Table 2: Outlier score for all data.
Label Outlier stdev VAR1 stdev VAR2 avg VAR1 avg VAR2
valid 0,0007 0,4612 0,4365 0,3068 0,2561
valid 0,0003 0,4614 0,4364 0,3073 0,2559
valid 0,0009 0,4614 0,4355 0,3074 0,2544
valid 0,0005 0,4623 0,4368 0,3095 0,2566
valid 0,0294 0,4262 0,3988 0,2385 0,1984
valid 0,0086 0,4507 0,4247 0,2834 0,2361
valid 0,0019 0,4611 0,4347 0,3066 0,2528
valid 0,0004 0,4622 0,4369 0,3093 0,2569
valid 0,0355 0,4252 0,4368 0,2888 0,2559
attack 0,1652 0,3333 0,4363 0,1272 0,2558
attack 0,1021 0,4614 0,3551 0,3073 0,148
such systems. In order to show the viability of ano-
maly detection and classification in industrial settings
a testbed with real industrial components was set up
data generated during normal operations was captured
to train a behavioral model.
Subsequently several cyber-attacks were launched
against the test setup. Based on these supervised at-
tacks, an attack model was trained using the naive
Bayes classifier. If an anomaly is detected, the classi-
fication process tries to classify the anomaly by ap-
plying the attack model and calculating prediction
confidences for trained classes.
We used this data as training data for creating
the attack model. We finally implemented the naive
Bayes classifier, as it allows probabilistic classifica-
tion of unknown data by experimenting with several
classification algorithms. The accuracy of the process
was 96%, with two misclassifications. New attacks,
known or unknown, will be imported to the attack mo-
del and trained by the classifier.
The results show clearly that attacks against indus-
trial control systems can be detected using our ano-
maly detection and classifying approach. Particularly
known attacks that have been trained by the classifier
can be classified with high accuracy. Furthermore, we
tested our approach on real data from a production fa-
cility. This process data from the truck manufacturer
showed that our approach also works for data from
real operational plants.
Further work will comprise the improvement of
the attack classification process by widening the
spectrum of anomaly detection to other types of
cyber-attacks.
ACKNOWLEDGEMENTS
Our project is funded by the KIRAS program of the
Austrian Research Promotion Agency (FFG). KIRAS
funds projects in the field of security, with IT security
being a subcategory in this context.
REFERENCES
Batishchev, A. (2014). Low Orbit Ion Cannon.
https://sourceforge.net/projects/loic/.
Chen, T. M. (2010). Stuxnet, the real start of cyber warfare?
[editor’s note]. IEEE Network, 24(6):2–3.
Cheung, S., Dutertre, B., Fong, M., Lindqvist, U., Skinner,
K., and Valdes, A. (2007). Using model-based intru-
sion detection for scada networks. In Proceedings of
the SCADA Security Scientific Symposium, Miami Be-
ach, Florida.
Dieterle, D. (2012). Israel’s Cyber Defenses Protect Go-
vernment Sites from 44 Million Attacks. CYBER
ARMS - Computer Security.
Eigner, O., Kreimel, P., and Tavolato, P. (2016). Detection
of man-in-the-middle attacks on industrial control net-
works. In 2016 International Conference on Software
Security and Assurance (ICSSA), pages 64–69.
Falliere, N., Murchu, L. O., and Chien, E. (2011). W32.
stuxnet dossier. White paper, Symantec Corp., Secu-
rity Response, 5.
Garitano, I., Uribeetxeberria, R., and Zurutuza, U. (2011).
A review of scada anomaly detection systems. In
Soft Computing Models in Industrial and Environmen-
tal Applications, 6th International Conference SOCO
2011, pages 357–366. Springer.
Ghaleb, A., Zhioua, S., and Almulhem, A. (2016). Scada-
sst: a scada security testbed. In 2016 World Congress
on Industrial Control Systems Security (WCICSS), pa-
ges 1–6.
Goldenberg, N. and Wool, A. (2013). Accurate modeling
of Modbus/TCP for intrusion detection in SCADA sy-