TY - JOUR
T1 - Detecting stealthy attacks on industrial control systems using a permutation entropy-based method
AU - Hu, Yan
AU - Li, Hong
AU - Luan, Tom H.
AU - Yang, An
AU - Sun, Limin
AU - Wang, Zhiliang
AU - Wang, Rui
N1 - Publisher Copyright:
© 2018 Elsevier B.V.
PY - 2020/7
Y1 - 2020/7
N2 - The modern Industrial Control Systems (ICS) now exhibit an increasing connectivity to the corporate Internet Technology (IT) networks so as to make use of the rich resources in IT networks. The increasing interaction between ICS and the outside IT world, however, has made them an attractive target for a variety of cyber attacks, raising great need to secure the ICS. In ICS, skilled attackers can manipulate sensor readings or control signals until the system crashes, while still keeping the attack process hidden by closely following the expected behavior of the system. This kind of attacks is called stealthy attacks, which cannot be detected by traditional intrusion detection methods in which only the magnitudes of residuals are evaluated. In this paper, we show that the residuals generated during a stealthy attack present some sort of regularity besides the magnitudes. Based on this observation, we propose a novel permutation entropy-based approach to detect stealthy attacks on ICS. The permutation entropy can characterize the non-randomness contained in the residuals so as to distinguish the residuals during a stealthy attack from a random series effectively. A significant change of the permutation entropy indicates the occurrence of a stealthy attack. Finally, we conduct comprehensive experiments to verify the effectiveness of the proposed stealthy attack detection approach.
AB - The modern Industrial Control Systems (ICS) now exhibit an increasing connectivity to the corporate Internet Technology (IT) networks so as to make use of the rich resources in IT networks. The increasing interaction between ICS and the outside IT world, however, has made them an attractive target for a variety of cyber attacks, raising great need to secure the ICS. In ICS, skilled attackers can manipulate sensor readings or control signals until the system crashes, while still keeping the attack process hidden by closely following the expected behavior of the system. This kind of attacks is called stealthy attacks, which cannot be detected by traditional intrusion detection methods in which only the magnitudes of residuals are evaluated. In this paper, we show that the residuals generated during a stealthy attack present some sort of regularity besides the magnitudes. Based on this observation, we propose a novel permutation entropy-based approach to detect stealthy attacks on ICS. The permutation entropy can characterize the non-randomness contained in the residuals so as to distinguish the residuals during a stealthy attack from a random series effectively. A significant change of the permutation entropy indicates the occurrence of a stealthy attack. Finally, we conduct comprehensive experiments to verify the effectiveness of the proposed stealthy attack detection approach.
KW - Industrial control systems
KW - Intrusion detection systems
KW - Permutation entropy
KW - Stealthy attacks
UR - https://www.scopus.com/pages/publications/85052062165
U2 - 10.1016/j.future.2018.07.027
DO - 10.1016/j.future.2018.07.027
M3 - 文章
AN - SCOPUS:85052062165
SN - 0167-739X
VL - 108
SP - 1230
EP - 1240
JO - Future Generation Computer Systems
JF - Future Generation Computer Systems
ER -