论文标题

Scaphy:通过将SCADA和物理行为相关联来检测现代ICS攻击

SCAPHY: Detecting Modern ICS Attacks by Correlating Behaviors in SCADA and PHYsical

论文作者

Ike, Moses, Phan, Kandy, Sadoski, Keaton, Valme, Romuald, Lee, Wenke

论文摘要

现代工业控制系统(ICS)攻击通过使用ICS流程的知识将其活动与良性监督控制和数据获取(SCADA)操作融合在一起,从而逃避了现有工具,从而造成了物理世界损害。我们通过利用SCADA的独特执行阶段来确定有限的合法行为,以在不同的阶段控制物理世界,从而在SCADA中检测SCAPHY,以检测SCADA中的ICS攻击,这与攻击者的活动不同。例如,SCADA在初始化过程中设置ICS设备对象是典型的,但在ProcessControl期间是异常的。为了提取SCADA执行阶段的独特行为,Scaphy First Lover of Open ICS约定产生了新颖的物理过程依赖性和影响图(PDIG)以识别破坏性的物理状态。然后,Scaphy使用PDIG告知物理过程感知的动态分析,诱导SCADA过程控制执行的代码路径揭示合法过程控制阶段独有的API调用行为。使用这种既定的行为,Scaphy有选择地监视攻击者的身体针对性的活动,这些活动违反了合法的过程控制行为。我们在美国国家实验室ICS测试台环境中评估了scaphy。 Scaphy利用了四个ICS行业的各种ICS部署方案和攻击,获得了95%的精度和3.5%的假阳性(FP),而精度为47.5%,现有工作的FP为47.5%。我们分析了Scaphys对攻击者知道我们方法的未来派攻击的韧性。

Modern Industrial Control Systems (ICS) attacks evade existing tools by using knowledge of ICS processes to blend their activities with benign Supervisory Control and Data Acquisition (SCADA) operation, causing physical world damages. We present SCAPHY to detect ICS attacks in SCADA by leveraging the unique execution phases of SCADA to identify the limited set of legitimate behaviors to control the physical world in different phases, which differentiates from attackers activities. For example, it is typical for SCADA to setup ICS device objects during initialization, but anomalous during processcontrol. To extract unique behaviors of SCADA execution phases, SCAPHY first leverages open ICS conventions to generate a novel physical process dependency and impact graph (PDIG) to identify disruptive physical states. SCAPHY then uses PDIG to inform a physical process-aware dynamic analysis, whereby code paths of SCADA process-control execution is induced to reveal API call behaviors unique to legitimate process-control phases. Using this established behavior, SCAPHY selectively monitors attackers physical world-targeted activities that violates legitimate processcontrol behaviors. We evaluated SCAPHY at a U.S. national lab ICS testbed environment. Using diverse ICS deployment scenarios and attacks across 4 ICS industries, SCAPHY achieved 95% accuracy & 3.5% false positives (FP), compared to 47.5% accuracy and 25% FP of existing work. We analyze SCAPHYs resilience to futuristic attacks where attacker knows our approach.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源