skip to main content
10.1145/3424954.3424963acmotherconferencesArticle/Chapter ViewAbstractPublication PageseiccConference Proceedingsconference-collections
poster

Anomaly Detection in ICS based on Data-history Analysis

Published:12 January 2021Publication History

ABSTRACT

Data of industrial control systems (ICS) are increasingly subject to cyber attacks which should be detected by approaches such as anomaly detection before they can take effect. However, examples such as Stuxnet, Industroyer or Triton show that, despite all the precautions taken, it is still possible to overcome anomaly detection systems and cause damage. Similarly, damage can be made by intentional malicious and unintentional changes by employees in programming or configuration of ICS components. An example is an employee who unintentionally manipulates a machine's configuration to a higher temperature limit than it should have. The potential consequence would be that the machine overheats and breaks. The aim of the project MADISA (Machine Learning for Attack Detection Using Data of Industrial Control Systems) is to identify such anomalies in the data of ICS by examining the data-sets and creating a machine learning system (MLS) based on heuristics over meta-data, configurations and code content. For this purpose, this poster provides a structured analysis of real-world projects from a German automobile manufacturer which lead to first attributes in this unexplored approach for creating heuristics to anomaly detection of historic data in ICS.

References

  1. BBC. 2020. Iran nuclear: Natanz fire caused 'significant' damage. BBC News. Retrieved July 09, 2020 from bbc.com/news/world- middle-east-53300579Google ScholarGoogle Scholar
  2. Cheng Feng, Venkata Reddy Palleti, Aditya Mathur, and Deeph Chana. 2019. A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems. In Network and Distributed Systems Security (NDSS) Symposium 2019. NDSS, San Diego, CA, USA. https://doi.org/10.14722/ndss.2019.23265Google ScholarGoogle ScholarCross RefCross Ref
  3. Jiyar Gol. 2020. Iran blasts: What is behind mysterious fires at key sites? BBC Persian, BBC News. Retrieved July 09, 2020 from bbc.com/news/world-middle-east-53305940Google ScholarGoogle Scholar
  4. István Kiss, Béla Genge, Piroska Haller, and Gheorghe Sebestyén. 2014. Data clustering-based anomaly detection in industrial control systems. In 2014 IEEE 10th International Conference on Intelligent Computer Communication and Processing (ICCP). IEEE, Cluj Napoca, Romania, 275--281.Google ScholarGoogle ScholarCross RefCross Ref
  5. Christian Wressnegger, Ansgar Kellner, and Konrad Rieck. 2018. ZOE: Content-Based Anomaly Detection for Industrial Control Systems. In 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, Luxembourg City, Luxembourg, 127--138. https://doi.org/10.1109/DSN.2018.00025Google ScholarGoogle Scholar
  6. Hyunguk Yoo and Irfan Ahmed. 2019. Control Logic Injection Attacks on Industrial Control Systems. In SEC 2019: ICT Systems Security and Privacy Protection, Vol. 562. Springer, Cham, Switzerland, 33--48. https://doi.org/10.1007/978-3-030-22312-0_3Google ScholarGoogle Scholar
  7. Fan Zhang, Hansaka Angel Dias Edirisinghe Kodituwakku, J. Wesley Hines, and Jamie Coble. 2019. Multilayer Data-Driven Cyber-Attack Detection System for Industrial Control Systems Based on Network, System, and Process Data. IEEE Transactions on Industrial Informatics 15, 7 (July 2019), 4362--4369.Google ScholarGoogle Scholar
  8. Mu Zhang, Chien-Ying Chen, Bin-Chou Kao, Yassine Qamsane, Yuru Shao, Yikai Lin, Elaine Shi, Sibin Mohan, Kira Barton, James Moyne, and Z. Morley Mao. 2019. Towards Automated Safety Vetting of PLC Code in Real-World Plants. In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, San Francisco, CA, USA, 522--538. https://doi.org/10.1109/SP.2019.00034Google ScholarGoogle Scholar
  9. R B Zhang, L H Xia, and Y Lu. 2019. Anomaly Detection of ICS based on EB-OCSVM. Journal of Physics: Conference Series 1267 (July 2019), 012054. https://doi.org/10.1088/1742-6596/1267/1/012054Google ScholarGoogle Scholar

Index Terms

  1. Anomaly Detection in ICS based on Data-history Analysis

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      EICC '20: Proceedings of the 2020 European Interdisciplinary Cybersecurity Conference
      November 2020
      72 pages
      ISBN:9781450375993
      DOI:10.1145/3424954

      Copyright © 2020 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 12 January 2021

      Check for updates

      Qualifiers

      • poster
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)21
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader