首页> 外文会议>Australasian Universities Power Engineering Conference >Mining Anomaly Communication Patterns for Industrial Control Systems
【24h】

Mining Anomaly Communication Patterns for Industrial Control Systems

机译:用于工业控制系统的采矿异常通信模式

获取原文

摘要

The attacks on industrial control systems (ICS) have been exemplified by the malwares Stuxnet, Industroyer and Triton that targeted nuclear facilities of Iran in 2010, power grid of Ukraine in 2016, and Safety Instrumented System (SIS) controllers of a Middle East country in 2017, respectively. As a result, the issues concerning Critical Infrastructure Information Protection (CIIP) have drawn much attention among academia, industry and government in many countries. In this paper, we propose an anomaly detection method for ICS networks. The main idea of the proposed method is to model the normal behavior patterns of TCP and UDP payloads as frequent patterns and non-frequent pattern clusters. The normal behavior payloads are first processed by sequential pattern mining algorithm to extract frequent patterns, and then the payloads are projected against frequent patterns. After projection, the projected payloads are clustered using hierarchical agglomerative clustering algorithm to find representative variations in normal behaviors. The experimental results show that the proposed method has very good performance in terms of the metrics such as accuracy, recall, precision, false alarm, and false dismissal for the ICS networks that use Modbus/TCP or BACnet protocols. The proposed system model can also leverage honeypots deployed in ICS networks to generate attack signatures, which can be helpful in filtering out known attacks.
机译:Malwares Stuxnet,Industroyer和Triton的攻击是2010年伊朗核设施的攻击,2016年乌克兰电网,以及中东国家的安全仪器系统(SIS)控制器2017分别。因此,关于关键基础设施信息保护的问题(CIIP)在许多国家的学术界,工业和政府之间引起了很多关注。在本文中,我们为ICS网络提出了一种异常检测方法。所提出的方法的主要思想是将TCP和UDP有效载荷的正常行为模式模拟为频繁模式和非频繁模式集群。首先通过顺序模式挖掘算法处理正常行为有效载荷以提取频繁的模式,然后将有效载荷投影频繁模式。投影后,使用分层凝聚聚类算法群集投影有效载荷,以查找正常行为中的代表性变化。实验结果表明,该方法在指标方面具有很好的性能,例如准确性,召回,精度,假警报和使用Modbus / TCP或Bacnet协议的ICS网络的错误解密。所提出的系统模型还可以利用部署在ICS网络中的蜜罐来生成攻击签名,这可能有助于过滤出已知的攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号