Putting Together the Pieces: A Concept for Holistic Industrial Intrusion Detection

05/28/2019
by   Simon D. Duque Anton, et al.
0

Besides the advantages derived from the ever present communication properties, it increases the attack surface of a network as well. As industrial protocols and systems were not designed with security in mind, spectacular attacks on industrial systems occurred over the last years. Most industrial communication protocols do not provide means to ensure authentication or encryption. This means attackers with access to a network can read and write information. Originally not meant to be connected to public networks, the use cases of Industry 4.0 require interconnectivity, often through insecure public networks. This lead to an increasing interest in information security products for industrial applications. In this work, the concept for holistic intrusion detection methods in an industrial context is presented. It is based on different works considering several aspects of industrial environments and their capabilities to identify intrusions as an anomaly in network or process data. These capabilities are based on preceding experiments on real and synthetic data. In order to justify the concept, an overview of potential and actual attack vectors and attacks on industrial systems is provided. It is shown that different aspects of industrial facilities, e.g. office IT, shop floor OT, firewalled connections to customers and partners are analysed as well as the different layers of the automation pyramid require different methods to detect attacks. Additionally, the singular steps of an attack on industrial applications are characterised. Finally, a resulting concept for integration of these methods is proposed, providing the means to detect the different stages of an attack by different means.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/09/2019

Using Temporal and Topological Features for Intrusion Detection in Operational Networks

Until two decades ago, industrial networks were deemed secure due to phy...
research
05/28/2019

A Question of Context: Enhancing Intrusion Detection by Providing Context Information

Due to the fourth industrial revolution, and the resulting increase in i...
research
11/05/2021

IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems

The increasing interconnection of industrial networks with the Internet ...
research
05/21/2019

Two Decades of SCADA Exploitation: A Brief History

Since the early 1960, industrial process control has been applied by ele...
research
05/15/2019

Modern Problems Require Modern Solutions: Hybrid Concepts for Industrial Intrusion Detection

The concept of Industry 4.0 brings a disruption into the processing indu...
research
05/28/2019

Evaluation of Machine Learning-based Anomaly Detection Algorithms on an Industrial Modbus/TCP Data Set

In the context of the Industrial Internet of Things, communication techn...
research
02/10/2021

A Survey on Industrial Control System Testbeds and Datasets for Security Research

The increasing digitization and interconnection of legacy Industrial Con...

Please sign up or login with your details

Forgot password? Click here to reset