skip to main content
10.1145/3362743.3362961acmconferencesArticle/Chapter ViewAbstractPublication PagessensysConference Proceedingsconference-collections
research-article

KingFisher: an Industrial Security Framework based on Variational Autoencoders

Published:10 November 2019Publication History

ABSTRACT

The recent evolution of edge computing favored the Industrial Internet of Things (IIoT) growth, opening dangerous surfaces of vulnerabilities. In this distributed sensor system scenario, due to the insecure interactions between Information Technology (IT) and Operational Technology (OT) networks, cyber-physical threats could lead to destructive consequences for environments and population safety. To deal with industrial cyber-physical security, modern anomaly detection systems implement innovative Machine Learning (ML) techniques. Unfortunately, current solutions still fail to provide an effective prevention to complex industrial threats.

In this paper, we present KingFisher, an Intrusion Detection System (IDS) framework based on ML. KingFisher is, to the best of our knowledge, the first solution that looks independently at IT and OT traffic, but also from sensors deployed to capture side-channel physical processes data (e.g., vibrations, background noise). Thanks to this feature, KingFisher can detect attacks that other systems would ignore. As our tests report, the correlation of inferred physical processes status with OT-network and IT-network data can give insights into suspicious and anomalous activities targeting industrial networks. For our framework, we use the Variational Autoencoders (VAEs), an unsupervised neural network model, to categorize data without a priori knowledge of the dataset. We evaluate the detection capabilities and performances of KingFisher in a proof of concept simulated industrial scenario under cyber-physical attacks. Our preliminary results show that KingFisher identifies attacks on both network and physical layers.

References

  1. Pierre Baldi. 2012. Autoencoders, unsupervised learning, and deep architectures. In Proceedings of ICML workshop on unsupervised and transfer learning. 37--49.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Giuseppe Bernieri, Mauro Conti, and Federico Turrin. 2019. Evaluation of Machine Learning Algorithms for Anomaly Detection in Industrial Networks. In 2019 IEEE International Symposium on Measurements & Networking (M&N). IEEE, 1--6.Google ScholarGoogle Scholar
  3. Giuseppe Bernieri, Federica Pascucci, and Javier López. 2017. Network Anomaly Detection in Critical Infrastructure Based on Mininet Network Simulator. In ITASEC. 116--125.Google ScholarGoogle Scholar
  4. Hoang Anh Dau, Vic Ciesielski, and Andy Song. 2014. Anomaly detection using replicator neural networks trained on examples of one class. In Asia-Pacific Conference on Simulated Evolution and Learning. Springer, 311--322.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. L Dhanabal and SP Shantharajah. 2015. A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. International Journal of Advanced Research in Computer and Communication Engineering 4, 6 (2015), 446--452.Google ScholarGoogle Scholar
  6. Simon Duque Anton, Suneetha Kanoor, Daniel Fraunholz, and Hans Schotten. 2018. Evaluation of Machine Learning-based Anomaly Detection Algorithms on an Industrial Modbus/TCP Data Set. 1--9.Google ScholarGoogle Scholar
  7. Markus Goldstein and Seiichi Uchida. 2016. A comparative evaluation of unsupervised anomaly detection algorithms for multivariate data. PloS one 11, 4 (2016).Google ScholarGoogle Scholar
  8. Samer Jaloudi. 2019. Communication Protocols of an Industrial Internet of Things Environment: A Comparative Study. Future Internet 11, 3 (2019), 66.Google ScholarGoogle ScholarCross RefCross Ref
  9. Anastasis Keliris, Hossein Salehghaffari, Brian Cairl, Prashanth Krishnamurthy, Michail Maniatakos, and Farshad Khorrami. 2016. Machine learning-based defense against process-aware attacks on industrial control systems. In 2016 IEEE International Test Conference (ITC). IEEE, 1--10.Google ScholarGoogle ScholarCross RefCross Ref
  10. Diederik P Kingma and Max Welling. 2013. Auto-encoding variational bayes. (2013).Google ScholarGoogle Scholar
  11. Leandros A Maglaras and Jianmin Jiang. 2014. Intrusion detection in SCADA systems using machine learning techniques. In 2014 Science and Information Conference. IEEE, 626--631.Google ScholarGoogle ScholarCross RefCross Ref
  12. Estefanía Etchevés Miciolino, Roberto Setola, Giuseppe Bernieri, Stefano Panzieri, Federica Pascucci, and Marios M Polycarpou. 2017. Fault diagnosis and network anomaly detection in water infrastructures. IEEE Design & Test 34, 4 (2017), 44--51.Google ScholarGoogle ScholarCross RefCross Ref
  13. IDA Modbus. 2006. Modbus application protocol specification v1.1b. North Grafton, Massachusetts (2006).Google ScholarGoogle Scholar
  14. Nozomi Networks. June 2018. Advancing ICS Visibility and Cybersecurity with the Nozomi Networks Solution.Google ScholarGoogle Scholar
  15. Vern Paxson. 1999. Bro: a system for detecting network intruders in real-time. Computer networks 31, 23-24 (1999), 2435--2463.Google ScholarGoogle Scholar
  16. Roesch and Martin. 1999. Snort: Lightweight intrusion detection for networks.. In Lisa, Vol. 99. 229--238.Google ScholarGoogle Scholar
  17. Ben Seri, Gregory Vishnepolsky, and Dor Zusman. 2019. URGENT/11, Critical vulnerabilities to remotely compromise VxWorks, the most popular RTOS. (2019).Google ScholarGoogle Scholar
  18. David I Urbina, Jairo A Giraldo, Alvaro A Cardenas, Nils Ole Tippenhauer, Junia Valente, Mustafa Faisal, Justin Ruths, Richard Candell, and Henrik Sandberg. 2016. Limiting the impact of stealthy attacks on industrial control systems. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 1092--1105.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. David Zimmerer, Jens Petersen, Fabian Isensee, and Klaus Maier-Hein. 2019. Context-encoding Variational Autoencoder for Unsupervised Anomaly Detection. In International Conference on Medical Imaging with Deep Learning. London.Google ScholarGoogle Scholar

Index Terms

  1. KingFisher: an Industrial Security Framework based on Variational Autoencoders

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SenSys-ML 2019: Proceedings of the 1st Workshop on Machine Learning on Edge in Sensor Systems
          November 2019
          47 pages
          ISBN:9781450370110
          DOI:10.1145/3362743

          Copyright © 2019 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 10 November 2019

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

          Acceptance Rates

          SenSys-ML 2019 Paper Acceptance Rate7of14submissions,50%Overall Acceptance Rate7of14submissions,50%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader