• DocumentCode
    658804
  • Title

    Network Anomaly Detection for M-Connected SCADA Networks

  • Author

    Si-Jung Kim ; Bong-Han Kim ; Sang-Soo Yeo ; Do-Eun Cho

  • Author_Institution
    Coll. of Gen. Educ., Hannam Univ., Daejeon, South Korea
  • fYear
    2013
  • fDate
    28-30 Oct. 2013
  • Firstpage
    351
  • Lastpage
    354
  • Abstract
    In the current national critical infrastructures, SCADA systems and networks are playing very important roles. Unfortunately, most of closed-network SCADA systems have been considered as very secure against cyber-attacks. Because they use their own operating systems and communication/ network protocols, and their private networks are physically isolated from the public networks and the Internet. However, in case the closed SCADA system has m-connected status due to its maintenance, updates, and patches, it is no longer perfectly secure against cyber-attacks. This paper analyzes vulnerabilities of m-connected SCADA networks and proposes a novel security model for detecting network anomalies. The proposed model is based on an intrusion detection system using the network-based pattern reference method, which has two kinds of rule sets - one is the base rule set, and the other is dynamically produced rule set. The basic rule set can be set with pre-known intrusion patterns, and a dynamically produced new rule set can be set by detecting network anomalies under specific threshold values. Such new rule set would be adapted to the pattern reference model in its next execution time. Therefore, the proposed security model can identify abnormal command execution more effectively and efficiently.
  • Keywords
    Internet; SCADA systems; computer network security; critical infrastructures; cryptographic protocols; operating systems (computers); Internet; abnormal command execution identification; base rule set; communication protocol; dynamically produced rule set; intrusion detection system; m-connected SCADA network vulnerability; m-connected status; national critical infrastructure; network anomaly detection; network protocol; network-based pattern reference method; operating systems; pattern reference model; pre-known intrusion pattern; private network; public network; security model; specific threshold value; supervisory control and data acquisition; Internet; Intrusion detection; Monitoring; Protocols; SCADA systems; Servers; Anomaly Detection; IDS; SCADA; Secure Service;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Broadband and Wireless Computing, Communication and Applications (BWCCA), 2013 Eighth International Conference on
  • Conference_Location
    Compiegne
  • Type

    conf

  • DOI
    10.1109/BWCCA.2013.61
  • Filename
    6690909