new malicious behaviour. It is also expected that
very few of the normal traffic is redirected to the
honeynet as it will produce service outage for le-
gitimate users of the network. This requirement
is directly linked with the detection performance
indicators. A high false positive rate would proba-
bly produce more redirections of benign traffic to
a honeynet. With this in mind the type of attacks
or the specific threshold that is used to choose a
flow as malicious (and therefore a candidate for
redirection) is configurable, making it easy to ad-
just the rate in case of detecting legitimate traffic
ending at the honeynet
• Self-protection: as the system itself is expected
to be the target of attacks it has been built to re-
sist them and react in the case of a platform com-
promise. To this aim, CYBERSENS system de-
ploys probes at the actual elements of the plat-
form. Therefore proper responses are intended
to protect the platform itself (e.g.,isolating par-
tial segments that may be under attack, contain-
ing the spread of the intrusion). On the other side
resource overconsumption may also be the source
of targeted attacks aimed to disable security mea-
sures to bypass monitoring services. Moreover it
can lead to a DoS attack if the resource consump-
tion lead to a service outage in the actual services
of the critical infrastructure. To measure how this
requirement is met, simulated alerts are sent to the
MCU to evaluate how the system react to attacks
inside the platform and if they are properly iso-
lated
Given these functionalities, the main requirements
that the CYBERSENS system should fulfil, to prop-
erly protect a critical infrastructure, are:
• Detection rate in the range 70% to 90%, with a
false alarm rate lower than 20%
• Ability of processing, almost in real-time, net-
work traffic with a granularity either at the flow
level, if direct access to the network devices is
guaranteed, or at the aggregate level, if data are
exported from the network devices to the moni-
toring probe
• Ability of redirecting the 70% of anomalous traf-
fic to the honeynet, with only a maximum of 1%
of normal traffic also redirected to the honeynet
• Ability of processing more than 1000 events in the
case of usage of log records for forensic activi-
ties, corresponding to maximum time to perform
searches in data recently archived of 15’ and of
30’ in data archived in 6 months
• Ability of disclosing not more than 1% of private
data during aggregation and export
6 CONCLUSIONS
One of the main concerns for today’s critical in-
frastructures is protection against cyber attacks.
For effective protection, advanced Intrusion Pre-
vention/Detection Systems (IDS/IPS) are paramount.
This paper presents CYBERSENS, a novel advanced
IDS/IPS system intended for critical infrastructures.
Particularly, the general architecture and the main
functionalities of the CYBERSENS system, as well
as the interactions with other subsystems within the
critical infrastructure network are described. Finally,
an outline of the evaluation metrics we will use to as-
sess CYBERSENS performance is presented.
ACKNOWLEDGEMENTS
This work was partially supported by SCOUT, a re-
search project supported by the European Commis-
sion under its 7th Framework Program (contract-no.
607019). The views and conclusions contained herein
are those of the authors and should not be inter-
preted as necessarily representing the official policies
or endorsements, either expressed or implied, of the
SCOUT project or the European Commission.
REFERENCES
Bace, R. G. (2000). Intrusion detection. Sams Publishing.
Bray, R., Cid, D., and Hay, A. (2008). OSSEC host-based
intrusion detection guide. Syngress.
Callegari, C., Di Pietro, A., Giordano, S., Pepe, T.,
and Procissi, G. (2012). The loglog counting re-
versible sketch: A distributed architecture for detect-
ing anomalies in backbone networks. In Communica-
tions (ICC), 2012 IEEE International Conference on,
pages 1287–1291.
Callegari, C., Gazzarrini, L., Giordano, S., Pagano, M.,
and Pepe, T. (2010). When randomness improves
the anomaly detection performance. In Proceedings
of the International Symposium on Applied Sciences
in Biomedical and Communication Technologies (IS-
ABEL).
Callegari, C., Giordano, S., and Pagano, M. (2015). Net-
work and System Security: 9th International Confer-
ence, NSS 2015, New York, NY, USA, November 3-
5, 2015, Proceedings, chapter Enforcing Privacy in
Distributed Multi-Domain Network Anomaly Detec-
tion, pages 439–446. Springer International Publish-
ing, Cham.
Carlen, P. L. (2013). Traffic flow confidentiality mech-
anisms and their impact on traffic. In Military
Communications and Information Systems Confer-
ence (MCC), 2013, pages 1–6. IEEE.
An Architecture for Securing Communications in Critical Infrastructure
119