An Improved Industrial Control System Device Logs Processing Method for Process-Based Anomaly Detection
Title | An Improved Industrial Control System Device Logs Processing Method for Process-Based Anomaly Detection |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Hussain, Mukhtar, Foo, Ernest, Suriadi, Suriadi |
Conference Name | 2019 International Conference on Frontiers of Information Technology (FIT) |
Date Published | Dec. 2019 |
Publisher | IEEE |
ISBN Number | 978-1-7281-6625-4 |
Keywords | anomalous behaviour, anomaly detection, cyber-attacks, event logs, event-driven system analysis, expected behaviour, formalised method, ICs, ICS device, improved industrial control system device logs processing method, industrial control, industrial control system, industrial control systems, industrial process, intrusion detection system, Petri Net model identification, Petri nets, PN identification-based anomaly detection methods, process-based anomaly detection, process-based attacks, process-related attacks, pubcrawl, resilience, Resiliency, Scalability, security of data, System Identification, system monitoring |
Abstract | Detecting process-based attacks on industrial control systems (ICS) is challenging. These cyber-attacks are designed to disrupt the industrial process by changing the state of a system, while keeping the system's behaviour close to the expected behaviour. Such anomalous behaviour can be effectively detected by an event-driven approach. Petri Net (PN) model identification has proved to be an effective method for event-driven system analysis and anomaly detection. However, PN identification-based anomaly detection methods require ICS device logs to be converted into event logs (sequence of events). Therefore, in this paper we present a formalised method for pre-processing and transforming ICS device logs into event logs. The proposed approach outperforms the previous methods of device logs processing in terms of anomaly detection. We have demonstrated the results using two published datasets. |
URL | https://ieeexplore.ieee.org/document/8991656 |
DOI | 10.1109/FIT47737.2019.00037 |
Citation Key | hussain_improved_2019 |
- intrusion detection system
- system monitoring
- System Identification
- security of data
- Scalability
- Resiliency
- resilience
- pubcrawl
- process-related attacks
- process-based attacks
- process-based anomaly detection
- PN identification-based anomaly detection methods
- Petri nets
- Petri Net model identification
- anomalous behaviour
- industrial process
- Industrial Control Systems
- industrial control system
- industrial control
- improved industrial control system device logs processing method
- ICS device
- ICs
- formalised method
- expected behaviour
- event-driven system analysis
- event logs
- cyber-attacks
- Anomaly Detection