Creating Synthetic Attacks with Evolutionary Algorithms for Proactive Defense of Industrial Control Systems
Abstract
Industrial control systems (ICS) play an important role in critical infrastructure. Cybersecurity defenders can use honeypots (decoy systems) to capture and study malicious ICS traffic. A problem with existing ICS honeypots is their low interactivity, causing intruders to quickly abandon the attack attempts. This research aims to improve ICS honeypots by feeding them realistic artificially generated packets and examining their behavior to proactively identify functional gaps in defenses. Our synthetic attack generator (SAGO) uses an evolutionary algorithm on known attack traffic to create new variants of Log4j exploits (CVE-2021- 44228) and Industroyer2 malware. We tested over 5,200 and 256 unique Log4j and IEC 104 variations respectively, with success rates up to 70 percent for Log4j and 40 percent for IEC 104. We identified improvements to our honeypot’ s interactivity based on its responses to these attacks. Our technique can aid defenders in hardening perimeter protection against new attack variants.
Description
Proceedings of the 56th Hawaii International Conference on System Sciences | 2023
The article of record as published may be found at ttps://hdl.handle.net/10125/102842
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Related items
Showing items related by title, author, creator and subject.
-
IDENTIFYING HONEYPOTS SIMULATING INTERNET-CONNECTED INDUSTRIAL-CONTROL SYSTEM DEVICES
Brown, Justin C. (Monterey, CA; Naval Postgraduate School, 2019-09);Heuristic analysis can reveal honeypots (decoy computer systems doing intelligence gathering) among Internet-connected industrial-control sites. Detectability of honeypots is undesirable, as it enables a careful adversary ... -
Creating Effective Industrial-Control-System Honeypots
Rowe, Neil; Nguyen, Thuy; Kendrick, Marian; Rucker, Zaky; Hyun, Dahae; Brown, Justin (HICSS, 2020-01-07);Cyberattacks on industrial control systems (ICSs) can be especially damaging since they often target critical infrastructure. Honeypots are valuable network-defense tools, but they are difficult to implement for ICSs because ... -
Creating Effective Industrial-Control-System Honeypots
Rowe, Neil C.; Nguyen, Thuy D.; Kendrick, Marian M.; Rucker, Zaki A.; Hyun, Dahae; Brown, Justin C. (HICSS, 2020);Cyberattacks on industrial control systems (ICSs) can be especially damaging since they often target critical infrastructure. Honeypots are valuable network-defense tools, but they are difficult to implement for ICSs because ...