Detecting stealthy attacks against industrial control systems based on residual skewness analysis
Abstract With the integration of the modern industrial control systems (ICS) with the Internet technology, ICS can make full use of the rich resources on the Internet to facilitate remote process control. However, every coin has two sides. More exposure to the outside IT world has made ICS an attrac...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
SpringerOpen
2019-03-01
|
Series: | EURASIP Journal on Wireless Communications and Networking |
Subjects: | |
Online Access: | http://link.springer.com/article/10.1186/s13638-019-1389-1 |
id |
doaj-2ae3f76953494545bfe90dfa314735ae |
---|---|
record_format |
Article |
spelling |
doaj-2ae3f76953494545bfe90dfa314735ae2020-11-25T02:37:50ZengSpringerOpenEURASIP Journal on Wireless Communications and Networking1687-14992019-03-012019111410.1186/s13638-019-1389-1Detecting stealthy attacks against industrial control systems based on residual skewness analysisYan Hu0Hong Li1Hong Yang2Yuyan Sun3Limin Sun4Zhiliang Wang5School of Computer and Communication Engineering, University of Science and Technology BeijingBeijing Key Laboratory of IoT Information Security, Institute of Information Engineering, Chinese Academy of SciencesBeijing ZKWA Technology CO. LTD., E-ParkBeijing Key Laboratory of IoT Information Security, Institute of Information Engineering, Chinese Academy of SciencesBeijing Key Laboratory of IoT Information Security, Institute of Information Engineering, Chinese Academy of SciencesSchool of Computer and Communication Engineering, University of Science and Technology BeijingAbstract With the integration of the modern industrial control systems (ICS) with the Internet technology, ICS can make full use of the rich resources on the Internet to facilitate remote process control. However, every coin has two sides. More exposure to the outside IT world has made ICS an attractive target for hackers, so it becomes urgent to protect the security of ICS. Skilled attackers can penetrate control networks and then manipulate sensor readings or control signals persistently until the system crashes, while still keeping themselves undetected by following the expected behavior of the system closely. This kind of attacks are referred to as stealthy attacks. As far as we know, many existing intrusion detection techniques only investigate the magnitudes of behavior residuals, so they cannot detect this kind of stealthy attacks. In this paper, we discover that residuals generated during stealthy attacks exhibit significant skewness compared to attack-free residuals. Based on the new observation, we propose an effective and fast technique to detect stealthy attacks against ICS based on residual skewness analysis. Skewness coefficients can distinguish the counterfeited residuals from the attack-free residuals effectively. A larger absolute value of the skewness coefficient generally indicates the occurrence of a more intense stealthy attack. Finally, we conduct comprehensive experiments to verify the effectiveness and efficiency of the proposed stealthy attack detection approach.http://link.springer.com/article/10.1186/s13638-019-1389-1Industrial control systemsStealthy attacksIntrusion detectionResidual skewness analysis |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Yan Hu Hong Li Hong Yang Yuyan Sun Limin Sun Zhiliang Wang |
spellingShingle |
Yan Hu Hong Li Hong Yang Yuyan Sun Limin Sun Zhiliang Wang Detecting stealthy attacks against industrial control systems based on residual skewness analysis EURASIP Journal on Wireless Communications and Networking Industrial control systems Stealthy attacks Intrusion detection Residual skewness analysis |
author_facet |
Yan Hu Hong Li Hong Yang Yuyan Sun Limin Sun Zhiliang Wang |
author_sort |
Yan Hu |
title |
Detecting stealthy attacks against industrial control systems based on residual skewness analysis |
title_short |
Detecting stealthy attacks against industrial control systems based on residual skewness analysis |
title_full |
Detecting stealthy attacks against industrial control systems based on residual skewness analysis |
title_fullStr |
Detecting stealthy attacks against industrial control systems based on residual skewness analysis |
title_full_unstemmed |
Detecting stealthy attacks against industrial control systems based on residual skewness analysis |
title_sort |
detecting stealthy attacks against industrial control systems based on residual skewness analysis |
publisher |
SpringerOpen |
series |
EURASIP Journal on Wireless Communications and Networking |
issn |
1687-1499 |
publishDate |
2019-03-01 |
description |
Abstract With the integration of the modern industrial control systems (ICS) with the Internet technology, ICS can make full use of the rich resources on the Internet to facilitate remote process control. However, every coin has two sides. More exposure to the outside IT world has made ICS an attractive target for hackers, so it becomes urgent to protect the security of ICS. Skilled attackers can penetrate control networks and then manipulate sensor readings or control signals persistently until the system crashes, while still keeping themselves undetected by following the expected behavior of the system closely. This kind of attacks are referred to as stealthy attacks. As far as we know, many existing intrusion detection techniques only investigate the magnitudes of behavior residuals, so they cannot detect this kind of stealthy attacks. In this paper, we discover that residuals generated during stealthy attacks exhibit significant skewness compared to attack-free residuals. Based on the new observation, we propose an effective and fast technique to detect stealthy attacks against ICS based on residual skewness analysis. Skewness coefficients can distinguish the counterfeited residuals from the attack-free residuals effectively. A larger absolute value of the skewness coefficient generally indicates the occurrence of a more intense stealthy attack. Finally, we conduct comprehensive experiments to verify the effectiveness and efficiency of the proposed stealthy attack detection approach. |
topic |
Industrial control systems Stealthy attacks Intrusion detection Residual skewness analysis |
url |
http://link.springer.com/article/10.1186/s13638-019-1389-1 |
work_keys_str_mv |
AT yanhu detectingstealthyattacksagainstindustrialcontrolsystemsbasedonresidualskewnessanalysis AT hongli detectingstealthyattacksagainstindustrialcontrolsystemsbasedonresidualskewnessanalysis AT hongyang detectingstealthyattacksagainstindustrialcontrolsystemsbasedonresidualskewnessanalysis AT yuyansun detectingstealthyattacksagainstindustrialcontrolsystemsbasedonresidualskewnessanalysis AT liminsun detectingstealthyattacksagainstindustrialcontrolsystemsbasedonresidualskewnessanalysis AT zhiliangwang detectingstealthyattacksagainstindustrialcontrolsystemsbasedonresidualskewnessanalysis |
_version_ |
1724793097350545408 |