首页> 外文学位 >A behavioral intrusion detection system for SCADA systems.
【24h】

A behavioral intrusion detection system for SCADA systems.

机译:用于SCADA系统的行为入侵检测系统。

获取原文
获取原文并翻译 | 示例

摘要

Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS) are the computer systems that are used to control many underlying infrastructures, utility systems, and industrial processes used by all modern industrial societies. SCADA systems include subway system control, electrical distribution, water and waste water systems control, oil refinery control, gas and oil pipeline control to name just a few. ICS are used in factories or plants to control production or industrial processes that are repetitive in nature and run continuously. A good example of an ICS application is the control of chemicals being combined in a reaction chamber where specific chemicals are added sequentially and at specific temperatures and pressures. These underlying operations controlled by SCADA and ICS are relatively transparent to our daily lives, but the safe and continued operations of these systems are often critical in our existence.;Original SCADA systems were human controlled and did not include autonomous real-time control systems. To improve process consistency and reduce operational costs many ICS were developed or redesigned to include centralized human monitoring and real-time embedded control systems. As systems have become more complex the line between SCADA and ICS has become blurred and these systems are converging such that ICS are a subset of SCADA systems. Regardless of the definition used for these systems, the proposed method of intrusion detection will work equally well in both SCADA and ICS environments. For simplicity and to reduce redundancy, the rest of this dissertation will use the term SCADA systems to include ICS unless explicitly noted otherwise.;Initially, many automated SCADA systems were designed based on proprietary communications protocols and proprietary designs without network connectivity. As time and technology have progressed these systems have been changing to include open standards based designs, and the system components have been integrated based on IP, RF protocols, and other widely used communication standards.;Security within Supervisory Control and Data Acquisition (SCADA) systems is a concern because many of these systems were not designed with security requirements but security is an increasing concern with several well publicized attacks on these control systems over the last several years. Network messages containing controller and operator commands and sensor status data may be modified, system control elements may be reprogrammed, or control commands may be injected by an attacker to cause system failures. To detect these intrusions a Behavioral Intrusion Detection System (BIDS) is proposed in this dissertation. A BIDS can detect attacks that traditional network or host based Intrusion Detection Systems would not detect within a SCADA system. Once implemented a BIDS would be used to augment existing host and network based IDS systems to detect attacks on SCADA system controllers. The basis of the BIDS approach is to leverage the fact that SCADA systems have a limited and deterministic set of behaviors that result in a relatively small amount of variability during normal system operation. A system's operation can be embodied in system models included in the behavioral intrusion detection system to detect attacks and alert the system operator. Alert filtering is required to minimize false alarms while that ensuring attacks and other anomalous system behaviors including failures are detected.;Based on two system simulations with and without attacks were performed and detailed in this dissertation. The implemented BIDS for each system proved the viability of this approach. BIDS performance resulted an extremely low false alarm rate when attacks were present, and with a high exceptional attack detection rate with very good identification of the attacked control elements.;This dissertation focuses on the development of a new and unique method of intrusion detection for SCADA systems. It is an IDS which includes system models to predict system behavior. A behavior is typically an anticipated sensor signal (pressure, temperature, flow, level etc.). This new IDS is called a Behavioral IDS or BIDS for short. The reliability of this intrusion detection method is improved with the addition of trust anchors within the system to provide real-time data signal whose authenticity and values are assumed to be valid. These trusted signals are used with untrusted system signals by system models within the BIDS to determine when a system behavior is diverging from normal predicted operation and to determine if alert conditions exist. While the use of trust anchors is an underlying and critical enabling technology for this advanced IDS method, the complete definition of the trust anchor is not the subject of this dissertation. Expected trust anchor functionality and support of the Behavioral IDS is provided in this work.
机译:监督控制和数据采集(SCADA)和工业控制系统(ICS)是用于控制所有现代工业社会使用的许多基础结构,公用事业系统和工业过程的计算机系统。 SCADA系统包括地铁系统控制,配电,给水和废水系统控制,炼油厂控制,天然气和石油管道控制等。 ICS用于工厂或工厂,以控制本质上重复且连续运行的生产或工业过程。 ICS应用的一个很好的例子是控制化学物质在反应室中的混合,在反应室中按顺序在特定的温度和压力下添加特定的化学物质。由SCADA和ICS控制的这些基本操作对我们的日常生活相对透明,但是这些系统的安全和持续操作通常对我们的生存至关重要。;原始的SCADA系统是人为控制的,不包括自主实时控制系统。为了提高过程的一致性并降低运营成本,开发或重新设计了许多ICS,以包括集中式人工监控和实时嵌入式控制系统。随着系统变得越来越复杂,SCADA和ICS之间的界线变得越来越模糊,并且这些系统正在融合,因此ICS是SCADA系统的子集。无论这些系统使用什么定义,建议的入侵检测方法在SCADA和ICS环境中均能很好地工作。为了简化并减少冗余,本文的其余部分将使用术语SCADA系统包括ICS,除非另有明确说明。最初,许多自动SCADA系统是基于专有的通信协议和专有设计设计的,没有网络连接。随着时间和技术的进步,这些系统已经发生变化,包括基于开放标准的设计,并且系统组件已基于IP,RF协议和其他广泛使用的通信标准进行了集成。;监控和数据采集(SCADA)内的安全性系统是一个令人担忧的问题,因为其中许多系统的设计都没有安全性要求,但是在过去的几年中,由于对这些控制系统进行了多次广为人知的攻击,安全性日益成为人们关注的焦点。可以修改包含控制器和操作员命令以及传感器状态数据的网络消息,可以对系统控制元素进行重新编程,或者攻击者可以注入控制命令以引起系统故障。为了检测这些入侵,本文提出了一种行为入侵检测系统(BIDS)。 BIDS可以检测到传统的基于网络或主机的入侵检测系统无法在SCADA系统中检测到的攻击。一旦实施,BIDS将用于增强现有的基于主机和网络的IDS系统,以检测对SCADA系统控制器的攻击。 BIDS方法的基础是利用SCADA系统具有有限的确定性行为集这一事实,从而在正常系统运行期间导致相对较小的可变性。可以在行为入侵检测系统中包含的系统模型中体现系统的操作,以检测攻击并向系统操作员发出警报。在确保检测到攻击和其他异常系统行为(包括故障)的同时,需要使用警报过滤以最大程度地减少虚假警报。本文基于对有攻击和无攻击的两个系统仿真,并进行了详细介绍。为每个系统实施的BIDS证明了这种方法的可行性。当发生攻击时,BIDS的性能导致极低的虚假警报率,并且具有很高的异常攻击检测率,能够很好地识别被攻击的控制元素。;本论文着重于开发一种新颖独特的SCADA入侵检测方法系统。它是一个IDS,其中包括用于预测系统行为的系统模型。行为通常是预期的传感器信号(压力,温度,流量,液位等)。此新IDS简称为行为IDS或BIDS。通过在系统内添加信任锚来提高此入侵检测方法的可靠性,以提供其真实性和值被假定为有效的实时数据信号。 BIDS中的系统模型将这些受信任信号与不受信任系统信号一起使用,以确定系统行为何时偏离正常的预测操作并确定是否存在警报条件。尽管信任锚的使用是此高级IDS方法的基础和关键启用技术,但是信任锚的完整定义不是本文的主题。这项工作提供了预期的信任锚功能和对行为IDS的支持。

著录项

  • 作者

    Papa, Stephen M.;

  • 作者单位

    Southern Methodist University.;

  • 授予单位 Southern Methodist University.;
  • 学科 Engineering Computer.
  • 学位 Ph.D.
  • 年度 2013
  • 页码 176 p.
  • 总页数 176
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号