Methodology to Determine the Device-Level Periodicity for Anomaly Detection in EtherCAT-Based Industrial Control Network

被引:17
|
作者
Akpinar, Kevser Ovaz [1 ]
Ozcelik, Ibrahim [1 ]
机构
[1] Sakarya Univ, Dept Comp Engn, TR-54040 Sakarya, Turkey
关键词
Integrated circuits; Protocols; Anomaly detection; Monitoring; TCPIP; Traffic control; Critical infrastructure; EtherCAT; critical infrastructure systems; industrial control systems; periodicity detection; SCADA security; zero-day attacks; INTRUSION DETECTION; DEMAND FORECAST;
D O I
10.1109/TNSM.2020.3037050
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Continuous operation and monitoring of critical infrastructure networks are crucial to ensure their sustainability and security. To achieve these, industrial control system (ICS) networks and supervisory control and data acquisition (SCADA) systems are deployed in critical infrastructure assets. Many events in ICS networks present strong periodical patterns because of process repetition or cyclic communication. From the security viewpoint, inferring the periodicity primarily in the device-level communications where the actuator/sensor, field, and the cell-level transmissions are performed is important for detecting anomalies. The synchronization period and traffic pattern need to be known for anomaly detection. This article presents a novel periodicity detection approach specifically for Ethernet for control automation technology (EtherCAT) networks. It uses protocol-specific operations and fields for detecting device-level periodicity. Using the period, an anomaly detection method that uncovers traffic pattern statistics is also proposed. The periodicity can be detected with different precision, significance levels, and lag sizes. Four programmable logic controller (PLC) programs were developed to demonstrate the feasibility of the periodicity detection approach, and the periodicity was automatically obtained with high accuracy. As any malicious activity on the system causes variances in the periodic pattern, the approach was also tested on synthetic traffic traces that contain denial of service (DoS) and code-injection attacks. The traffic patterns were uncovered by an anomaly detection module, which was developed on a Snort intrusion detection/prevention system (IDS/IPS) and used the captured period. The tests demonstrated that intrusions that exploit communication patterns are fully flagged.
引用
收藏
页码:2308 / 2319
页数:12
相关论文
共 50 条
  • [21] Research on Industrial Control Anomaly Detection Based on FCM and SVM
    Shang, Wenli
    Cui, Junrong
    Song, Chunhe
    Zhao, Jianming
    Zeng, Peng
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 218 - 222
  • [22] A Novel RNN-GBRBM Based Feature Decoder for Anomaly Detection Technology in Industrial Control Network
    Zhang, Hua
    Zhu, Shixiang
    Ma, Xiao
    Zhao, Jun
    Shou, Zeng
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (08) : 1780 - 1789
  • [23] Template-based Feature Aggregation Network for industrial anomaly detection
    Luo, Wei
    Yao, Haiming
    Yu, Wenyong
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2024, 131
  • [24] Industrial Control System Anomaly Detection Using Convolutional Neural Network Consensus
    Sinha, Aviraj
    Taylor, Michael
    Srirama, Nathan
    Manikas, Theodore
    Larson, Eric C.
    Thornton, Mitchell A.
    5TH IEEE CONFERENCE ON CONTROL TECHNOLOGY AND APPLICATIONS (IEEE CCTA 2021), 2021, : 693 - 700
  • [25] Data Clustering-based Anomaly Detection in Industrial Control Systems
    Kiss, Istvan
    Genge, Bela
    Haller, Piroska
    Sebestyen, Gheorghe
    2014 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING (ICCP), 2014, : 275 - +
  • [26] Industrial Control Anomaly Detection Based on Distributed Linear Deep Learning
    Tang, Shijie
    Ding, Yong
    Wang, Huiyong
    CMC-COMPUTERS MATERIALS & CONTINUA, 2025, 82 (01): : 1129 - 1150
  • [27] ZOE: Content-based Anomaly Detection for Industrial Control Systems
    Wressnegger, Christian
    Kellner, Ansgar
    Rieck, Konrad
    2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2018, : 127 - 138
  • [28] Explainable correlation-based anomaly detection for Industrial Control Systems
    Birihanu, Ermiyas
    Lendak, Imre
    FRONTIERS IN ARTIFICIAL INTELLIGENCE, 2025, 7
  • [29] Research on the Network Anomaly Detection and Tracking Information Methodology based on Cellular Automata
    Sui, Qingru
    Liu, Xiaoyan
    PROCEEDINGS OF THE 2015 CONFERENCE ON INFORMATIZATION IN EDUCATION, MANAGEMENT AND BUSINESS, 2015, 20 : 140 - 144
  • [30] Anomaly Detection Approach in Industrial Control Systems Based on Measurement Data
    Zhao, Xiaosong
    Zhang, Lei
    Cao, Yixin
    Jin, Kai
    Hou, Yupeng
    INFORMATION, 2022, 13 (10)