Publication | Open Access
Exploiting Bro for Intrusion Detection in a SCADA System
56
Citations
8
References
2016
Year
Unknown Venue
Anomaly DetectionEngineeringInformation SecurityInformation ForensicsFormal VerificationHardware SecurityScada SecuritySystems EngineeringCps SecurityNew Protocol ParsersIntrusion Detection SystemThreat DetectionComputer EngineeringSupervisory ControlComputer ScienceData SecurityCryptographyScada SystemIntrusion DetectionControl System SecurityIndustrial Informatics
Supervisory control and data acquisition (SCADA) systems that run our critical infrastructure are increasingly run with Internet-based protocols and devices for remote monitoring. The embedded nature of the components involved, and the legacy aspects makes adding new security mechanisms in an efficient manner far from trivial. In this paper we study an anomaly detection based approach that enables detecting zero-day malicious threats and benign malconfigurations and mishaps. The approach builds on an existing platform (Bro) that lends itself to modular addition of new protocol parsers and event handling mechanisms. As an example we have shown an application of the technique to the IEC-60870-5-104 protocol and tested the anomaly detector with mixed results. The detection accuracy and false positive rate, as well as real-time response was adequate for 3 of our 4 created attacks. We also discovered some additional work that needs to be done to an existing protocol parser to extend its reach.
| Year | Citations | |
|---|---|---|
Page 1
Page 1