首页> 外文期刊>Future generation computer systems >Detecting stealthy attacks on industrial control systems using a permutation entropy-based method
【24h】

Detecting stealthy attacks on industrial control systems using a permutation entropy-based method

机译:使用基于排列熵的方法检测对工业控制系统的隐形攻击

获取原文
获取原文并翻译 | 示例

摘要

The modern Industrial Control Systems (ICS) now exhibit an increasing connectivity to the corporate Internet Technology (IT) networks so as to make use of the rich resources in IT networks. The increasing interaction between ICS and the outside IT world, however, has made them an attractive target for a variety of cyber attacks, raising great need to secure the ICS. In ICS, skilled attackers can manipulate sensor readings or control signals until the system crashes, while still keeping the attack process hidden by closely following the expected behavior of the system. This kind of attacks is called stealthy attacks, which cannot be detected by traditional intrusion detection methods in which only the magnitudes of residuals are evaluated. In this paper, we show that the residuals generated during a stealthy attack present some sort of regularity besides the magnitudes. Based on this observation, we propose a novel permutation entropy-based approach to detect stealthy attacks on ICS. The permutation entropy can characterize the non-randomness contained in the residuals so as to distinguish the residuals during a stealthy attack from a random series effectively. A significant change of the permutation entropy indicates the occurrence of a stealthy attack. Finally, we conduct comprehensive experiments to verify the effectiveness of the proposed stealthy attack detection approach.
机译:现在,现代工业控制系统(ICS)与企业Internet技术(IT)网络之间的连接日益紧密,从而可以利用IT网络中的丰富资源。但是,ICS与外部IT世界之间不断增强的交互作用使它们成为各种网络攻击的诱人目标,从而极大地提高了保护ICS的需求。在ICS中,熟练的攻击者可以操纵传感器的读数或控制信号,直到系统崩溃为止,同时仍通过密切关注系统的预期行为来使攻击过程保持隐藏。这种攻击称为秘密攻击,传统的入侵检测方法无法检测到这种攻击,在这种方法中,仅评估残差的大小。在本文中,我们证明了在隐身攻击过程中产生的残差除大小外还具有某种规律性。基于此观察,我们提出了一种基于置换熵的新颖方法来检测对ICS的隐形攻击。置换熵可以表征残差中包含的非随机性,从而有效地将隐形攻击期间的残差与随机序列区分开。排列熵的显着变化表明发生了隐身攻击。最后,我们进行了全面的实验,以验证所提出的隐身攻击检测方法的有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号