Visible to the public A New Burst-DFA Model for SCADA Anomaly Detection

TitleA New Burst-DFA Model for SCADA Anomaly Detection
Publication TypeConference Paper
Year of Publication2017
AuthorsMarkman, Chen, Wool, Avishai, Cardenas, Alvaro A.
Conference NameProceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-5394-6
Keywordsanomaly detection, compositionality, DFA, Human Behavior, ICs, ICS Anomaly Detection, Modbus, network intrusion detection, network-intrusion-detection-system, pubcrawl, resilience, Resiliency, SCADA, SCADA systems, security
Abstract

In Industrial Control Systems (ICS/SCADA), machine to machine data traffic is highly periodic. Past work showed that in many cases, it is possible to model the traffic between each individual Programmable Logic Controller (PLC) and the SCADA server by a cyclic Deterministic Finite Automaton (DFA), and to use the model to detect anomalies in the traffic. However, a recent analysis of network traffic in a water facility in the U.S, showed that cyclic-DFA models have limitations. In our research, we examine the same data corpus; our study shows that the communication on all of the channels in the network is done in bursts of packets, and that the bursts have semantic meaning---the order within a burst depends on the messages. Using these observations, we suggest a new burst-DFA model that fits the data much better than previous work. Our model treats the traffic on each channel as a series of bursts, and matches each burst to the DFA, taking the burst's beginning and end into account. Our burst-DFA model successfully explains between 95% and 99% of the packets in the data-corpus, and goes a long way toward the construction of a practical anomaly detection system.

URLhttps://dl.acm.org/citation.cfm?doid=3140241.3140245
DOI10.1145/3140241.3140245
Citation Keymarkman_new_2017