Detecting stealthy attacks against industrial control systems based on residual skewness analysis

Abstract With the integration of the modern industrial control systems (ICS) with the Internet technology, ICS can make full use of the rich resources on the Internet to facilitate remote process control. However, every coin has two sides. More exposure to the outside IT world has made ICS an attrac...

Full description

Bibliographic Details
Main Authors: Yan Hu, Hong Li, Hong Yang, Yuyan Sun, Limin Sun, Zhiliang Wang
Format: Article
Language:English
Published: SpringerOpen 2019-03-01
Series:EURASIP Journal on Wireless Communications and Networking
Subjects:
Online Access:http://link.springer.com/article/10.1186/s13638-019-1389-1
id doaj-2ae3f76953494545bfe90dfa314735ae
record_format Article
spelling doaj-2ae3f76953494545bfe90dfa314735ae2020-11-25T02:37:50ZengSpringerOpenEURASIP Journal on Wireless Communications and Networking1687-14992019-03-012019111410.1186/s13638-019-1389-1Detecting stealthy attacks against industrial control systems based on residual skewness analysisYan Hu0Hong Li1Hong Yang2Yuyan Sun3Limin Sun4Zhiliang Wang5School of Computer and Communication Engineering, University of Science and Technology BeijingBeijing Key Laboratory of IoT Information Security, Institute of Information Engineering, Chinese Academy of SciencesBeijing ZKWA Technology CO. LTD., E-ParkBeijing Key Laboratory of IoT Information Security, Institute of Information Engineering, Chinese Academy of SciencesBeijing Key Laboratory of IoT Information Security, Institute of Information Engineering, Chinese Academy of SciencesSchool of Computer and Communication Engineering, University of Science and Technology BeijingAbstract With the integration of the modern industrial control systems (ICS) with the Internet technology, ICS can make full use of the rich resources on the Internet to facilitate remote process control. However, every coin has two sides. More exposure to the outside IT world has made ICS an attractive target for hackers, so it becomes urgent to protect the security of ICS. Skilled attackers can penetrate control networks and then manipulate sensor readings or control signals persistently until the system crashes, while still keeping themselves undetected by following the expected behavior of the system closely. This kind of attacks are referred to as stealthy attacks. As far as we know, many existing intrusion detection techniques only investigate the magnitudes of behavior residuals, so they cannot detect this kind of stealthy attacks. In this paper, we discover that residuals generated during stealthy attacks exhibit significant skewness compared to attack-free residuals. Based on the new observation, we propose an effective and fast technique to detect stealthy attacks against ICS based on residual skewness analysis. Skewness coefficients can distinguish the counterfeited residuals from the attack-free residuals effectively. A larger absolute value of the skewness coefficient generally indicates the occurrence of a more intense stealthy attack. Finally, we conduct comprehensive experiments to verify the effectiveness and efficiency of the proposed stealthy attack detection approach.http://link.springer.com/article/10.1186/s13638-019-1389-1Industrial control systemsStealthy attacksIntrusion detectionResidual skewness analysis
collection DOAJ
language English
format Article
sources DOAJ
author Yan Hu
Hong Li
Hong Yang
Yuyan Sun
Limin Sun
Zhiliang Wang
spellingShingle Yan Hu
Hong Li
Hong Yang
Yuyan Sun
Limin Sun
Zhiliang Wang
Detecting stealthy attacks against industrial control systems based on residual skewness analysis
EURASIP Journal on Wireless Communications and Networking
Industrial control systems
Stealthy attacks
Intrusion detection
Residual skewness analysis
author_facet Yan Hu
Hong Li
Hong Yang
Yuyan Sun
Limin Sun
Zhiliang Wang
author_sort Yan Hu
title Detecting stealthy attacks against industrial control systems based on residual skewness analysis
title_short Detecting stealthy attacks against industrial control systems based on residual skewness analysis
title_full Detecting stealthy attacks against industrial control systems based on residual skewness analysis
title_fullStr Detecting stealthy attacks against industrial control systems based on residual skewness analysis
title_full_unstemmed Detecting stealthy attacks against industrial control systems based on residual skewness analysis
title_sort detecting stealthy attacks against industrial control systems based on residual skewness analysis
publisher SpringerOpen
series EURASIP Journal on Wireless Communications and Networking
issn 1687-1499
publishDate 2019-03-01
description Abstract With the integration of the modern industrial control systems (ICS) with the Internet technology, ICS can make full use of the rich resources on the Internet to facilitate remote process control. However, every coin has two sides. More exposure to the outside IT world has made ICS an attractive target for hackers, so it becomes urgent to protect the security of ICS. Skilled attackers can penetrate control networks and then manipulate sensor readings or control signals persistently until the system crashes, while still keeping themselves undetected by following the expected behavior of the system closely. This kind of attacks are referred to as stealthy attacks. As far as we know, many existing intrusion detection techniques only investigate the magnitudes of behavior residuals, so they cannot detect this kind of stealthy attacks. In this paper, we discover that residuals generated during stealthy attacks exhibit significant skewness compared to attack-free residuals. Based on the new observation, we propose an effective and fast technique to detect stealthy attacks against ICS based on residual skewness analysis. Skewness coefficients can distinguish the counterfeited residuals from the attack-free residuals effectively. A larger absolute value of the skewness coefficient generally indicates the occurrence of a more intense stealthy attack. Finally, we conduct comprehensive experiments to verify the effectiveness and efficiency of the proposed stealthy attack detection approach.
topic Industrial control systems
Stealthy attacks
Intrusion detection
Residual skewness analysis
url http://link.springer.com/article/10.1186/s13638-019-1389-1
work_keys_str_mv AT yanhu detectingstealthyattacksagainstindustrialcontrolsystemsbasedonresidualskewnessanalysis
AT hongli detectingstealthyattacksagainstindustrialcontrolsystemsbasedonresidualskewnessanalysis
AT hongyang detectingstealthyattacksagainstindustrialcontrolsystemsbasedonresidualskewnessanalysis
AT yuyansun detectingstealthyattacksagainstindustrialcontrolsystemsbasedonresidualskewnessanalysis
AT liminsun detectingstealthyattacksagainstindustrialcontrolsystemsbasedonresidualskewnessanalysis
AT zhiliangwang detectingstealthyattacksagainstindustrialcontrolsystemsbasedonresidualskewnessanalysis
_version_ 1724793097350545408