Skip to main content

2019 | OriginalPaper | Buchkapitel

Who’s There? Evaluating Data Source Integrity and Veracity in IIoT Using Multivariate Statistical Process Control

verfasst von : Iñaki Garitano, Mikel Iturbe, Enaitz Ezpeleta, Urko Zurutuza

Erschienen in: Security and Privacy Trends in the Industrial Internet of Things

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The security landscape in Industrial settings has completely changed in the last decades. From the initial primitive setups, industrial networks have evolved into massively interconnected environments, thus developing the Industrial Internet of Things (IIoT) paradigm. In IIoT, multiple, heterogeneous devices collaborate by collecting, sending and processing data. These data-driven environments have made possible to develop added-value services based on data that improve industrial process operation. However, it is necessary to audit incoming data to determine that the decisions are made based on correct data. In this chapter, we present an IIoT Anomaly Detection System (ADS), that audits the integrity and veracity of the data received from incoming connections. For this end, the ADS includes field data (physical qualities based on data) and connection metadata (interval between incoming connections and packet size) in the same anomaly detection model. The approach is based on multivariate statistical process Control and has been validated using data from a real water distribution plant.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Falliere N, Murchu LO, Chien E (2011) W32.Stuxnet dossier. White paper, Symantec Corporation, Security Response Falliere N, Murchu LO, Chien E (2011) W32.Stuxnet dossier. White paper, Symantec Corporation, Security Response
3.
Zurück zum Zitat Cheminod M, Durante L, Valenzano A (2013) Review of security issues in industrial networks. IEEE Trans Ind Inf 9(1):277–293CrossRef Cheminod M, Durante L, Valenzano A (2013) Review of security issues in industrial networks. IEEE Trans Ind Inf 9(1):277–293CrossRef
4.
Zurück zum Zitat Ding D, Han QL, Xiang Y, Ge X, Zhang XM (2018) A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing 275:1674–1683CrossRef Ding D, Han QL, Xiang Y, Ge X, Zhang XM (2018) A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing 275:1674–1683CrossRef
5.
Zurück zum Zitat Urbina DI, Giraldo J, Cardenas AA, Valente J, Faisal M, Tippenhauer NO, Ruths J, Candell R, Sandberg H (2016) Survey and new directions for physics-based attack detection in control systems. NIST GCR 16–010. Technical report, National Institute of Standards and Technology Urbina DI, Giraldo J, Cardenas AA, Valente J, Faisal M, Tippenhauer NO, Ruths J, Candell R, Sandberg H (2016) Survey and new directions for physics-based attack detection in control systems. NIST GCR 16–010. Technical report, National Institute of Standards and Technology
6.
Zurück zum Zitat Sadeghi AR, Wachsmann C, Waidner M (2015) Security and privacy challenges in industrial internet of things. In: 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), pp 1–6 Sadeghi AR, Wachsmann C, Waidner M (2015) Security and privacy challenges in industrial internet of things. In: 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), pp 1–6
7.
Zurück zum Zitat Sajid A, Abbas H, Saleem K (2016) Cloud-assisted IoT-based SCADA systems security: a review of the state of the art and future challenges. IEEE Access 4:1375–1384CrossRef Sajid A, Abbas H, Saleem K (2016) Cloud-assisted IoT-based SCADA systems security: a review of the state of the art and future challenges. IEEE Access 4:1375–1384CrossRef
8.
Zurück zum Zitat Rajasegarar S, Leckie C, Palaniswami M (2014) Hyperspherical cluster based distributed anomaly detection in wireless sensor networks. J Parall Distrib Comput 74(1):1833–1847CrossRef Rajasegarar S, Leckie C, Palaniswami M (2014) Hyperspherical cluster based distributed anomaly detection in wireless sensor networks. J Parall Distrib Comput 74(1):1833–1847CrossRef
9.
Zurück zum Zitat Thanigaivelan NK, Nigussie E, Kanth RK, Virtanen S, Isoaho J (2016) Distributed internal anomaly detection system for internet-of-things. In: 2016 13th IEEE annual consumer communications networking conference (CCNC), pp 319–320 Thanigaivelan NK, Nigussie E, Kanth RK, Virtanen S, Isoaho J (2016) Distributed internal anomaly detection system for internet-of-things. In: 2016 13th IEEE annual consumer communications networking conference (CCNC), pp 319–320
10.
Zurück zum Zitat Summerville DH, Zach KM, Chen Y (2015) Ultra-lightweight deep packet anomaly detection for internet of things devices. In: 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC), pp 1–8 Summerville DH, Zach KM, Chen Y (2015) Ultra-lightweight deep packet anomaly detection for internet of things devices. In: 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC), pp 1–8
11.
Zurück zum Zitat Stiawan D, Idris MY, Malik RF, Nurmaini S, Budiarto R (2016) Anomaly detection and monitoring in internet of things communication. In: 2016 8th International Conference on Information Technology and Electrical Engineering (ICITEE), pp 1–4 Stiawan D, Idris MY, Malik RF, Nurmaini S, Budiarto R (2016) Anomaly detection and monitoring in internet of things communication. In: 2016 8th International Conference on Information Technology and Electrical Engineering (ICITEE), pp 1–4
12.
Zurück zum Zitat Sicari S, Rizzardi A, Grieco L, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 76:146–164CrossRef Sicari S, Rizzardi A, Grieco L, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 76:146–164CrossRef
13.
Zurück zum Zitat Bao F, Chen IR (2012) Dynamic trust management for internet of things applications. In: Proceedings of the 2012 International Workshop on Self-Aware Internet of Things. Self-IoT’12, New York. ACM, pp 1–6 Bao F, Chen IR (2012) Dynamic trust management for internet of things applications. In: Proceedings of the 2012 International Workshop on Self-Aware Internet of Things. Self-IoT’12, New York. ACM, pp 1–6
14.
Zurück zum Zitat Mahalle PN, Thakre PA, Prasad NR, Prasad R (2013) A fuzzy approach to trust based access control in internet of things. In: Wireless VITAE 2013, pp 1–5 Mahalle PN, Thakre PA, Prasad NR, Prasad R (2013) A fuzzy approach to trust based access control in internet of things. In: Wireless VITAE 2013, pp 1–5
15.
Zurück zum Zitat Wang JP, Bin S, Yu Y, Niu XX (2013) Distributed trust management mechanism for the internet of things. Appl Mech Mater 347:2463–2467 Wang JP, Bin S, Yu Y, Niu XX (2013) Distributed trust management mechanism for the internet of things. Appl Mech Mater 347:2463–2467
16.
Zurück zum Zitat Liu Y, Chen Z, Xia F, Lv X, Bu F (2012) An integrated scheme based on service classification in pervasive mobile services. Int J Commun Syst 25(9):1178–1188CrossRef Liu Y, Chen Z, Xia F, Lv X, Bu F (2012) An integrated scheme based on service classification in pervasive mobile services. Int J Commun Syst 25(9):1178–1188CrossRef
17.
Zurück zum Zitat Liu WM, Yin LH, Fang B, Zhang HL (2012) A hierarchical trust model for the internet of things. Chin J Comput Phys 35(5):846–855CrossRef Liu WM, Yin LH, Fang B, Zhang HL (2012) A hierarchical trust model for the internet of things. Chin J Comput Phys 35(5):846–855CrossRef
18.
Zurück zum Zitat Saied YB, Olivereau A, Zeghlache D, Laurent M (2013) Trust management system design for the internet of things: a context-aware and multi-service approach. Comput Secur 39:351–365CrossRef Saied YB, Olivereau A, Zeghlache D, Laurent M (2013) Trust management system design for the internet of things: a context-aware and multi-service approach. Comput Secur 39:351–365CrossRef
19.
Zurück zum Zitat Liu Y, Gong X, Feng Y (2014) Trust system based on node behavior detection in internet of things. J Commun 35:8–15 Liu Y, Gong X, Feng Y (2014) Trust system based on node behavior detection in internet of things. J Commun 35:8–15
20.
Zurück zum Zitat Tormo GD, Mármol FG, Pérez GM (2015) Dynamic and flexible selection of a reputation mechanism for heterogeneous environments. Futur Gener Comput Syst 49:113–124CrossRef Tormo GD, Mármol FG, Pérez GM (2015) Dynamic and flexible selection of a reputation mechanism for heterogeneous environments. Futur Gener Comput Syst 49:113–124CrossRef
21.
Zurück zum Zitat MacGregor JF, Kourti T (1995) Statistical process control of multivariate processes. Control Eng Pract 3(3):403–414CrossRef MacGregor JF, Kourti T (1995) Statistical process control of multivariate processes. Control Eng Pract 3(3):403–414CrossRef
22.
Zurück zum Zitat Camacho J, Pérez Villegas A, García Teodoro P, Maciá Fernández G (2016) PCA-based multivariate statistical network monitoring for anomaly detection. Comput Secur 59:118–137CrossRef Camacho J, Pérez Villegas A, García Teodoro P, Maciá Fernández G (2016) PCA-based multivariate statistical network monitoring for anomaly detection. Comput Secur 59:118–137CrossRef
23.
Zurück zum Zitat Iturbe M, Camacho J, Garitano I, Zurutuza U, Uribeetxeberria R (2016) On the feasibility of distinguishing between process disturbances and intrusions in process control systems using multivariate statistical process control. In: 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W), Toulouse, pp 155–160 Iturbe M, Camacho J, Garitano I, Zurutuza U, Uribeetxeberria R (2016) On the feasibility of distinguishing between process disturbances and intrusions in process control systems using multivariate statistical process control. In: 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W), Toulouse, pp 155–160
24.
Zurück zum Zitat Stoumbos ZG, Reynolds MR Jr, Ryan TP, Woodall WH (2000) The state of statistical process control as we proceed into the twenty-first century. J Am Stat Assoc 95(451):992–998CrossRef Stoumbos ZG, Reynolds MR Jr, Ryan TP, Woodall WH (2000) The state of statistical process control as we proceed into the twenty-first century. J Am Stat Assoc 95(451):992–998CrossRef
25.
Zurück zum Zitat Kourti T (2002) Process analysis and abnormal situation detection: from theory to practice. Control Syst IEEE 22(5):10–25CrossRef Kourti T (2002) Process analysis and abnormal situation detection: from theory to practice. Control Syst IEEE 22(5):10–25CrossRef
26.
Zurück zum Zitat Camacho J, Pérez Villegas A, Rodríguez Gómez RA, Jiménez Mañas E (2015) Multivariate exploratory data analysis (MEDA) toolbox for matlab. Chemometrics Intell Lab Syst 143:49–57CrossRef Camacho J, Pérez Villegas A, Rodríguez Gómez RA, Jiménez Mañas E (2015) Multivariate exploratory data analysis (MEDA) toolbox for matlab. Chemometrics Intell Lab Syst 143:49–57CrossRef
27.
Zurück zum Zitat Hotelling H (1947) Multivariate quality control. In: Eisenhart C, Hastay MW, Wallis WA (eds) Techniques of statistical analysis. McGraw-Hill, New York Hotelling H (1947) Multivariate quality control. In: Eisenhart C, Hastay MW, Wallis WA (eds) Techniques of statistical analysis. McGraw-Hill, New York
28.
Zurück zum Zitat Jackson JE, Mudholkar GS (1979) Control procedures for residuals associated with principal component analysis. Technometrics 21(3):341–349CrossRef Jackson JE, Mudholkar GS (1979) Control procedures for residuals associated with principal component analysis. Technometrics 21(3):341–349CrossRef
29.
Zurück zum Zitat Ramaker HJ, Van Sprang EN, Westerhuis JA, Gurden SP, Smilde AK, Van Der Meulen FH (2006) Performance assessment and improvement of control charts for statistical batch process monitoring. Statistica Neerlandica 60(3):339–360MathSciNetCrossRef Ramaker HJ, Van Sprang EN, Westerhuis JA, Gurden SP, Smilde AK, Van Der Meulen FH (2006) Performance assessment and improvement of control charts for statistical batch process monitoring. Statistica Neerlandica 60(3):339–360MathSciNetCrossRef
30.
Zurück zum Zitat Alcala CF, Qin SJ (2011) Analysis and generalization of fault diagnosis methods for process monitoring. J Process Control 21(3):322–330CrossRef Alcala CF, Qin SJ (2011) Analysis and generalization of fault diagnosis methods for process monitoring. J Process Control 21(3):322–330CrossRef
31.
Zurück zum Zitat Camacho J (2011) Observation-based missing data methods for exploratory data analysis to unveil the connection between observations and variables in latent subspace models. J Chemometrics 25(11):592–600CrossRef Camacho J (2011) Observation-based missing data methods for exploratory data analysis to unveil the connection between observations and variables in latent subspace models. J Chemometrics 25(11):592–600CrossRef
32.
Zurück zum Zitat Zaharia M, Xin RS, Wendell P, Das T, Armbrust M, Dave A, Meng X, Rosen J, Venkataraman S, Franklin MJ et al (2016) Apache spark: a unified engine for big data processing. Commun ACM 59(11):56–65CrossRef Zaharia M, Xin RS, Wendell P, Das T, Armbrust M, Dave A, Meng X, Rosen J, Venkataraman S, Franklin MJ et al (2016) Apache spark: a unified engine for big data processing. Commun ACM 59(11):56–65CrossRef
Metadaten
Titel
Who’s There? Evaluating Data Source Integrity and Veracity in IIoT Using Multivariate Statistical Process Control
verfasst von
Iñaki Garitano
Mikel Iturbe
Enaitz Ezpeleta
Urko Zurutuza
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-12330-7_9