SCAPHY: Detecting Modern ICS Attacks by Correlating Behaviors in SCADA and PHYsical

11/26/2022
by   Moses Ike, et al.
0

Modern Industrial Control Systems (ICS) attacks evade existing tools by using knowledge of ICS processes to blend their activities with benign Supervisory Control and Data Acquisition (SCADA) operation, causing physical world damages. We present SCAPHY to detect ICS attacks in SCADA by leveraging the unique execution phases of SCADA to identify the limited set of legitimate behaviors to control the physical world in different phases, which differentiates from attackers activities. For example, it is typical for SCADA to setup ICS device objects during initialization, but anomalous during processcontrol. To extract unique behaviors of SCADA execution phases, SCAPHY first leverages open ICS conventions to generate a novel physical process dependency and impact graph (PDIG) to identify disruptive physical states. SCAPHY then uses PDIG to inform a physical process-aware dynamic analysis, whereby code paths of SCADA process-control execution is induced to reveal API call behaviors unique to legitimate process-control phases. Using this established behavior, SCAPHY selectively monitors attackers physical world-targeted activities that violates legitimate processcontrol behaviors. We evaluated SCAPHY at a U.S. national lab ICS testbed environment. Using diverse ICS deployment scenarios and attacks across 4 ICS industries, SCAPHY achieved 95 (FP), compared to 47.5 SCAPHYs resilience to futuristic attacks where attacker knows our approach.

READ FULL TEXT

page 1

page 3

page 11

research
05/08/2019

Evaluating Cascading Effects of Attacks on Resilience of Industrial Control Systems: A Design-Centric Modeling Approach

A design-centric modeling approach was proposed to model the behavior of...
research
07/16/2022

Exploring The Resilience of Control Execution Skips against False Data Injection Attacks

Modern Cyber-Physical Systems (CPSs) are often designed as networked, so...
research
07/17/2019

Real-time Evasion Attacks with Physical Constraints on Deep Learning-based Anomaly Detectors in Industrial Control Systems

Recently, a number of deep learning-based anomaly detection algorithms w...
research
02/15/2023

ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks

IoT application domains, device diversity and connectivity are rapidly g...
research
04/19/2022

Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge

Industrial Control Systems (ICSs) rely on insecure protocols and devices...
research
10/11/2019

Anticipating Illegal Maritime Activities from Anomalous Multiscale Fleet Behaviors

Illegal fishing is prevalent throughout the world and heavily impacts th...
research
03/14/2022

Detection of Electromagnetic Signal Injection Attacks on Actuator Systems

An actuator is a device that converts electricity into another form of e...

Please sign up or login with your details

Forgot password? Click here to reset