Cargando…
Correlation-Based Anomaly Detection in Industrial Control Systems
Industrial Control Systems (ICSs) were initially designed to be operated in an isolated network. However, recently, ICSs have been increasingly connected to the Internet to expand their capability, such as remote management. This interconnectivity of ICSs exposes them to cyber-attacks. At the same t...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9920746/ https://www.ncbi.nlm.nih.gov/pubmed/36772600 http://dx.doi.org/10.3390/s23031561 |
_version_ | 1784887145220014080 |
---|---|
author | Jadidi, Zahra Pal, Shantanu Hussain, Mukhtar Nguyen Thanh, Kien |
author_facet | Jadidi, Zahra Pal, Shantanu Hussain, Mukhtar Nguyen Thanh, Kien |
author_sort | Jadidi, Zahra |
collection | PubMed |
description | Industrial Control Systems (ICSs) were initially designed to be operated in an isolated network. However, recently, ICSs have been increasingly connected to the Internet to expand their capability, such as remote management. This interconnectivity of ICSs exposes them to cyber-attacks. At the same time, cyber-attacks in ICS networks are different compared to traditional Information Technology (IT) networks. Cyber attacks on ICSs usually involve a sequence of actions and a multitude of devices. However, current anomaly detection systems only focus on local analysis, which misses the correlation between devices and the progress of attacks over time. As a consequence, they lack an effective way to detect attacks at an entire network scale and predict possible future actions of an attack, which is of significant interest to security analysts to identify the weaknesses of their network and prevent similar attacks in the future. To address these two key issues, this paper presents a system-wide anomaly detection solution using recurrent neural networks combined with correlation analysis techniques. The proposed solution has a two-layer analysis. The first layer targets attack detection, and the second layer analyses the detected attack to predict the next possible attack actions. The main contribution of this paper is the proof of the concept implementation using two real-world ICS datasets, SWaT and Power System Attack. Moreover, we show that the proposed solution effectively detects anomalies and attacks on the scale of the entire ICS network. |
format | Online Article Text |
id | pubmed-9920746 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-99207462023-02-12 Correlation-Based Anomaly Detection in Industrial Control Systems Jadidi, Zahra Pal, Shantanu Hussain, Mukhtar Nguyen Thanh, Kien Sensors (Basel) Article Industrial Control Systems (ICSs) were initially designed to be operated in an isolated network. However, recently, ICSs have been increasingly connected to the Internet to expand their capability, such as remote management. This interconnectivity of ICSs exposes them to cyber-attacks. At the same time, cyber-attacks in ICS networks are different compared to traditional Information Technology (IT) networks. Cyber attacks on ICSs usually involve a sequence of actions and a multitude of devices. However, current anomaly detection systems only focus on local analysis, which misses the correlation between devices and the progress of attacks over time. As a consequence, they lack an effective way to detect attacks at an entire network scale and predict possible future actions of an attack, which is of significant interest to security analysts to identify the weaknesses of their network and prevent similar attacks in the future. To address these two key issues, this paper presents a system-wide anomaly detection solution using recurrent neural networks combined with correlation analysis techniques. The proposed solution has a two-layer analysis. The first layer targets attack detection, and the second layer analyses the detected attack to predict the next possible attack actions. The main contribution of this paper is the proof of the concept implementation using two real-world ICS datasets, SWaT and Power System Attack. Moreover, we show that the proposed solution effectively detects anomalies and attacks on the scale of the entire ICS network. MDPI 2023-02-01 /pmc/articles/PMC9920746/ /pubmed/36772600 http://dx.doi.org/10.3390/s23031561 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Jadidi, Zahra Pal, Shantanu Hussain, Mukhtar Nguyen Thanh, Kien Correlation-Based Anomaly Detection in Industrial Control Systems |
title | Correlation-Based Anomaly Detection in Industrial Control Systems |
title_full | Correlation-Based Anomaly Detection in Industrial Control Systems |
title_fullStr | Correlation-Based Anomaly Detection in Industrial Control Systems |
title_full_unstemmed | Correlation-Based Anomaly Detection in Industrial Control Systems |
title_short | Correlation-Based Anomaly Detection in Industrial Control Systems |
title_sort | correlation-based anomaly detection in industrial control systems |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9920746/ https://www.ncbi.nlm.nih.gov/pubmed/36772600 http://dx.doi.org/10.3390/s23031561 |
work_keys_str_mv | AT jadidizahra correlationbasedanomalydetectioninindustrialcontrolsystems AT palshantanu correlationbasedanomalydetectioninindustrialcontrolsystems AT hussainmukhtar correlationbasedanomalydetectioninindustrialcontrolsystems AT nguyenthanhkien correlationbasedanomalydetectioninindustrialcontrolsystems |