跳到主要导航 跳到搜索 跳到主要内容

Detecting stealthy attacks on industrial control systems using a permutation entropy-based method

  • Yan Hu
  • , Hong Li
  • , Tom H. Luan
  • , An Yang
  • , Limin Sun
  • , Zhiliang Wang
  • , Rui Wang

科研成果: 期刊稿件文章同行评审

33 引用 (Scopus)

摘要

The modern Industrial Control Systems (ICS) now exhibit an increasing connectivity to the corporate Internet Technology (IT) networks so as to make use of the rich resources in IT networks. The increasing interaction between ICS and the outside IT world, however, has made them an attractive target for a variety of cyber attacks, raising great need to secure the ICS. In ICS, skilled attackers can manipulate sensor readings or control signals until the system crashes, while still keeping the attack process hidden by closely following the expected behavior of the system. This kind of attacks is called stealthy attacks, which cannot be detected by traditional intrusion detection methods in which only the magnitudes of residuals are evaluated. In this paper, we show that the residuals generated during a stealthy attack present some sort of regularity besides the magnitudes. Based on this observation, we propose a novel permutation entropy-based approach to detect stealthy attacks on ICS. The permutation entropy can characterize the non-randomness contained in the residuals so as to distinguish the residuals during a stealthy attack from a random series effectively. A significant change of the permutation entropy indicates the occurrence of a stealthy attack. Finally, we conduct comprehensive experiments to verify the effectiveness of the proposed stealthy attack detection approach.

源语言英语
页(从-至)1230-1240
页数11
期刊Future Generation Computer Systems
108
DOI
出版状态已出版 - 7月 2020
已对外发布

学术指纹

探究 'Detecting stealthy attacks on industrial control systems using a permutation entropy-based method' 的科研主题。它们共同构成独一无二的指纹。

引用此