Cargando…

Correlation-Based Anomaly Detection in Industrial Control Systems

Industrial Control Systems (ICSs) were initially designed to be operated in an isolated network. However, recently, ICSs have been increasingly connected to the Internet to expand their capability, such as remote management. This interconnectivity of ICSs exposes them to cyber-attacks. At the same t...

Descripción completa

Detalles Bibliográficos
Autores principales: Jadidi, Zahra, Pal, Shantanu, Hussain, Mukhtar, Nguyen Thanh, Kien
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9920746/
https://www.ncbi.nlm.nih.gov/pubmed/36772600
http://dx.doi.org/10.3390/s23031561
_version_ 1784887145220014080
author Jadidi, Zahra
Pal, Shantanu
Hussain, Mukhtar
Nguyen Thanh, Kien
author_facet Jadidi, Zahra
Pal, Shantanu
Hussain, Mukhtar
Nguyen Thanh, Kien
author_sort Jadidi, Zahra
collection PubMed
description Industrial Control Systems (ICSs) were initially designed to be operated in an isolated network. However, recently, ICSs have been increasingly connected to the Internet to expand their capability, such as remote management. This interconnectivity of ICSs exposes them to cyber-attacks. At the same time, cyber-attacks in ICS networks are different compared to traditional Information Technology (IT) networks. Cyber attacks on ICSs usually involve a sequence of actions and a multitude of devices. However, current anomaly detection systems only focus on local analysis, which misses the correlation between devices and the progress of attacks over time. As a consequence, they lack an effective way to detect attacks at an entire network scale and predict possible future actions of an attack, which is of significant interest to security analysts to identify the weaknesses of their network and prevent similar attacks in the future. To address these two key issues, this paper presents a system-wide anomaly detection solution using recurrent neural networks combined with correlation analysis techniques. The proposed solution has a two-layer analysis. The first layer targets attack detection, and the second layer analyses the detected attack to predict the next possible attack actions. The main contribution of this paper is the proof of the concept implementation using two real-world ICS datasets, SWaT and Power System Attack. Moreover, we show that the proposed solution effectively detects anomalies and attacks on the scale of the entire ICS network.
format Online
Article
Text
id pubmed-9920746
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-99207462023-02-12 Correlation-Based Anomaly Detection in Industrial Control Systems Jadidi, Zahra Pal, Shantanu Hussain, Mukhtar Nguyen Thanh, Kien Sensors (Basel) Article Industrial Control Systems (ICSs) were initially designed to be operated in an isolated network. However, recently, ICSs have been increasingly connected to the Internet to expand their capability, such as remote management. This interconnectivity of ICSs exposes them to cyber-attacks. At the same time, cyber-attacks in ICS networks are different compared to traditional Information Technology (IT) networks. Cyber attacks on ICSs usually involve a sequence of actions and a multitude of devices. However, current anomaly detection systems only focus on local analysis, which misses the correlation between devices and the progress of attacks over time. As a consequence, they lack an effective way to detect attacks at an entire network scale and predict possible future actions of an attack, which is of significant interest to security analysts to identify the weaknesses of their network and prevent similar attacks in the future. To address these two key issues, this paper presents a system-wide anomaly detection solution using recurrent neural networks combined with correlation analysis techniques. The proposed solution has a two-layer analysis. The first layer targets attack detection, and the second layer analyses the detected attack to predict the next possible attack actions. The main contribution of this paper is the proof of the concept implementation using two real-world ICS datasets, SWaT and Power System Attack. Moreover, we show that the proposed solution effectively detects anomalies and attacks on the scale of the entire ICS network. MDPI 2023-02-01 /pmc/articles/PMC9920746/ /pubmed/36772600 http://dx.doi.org/10.3390/s23031561 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Jadidi, Zahra
Pal, Shantanu
Hussain, Mukhtar
Nguyen Thanh, Kien
Correlation-Based Anomaly Detection in Industrial Control Systems
title Correlation-Based Anomaly Detection in Industrial Control Systems
title_full Correlation-Based Anomaly Detection in Industrial Control Systems
title_fullStr Correlation-Based Anomaly Detection in Industrial Control Systems
title_full_unstemmed Correlation-Based Anomaly Detection in Industrial Control Systems
title_short Correlation-Based Anomaly Detection in Industrial Control Systems
title_sort correlation-based anomaly detection in industrial control systems
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9920746/
https://www.ncbi.nlm.nih.gov/pubmed/36772600
http://dx.doi.org/10.3390/s23031561
work_keys_str_mv AT jadidizahra correlationbasedanomalydetectioninindustrialcontrolsystems
AT palshantanu correlationbasedanomalydetectioninindustrialcontrolsystems
AT hussainmukhtar correlationbasedanomalydetectioninindustrialcontrolsystems
AT nguyenthanhkien correlationbasedanomalydetectioninindustrialcontrolsystems