A SEQUENCE-AWARE INTRUSION DETECTION SYSTEM FOR ETHERNET/IP INDUSTRIAL CONTROL NETWORKS

Download
Author
Wetzel, Jonathan L.
Date
2020-09Advisor
Nguyen, Thuy D.
Orescanin, Marko
Metadata
Show full item recordAbstract
Industrial control systems (ICS) regulate and monitor critical cyber-physical systems such as the power grid and manufacturing plants. ICS networks are also vulnerable to cyber attacks, and existing defenses against these attacks are similar to those employed by traditional network intrusion detection systems (IDS). However, a typical IDS may not detect semantic attacks on the physical end devices because they follow the protocol specifications to bypass the IDS signatures. Sequence-based attacks, a subset of semantic attacks, can manipulate the ordering of valid commands to cause unsafe conditions for the physical devices. Based on a previous method of detecting sequence-based attacks by using discrete-time Markov chains (DTMC) to model normal ICS network traffic, we implemented a DTMC model for the EtherNet/IP and CIP industrial protocols and observed its effectiveness at recognizing sequence-based attacks. We developed four additional methods for DTMC model creation and compared their ability to detect attacks that the previous method failed to observe. All methods successfully identified attacks causing invalid states or invalid transitions, and only two methods could find localized anomalies. The results confirmed that a DTMC-based sequence-aware IDS could help improve the security posture of national critical infrastructure and Department of the Navy control systems.
Rights
Copyright is reserved by the copyright owner.Collections
Related items
Showing items related by title, author, creator and subject.
-
Sequential pattern detection and time series models for predicting IED attacks
Stafford, William B. (Monterey, California. Naval Postgraduate School, 2009-03);Improvised explosive device (IED) attacks are a significant threat to coalition forces. Defeating IEDs as weapons of strategic influence has become a major objective of Combatant Commanders and their respective Joint ... -
AN EVALUATION OF DE-ANONYMIZATION ATTACKS AGAINST PHYSICAL DOWNLINK SHARED CHANNEL DATA IN 5G NEW RADIO
Garrett, Jacob M. (Monterey, CA; Naval Postgraduate School, 2021-09);The development and adoption of 5G technology is rapidly progressing worldwide, and users of this technology are expected to increase to three billion by 2026. Third generation Partnership Project (3GPP) has designed the ... -
Planning Cost-Effective Deceptive Resource Denial in Defense to Cyber-Attacks
Rowe, Neil C. (Monterey, California. Naval Postgraduate School, 2007-03);Cyber-attacks against computer systems that provide valuable services can often be effectively defended by tactics of deliberately deceptive resource denial. Delaying in response to suspicious requests is one example; it ...