Abstract
This paper discusses a novel approach to specification-based intrusion detection in the field of networked control systems. Our approach reduces the substantial human effort required to deploy a specification-based intrusion detection system by automating the development of its specification rules. We observe that networked control systems often include comprehensive documentation used by operators to manage their infrastructures. Our approach leverages the same documentation to automatically derive the specification rules and continuously monitor network traffic. In this paper, we implement this approach for BACnet-based building automation systems and test its effectiveness against two real infrastructures deployed at the University of Twente and the Lawrence Berkeley National Laboratory (LBNL). Our implementation successfully identifies process control mistakes and potentially dangerous misconfigurations. This confirms the need for an improved monitoring of networked control system infrastructures.
Original language | English |
---|---|
Title of host publication | Proceedings of the 25th USENIX Security Symposium |
Publisher | USENIX Association |
Pages | 791-806 |
Number of pages | 16 |
ISBN (Print) | 978-1-931971-32-4 |
Publication status | Published - 2016 |
Event | 25th USENIX Security Symposium 2016 - Austin, United States Duration: 10 Aug 2016 → 12 Aug 2016 Conference number: 25 |
Conference
Conference | 25th USENIX Security Symposium 2016 |
---|---|
Abbreviated title | USENIX Security |
Country/Territory | United States |
City | Austin |
Period | 10/08/16 → 12/08/16 |
Keywords
- SCS-Cybersecurity
- EC Grant Agreement nr.: FP7/607093
- IR-102119
- METIS-319471
- EWI-27407