Skip to main content
Erschienen in: e & i Elektrotechnik und Informationstechnik 3/2018

24.05.2018 | Orginalarbeit

Countering targeted cyber-physical attacks using anomaly detection in self-adaptive Industry 4.0 Systems

verfasst von: Giuseppe Settanni, Florian Skopik, Markus Wurzenberger, Roman Fiedler

Erschienen in: e+i Elektrotechnik und Informationstechnik | Ausgabe 3/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper presents a novel approach to flexibly control the depth of monitoring applied to CPS-enabled safety-critical infrastructures, to timely detect deviations from the desired operational status, and discusses how the application of anomaly detection (AD) techniques can be further leveraged to automatically adapt the security controls of the infrastructure itself.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Open Web Application Security Project (OWASP): The free and open software security community http://​www.​owasp.​org/​.
 
2
As further described in the following, in our work we adopted our log-based white-listing anomaly detection approach named AECID [17].
 
Literatur
1.
Zurück zum Zitat Arcaini, P., Riccobene, E., Scandurra, P. (2015): Modeling and analyzing MAPE-K feedback loops for self-adaptation. In Proceedings of the 10th international symposium on software engineering for adaptive and self-managing systems (pp. 13–23). New York: IEEE Press. Arcaini, P., Riccobene, E., Scandurra, P. (2015): Modeling and analyzing MAPE-K feedback loops for self-adaptation. In Proceedings of the 10th international symposium on software engineering for adaptive and self-managing systems (pp. 13–23). New York: IEEE Press.
2.
Zurück zum Zitat Chandola, V., Banerjee, A., Kumar, V. (2009): Anomaly detection: a survey. ACM Comput. Surv., 41(3), 15. CrossRef Chandola, V., Banerjee, A., Kumar, V. (2009): Anomaly detection: a survey. ACM Comput. Surv., 41(3), 15. CrossRef
3.
Zurück zum Zitat Hankel, M., Rexroth, B. (2015): The reference architectural model Industrie 4.0 (RAMI 4.0). Frankfurt a. M.: ZVEI. Hankel, M., Rexroth, B. (2015): The reference architectural model Industrie 4.0 (RAMI 4.0). Frankfurt a. M.: ZVEI.
4.
Zurück zum Zitat Industrial Internet Consortium (2016): Industrial internet of things, vol. G4: security framework. Needham: Industrial Internet Consortium. Industrial Internet Consortium (2016): Industrial internet of things, vol. G4: security framework. Needham: Industrial Internet Consortium.
6.
Zurück zum Zitat Lasi, H., Fettke, P., Kemper, H.-G., Feld, T., Hoffmann, M. (2014): Industry 4.0. Bus. Inf. Syst. Eng., 6(4), 239. CrossRef Lasi, H., Fettke, P., Kemper, H.-G., Feld, T., Hoffmann, M. (2014): Industry 4.0. Bus. Inf. Syst. Eng., 6(4), 239. CrossRef
7.
Zurück zum Zitat Liebi, M. (2016): Industry 4.0 and the impact on cybersecurity. Bern: United Security Providers. Liebi, M. (2016): Industry 4.0 and the impact on cybersecurity. Bern: United Security Providers.
8.
Zurück zum Zitat Ma, Z., Hudic, A., Shaaban, A., Plosz, S. (2017): Security viewpoint in a reference architecture model for cyber-physical production systems. In 2017 IEEE European symposium on security and privacy workshops, EuroS&PW (pp. 153–159). New York: IEEE Press. CrossRef Ma, Z., Hudic, A., Shaaban, A., Plosz, S. (2017): Security viewpoint in a reference architecture model for cyber-physical production systems. In 2017 IEEE European symposium on security and privacy workshops, EuroS&PW (pp. 153–159). New York: IEEE Press. CrossRef
9.
Zurück zum Zitat Muccini, H., Sharaf, M., Weyns, D. (2016): Self-adaptation for cyber physical systems: a systematic literature review. In Proceedings of the 11th international symposium on software engineering for adaptive and self-managing systems (pp. 75–81). New York: ACM. Muccini, H., Sharaf, M., Weyns, D. (2016): Self-adaptation for cyber physical systems: a systematic literature review. In Proceedings of the 11th international symposium on software engineering for adaptive and self-managing systems (pp. 75–81). New York: ACM.
10.
Zurück zum Zitat Musil, A., Musil, J., Weyns, D., Bures, T., Muccini, H., Sharaf, M. (2017): Patterns for self-adaptation in cyber-physical systems. In Multi-disciplinary engineering for cyber-physical production systems (pp. 331–368). Berlin: Springer. CrossRef Musil, A., Musil, J., Weyns, D., Bures, T., Muccini, H., Sharaf, M. (2017): Patterns for self-adaptation in cyber-physical systems. In Multi-disciplinary engineering for cyber-physical production systems (pp. 331–368). Berlin: Springer. CrossRef
11.
Zurück zum Zitat Om, H., Kundu, A. (2012): A hybrid system for reducing the false alarm rate of anomaly intrusion detection system. In 2012 1st international conference on recent advances in information technology. RAIT (pp. 131–136). New York: IEEE Press. Om, H., Kundu, A. (2012): A hybrid system for reducing the false alarm rate of anomaly intrusion detection system. In 2012 1st international conference on recent advances in information technology. RAIT (pp. 131–136). New York: IEEE Press.
12.
Zurück zum Zitat Pereira, T., Barreto, L., Amaral, A. (2017): Network and information security challenges within Industry 4.0 paradigm. Proc. Manuf., 13, 1253–1260. Pereira, T., Barreto, L., Amaral, A. (2017): Network and information security challenges within Industry 4.0 paradigm. Proc. Manuf., 13, 1253–1260.
13.
Zurück zum Zitat Settanni, G., Skopik, F., Karaj, A., Wurzenberger, M., Fiedler, R. (2018): Protecting cyber physical production systems using anomaly detection to enable self-adaptation. In 1st IEEE international conference on industrial cyber physical systems, ICPS 2018 (pp. 173–180). New York: IEEE Press. Settanni, G., Skopik, F., Karaj, A., Wurzenberger, M., Fiedler, R. (2018): Protecting cyber physical production systems using anomaly detection to enable self-adaptation. In 1st IEEE international conference on industrial cyber physical systems, ICPS 2018 (pp. 173–180). New York: IEEE Press.
14.
Zurück zum Zitat Skopik, F. (2017): Collaborative cyber threat intelligence: detecting and responding to advanced cyber attacks at the national level. Boca Raton: CRC Press. Skopik, F. (2017): Collaborative cyber threat intelligence: detecting and responding to advanced cyber attacks at the national level. Boca Raton: CRC Press.
15.
Zurück zum Zitat Tauber, M., Kirby, G., Dearle, A. (2010): Self-adaptation applied to peer-set maintenance in chord via a generic autonomic management framework. In 2010 fourth IEEE international conference on self-adaptive and self-organizing systems workshop, SASOW (pp. 9–16). New York: IEEE Press. CrossRef Tauber, M., Kirby, G., Dearle, A. (2010): Self-adaptation applied to peer-set maintenance in chord via a generic autonomic management framework. In 2010 fourth IEEE international conference on self-adaptive and self-organizing systems workshop, SASOW (pp. 9–16). New York: IEEE Press. CrossRef
16.
Zurück zum Zitat Thonnard, O., Bilge, L., OGorman, G., Kiernan, S., Lee, M. (2012): Industrial espionage and targeted attacks: understanding the characteristics of an escalating threat. In International workshop on recent advances in intrusion detection (pp. 64–85). Berlin: Springer. Thonnard, O., Bilge, L., OGorman, G., Kiernan, S., Lee, M. (2012): Industrial espionage and targeted attacks: understanding the characteristics of an escalating threat. In International workshop on recent advances in intrusion detection (pp. 64–85). Berlin: Springer.
17.
Zurück zum Zitat Wurzenberger, M., Skopik, F., Settanni, G., Fiedler, R. (2018): AECID: a self-learning anomaly detection approach based on light-weight log parser models. In 4th international conference on information systems security and privacy, ICISSP 2018, January 22–24, 2018. Funchal, Madeira, Portugal. Setubal: INSTICC. Wurzenberger, M., Skopik, F., Settanni, G., Fiedler, R. (2018): AECID: a self-learning anomaly detection approach based on light-weight log parser models. In 4th international conference on information systems security and privacy, ICISSP 2018, January 22–24, 2018. Funchal, Madeira, Portugal. Setubal: INSTICC.
Metadaten
Titel
Countering targeted cyber-physical attacks using anomaly detection in self-adaptive Industry 4.0 Systems
verfasst von
Giuseppe Settanni
Florian Skopik
Markus Wurzenberger
Roman Fiedler
Publikationsdatum
24.05.2018
Verlag
Springer Vienna
Erschienen in
e+i Elektrotechnik und Informationstechnik / Ausgabe 3/2018
Print ISSN: 0932-383X
Elektronische ISSN: 1613-7620
DOI
https://doi.org/10.1007/s00502-018-0615-6

Weitere Artikel der Ausgabe 3/2018

e & i Elektrotechnik und Informationstechnik 3/2018 Zur Ausgabe

Neuer Inhalt