From System Specification to Anomaly Detection (and Back)
Title | From System Specification to Anomaly Detection (and Back) |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Fauri, Davide, dos Santos, Daniel Ricardo, Costante, Elisa, den Hartog, Jerry, Etalle, Sandro, Tonetta, Stefano |
Conference Name | Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-5394-6 |
Keywords | anomaly detection, ICS Anomaly Detection, industrial control systems, Intrusion detection, pubcrawl, resilience, Resiliency, Scalability, specification |
Abstract | Industrial control systems have stringent safety and security demands. High safety assurance can be obtained by specifying the system with possible faults and monitoring it to ensure these faults are properly addressed. Addressing security requires considering unpredictable attacker behavior. Anomaly detection, with its data driven approach, can detect simple unusual behavior and system-based attacks like the propagation of malware; on the other hand, anomaly detection is less suitable to detect more complex \textbackslashtextbackslashemph\process-based\ attacks and it provides little actionability in presence of an alert. The alternative to anomaly detection is to use specification-based intrusion detection, which is more suitable to detect process-based attacks, but is typically expensive to set up and less scalable. We propose to combine a lightweight formal system specification with anomaly detection, providing data-driven monitoring. The combination is based on mapping elements of the specification to elements of the network traffic. This allows extracting locations to monitor and relevant context information from the formal specification, thus semantically enriching the raised alerts and making them actionable. On the other hand, it also allows under-specification of data-based properties in the formal model; some predicates can be left uninterpreted and the monitoring can be used to learn a model for them. We demonstrate our methodology on a smart manufacturing use case. |
URL | http://doi.acm.org/10.1145/3140241.3140250 |
DOI | 10.1145/3140241.3140250 |
Citation Key | fauri_system_2017 |