Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3465481.3470073acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

Artificial Steganographic Network Data Generation Concept and Evaluation of Detection Approaches to secure Industrial Control Systems against Steganographic Attacks

Published: 17 August 2021 Publication History

Abstract

Since industrial control systems (ICS) play an important role in our everyday life, their protection is of great importance. At the same time, security researchers observe an increasing usage of steganographic methods in IT networks used by attackers to embed hidden communication in order to stay undetected as long as possible. This leads to a novel digital threat which includes the embedding of steganographic hidden communication in ICS networks. Thus, novel detection approaches specified for steganographic attacks have to be elaborated. Detectors are often based on machine learning approaches and require training and test data. However, the embedding of sophisticated hidden communication in an ICS is a very time consuming and challenging task which currently leads to a lack of suitable training and test data for the evaluation of detection mechanisms. To address this gap, this work presents an artificial steganographic network data (ASND) generation concept for an easy generation of sophisticated steganographic network data which can be provided for the evaluation of detection mechanisms. In this paper, an exemplary data set is created by ASND generation concept and used to evaluate a state-of-the-art detector and a novel detector, also introduced in this work. The accuracy of the detectors is determined and compared. The novel detector reaches a maximum detection accuracy of 92.5%.

References

[1]
J. Brownlee. 2019. Machine Learning Mastery: Deep Learning with Python: Develop Deep Learning Models on Theano and TensorFlow Using Keras. Machine Learning Mastery(2019).
[2]
Luca Caviglione. 2021. Trends and Challenges in Network Covert Channels Countermeasures. Applied Sciences 11 (02 2021). https://doi.org/10.3390/app11041641
[3]
M. Hall. 2009. The WEKA data mining software: An update.In SIGKDD Explorations(2009).
[4]
K. Hempstalk, E. Frank, and I. Witten. 2008. One-Class Classification by Combining Density and Class Probability Estimation. In: Proceedings of the 12th European Conference on Principles and Practice of Knowledge Discovery in Databases and 19th European Conference on Machine Learning, ECMLPKDD2008, Berlin (2008) 505-519 (2008).
[5]
M. Hildebrandt, R. Altschaffel, K. Lamshoeft, M. Lange, M. Szemkus, T. Neubert, C. Vielhauer, Y. Ding, and J. Dittmann. 2020. Threat Analysis Of Steganographic and Covert Communication in Nuclear I&C Systems. In Proceedings of IAEA ICONS 2020: International Conference on Nuclear Security: Sustaining and Strengthening Efforts, 10-14 February 2020, Vienna, Austria, https://event.do/iaea/a/#/events/3301/f/29007.
[6]
Mario Hildebrandt, Kevin Lamshöft, Jana Dittmann, Tom Neubert, and Claus Vielhauer. 2020. Information Hiding in Industrial Control Systems: An OPC UA Based Supply Chain Attack and Its Detection. In Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security (Denver, CO, USA) (IH&MMSec 2020). Association for Computing Machinery, New York, NY, USA, 115–120. https://doi.org/10.1145/3369412.3395068
[7]
D. Kushner. 2013. The Real Story of Stuxnet. IEEE Spectrum;
[8]
K. Lamshoeft and J. Dittmann. 2020. Assessment of Hidden Channel Attacks: Targetting Modbus/TCP. in Proceedings of the IFAC-V 2020 1st Virtual IFAC World Congress, Germany 2020, July 11-17 (2020).
[9]
Kevin Lamshöft, Christian Kraetzer, Jana Dittmann, Tom Neubert, and Claus Vielhauer. 2021. Information Hiding in Cyber Physical Systems: Challenges for Embedding, Retrieval and Detection using Sensor Data of the SWAT Dataset. Accepted for Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia Security(2021), 12 pages. https://doi.org/10.1145/3437880.3460413
[10]
Kevin Lamshöft, Tom Neubert, Mathias Lange, Robert Altschaffel, Mario Hildebrandt, Yongjian Ding, claus Vielhauer, and Jana Dittmann. 2020. Novel Challenges for Anomaly Detection in I&C Networks: Strategic Preparation for the Advent of Information Hiding based Attacks. Atw. Atomwirtschaft 65 (10 2020), 504–508.
[11]
Robert M. Lee, Michael J. Assante, and Tim Conway. 2016. Analysis of the Cyber Attack on the Ukrainian Power Grid. Technical Report. SANS Institute. https://ics.sans.org/media/E-ISAC_SANS_Ukraine_DUC_5.pdf
[12]
W. Mazurczyk, S. Wendzel, and K. Cabaj. 2018. Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach.ARES 2018, 13th International Conference on Availability, Reliability and Security; Hamburg, Germany, August 27 - August 30, ISBN: 978-1-4503-6448-5.
[13]
T. Neubert and C. Vielhauer. 2020. Kill Chain Attack Modeling for Hidden Channel Attack Scenarios in Industrial Control Systems. 21st IFAC World Congress, Berlin, Germany, July 11-17, Submission 1475 (2020).
[14]
T. Schmidbauer, S. Wendzel, A. Mileva, and W. Mazurczyk. 2019. Introducing Dead Drops to Network Steganography using ARP-Caches and SNMP-Walks. ARES ’19: Proceedings of the 14th International Conference on Availability, Reliability and Security August 2019 Article No.: 64 Pages 1–10
[15]
Mohit Sewak, Rezaul Karim, and Pradeep Pujari. 2018. Practical Convolutional Neural Network: Implement advanced deep learning models using Python. Packt Publishing Ltd. ISBN: 978-1-78839-230-3 (2018).
[16]
W.Mazurczyk, S.Wendzel, S.Zanderand A.Houmansadr, and K.Szczypiorski. 2016. Information Hiding in Communication Networks: Fundamentals, Mechanisms, Applications, and Countermeasures.Wiley-IEEE Press ISBN-10: 1118861698(2016).

Cited By

View all
  • (2023)Cyber Crime Undermines Data Privacy Efforts – On the Balance Between Data Privacy and SecurityDigital Forensics and Cyber Crime10.1007/978-3-031-36574-4_25(417-434)Online publication date: 16-Jul-2023

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ARES '21: Proceedings of the 16th International Conference on Availability, Reliability and Security
August 2021
1447 pages
ISBN:9781450390514
DOI:10.1145/3465481
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 August 2021

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Covert Channels
  2. Cyber Physical Systems
  3. Detection
  4. Industrial Control Systems
  5. Information Hiding
  6. Network Covert Channels
  7. Neural Networks
  8. Pattern Recognition
  9. Steganalysis
  10. Steganography

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

  • German Federal Ministry of Economic Affairs and Energy

Conference

ARES 2021

Acceptance Rates

Overall Acceptance Rate 228 of 451 submissions, 51%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)33
  • Downloads (Last 6 weeks)4
Reflects downloads up to 03 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Cyber Crime Undermines Data Privacy Efforts – On the Balance Between Data Privacy and SecurityDigital Forensics and Cyber Crime10.1007/978-3-031-36574-4_25(417-434)Online publication date: 16-Jul-2023

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media