Abstract

Standard Ethernet (IEEE 802.3 and the TCP/IP protocol suite) is gradually applied in industrial control system (ICS) with the development of information technology. It breaks the natural isolation of ICS, but contains no security mechanisms. An improved intrusion detection system (IDS), which is strongly correlated to specific industrial scenarios, is necessary for modern ICS. On one hand, this paper outlines three kinds of attack models, including infiltration attacks, creative forging attacks, and false data injection attacks. On the other hand, a two stage IDS is proposed, which contains a traffic prediction model and an anomaly detection model. The traffic prediction model, which is based on the autoregressive integrated moving average (ARIMA), can forecast the traffic of the ICS network in the short term and detect infiltration attacks precisely according to the abnormal changes in traffic patterns. Furthermore, the anomaly detection model, using a one class support vector machine (OCSVM), is able to detect malicious control instructions by analyzing the key field in Ethernet/IP packets. The confusion matrix is selected to testify to the effectiveness of the proposed method, and two other innovative IDSs are used for comparison. The experiment results show that the proposed two stage IDS in this paper has an outstanding performance in detecting infiltration attacks, forging attacks, and false data injection attacks compared with other IDSs.

Highlights

  • An industrial control system (ICS) is composed of various automatic control components and real-time data acquisition components together

  • ICS system, the results showed that the transmission control protocol (TCP) port number was open, which indicated that the Ethernet/Internet protocol (IP) service was running on this ICS

  • If no anomaly was detected, the packets would be delivered to the anomaly detection model for the step of inspection

Read more

Summary

Introduction

An industrial control system (ICS) is composed of various automatic control components and real-time data acquisition components together. Implementing standard Ethernet in the modern ICS improves the interoperability of the ICS and greatly reduces the cost of application developments It breaks the natural isolation of industrial networks. In order to overcome the deficiencies of previous works, it is required to construct an intrusion detection system that could reflect the behavior characteristics in the ICS networks, strongly correlated to the ICS protocols, and be able to cope with vulnerabilities. It should have a satisfactory overall accuracy and false alarm rate.

Related Works
Industrial Scenario
Attack Models
Infiltration Attacks
Forging Attack
False Data Injection Attack
Two Stage IDS
Traffic Prediction Model
Anomaly Detection Model
Scenarios
Metrics
Performance of the Traffic Prediction Model
Performance of the Anomaly Detection Model
Performance of the Proposed Two Stage IDS
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.