Skip to main content
Erschienen in:
Buchtitelbild

2019 | OriginalPaper | Buchkapitel

Research and Application of Anomaly Detection of Industrial Control System Based on Improved Zoe Algorithm

verfasst von : Xin Xie, Bin Wang, Tiancheng Wan, Xunyi Jiang, Weiru Wang, WenLiang Tang

Erschienen in: Cyberspace Safety and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Due to the complexity of components and the diversity of protocols in industrial control systems, it is difficult to simply use content-based anomaly detection system with the background. This paper proposes an improved Zoe algorithm. In the algorithm, the similarity between traffics is calculated through sequence coverage. And we use Count-Mean-Min Sketch to store and count the sub-strings. Finally, we utilize clustering to achieve the anomaly detection of the industrial control system. The experimental results show that this algorithm can achieve higher detection rate and lower false positive rate of anomaly detection in industrial control systems.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Sun, Z., Liang, G., Bai, Y.: A hierarchical intrusion detection model in wireless sensor networks. Inf. Control 42(6), 670–676 (2013) Sun, Z., Liang, G., Bai, Y.: A hierarchical intrusion detection model in wireless sensor networks. Inf. Control 42(6), 670–676 (2013)
2.
Zurück zum Zitat Shn, S., Kwon, T., Jo, G.Y.: An experimental study of hierarchical intrusion detection for wireless industrial sensor networks. IEEE Trans. Industr. Inf. 6(4), 744–757 (2010)CrossRef Shn, S., Kwon, T., Jo, G.Y.: An experimental study of hierarchical intrusion detection for wireless industrial sensor networks. IEEE Trans. Industr. Inf. 6(4), 744–757 (2010)CrossRef
3.
Zurück zum Zitat Jones, R.A., Horowitz, B.: A system-aware cyber security architecture. Syst. Eng. 15(2), 225–240 (2012)CrossRef Jones, R.A., Horowitz, B.: A system-aware cyber security architecture. Syst. Eng. 15(2), 225–240 (2012)CrossRef
4.
Zurück zum Zitat Cherepanov, A.: Win32/industroyer – a new threat for industrial control systems. Technical report, ESET (2017) Cherepanov, A.: Win32/industroyer – a new threat for industrial control systems. Technical report, ESET (2017)
5.
Zurück zum Zitat K. Lab: The DUQU 2.0 – technical details. Technical report, Kaspersky Lab (2015) K. Lab: The DUQU 2.0 – technical details. Technical report, Kaspersky Lab (2015)
6.
Zurück zum Zitat Yingxu, L., Jiao, J., Jing, L.: Analysis of industrial control systems traffic based on time series. In: 2015 IEEE Twelfth International Symposium on Autonomous Decentralized Systems, pp. 123–129. IEEE Press, Taichung (2015) Yingxu, L., Jiao, J., Jing, L.: Analysis of industrial control systems traffic based on time series. In: 2015 IEEE Twelfth International Symposium on Autonomous Decentralized Systems, pp. 123–129. IEEE Press, Taichung (2015)
7.
Zurück zum Zitat Arévalo, F., Rernentería, J., Schwung, A.: Fault detection assessment architectures based on classification methods and information fusion. In: 2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA), pp. 1343–1350. IEEE Press, Turin (2018) Arévalo, F., Rernentería, J., Schwung, A.: Fault detection assessment architectures based on classification methods and information fusion. In: 2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA), pp. 1343–1350. IEEE Press, Turin (2018)
8.
Zurück zum Zitat Tsai, J., Lo, N.: Secure anonymous key distribution scheme for smart grid. IEEE Trans. Smart Grid 7(2), 906–914 (2016) Tsai, J., Lo, N.: Secure anonymous key distribution scheme for smart grid. IEEE Trans. Smart Grid 7(2), 906–914 (2016)
9.
Zurück zum Zitat Liu, T., Sun, Y., Liu, Y., et al.: Abnormal traffic-indexed state estimation: a cyber-physical fusion approach for smart grid attack detection. Future Gener. Comput. Syst. 49, 94–103 (2015)CrossRef Liu, T., Sun, Y., Liu, Y., et al.: Abnormal traffic-indexed state estimation: a cyber-physical fusion approach for smart grid attack detection. Future Gener. Comput. Syst. 49, 94–103 (2015)CrossRef
10.
Zurück zum Zitat Kurt, M.N., Yılmaz, Y., Wang, X.: Distributed quickest detection of cyber-attacks in smart grid. IEEE Trans. Inf. Forensics Secur. 13(8), 1 (2018)CrossRef Kurt, M.N., Yılmaz, Y., Wang, X.: Distributed quickest detection of cyber-attacks in smart grid. IEEE Trans. Inf. Forensics Secur. 13(8), 1 (2018)CrossRef
11.
Zurück zum Zitat Jiang, N., Li, B., Wan, T., Liu, L.: C-POEM: comprehensive performance optimization evaluation model for wireless sensor networks. Soft. Comput. 21(12), 3377–3385 (2017)CrossRef Jiang, N., Li, B., Wan, T., Liu, L.: C-POEM: comprehensive performance optimization evaluation model for wireless sensor networks. Soft. Comput. 21(12), 3377–3385 (2017)CrossRef
12.
Zurück zum Zitat Jiang, N., Xiao, X., Liu, L.: Localization scheme for wireless sensor networks based on “shortcut” constraint. Ad Hoc Sens. Wirel. Netw. 26(1–4), 1–19 (2015) Jiang, N., Xiao, X., Liu, L.: Localization scheme for wireless sensor networks based on “shortcut” constraint. Ad Hoc Sens. Wirel. Netw. 26(1–4), 1–19 (2015)
13.
Zurück zum Zitat Lai, Y.X., Liu, Z.H., Cai, X.T., et al.: Research on intrusion detection of industrial control system. J. Commun. 38(2), 143–156 (2017) Lai, Y.X., Liu, Z.H., Cai, X.T., et al.: Research on intrusion detection of industrial control system. J. Commun. 38(2), 143–156 (2017)
14.
Zurück zum Zitat Yu, B.B., Wang, H.Z., Yan, B.Y.: Intrusion detection of industrial control systems based on long and short time memory networks. Inf. Control 47(01), 54–59 (2018) Yu, B.B., Wang, H.Z., Yan, B.Y.: Intrusion detection of industrial control systems based on long and short time memory networks. Inf. Control 47(01), 54–59 (2018)
15.
Zurück zum Zitat Song, L.K., Fei, C.W., Bai, G.C., et al.: Dynamic neural network method-based improved PSO and BR algorithms for transient probabilistic analysis of flexible mechanism. Adv. Eng. Inform. 33, 144–153 (2017)CrossRef Song, L.K., Fei, C.W., Bai, G.C., et al.: Dynamic neural network method-based improved PSO and BR algorithms for transient probabilistic analysis of flexible mechanism. Adv. Eng. Inform. 33, 144–153 (2017)CrossRef
16.
Zurück zum Zitat Hadžiosmanović, D., Simionato, L., Bolzoni, D., Zambon, E., Etalle, S.: N-gram against the machine: on the feasibility of the N-gram network analysis for binary protocols. In: Balzarotti, D., Stolfo, S.J., Cova, M. (eds.) RAID 2012. LNCS, vol. 7462, pp. 354–373. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-33338-5_18CrossRef Hadžiosmanović, D., Simionato, L., Bolzoni, D., Zambon, E., Etalle, S.: N-gram against the machine: on the feasibility of the N-gram network analysis for binary protocols. In: Balzarotti, D., Stolfo, S.J., Cova, M. (eds.) RAID 2012. LNCS, vol. 7462, pp. 354–373. Springer, Heidelberg (2012). https://​doi.​org/​10.​1007/​978-3-642-33338-5_​18CrossRef
17.
Zurück zum Zitat Huang, Y.W., Chen, G., Ye, J.F.: Weighted K-nearest neighbor indoor positioning algorithm based on cosine similarity. Comput. Appl. Softw. 36(02), 159–162 (2019) Huang, Y.W., Chen, G., Ye, J.F.: Weighted K-nearest neighbor indoor positioning algorithm based on cosine similarity. Comput. Appl. Softw. 36(02), 159–162 (2019)
18.
Zurück zum Zitat Wressnegger, C., Kellner, A., Rieck, K.: Zoe: content-based anomaly detection for industrial control systems. In: 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pp. 127–138. IEEE Press, Luxembourg City (2018) Wressnegger, C., Kellner, A., Rieck, K.: Zoe: content-based anomaly detection for industrial control systems. In: 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pp. 127–138. IEEE Press, Luxembourg City (2018)
19.
Zurück zum Zitat Marteau, P.-F.: Sequence covering for efficient host-based intrusion detection. IEEE Trans. Inf. Forensics Secur. 14(4), 994–1006 (2019)MathSciNetCrossRef Marteau, P.-F.: Sequence covering for efficient host-based intrusion detection. IEEE Trans. Inf. Forensics Secur. 14(4), 994–1006 (2019)MathSciNetCrossRef
21.
Zurück zum Zitat Cormode, G., Muthukrishnan, M.: Approximating data with the count-min sketch. IEEE Softw. 29(1), 64–69 (2012)CrossRef Cormode, G., Muthukrishnan, M.: Approximating data with the count-min sketch. IEEE Softw. 29(1), 64–69 (2012)CrossRef
22.
Zurück zum Zitat Creech, G., Hu, J.: A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns. IEEE Trans. Comput. 63(4), 807–819 (2014)MathSciNetCrossRef Creech, G., Hu, J.: A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns. IEEE Trans. Comput. 63(4), 807–819 (2014)MathSciNetCrossRef
24.
Zurück zum Zitat Nader, P., Honeine, P., Beauseroy, P.: One-class classification for intrusion detection in SCADA systems. IEEE Trans. Industr. Inf. 10(4), 2308–2317 (2014)CrossRef Nader, P., Honeine, P., Beauseroy, P.: One-class classification for intrusion detection in SCADA systems. IEEE Trans. Industr. Inf. 10(4), 2308–2317 (2014)CrossRef
26.
Zurück zum Zitat Suthaharan, S., Alzahrani, M., Rajasegarar, S., et al.: Labelled data collection for anomaly detection in wireless sensor networks. In: Sixth International Conference on Intelligent Sensors, pp. 269–274. IEEE Press, Brisbane (2010) Suthaharan, S., Alzahrani, M., Rajasegarar, S., et al.: Labelled data collection for anomaly detection in wireless sensor networks. In: Sixth International Conference on Intelligent Sensors, pp. 269–274. IEEE Press, Brisbane (2010)
27.
Zurück zum Zitat Almalawi, A., Fahad, A., Tari, Z., et al.: An efficient data-driven clustering technique to detect attacks in SCADA systems. IEEE Trans. Inf. Forensics Secur. 11(5), 893–906 (2016)CrossRef Almalawi, A., Fahad, A., Tari, Z., et al.: An efficient data-driven clustering technique to detect attacks in SCADA systems. IEEE Trans. Inf. Forensics Secur. 11(5), 893–906 (2016)CrossRef
Metadaten
Titel
Research and Application of Anomaly Detection of Industrial Control System Based on Improved Zoe Algorithm
verfasst von
Xin Xie
Bin Wang
Tiancheng Wan
Xunyi Jiang
Weiru Wang
WenLiang Tang
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-37337-5_1

Premium Partner