Energies (Feb 2022)

Anomaly Detection in Cyclic Communication in OT Protocols

  • Milosz Smolarczyk,
  • Sebastian Plamowski,
  • Jakub Pawluk,
  • Krzysztof Szczypiorski

DOI
https://doi.org/10.3390/en15041517
Journal volume & issue
Vol. 15, no. 4
p. 1517

Abstract

Read online

This paper demonstrates the effectiveness of using anomaly detection in cyclic communication as a method aimed at protecting industrial installations from steganographic communication and a wide range of cyberattacks. The analysis was performed for a method based on deterministic finite automaton and the authors’ method using cycles. In this paper, we discuss the cycle detection algorithm and graph construction as well as demonstrate an anomaly detection method for cyberattack detection that utilizes stochastic elements, such as time-to-response and time-between-messages. We present a novel algorithm that combines finite automaton determinism modeling consecutive admissible messages with a time-domain model allowing for random deviations of regularity. The study was conducted for several test scenarios, including C&C steganographic channels generated using the Modbus TCP/IP protocol. Experimental results demonstrating the effectiveness of the algorithms are presented for both methods. All algorithms described in this paper are implemented and run as part of a passive warden system embedded in a bigger commercial IDS (intrusion detection system).

Keywords