...
首页> 外文期刊>Frontiers of Information Technology & Electronic Engineering >NIPAD: a non-invasive power-based anomaly detection scheme for programmable logic controllers
【24h】

NIPAD: a non-invasive power-based anomaly detection scheme for programmable logic controllers

机译:NIPAD:一种用于可编程逻辑控制器的基于功率的非侵入式异常检测方案

获取原文
   

获取外文期刊封面封底 >>

       

摘要

industrial control systems (ICSs) are widely used in critical infrastructures, making them popular targets for attacks to cause catastrophic physical damage. As one of the most critical components in ICSs, the programmable logic controller (PLC) controls the actuators directly. A PLC executing a malicious program can cause significant property loss or even casualties. The number of attacks targeted at PLCs has increased noticeably over the last few years, exposing the vulnerability of the PLC and the importance of PLC protection. Unfortunately, PLCs cannot be protected by traditional intrusion detection systems or antivirus software. Thus, an effective method for PLC protection is yet to be designed. Motivated by these concerns, we propose a non-invasive power-based anomaly detection scheme for PLCs. The basic idea is to detect malicious software execution in a PLC through analyzing its power consumption, which is measured by inserting a shunt resistor in series with the CPU in a PLC while it is executing instructions. To analyze the power measurements, we extract a discriminative feature set from the power trace, and then train a long short-term memory (LSTM) neural network with the features of normal samples to predict the next time step of a normal sample. Finally, an abnormal sample is identified through comparing the predicted sample and the actual sample. The advantages of our method are that it requires no software modification on the original system and is able to detect unknown attacks effectively. The method is evaluated on a lab testbed, and for a trojan attack whose difference from the normal program is around 0.63%, the detection accuracy reaches 99.83%.
机译:工业控制系统(ICS)广泛用于关键基础设施,使其成为造成灾难性物理损坏的攻击的目标。作为ICS中最关键的组件之一,可编程逻辑控制器(PLC)直接控制执行器。执行恶意程序的PLC可能会导致重大财产损失甚至人员伤亡。在过去的几年中,针对PLC的攻击数量显着增加,这暴露了PLC的脆弱性和PLC保护的重要性。不幸的是,PLC无法受到传统入侵检测系统或防病毒软件的保护。因此,尚未设计出一种有效的PLC保护方法。基于这些考虑,我们提出了一种针对PLC的基于非侵入式电源的异常检测方案。基本思想是通过分析其功耗来检测PLC中的恶意软件执行,该功耗是通过在执行指令时在PLC中与CPU串联插入并联电阻来测量的。为了分析功率测量,我们从功率迹线中提取出一个判别性特征集,然后使用正常样本的特征训练一个长短期记忆(LSTM)神经网络,以预测正常样本的下一步。最后,通过比较预测样本和实际样本来识别异常样本。我们方法的优点在于,它不需要在原始系统上进行任何软件修改,并且能够有效地检测未知攻击。该方法在实验室测试平台上进行了评估,针对木马攻击(与正常程序的差异约为0.63%),检测精度达到99.83%。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号