[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3372318.3372320acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicssConference Proceedingsconference-collections
research-article

A Probe into Process-Level Attack Detection in Industrial Environments from a Side-Channel Perspective

Published: 10 December 2019 Publication History

Abstract

Process-level detection of cyberattacks on industrial control systems pertain to observing the physical process to detect implausible behavior. State-of-the-art techniques identify a baseline of the normal process behavior from historical measurements and then monitor the system operation in real time to detect deviations from the baseline. Evidently, these techniques are intended to be connected to the control flow to be able to acquire and analyze the necessary measurement data, which makes them susceptible to compromise by the attacker. In this paper, we approach process-level attack detection from a side-channel perspective, where we investigate the feasibility and efficacy of monitoring industrial machines through external sensors. The sensors measure physical properties of the process that are bound to change during a cyberattack. We demonstrate the viability of our approach through simulations and experiments on real industrial machines.

References

[1]
Chuadhry Mujeeb Ahmed, Jianying Zhou, and Aditya P. Mathur. 2018. Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate Sensors in CPS. In Proceedings of the 34th Annual Computer Security Applications Conference (ACSAC '18). ACM, New York, NY, USA, 566--581. https://doi.org/10.1145/3274694.3274748
[2]
Magnus Almgren, Wissam Aoudi, Robert Gustafsson, Robin Krahl, and Andreas Lindhé. 2018. The Nuts and Bolts of Deploying Process-Level IDS in Industrial Control Systems. In Proceedings of the 4th Annual Industrial Control System Security Workshop (ICSS '18). ACM, New York, NY, USA, 17--24. https://doi.org/10.1145/3295453.3295456
[3]
Wissam Aoudi, Mikel Iturbe, and Magnus Almgren. 2018. Truth Will Out: Departure-Based Process-Level Detection of Stealthy Attacks on Control Systems. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS '18). ACM, New York, NY, USA, 817--831. https://doi.org/10.1145/3243734.3243781
[4]
J. Goh, S. Adepu, M. Tan, and Z. S. Lee. 2017. Anomaly Detection in Cyber Physical Systems Using Recurrent Neural Networks. In 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE). 140--145. https://doi.org/10.1109/HASE.2017.36
[5]
Dina Hadžiosmanović, Robin Sommer, Emmanuele Zambon, and Pieter H. Hartel. 2014. Through the Eye of the PLC: Semantic Security Monitoring for Industrial Processes. In Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC '14). ACM, New York, NY, USA, 126--135. https://doi.org/10.1145/2664243.2664277
[6]
Karl Hoffmann. 2001. Applying the Wheatstone Bridge Circuit. HBM Publication. http://eln.teilam.gr/sites/default/files/Wheatstone%20bridge.pdf
[7]
Marina Krotofil, Jason Larsen, and Dieter Gollmann. 2015. The Process Matters: Ensuring Data Veracity in Cyber-Physical Systems. In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (ASIA CCS '15). ACM, New York, NY, USA, 133--144. https://doi.org/10.1145/2714576.2714599
[8]
Miro Oljaca, Peter Semig, and Collin Wells. 2015. Connecting PGA900 Instrumentation Amplifier to Resistive Bridge Sensor. Texas Instruments. http://www.ti.com/lit/an/slda032/slda032.pdf
[9]
Dmitry Shalyga, Pavel Filonov, and Andrey Lavrentyev. 2018. Anomaly Detection for Water Treatment System based on Neural Network with Automatic Architecture Optimization. CoRR abs/1807.07282 (2018). arXiv:1807.07282
[10]
David I. Urbina, Jairo A. Giraldo, Alvaro A. Cardenas, Nils Ole Tippenhauer, Junia Valente, Mustafa Faisal, Justin Ruths, Richard Candell, and Henrik Sandberg. 2016. Limiting the Impact of Stealthy Attacks on Industrial Control Systems. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16). ACM, New York, NY, USA, 1092--1105.
[11]
David I Urbina, David I Urbina, Jairo Giraldo, Alvaro A Cardenas, Junia Valente, Mustafa Faisal, Nils Ole Tippenhauer, Justin Ruths, Richard Candell, and Henrik Sandberg. 2016. Survey and new directions for physics-based attack detection in control systems. National Institute of Standards and Technology.
[12]
Pol Van Aubel, Kostas Papagiannopoulos, Łukasz Chmielewski, and Christian Doerr. 2017. Side-channel based intrusion detection for industrial control systems. In International Conference on Critical Information Infrastructures Security. Springer, 207--224.

Cited By

View all
  • (2021)A Framework for Determining Robust Context-Aware Attack-Detection Thresholds for Cyber-Physical SystemsProceedings of the 2021 Australasian Computer Science Week Multiconference10.1145/3437378.3437393(1-6)Online publication date: 1-Feb-2021
  • (2021)SpectraProceedings of the 36th Annual ACM Symposium on Applied Computing10.1145/3412841.3442032(1588-1597)Online publication date: 22-Mar-2021
  1. A Probe into Process-Level Attack Detection in Industrial Environments from a Side-Channel Perspective

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICSS: Proceedings of the Fifth Annual Industrial Control System Security (ICSS) Workshop
    December 2019
    72 pages
    ISBN:9781450377195
    DOI:10.1145/3372318
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    In-Cooperation

    • ACSA: Applied Computing Security Assoc

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 10 December 2019

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Anomaly Detection
    2. Embedded System
    3. Industrial Control System
    4. Industrial Environment
    5. PASAD

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICSS

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)9
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 17 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2021)A Framework for Determining Robust Context-Aware Attack-Detection Thresholds for Cyber-Physical SystemsProceedings of the 2021 Australasian Computer Science Week Multiconference10.1145/3437378.3437393(1-6)Online publication date: 1-Feb-2021
    • (2021)SpectraProceedings of the 36th Annual ACM Symposium on Applied Computing10.1145/3412841.3442032(1588-1597)Online publication date: 22-Mar-2021

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media