Traffic
    Jiang, Jehn-Ruey
    Chen, Yan-Ting
    IEEE ACCESS, 2022, 10 : 41874 - 41888
  • [10] Ethernet-based device-level networks: Not always right for control
    Dierauer, P
    I&CS-INSTRUMENTATION & CONTROL SYSTEMS, 1999, 72 (02): : 83 - 84