DocumentCode :
658804
Title :
Network Anomaly Detection for M-Connected SCADA Networks
Author :
Si-Jung Kim ; Bong-Han Kim ; Sang-Soo Yeo ; Do-Eun Cho
Author_Institution :
Coll. of Gen. Educ., Hannam Univ., Daejeon, South Korea
fYear :
2013
fDate :
28-30 Oct. 2013
Firstpage :
351
Lastpage :
354
Abstract :
In the current national critical infrastructures, SCADA systems and networks are playing very important roles. Unfortunately, most of closed-network SCADA systems have been considered as very secure against cyber-attacks. Because they use their own operating systems and communication/ network protocols, and their private networks are physically isolated from the public networks and the Internet. However, in case the closed SCADA system has m-connected status due to its maintenance, updates, and patches, it is no longer perfectly secure against cyber-attacks. This paper analyzes vulnerabilities of m-connected SCADA networks and proposes a novel security model for detecting network anomalies. The proposed model is based on an intrusion detection system using the network-based pattern reference method, which has two kinds of rule sets - one is the base rule set, and the other is dynamically produced rule set. The basic rule set can be set with pre-known intrusion patterns, and a dynamically produced new rule set can be set by detecting network anomalies under specific threshold values. Such new rule set would be adapted to the pattern reference model in its next execution time. Therefore, the proposed security model can identify abnormal command execution more effectively and efficiently.
Keywords :
Internet; SCADA systems; computer network security; critical infrastructures; cryptographic protocols; operating systems (computers); Internet; abnormal command execution identification; base rule set; communication protocol; dynamically produced rule set; intrusion detection system; m-connected SCADA network vulnerability; m-connected status; national critical infrastructure; network anomaly detection; network protocol; network-based pattern reference method; operating systems; pattern reference model; pre-known intrusion pattern; private network; public network; security model; specific threshold value; supervisory control and data acquisition; Internet; Intrusion detection; Monitoring; Protocols; SCADA systems; Servers; Anomaly Detection; IDS; SCADA; Secure Service;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Broadband and Wireless Computing, Communication and Applications (BWCCA), 2013 Eighth International Conference on
Conference_Location :
Compiegne
Type :
conf
DOI :
10.1109/BWCCA.2013.61
Filename :
6690909
Link To Document :
بازگشت