A Novel IDS Securing Industrial Control System of Critical Infrastructure Using Deception Technology

A Novel IDS Securing Industrial Control System of Critical Infrastructure Using Deception Technology

Shaobo Zhang, Yuhang Liu, Dequan Yang
Copyright: © 2022 |Pages: 20
DOI: 10.4018/IJDCF.302874
Article PDF Download
Open access articles are freely available for download

Abstract

The Industrial Control System (ICS) has become the key concept in the modern industrial world, enabling process monitoring and system control for general industrial systems and critical infrastructures. High-skilled hackers can invade an imperfect ICS by existing vulnerabilities without much effort. Conventional defenses (such as encryption and firewall) to keep invaders away are getting less and less effective when an attack is carried out by exploiting an array of particular vulnerabilities. Under this circumstance, a new-type intrusion detection system (IDS) based on deception strategy using honeypot technique is proposed, which is of dramatic effectiveness in protecting ICSs of critical infrastructures. In this honeypot-based model, we capture malicious Internet flows and system operations. We analyze the collected data before alerting and preventing the intrusion alike when it affects the system in the future. This paper deals with the model's concept, architecture, deployment, and what else can be achieved in the field of Critical Infrastructure Cybersecurity (CIC).
Article Preview
Top

Introduction

Over the past decade, various modern technologies such as the Internet of Things (IoT), Big Data, and Cloud Computing have been terrifically advanced. These significant improvements bring abundant opportunities for industry development and become essential drivers of innovation in industry. As a result, a new industry concept has emerged, the Fourth Industrial Revolution (Industry 4.0) (Schwab, 2017).

As the so-called “Fourth Industrial Revolution” evolving further, industry today has become more intellectual and connective than any other era in history. As a result, Industrial Control Systems (ICSs), designed to focus on system functions rather than the Internet connection and remote distribution, are now migrating from their original isolated networks (usually LANs) to some public environment, such as the Internet. By utilizing the powerful ability of interconnection, ICSs, including Supervisory Control and Data Acquisition Systems (SCADAs) (Gaushell & Darlington, 1987), Distributed Control System (DCS), and other control system configurations like Programmable Logic Controllers (PLC) (Stouffer et al., 2011), can conduct remote control and instant supervision of the target industrial systems nowadays.

Unfortunately, a variety of cybersecurity challenges has been emerging due to exposing of vital services of ICSs. (Ani et al., 2017) Tight connection of devices and components of ICSs results in high risk in security. Communication of devices perennially exchange vast quantity of safety-critical data through the open air and constantly attract various types of attack. Attackers may manipulate the whole industrial Internet by exploiting vulnerabilities in front-end equipment and sensors, communication networks, and back-end of IT systems (Kumar & Patel, 2014). Once attackers gain the whole or partial access control privileges of the system, there is no doubt that informational and economic loss will be immeasurable. Even people's life security will be in great jeopardy in some severe cases. On December 23, 2015, the Ukrainian Kyivoblenergo, a regional electricity distribution company in Ukraine, reported customer service outages. The outages were due to a third party's illegal entry into the company's computer and SCADA systems: some crucial substations were disconnected for three hours. Later statements indicated that the cyberattack impacted additional portions of the distribution grid and forced operators to switch to manual mode. It is said that a foreign attacker remotely controlled the SCADA distribution management system. The outages were initially thought to have affected approximately 80,000 customers. However, later it was revealed that three different distribution companies were attacked, resulting in several outages that caused approximately 225,000 customers to lose power across various areas. (Case, 2016) A typical domino effect of attacks on ICSs has been seen in the event. (Arief et al., 2020)

Intrusion detection systems (IDSs) are software or hardware systems that automate the process of monitoring the events occurring in a computer system or network, analyzing them for signs of security problems. As cybersecurity issues have become the primary concern of ICSs, IDSs have become a necessary addition to the security infrastructure of most organizations (Bace & Mell, 2001). Intrusion detection methodologies are classified into three major categories: Signature-based Detection (SD), Anomaly-based Detection (AD), and Stateful Protocol Analysis (SPA). Every one of these types is utilized in different situations. Using the IDSs, the authors can make monitoring the whole security system a much more relaxing work with higher efficiency. In the industrial Internet field, the use of IDSs is commonplace owing to their high quality and low cost.

Along with IDS, the honeypot is another helpful method to perceive unknown attacks and intrusions. As the honeypot is commonly defined as “an information system resource whose value lies in unauthorized or illicit use of that resource”, the honeypot is the security resource deception frame up to act like a decoy whose importance resides in getting probed, attacked, or compromised. It contains no sensitive data; however, it pretends to be a valuable portion of the network (Oza et al., 2019). With the help of the deception function of the honeypot, IDSs can be used to collect valuable data from zero-day attacks and other unknown malicious actions in SCADA systems or DCSs. Thus, the authors may be about to stop attacks alike outside our critical infrastructures next time.

Complete Article List

Search this Journal:
Reset
Volume 16: 1 Issue (2024)
Volume 15: 1 Issue (2023)
Volume 14: 3 Issues (2022)
Volume 13: 6 Issues (2021)
Volume 12: 4 Issues (2020)
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing