Ajou University repository

Unknown Payload Anomaly Detection Based on Format and Field Semantics Inference in Cyber-Physical Infrastructure Systemsoa mark
  • Kim, Hyunjin ;
  • Kim, Sungjin ;
  • Jo, Wooyeon ;
  • Kim, Ki Hyun ;
  • Shon, Taeshik
Citations

SCOPUS

9

Citation Export

Publication Year
2021-01-01
Publisher
Institute of Electrical and Electronics Engineers Inc.
Citation
IEEE Access, Vol.9, pp.75542-75552
Keyword
cyber securityCyber-physical infrastructure systemsEthernet-based industrial protocolindustrial control systemsunknown payload anomaly detection
Mesh Keyword
Anomaly detection methodsCommand injectionsDetection efficiencyDistribution facilitiesInfrastructure systemsNetwork environmentsSmart manufacturingWater treatment facilities
All Science Classification Codes (ASJC)
Computer Science (all)Materials Science (all)Engineering (all)
Abstract
A cyber-physical infrastructure system (CPIS) is a system that controls and manages critical infrastructure such as smart manufacturing, water treatment facilities, power generation, and distribution facilities. Although these CPISs focus on the security of air-gapped network environments, strict isolation from the outside network is difficult to achieve, leading to various attacks. CPISs also comprise various devices and proprietary communication protocols that are used exclusively for each domain and site. Therefore, experts have to adopt a customized strategy to enhance security in CPIS networks after analyzing each domain, device, and protocol in advance. These methods require a significant amount of time, cost, and manpower; consequently, they are difficult to apply existing security methods in the real field. As a solution, a method is proposed herein that includes the following: 1) inferencing the CPIS protocol format and field semantics based on the characteristics of CPIS networks and protocols; 2) multilevel anomaly detection based on the meaning and values of each inferred field. The proposed method does not require knowledge of each site and protocol. In addition, the inference method can be used to analyze the payload field, including the state and measurement value, as well as the header field. Finally, we validate the proposed technique using an open-source CPIS network dataset including response injection, command injection, denial-of-service, and reconnaissance attacks. In addition, in the aspect of detection efficiency, the proposed technique exhibits comparable performance to that of existing knowledge-based anomaly detection methods.
ISSN
2169-3536
Language
eng
URI
https://dspace.ajou.ac.kr/dev/handle/2018.oak/32019
DOI
https://doi.org/10.1109/access.2021.3080081
Fulltext

Type
Article
Funding
This work was supported in part by the Institute of Information and Communications Technology Planning and Evaluation (IITP) Grant by the Korean Government through the Ministry of Science and ICT (MSIT) (Advanced manufacturing process anomaly detection to prevent the smart factory operation failure by cyber-attacks) under Grant 2018-0-00336, and in part by the Energy Cloud Research and Development Program through the National Research Foundation of Korea (NRF) Grant by the Ministry of Science and ICT under Grant 2019M3F2A1073385.
Show full item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

SHON, TAE SHIK Image
SHON, TAE SHIK손태식
Department of Cyber Security
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.