Behavior Based Anomaly Detection Model in SCADA
Behavior Based Anomaly Detection Model in SCADA
1051/matecconf/201817301011
SMIMA 2018
P.R.China
Abstract. With the arrival of Industry 4.0, more and more industrial control systems are connected with the
outside world, which brings tremendous convenience to industrial production and control, and also
introduces many potential security hazards. After a large number of attack cases analysis, we found that
attacks in SCADA systems can be divided into internal attacks and external attacks. Both types of attacks
are inevitable. Traditional firewalls, IDSs and IPSs are no longer suitable for industrial control systems.
Therefore, we propose behavior-based anomaly detection and build three baselines of normal behaviors.
Experiments show that using our proposed detection model, we can quickly detect a variety of attacks on
SCADA (Supervisory Control And Data Acquisition) systems.
*
Corresponding author: [email protected]
© The Authors, published by EDP Sciences. This is an open access article distributed under the terms of the Creative Commons Attribution
License 4.0 (http://creativecommons.org/licenses/by/4.0/).
MATEC Web of Conferences 173, 01011 (2018) https://doi.org/10.1051/matecconf/201817301011
SMIMA 2018
2.1. SCADA system structure misuse, software contractors, third-party integrators, and
more. Due to the lack of authentication and encryption
A typical industrial network[5] shown in Figure 1,which mechanisms that limit user activity in most industrial
is the reference model of Purdue University. control systems, users have unfettered access to devices
on the network, even modifying device configuration
and operating parameters. Typical attacks include the
incident of Maluqi, Australia Vitek Boden, former
engineer of the technology service provider of the plant,
was deliberately repaying for being dissatisfied with the
renewal of his contract of work. A total of 1 million
liters of untreated sewage were drained directly into the
natural water system through storm drains. The United
States Davis-Besse nuclear power plant was attacked by
the Slammer worm [6].
2
MATEC Web of Conferences 173, 01011 (2018) https://doi.org/10.1051/matecconf/201817301011
SMIMA 2018
and stable operation of industrial control systems. And II. Source Port (S-Port)
we come to the conclusion that all these threats and III. Target IP (D-IP)
attacks will be refelected on the behavior of IV. The target port (D-Port)
devices(Figure 3). V. Unit interval length (1s) (SegSize)
Since SCADA system attacks are inevitable, there is Then we use machine learning method to process all
a need for a method that can detect attacks in time and the information.
avoid attacks such as Stuxnet[8]. Therefore, we propose a
behavioral based anomaly detection mechanism.
3.2 Entity determination
3 Framework for behavior-based This step we want to uniquely identify an entity. Device
fingerprint is a series of device-related data that uniquely
anomaly detection mechanism depicts a device. This information includes: device
In this section, we will describe the model in detail. The operating system, configuration information, operational
framework is shown in Figure 4. behavior features, and more.
Generally, industrial control protocols (such as
Modbus) provide the query function, which can be used
to collect information. Moreover, the conversations in
industrial control systems have significant stability and
periodicity. Researchers can make fingerprints of
industrial control systems by using data sources such as
network traffic characteristics and interaction modes
based on time dimension.
Then we will determine the relationship between
entities and infer the topology. Industrial control systems
have their inherent characteristics and drawbacks over
conventional Internet and corporate LANs. First of all,
compared with the traditional IT systems, industrial
control devices in industrial control systems generally
have a longer life cycle; second, the industrial control
system has a stable network topology; Finally, in
industrial control systems, the role of a single device is
usually unique, with a fixed communication object.
Therefore, the network topology of the SCADA
system can be reconstructed based on the traffic in the
SCADA system.
3
MATEC Web of Conferences 173, 01011 (2018) https://doi.org/10.1051/matecconf/201817301011
SMIMA 2018
5 Conclusion
This paper first analyzes the structure of SCADA system
and the security threats faced by SCADA system. Then it
introduces the framework of behavior-based anomaly
detection mechanism and introduces each module in the
framework in detail. Based on the collected information,
we construct three different normal behavior baseline
from multiple dimensions and use these to detect the
attack. Experiments show that the proposed detection
model can find fake attacks, data packet tampering
attacks and logical sequential attacks well.
6 Future work
Future work we intend to focus on the following two
research directions:
(1). Establish a defense-in-depth system[9] suitable
for industrial control systems. According to the
characteristics of industrial control system, the depth
defense system will be improved so that it can be better
applied to the security of industrial control systems[10].
(2). Establish a kill-chain model[11] specially for
Fig. 5. Anomaly detection process. industrial safety. The current kill chain model is rough,
ignoring a lot of details of attack. We intend to create a
kill chain model that is specific to industrial control
4 Experimental verification systems.
Let's experiment with the behavior-based anomaly
detection model we built. Acknowledgements
We thank our shepherds—Zhen Xu, Liming Wang in
4.1. Fake attack our research group, for providing insightful feedback of
Due to the lack of authentication of communication the draft that helped improve the final paper. We would
entities in SCADA systems, there is a large number of also like to thank Kai Chen, Zelong Chen and Zhenbo
counterfeit attacks. We have installed a PLC simulation Yan for their help in early discussions and providing
software in an experimental notebook, the laptop insightful comments. This work was supported by
disguised as PLC and communicated with host computer. Security Services for Informatization Applications
In this way, anomaly detection system installed on the Program, Institute of Information Engineering, Chinese
host computer will quickly detect abnormalities. Because Academy of Sciences, under grant No. XXH13505-02,
according to the uniqueness of the entity, you can for which we are grateful.
determine that PLC is fake which is now communicating
with the host computer.
4
MATEC Web of Conferences 173, 01011 (2018) https://doi.org/10.1051/matecconf/201817301011
SMIMA 2018
References
1. Langner R. Stuxnet: Dissecting a cyberwarfare
weapon[J]. IEEE Security & Privacy, 2011, 9(3):
49-51.
2. Bencsáth B, Pék G, Buttyán L, et al. Duqu: A
Stuxnet-like malware found in the wild[J]. CrySyS
Lab Technical Report, 2011, 14: 1-60.
3. HENTUNEN D T. A: Havex Hunts for ICS/SCADA
Systems [on-line][J]. 2014.
4. Case D U. Analysis of the cyber attack on the
Ukrainian power grid[J]. Electricity Information
Sharing and Analysis Center (E-ISAC), 2016.
5. Knapp E D, Langill J T. Industrial Network Security:
Securing critical infrastructure networks for smart
grid, SCADA, and other Industrial Control
Systems[M]. Syngress, 2014.
6. Moore D, Paxson V, Savage S, et al. Inside the
slammer worm[J]. IEEE Security & Privacy, 2003,
99(4): 33-39.
7. Krebs B. Cyber incident blamed for nuclear power
plant shutdown[J]. Washington Post, June, 2008, 5:
2008.
8. Byres E, Ginter A, Langill J. How Stuxnet spreads–
A study of infection paths in best practice systems[J].
Tofino Security, white paper, 2011.
9. Kuipers D, Fabro M. Control systems cyber security:
Defense in depth strategies[R]. Idaho National
Laboratory (INL), 2006.
10. Stouffer K, Falco J, Scarfone K. Guide to industrial
control systems (ICS) security[J]. NIST special
publication, 2011, 800(82): 16-16.
11. Greenert J, Welsh M. Breaking the kill chain[J].
Foreign Policy, 2013, 16.