DIMVA 2017: Detection of Intrusions and Malware, and Vulnerability Assessment pp 141-160 | Cite as
Last Line of Defense: A Novel IDS Approach Against Advanced Threats in Industrial Control Systems
Abstract
Industrial control systems are becoming increasingly interconnected, and with it their vulnerability to malicious actors. While intrusion detection systems are suited to detect network-based attacks, they remain unable to detect more sophisticated attacks against control systems, for example a compromise of the PLCs. This paper makes the case that the evolving landscape of threats such as the Stuxnet malware requires an alternative approach to intrusion detection in industrial control systems. We argue that effective control of such advanced threats needs to happen in the last link of the control network, hence building a last line of defense. A proof of concept of this new paradigm was implemented for the control system of a dredging vessel, and we describe main lessons learned and pose open research questions we find based on these experiences for ICS intrusion detection.
Keywords
Cyber physical security Intrusion detection Industrial control systemsReferences
- 1.Hadziosmanovic, D.: The process matters: cyber security in industrial control systems. Ph.D. thesis, Universiteit Twente (2014)Google Scholar
- 2.Cárdenas, A.A., Amin, S., Sastry, S.: Research challenges for the security of control systems. In: Conference on Hot Topics in Security (2008)Google Scholar
- 3.Abrams, M., Weiss, J.: Malicious control system cyber security attack case study-maroochy water services, Australia, July 2008Google Scholar
- 4.Falliere, N., Murchu, L.O., Chien, E.: W32.stuxnet dossier. Technical report, Symantec, February 2011Google Scholar
- 5.McDonald, G., Murchu, L.O., Doherty, S., Chien, E.: Stuxnet 0.5: the missing link. Technical report, Symantec (2013)Google Scholar
- 6.Langner, R.: The Langner Group. Technical report, November 2013Google Scholar
- 7.Lee, R.M., Assante, M.J., Conway, T.: Technical report, SANS ICS (2014)Google Scholar
- 8.BSI. Die Lage der IT-Sicherheit in Deutschland 2014 (2014)Google Scholar
- 9.Radvanovsky, R., Brodsky, J.: Handbook of SCADA/Control Systems Security. CRC Press, Boca Raton (2013)CrossRefGoogle Scholar
- 10.Anderson, R.J.: Security Engineering. Wiley, Indianapolis (2008)Google Scholar
- 11.Goodin, D.: Stepson of stuxnet stalked kaspersky for months, tapped iran nuke talks. Februari 2017. arstechnica.com
- 12.Igure, V.M., Laughter, S.A., Williams, R.D.: Security issues in SCADA networks. Comput. Secur. 25(7), 498–506 (2006)CrossRefGoogle Scholar
- 13.Cardenas, A., Amin, S., Sinopoli, B., Giani, A., Perrig, A., Sastry, S.: Challenges for securing cyber physical systems. In: Workshop on Future Directions in Cyber-physical Systems Security, DHS, July 2009Google Scholar
- 14.Cheminod, M., Durante, L., Valenzano, A.: Review of security issues in industrial networks. IEEE Trans. Ind. Inf. 9(1), 277–293 (2013)CrossRefGoogle Scholar
- 15.Denning, D.: An intrusion-detection model. IEEE Trans. Softw. Eng. SE–13(2), 222–232 (1987)CrossRefGoogle Scholar
- 16.Cárdenas, A.A., Amin, S., Lin, Z.-S., Huang, Y.-L., Huang, C.-Y., Sastry, S.: Attacks against process control systems: risk assessment, detection, and response. In: Symposium on Information, Computer and Communications Security (2011)Google Scholar
- 17.Etalle, S., Gregory, C., Bolzoni, D., Zambon, E., Trivellato, D.: Monitoring industrial control systems to improve operations and security. Technical report, Security Matters (2013)Google Scholar
- 18.Etalle, S., Gregory, C., Bolzoni, D., Zambon, E.: Self configuring deep protocol network whitelisting. Technical report, Security Matters (2013)Google Scholar
- 19.Urbina, D.I., Giraldo, J.A., Cardenas, A.A., Tippenhauer, N.O., Valente, J., Faisal, M., Ruths, J., Candell, R., Sandberg, H.: Limiting the impact of stealthy attacks on industrial control systems. In: SIGSAC Conference on Computer and Communications Security (2016)Google Scholar
- 20.Hadžiosmanović, D., Sommer, R., Zambon, E., Hartel, P.H.: Through the eye of the PLC: semantic security monitoring for industrial processes. In: Annual Computer Security Applications Conference (2014)Google Scholar
- 21.Fovino, I.N., Carcano, A., Masera, M., Trombetta, A.: An experimental investigation of malware attacks on scada systems. Crit. Infrastruct. Protection 2(4), 139–145 (2009)CrossRefGoogle Scholar
- 22.Cardenas, A., Baras, J., Seamon, K.: A framework for the evaluation of intrusion detection systems. In: 2006 IEEE Symposium on Security and Privacy, pp. 15–77, May 2006Google Scholar
- 23.Cardenas, A., Amin, S., Sastry, S.: Secure control: towards survivable cyber-physical systems. In: Distributed Computing Systems Workshops, pp. 495–500, June 2008Google Scholar
- 24.Fovino, I.N., Carcano, A., Murel, T.D.L., Trombetta, A., Masera, M.: Modbus/dnp. 3 state-based intrusion detection system. In: International Conference on Advanced Information Networking and Applications (2010)Google Scholar
- 25.Carcano, A., Fovino, I.N., Masera, M., Trombetta, A.: State-based network intrusion detection systems for SCADA protocols: a proof of concept. In: Rome, E., Bloomfield, R. (eds.) CRITIS 2009. LNCS, vol. 6027, pp. 138–150. Springer, Heidelberg (2010). doi: 10.1007/978-3-642-14379-3_12 CrossRefGoogle Scholar
- 26.Carcano, A., Coletta, A., Guglielmi, M., Masera, M., Fovino, I.N., Trombetta, A.: A multidimensional critical state analysis for detecting intrusions in scada systems. Trans. Ind. Inf. 7, 179–186 (2011)CrossRefGoogle Scholar
- 27.Doerr, C., Hernandez, J.M.: A computational approach to multi-level analysis of network resilience. In: Third International Conference on Dependability, DEPEND (2010)Google Scholar
- 28.Doerr, C.: Challenge tracing and mitigation under partial information and uncertainty. In: Communications and Network Security (CNS) (2013)Google Scholar