...
首页> 外文期刊>Computers & Security >Cyber-attack detection in SCADA systems using temporal pattern recognition techniques
【24h】

Cyber-attack detection in SCADA systems using temporal pattern recognition techniques

机译:使用时间模式识别技术的SCADA系统网络攻击检测

获取原文
获取原文并翻译 | 示例
           

摘要

Critical infrastructures crucial to our modern life, such as electricity grids and water pumps, are controlled by Supervisory Control and Data Acquisition (SCADA) systems. Over the last two decades, connecting critical infrastructures to the Internet has become essential due to performance and commercial needs. The combination of Internet connections to systems with little if any security features and the fact that security by obscurity is not working anymore, has moved the topic of SCADA security into the forefront in the last few years. To address these challenges, in this paper we propose cyber-attack detection techniques based on temporal pattern recognition. Temporal pattern recognition methods do not only look for anomalies in the data transferred by the SCADA components over the network but also look for anomalies that can occur by misusing legitimate commands such that unauthorized and incorrect time intervals between them may cripple the system. Specifically, we propose two algorithms based on Hidden Markov Models (HMM) and Artificial Neural Networks (ANN). We evaluate the algorithms on real and simulated SCADA data with five different feature extraction methods; in each method, the algorithms consider different aspects of the raw data. The results show that temporal pattern recognition methods, especially those based on time feature extraction, can detect cyber-attacks, including those that involve legitimate functions, which are known in the literature as hard to detect. (C) 2019 Elsevier Ltd. All rights reserved.
机译:关键基础设施对我们的现代生活至关重要,例如电网和水泵,由监督控制和数据采集(SCADA)系统控制。在过去的二十年中,由于性能和商业需求,将关键基础设施连接到互联网成为必不可少的。互联网连接到具有很少有任何安全功能的系统以及默默无闻的安全性不再工作的事实,已经将SCADA安全的主题转移到过去几年中将SCADA安全主题转移到最前沿。为了解决这些挑战,本文提出了基于时间模式识别的网络攻击检测技术。时间模式识别方法不仅可以查看由SCADA组件在网络上传输的数据中的异常,而且寻找可以误用合法命令发生的异常,使得它们之间的未经授权和不正确的时间间隔可能会遍及系统。具体地,我们提出了基于隐马尔可夫模型(HMM)和人工神经网络(ANN)的两种算法。我们用五种不同的特征提取方法评估真实和模拟SCADA数据的算法;在每种方法中,该算法考虑原始数据的不同方面。结果表明,时间图案识别方法,尤其是基于时间特征提取的方法,可以检测到网络攻击,包括那些涉及合法功能的网络攻击,这在文献中难以检测。 (c)2019 Elsevier Ltd.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号