This paper discusses a novel approach to specification-based intrusion detection in the field of networked control systems. Our approach reduces the substantial human effort required to deploy a specification-based intrusion detection system by automating the development of its specification rules. We observe that networked control systems often include comprehensive documentation used by operators to manage their infrastructures. Our approach leverages the same documentation to automatically derive the specification rules and continuously monitor network traffic. In this paper, we implement this approach for BACnet-based building automation systems and test its effectiveness against two real infrastructures deployed at the University of Twente and the Lawrence Berkeley National Laboratory (LBNL). Our implementation successfully identifies process control mistakes and potentially dangerous misconfigurations. This confirms the need for an improved monitoring of networked control system infrastructures.
|Title of host publication||Proceedings of the 25th USENIX Security Symposium|
|Number of pages||16|
|Publication status||Published - 2016|
|Event||25th USENIX Security Symposium 2016 - Austin, United States|
Duration: 10 Aug 2016 → 12 Aug 2016
Conference number: 25
|Conference||25th USENIX Security Symposium 2016|
|Abbreviated title||USENIX Security|
|Period||10/08/16 → 12/08/16|
- EC Grant Agreement nr.: FP7/607093
Caselli, M., Zambon, E., Amann, J., Sommer, R., & Kargl, F. (2016). Specification Mining for Intrusion Detection in Networked Control Systems. In Proceedings of the 25th USENIX Security Symposium (pp. 791-806). USENIX Association.