SlideShare a Scribd company logo
1
Universita degli Studi di Milano
Composite Intrusion Detection in Process Control Networks
Julian L. Rrushi
2
Overview
• This dissertation develops a multi-algorithmic intrusion detection
approach for operation in a networked process control environment
• The intrusion detection approach can be used to detect layer-7 attacks on
industrial process control systems
• It can also be used to detect spread of worm code over a process control
network, network insertion of rootkit code into the memory of a
compromised control system, synchronization of logic bombs or other
malware in a process control network, and valid but destructive network
packets generated by malicious insiders
3
Background
4
Capturing the Behavior of a Cyber-Physical System
• We have found that the behavior of a physical process is reflected as
evolutions of specific RAM content…
• …and that the behavior of network traffic in a process control network
is also reflected as evolutions of specific RAM content
• Well-behaved network traffic and physical processes are characterized
by specific evolutions of specific RAM content, which in this research
we refer to as normal evolutions
• For a network packet to be classified as normal, its payload should
cause a normal evolution of RAM content
• Thus, in this work the challenge of anomaly detection takes the form of
estimating normal evolutions of RAM content
5
Estimation-Inspection (EI) Algorithm
• The evolutions of values of each variable are modeled as a stochastic
vector
• The challenge is the construction of probability mass functions, which
consult RAM content and return stochastic vectors
• In this dissertation a probability mass function is developed via a series
of logistic regression models
• The Estimation part of the EI algorithm uses logistic regression and
maximum likelihood estimation to estimate statistical parameters
• The Inspection part of the EI algorithm uses those statistical
parameters in logistic regression formulae to estimate the normalcy
probability of payload content
6
Probabilistic Validation of the EI Algorithm
On the Rationality of Simulation-based Validation
• Simulation-based validation is commonly employed in environments in
which experimentation with real world equipment and/or physical
phenomena is not available or feasible
• Examples include conflict detection algorithms that are used in airborne
collision avoidance systems
• Several procedures for validating the effectiveness of radar algorithms to
detect and classify moving targets
• And so forth
8
Leveraging Specification-based Detection
9
Supervisory Control Specifications
• A system operator interacts with an HMI to operate a nuclear power
plant over a process control network. Such operation is conducted
according to precise supervisory instructions
• An example of a supervisory instruction is the consultation of a power-
to-flow operating map to keep thermal power within predefined
thresholds
• It is such supervisory instructions from which we derive specifications
in the form of activity network models that reason in terms of network
packets
• A concrete case study is the development of an activity network model
that detects any network packet that has potential for inducing stresses
on the walls of a reactor pressure vessel
10
Automatic Control Specifications
• The logic of automatic operation is encoded into control applications
that run in control systems
• We derive specifications in the form of activity network models from
control applications
• Redundant program execution does not seem to be necessary
• We consider functions of a control application that read from or write
to network sockets in conjunction with program variables stored in the
RAM of a control system
• A case study is the development of an activity network model that
recognizes network packets that protect a reactor from unsafe
conditions created by a fault in any of the water pumps
11
Mirage Theory - Definition
Mirage theory is comprised of actions that are devised to deliberately mislead an
adversary as to digitally controlled physical processes and equipment such as
nuclear power plants, thereby causing the adversary to take specific actions that
will contribute to the detection of his/her intrusion in process control networks
Inspired from operation Fortitude South, mirage theory exploits the adversary's
reliance on analysis of intercepted network data to derive the presence and
characteristics of physical targets, and the lack of means to verify that intercepted
traffic is indeed generated by existing physical targets
12
Exploiting Reconnaissance Analyses
13
Elements of Mirage Theory
• A continuous space constructed via computer simulation or emulation of
physical processes and equipment
• A discrete space formed by process control systems and networks that
are deployed and configured as if they were to monitor and control a real
physical process through real sensors and actuators
• An artificial boundary between continuous and discrete spaces
developed ad-hoc to allow for a regular interaction between the said
spaces, and to also prevent an adversary from crossing the discrete space
14
Boundary Between Continuous and Discrete Spaces
15
Detecting Foreign Network Traffic
Bayesian Theory of Confirmation
Deriving an Incomplete-data Space
Estimation of Hypothesis-based Probabilities
• We compute the complete-data sample expected by a given probability
distribution first
• We then compute the maximum likelihood estimate, i.e. the probability
distribution that maximizes the probability of the complete-data sample
• The maximum likelihood estimate is equal to the relative frequency
estimate, given that our probability model is unconstrained
• This cycle is repeated until reaching a probability distribution that
produces a maximal probability of the complete-data sample
• The hypothesis-based probability of evidence is equal to the product of
the hypothesis-based probabilities of the individual variables that
compose it
Estimation of Prior Hypotheses Probabilities
Bayesian Comparison of Competing Hypotheses
We apply the Bayes' theorem in its ratio form to have the normalcy and
abnormality hypotheses compete again each-other:
The hypotheses that holds is the one with the highest probability as estimated by
the Bayes' theorem
Empirical Testing
• The multi-algorithmic IDS was tested in a testbed that resembles the
networked process control environment of a nuclear power plant
• A number of test vulnerabilities and exploitations were introduced to
facilitate the tests
• Both the EI algorithm and the physical process aware specification-
based approach exhibited a false alarms rate of 0 false positives/hr and a
probability of detection of 0.98
• The Bayesian theory of confirmation was tested via a technique that we
refer to as detection failure injection
• The corrective effects of the Bayesian theory of confirmation resulted to
be proportional to the degree of detection failure injection
Conclusions
• The effectiveness of the multi-algorithmic IDS is indicative of the
potential of evolutions of specific RAM content to capture the normal
behavior of a cyber-physical system such as a power plant
• The application of statistics and probability theory along with expert
knowledge within the multi-algorithmic IDS has proven to be effective
in leveraging those evolutions for anomaly detection
• The multi-algorithmic IDS provides for near-real-time detection of
attacks, and hence is not heavyweight
• This is mainly due to the fact that the detection intelligence is created
offline before deployment

More Related Content

PDF
Automatic test packet generation in network
DOCX
automatic test packet generation
PDF
Network Traffic Anomaly Detection Through Bayes Net
PDF
VeriFlow: Verifying Network-Wide Invariants in Real Time
PDF
M41028892
PDF
SFA: Stateful Forwarding Abstraction in SDN Data Plane
PPTX
fault localization in computer network..
PDF
A SYSTEM FOR VALIDATING AND COMPARING HOST-BASED DDOS DETECTION MECHANISMS
Automatic test packet generation in network
automatic test packet generation
Network Traffic Anomaly Detection Through Bayes Net
VeriFlow: Verifying Network-Wide Invariants in Real Time
M41028892
SFA: Stateful Forwarding Abstraction in SDN Data Plane
fault localization in computer network..
A SYSTEM FOR VALIDATING AND COMPARING HOST-BASED DDOS DETECTION MECHANISMS

What's hot (20)

PDF
On-line Power System Static Security Assessment in a Distributed Computing Fr...
PDF
Parameter Estimation of Software Reliability Growth Models Using Simulated An...
PPT
Multisensor data fusion for defense application
PDF
Testing embedded system through optimal mining technique (OMT) based on multi...
DOC
Evaluating the vulnerability of network traffic using joint security and rout...
PDF
Yolinda chiramba Survey Paper
DOCX
B.Eng-Final Year Project interim-report
PDF
Final Paper
PPT
Multi sensor data fusion system for enhanced analysis of deterioration in con...
DOCX
IEEE 2014 JAVA NETWORKING PROJECTS Secure continuous aggregation in wireless ...
PPTX
Power system transmission issues and effects
PDF
Introduction to differential power analysis - Rambus
DOCX
Node-Level Trust Evaluation in Wireless Sensor Networks
PPTX
Data fusion
PDF
Model-Driven Run-Time Enforcement of Complex Role-Based Access Control Policies
PDF
Anomalous payload based network intrusion detection
PDF
chaos-monkey-increasing (1) (1)
PDF
Verification of the protection services in antivirus systems by using nusmv m...
PDF
4th Year Project Presentation Slides
PDF
ieee project topic & abstracts in php
On-line Power System Static Security Assessment in a Distributed Computing Fr...
Parameter Estimation of Software Reliability Growth Models Using Simulated An...
Multisensor data fusion for defense application
Testing embedded system through optimal mining technique (OMT) based on multi...
Evaluating the vulnerability of network traffic using joint security and rout...
Yolinda chiramba Survey Paper
B.Eng-Final Year Project interim-report
Final Paper
Multi sensor data fusion system for enhanced analysis of deterioration in con...
IEEE 2014 JAVA NETWORKING PROJECTS Secure continuous aggregation in wireless ...
Power system transmission issues and effects
Introduction to differential power analysis - Rambus
Node-Level Trust Evaluation in Wireless Sensor Networks
Data fusion
Model-Driven Run-Time Enforcement of Complex Role-Based Access Control Policies
Anomalous payload based network intrusion detection
chaos-monkey-increasing (1) (1)
Verification of the protection services in antivirus systems by using nusmv m...
4th Year Project Presentation Slides
ieee project topic & abstracts in php
Ad

Similar to Composite Intrusion Detection in Process Control Networks (20)

PPTX
Rule-Based Intrusion Detection System.pptx
PPTX
fuzzy logic based transformer fault analysis.pptx
DOC
Cloud data management
PPTX
Threat_actors_and_vectors_with_whiiteandblack_boxtesting.pptx
PPT
FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
PPT
Using a Cognitive Analytic Approach to Enhance Cybersecurity on Oil and Gas O...
PDF
Network Forensics.pdf
DOC
On false data injection attacks against power system
DOCX
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
PPTX
2.4_Overview of Microgrid Research, Development, and Resiliency Analysis_Hovs...
PDF
Networking for java and dotnet 2016 - 17
DOCX
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...
DOCX
2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...
PPTX
Artificial immune system
PPTX
WINSEM2023-24_BCSE354E_ETH_VL2023240501654_2024-01-11_Reference-Material-I.pptx
PPTX
Penentration testing
DOCX
2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...
DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
DOCX
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
PPTX
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Rule-Based Intrusion Detection System.pptx
fuzzy logic based transformer fault analysis.pptx
Cloud data management
Threat_actors_and_vectors_with_whiiteandblack_boxtesting.pptx
FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
Using a Cognitive Analytic Approach to Enhance Cybersecurity on Oil and Gas O...
Network Forensics.pdf
On false data injection attacks against power system
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
2.4_Overview of Microgrid Research, Development, and Resiliency Analysis_Hovs...
Networking for java and dotnet 2016 - 17
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...
2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...
Artificial immune system
WINSEM2023-24_BCSE354E_ETH_VL2023240501654_2024-01-11_Reference-Material-I.pptx
Penentration testing
2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Ad

Recently uploaded (20)

PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
A systematic review of self-coping strategies used by university students to ...
PPTX
Pharma ospi slides which help in ospi learning
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
RMMM.pdf make it easy to upload and study
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Computing-Curriculum for Schools in Ghana
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
Yogi Goddess Pres Conference Studio Updates
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
A systematic review of self-coping strategies used by university students to ...
Pharma ospi slides which help in ospi learning
Chinmaya Tiranga quiz Grand Finale.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Module 4: Burden of Disease Tutorial Slides S2 2025
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
RMMM.pdf make it easy to upload and study
Supply Chain Operations Speaking Notes -ICLT Program
Computing-Curriculum for Schools in Ghana
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Yogi Goddess Pres Conference Studio Updates
Abdominal Access Techniques with Prof. Dr. R K Mishra
2.FourierTransform-ShortQuestionswithAnswers.pdf

Composite Intrusion Detection in Process Control Networks

  • 1. 1 Universita degli Studi di Milano Composite Intrusion Detection in Process Control Networks Julian L. Rrushi
  • 2. 2 Overview • This dissertation develops a multi-algorithmic intrusion detection approach for operation in a networked process control environment • The intrusion detection approach can be used to detect layer-7 attacks on industrial process control systems • It can also be used to detect spread of worm code over a process control network, network insertion of rootkit code into the memory of a compromised control system, synchronization of logic bombs or other malware in a process control network, and valid but destructive network packets generated by malicious insiders
  • 4. 4 Capturing the Behavior of a Cyber-Physical System • We have found that the behavior of a physical process is reflected as evolutions of specific RAM content… • …and that the behavior of network traffic in a process control network is also reflected as evolutions of specific RAM content • Well-behaved network traffic and physical processes are characterized by specific evolutions of specific RAM content, which in this research we refer to as normal evolutions • For a network packet to be classified as normal, its payload should cause a normal evolution of RAM content • Thus, in this work the challenge of anomaly detection takes the form of estimating normal evolutions of RAM content
  • 5. 5 Estimation-Inspection (EI) Algorithm • The evolutions of values of each variable are modeled as a stochastic vector • The challenge is the construction of probability mass functions, which consult RAM content and return stochastic vectors • In this dissertation a probability mass function is developed via a series of logistic regression models • The Estimation part of the EI algorithm uses logistic regression and maximum likelihood estimation to estimate statistical parameters • The Inspection part of the EI algorithm uses those statistical parameters in logistic regression formulae to estimate the normalcy probability of payload content
  • 6. 6 Probabilistic Validation of the EI Algorithm
  • 7. On the Rationality of Simulation-based Validation • Simulation-based validation is commonly employed in environments in which experimentation with real world equipment and/or physical phenomena is not available or feasible • Examples include conflict detection algorithms that are used in airborne collision avoidance systems • Several procedures for validating the effectiveness of radar algorithms to detect and classify moving targets • And so forth
  • 9. 9 Supervisory Control Specifications • A system operator interacts with an HMI to operate a nuclear power plant over a process control network. Such operation is conducted according to precise supervisory instructions • An example of a supervisory instruction is the consultation of a power- to-flow operating map to keep thermal power within predefined thresholds • It is such supervisory instructions from which we derive specifications in the form of activity network models that reason in terms of network packets • A concrete case study is the development of an activity network model that detects any network packet that has potential for inducing stresses on the walls of a reactor pressure vessel
  • 10. 10 Automatic Control Specifications • The logic of automatic operation is encoded into control applications that run in control systems • We derive specifications in the form of activity network models from control applications • Redundant program execution does not seem to be necessary • We consider functions of a control application that read from or write to network sockets in conjunction with program variables stored in the RAM of a control system • A case study is the development of an activity network model that recognizes network packets that protect a reactor from unsafe conditions created by a fault in any of the water pumps
  • 11. 11 Mirage Theory - Definition Mirage theory is comprised of actions that are devised to deliberately mislead an adversary as to digitally controlled physical processes and equipment such as nuclear power plants, thereby causing the adversary to take specific actions that will contribute to the detection of his/her intrusion in process control networks Inspired from operation Fortitude South, mirage theory exploits the adversary's reliance on analysis of intercepted network data to derive the presence and characteristics of physical targets, and the lack of means to verify that intercepted traffic is indeed generated by existing physical targets
  • 13. 13 Elements of Mirage Theory • A continuous space constructed via computer simulation or emulation of physical processes and equipment • A discrete space formed by process control systems and networks that are deployed and configured as if they were to monitor and control a real physical process through real sensors and actuators • An artificial boundary between continuous and discrete spaces developed ad-hoc to allow for a regular interaction between the said spaces, and to also prevent an adversary from crossing the discrete space
  • 14. 14 Boundary Between Continuous and Discrete Spaces
  • 16. Bayesian Theory of Confirmation
  • 18. Estimation of Hypothesis-based Probabilities • We compute the complete-data sample expected by a given probability distribution first • We then compute the maximum likelihood estimate, i.e. the probability distribution that maximizes the probability of the complete-data sample • The maximum likelihood estimate is equal to the relative frequency estimate, given that our probability model is unconstrained • This cycle is repeated until reaching a probability distribution that produces a maximal probability of the complete-data sample • The hypothesis-based probability of evidence is equal to the product of the hypothesis-based probabilities of the individual variables that compose it
  • 19. Estimation of Prior Hypotheses Probabilities
  • 20. Bayesian Comparison of Competing Hypotheses We apply the Bayes' theorem in its ratio form to have the normalcy and abnormality hypotheses compete again each-other: The hypotheses that holds is the one with the highest probability as estimated by the Bayes' theorem
  • 21. Empirical Testing • The multi-algorithmic IDS was tested in a testbed that resembles the networked process control environment of a nuclear power plant • A number of test vulnerabilities and exploitations were introduced to facilitate the tests • Both the EI algorithm and the physical process aware specification- based approach exhibited a false alarms rate of 0 false positives/hr and a probability of detection of 0.98 • The Bayesian theory of confirmation was tested via a technique that we refer to as detection failure injection • The corrective effects of the Bayesian theory of confirmation resulted to be proportional to the degree of detection failure injection
  • 22. Conclusions • The effectiveness of the multi-algorithmic IDS is indicative of the potential of evolutions of specific RAM content to capture the normal behavior of a cyber-physical system such as a power plant • The application of statistics and probability theory along with expert knowledge within the multi-algorithmic IDS has proven to be effective in leveraging those evolutions for anomaly detection • The multi-algorithmic IDS provides for near-real-time detection of attacks, and hence is not heavyweight • This is mainly due to the fact that the detection intelligence is created offline before deployment