be discerned from the normal operations of the sys-
tem.
6 CONCLUSION
This paper highlights the threat actors that exist and
their capabilities in regards to an ICS network. This
is important when choosing what defences to de-
ploy. This work has expanded on (Gonzalez and Papa,
2007), and proposes novel metrics which are able to
detect a wider range of threats. This work also ad-
dresses a gap in the existing state-of-the-art and com-
mercial systems. In particular, (Terai et al., 2017;
Zhang et al., 2015) and (Vasilomanolakis et al., 2016)
are unable to detect adversaries which disguise their
activities within the application layer. The proposed
metrics can detect such intrusions. The metrics were
developed with the intention of providing a classifi-
cation system with deeper insight into a SCADA net-
work. (Nivethan and Papa, 2016) and (Jardine et al.,
2016), consider the application layer, but they are lim-
ited to a single host with limited visibility to the ap-
plication. Without encoding knowledge of the sys-
tem into a detection system it will require a user with
domain knowledge to act on the results. As a next
step we intend to apply the metrics to real world ex-
periments to confirm their effectiveness. This can be
validated by inputting the data into a SIEM and per-
forming baseline comparison with known normal op-
erations, as well as attack patterns. Finally, we plan
to experiment with one class SVMs to discover ma-
licious actions on the network. In conclusion, we
show that by creating and analysing metrics at the ap-
plication layer, it allows the detection of a multitude
of realistic threat types, which provides more com-
prehensive detection capabilities compared to exist-
ing state-of-the-art methods. It allows for lightweight
analysis which is suitable for multiple purposes, such
as forensics, SIEM integration, features for enhanced
machine learning approaches, and complying with le-
gal requirements.
ACKNOWLEDGEMENTS
This work was funded by EPSRC project ADAMA,
reference EP/N022866/1.
REFERENCES
Almalawi, A., Fahad, A., Tari, Z., Alamri, A., AlGhamdi,
R., and Zomaya, A. Y. (2016). An Efficient Data-
Driven Clustering Technique to Detect Attacks in
SCADA Systems. IEEE Transactions on Information
Forensics and Security.
Gonzalez, J. and Papa, M. (2007). Passive scanning in Mod-
bus networks. Critical Infrastructure Protection.
Hadziosmanovic, D., Bolzoni, D., Etalle, S., and Hartel,
P. H. (2012). Challenges and opportunities in securing
industrial control systems. In Proceedings of the IEEE
Workshop on Complexity in Engineering. IEEE.
Jardine, W., Frey, S., Green, B., and Rashid, A. (2016).
SENAMI: Selective Non-Invasive Active Monitoring
for ICS Intrusion Detection. In Proceedings of the
2Nd ACM Workshop on Cyber-Physical Systems Se-
curity and Privacy.
Kleinmann, A., Amichay, O., Wool, A., Tenenbaum, D.,
Bar, O., and Lev, L. (2017). Stealthy Deception At-
tacks Against SCADA Systems. In arXiv CS.CR.
Lemaire, L., Vossaert, J., Jansen, J., and Naessens, V.
(2017). A logic-based framework for the security
analysis of Industrial Control Systems. Automatic
Control and Computer Sciences.
Lemay, A., Fernandez, J. M., and Knight, S. (2016). A
Modbus command and control channel. In IEEE Sys-
tems Conference.
Luchs, M. and Doerr, C. (2017). Last Line of Defense: A
Novel IDS Approach Against Advanced Threats in In-
dustrial Control Systems. In International Conference
on Detection of Intrusions and Malware & Vulnerabil-
ity Assessment.
Nivethan, J. and Papa, M. (2016). On the Use of Open-
source Firewalls in ICS/SCADA Systems. Inf. Sec. J.:
A Global Perspective.
Payne, S. C. (2006). A guide to security metrics. SANS
institute.
Pendleton, M., Garcia-Lebron, R., Cho, J.-H., and Xu, S.
(2016). A Survey on Systems Security Metrics. ACM
Computing Surveys.
Rathbun, D. and Homsher, L. (2009). Gathering security
metrics and reaping the rewards. SANS Institute, Oct.
Robinson, M. (2013). The SCADA Threat Landscape. In
ICS-CSR.
Rudman, L. and Irwin, B. (2016). Dridex: Analysis of the
traffic and automatic generation of IOCs. In Informa-
tion Security for South Africa.
Shostack, A. (2014). Threat modeling: designing for secu-
rity. Wiley.
Spenneberg, R., Brggemann, M., and Schwartke, H. (2016).
Plc-blaster: A worm living solely in the plc. Black Hat
Asia, Marina Bay Sands, Singapore.
Stouffer, K., Pillitteri, V., Lightman, S., Abrams, M., and
Hahn, A. (2015). Guide to Industrial Control Systems
(ICS) Security. Technical Report NIST SP 800-82r2,
National Institute of Standards and Technology.
Terai, A., Abe, S., Kojima, S., Takano, Y., and Koshijima,
I. (2017). Cyber-Attack Detection for Industrial Con-
trol System Monitoring with Support Vector Machine
Based on Communication Profile. IEEE European
Symposium on Security and Privacy Workshops.
Urbina, D., Cardenas, A., Tippenhauer, N. O., Valente, J.,
Faisal, M., Ruths, J., Candell, R., and Sandberg, H.
ICISSP 2018 - 4th International Conference on Information Systems Security and Privacy
424