Abstract
Compared with standard information technology systems, industrial control systems show more consistent and regular communications patterns. This characteristic contributes to the stability of controlled processes in critical infrastructures such as power plants, electric grids and water treatment facilities. However, Stuxnet has demonstrated that skilled attackers can strike critical infrastructures by leveraging knowledge about these processes. Sequence attacks subvert infrastructure operations by sending misplaced industrial control system messages. This chapter discusses four main sequence attack scenarios against industrial control systems. Real Modbus, Manufacturing Message Specification and IEC 60870-5-104 traffic samples were used to test sequencing and modeling techniques for describing industrial control system communications. The models were then evaluated to verify the feasibility of identifying sequence attacks. The results create the foundation for developing “sequence-aware‿ intrusion detection systems.
Original language | English |
---|---|
Title of host publication | Critical Infrastructure Protection IX |
Subtitle of host publication | 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers |
Editors | Mason Rice, Sujeet Shenoi |
Place of Publication | London |
Publisher | Springer |
Pages | 49-71 |
Number of pages | 23 |
ISBN (Print) | 978-3-319-26566-7 |
DOIs | |
Publication status | Published - Mar 2015 |
Event | 9th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2015 - Arlington, United States Duration: 16 Mar 2015 → 18 Mar 2015 Conference number: 9 |
Publication series
Name | Critical Infrastructure Protection IX |
---|---|
Publisher | Springer Verlag |
Volume | 466 |
ISSN (Print) | 1868-4238 |
Workshop
Workshop | 9th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2015 |
---|---|
Abbreviated title | ICCIP |
Country/Territory | United States |
City | Arlington |
Period | 16/03/15 → 18/03/15 |
Keywords
- SCS-Cybersecurity
- sequence attacks
- EWI-26537
- METIS-315080
- IR-98661
- Industrial control systems
- Intrusion Detection
- EC Grant Agreement nr.: FP7-SEC-285477-CRISALIS