signatures and include denial of service (rebooting
Modbus servers, listen-only mode commands, and
crashing server with a large packets), reconnaissance
(e.g., unauthorized attempt to read data, gathering de-
vice information), and unauthorized write requests.
Cyber attacks on SCADA systems may require
a particular context to proceed. This context in-
cludes specific network configurations, communica-
tion protocols, system and application configuration,
and hardware or system components. Thus, contex-
tual information can undoubtedly play a considerable
role in intrusion analysis and understanding the possi-
ble impacts of attacks on the systems. Unfortunately,
most of the current IDS tend to consider only a little
part of the context and generate a huge amount of iso-
lated intrusion alerts (Sadighian et al., 2013). These
alerts provide very little attack descriptions and ana-
lysts can rarely make decisions about security events
without manually analyzing their surrounding con-
text. To address these issues and to enhance the con-
text of intrusion alerts, several approaches have been
proposed in (Cuppens et al., 2009; Frye et al., 2012;
Sadighian et al., 2013).
An ontology is a semantic web technique for
knowledge representation and is used for explicit
specification of particular domain conceptualities that
capture its context. It is a formal way of encod-
ing concepts (classes), properties (relations), axioms,
constraints and instances into a machine interpretable
language that easily allows sharing semantic informa-
tion between human and systems.
(Cuppens et al., 2009) proposed an ontology-
based approach to map alerts into the attack context.
In their approach, context is used to identify network
policies that can be used to solve the threat. The
use of ontological representation of networks and at-
tacks is presented by (Frye et al., 2012). The au-
thors used ontologies to describe network traffic and
generic attacks for the purpose of identifying com-
plex attacks. In (Sadighian et al., 2013), an ontol-
ogy based approach is proposed for reducing false
alerts in multi-sensor environments by the incorpora-
tion of contextual information obtained from vulner-
ability databases and context sensors deployed in the
network.
In summary, the concept of ontology techniques
have been applied to attack modeling, knowledge rep-
resentation, and context awareness. However, most
of the works focus on general communication net-
works and do not consider SCADA network context.
The complexity of SCADA networks and their asso-
ciated cyber attacks requires an expressive, but flex-
ible manner, for representing both SCADA domain
expert knowledge and collected intrusion evidences.
This should be supported by the ability to easily in-
tegrate these data for enhanced analytical capabili-
ties and better understanding of attacks. The use
of ontology approaches for contextualizing intrusion
alerts in SCADA networks can bring many advan-
tages. An ontology enables expressing the knowl-
edge with clear structure and detailed definition in a
machine-interpretable format. Moreover, semantics
(the meaning behind the data) can be added to data
and interpreted using the context definitions and re-
strictions for new data classifications. Finally, the on-
tology can help in integrating information from dif-
ferent sources in a flexible way.
3 PROPOSED APPROACH
The proposed ontology-based approach is for corre-
lating and enhancing intrusion alerts with contextual
information in SCADA industrial control networks.
The essential components of the system are illustrated
in Figure 1. These components are labeled with num-
bers linked to the following main steps in our ap-
proach. Detailed information about the technical im-
plementation of each component is provided in Sec-
tion 5.1.
Step 1. Formal knowledge representation models
for traffic, Modbus cyber attacks, and intrusion alerts
are developed using ontologies and stored in a knowl-
edge base. These ontologies capture the main prop-
erties of cyber-attacks on SCADA systems residing
in the communication protocols and systems. They
are used by subsequent components of the system to
transform input data to ontological format and the in-
tegration of SCADA intrusion context.
Step 2. Network traffic containing Modbus pack-
ets is captured and fed into the proposed system along
with generated intrusion alerts by Snort IDS. This
data is parsed and converted to Resource Description
Framework (RDF) triples, which are used as ontolog-
ical representation format. An RDF triple represents
data in three elements pairs that are subject, predicate,
and object. This format is supported by ontologies
and the SPARQL query engine described in the sys-
tem implementation. These RDF triples are added to
the knowledge base as instances.
Step 3. The core analysis engine running on
Apache Jena API library and SPARQL queries re-
trieves correlation rules from the knowledge base and
execute them against the ontology instances to inte-
grate contextual information or extract attack relation-
ships in the alerts and packet instances.
Step 4. The output contextual intrusion alert is
added to the knowledge base and forwarded to the se-
ICISSP 2016 - 2nd International Conference on Information Systems Security and Privacy
458