The attacks on industrial control systems (ICS) have been exemplified by the malwares Stuxnet, Industroyer, and Triton that targeted nuclear facilities of Iran in 2010, power grid of Ukraine in 2016, and Safety Instrumented System (SIS) controllers of a Middle East country in 2017, respectively. As a result, the issues concerning Critical Infrastructure Information Protection (CIIP) have drawn much attention among academia, industry, and government in many countries.In this paper, we propose an anomaly detection method for ICS networks. The main idea of the proposed method is to model the normal behavior patterns of TCP and UDP payloads as frequent patterns and non-frequent pattern clusters. The normal behavior payloads are first processed by sequential pattern mining algorithm to extract frequent patterns, and then the payloads are projected against frequent patterns. After projection, the projected payloads are clustered using hierarchical agglomerative clustering algorithm to find representative variations in normal behaviors. The experimental results show that the proposed method has very good performance in terms of the metrics such as accuracy, recall, precision, false alarm, and false dismissal for the ICS networks that use Modbus/TCP or BACnet protocols. The proposed system model can also leverage honeypots deployed in ICS networks to generate attack signatures, which can be helpful in filtering out known attacks.
[1]
Zhiyuan Zheng,et al.
Safeguarding Building Automation Networks: THE-Driven Anomaly Detector Based on Traffic Analysis
,
2017,
2017 26th International Conference on Computer Communication and Networks (ICCCN).
[2]
Anjali Sardana,et al.
A hybrid honeyfarm based technique for defense against worm attacks
,
2011,
2011 World Congress on Information and Communication Technologies.
[3]
Jon Crowcroft,et al.
Honeycomb
,
2004,
Comput. Commun. Rev..
[4]
Ming Wan,et al.
Double Behavior Characteristics for One-Class Classification Anomaly Detection in Networked Control Systems
,
2017,
IEEE Transactions on Information Forensics and Security.
[5]
Qiming Chen,et al.
PrefixSpan,: mining sequential patterns efficiently by prefix-projected pattern growth
,
2001,
Proceedings 17th International Conference on Data Engineering.