IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems

Loading...
Thumbnail Image
Date
2022-10-26
Volume
Issue
Journal
Series Titel
Book Title
Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2022)
Publisher
New York City : Association for Computing Machinery
Abstract

The increasing interconnection of industrial networks exposes them to an ever-growing risk of cyber attacks. To reveal such attacks early and prevent any damage, industrial intrusion detection searches for anomalies in otherwise predictable communication or process behavior. However, current efforts mostly focus on specific domains and protocols, leading to a research landscape broken up into isolated silos. Thus, existing approaches cannot be applied to other industries that would equally benefit from powerful detection. To better understand this issue, we survey 53 detection systems and find no fundamental reason for their narrow focus. Although they are often coupled to specific industrial protocols in practice, many approaches could generalize to new industrial scenarios in theory. To unlock this potential, we propose IPAL, our industrial protocol abstraction layer, to decouple intrusion detection from domain-specific industrial protocols. After proving IPAL's correctness in a reproducibility study of related work, we showcase its unique benefits by studying the generalizability of existing approaches to new datasets and conclude that they are indeed not restricted to specific domains or protocols and can perform outside their restricted silos.

Description
Keywords
Citation
Wolsing, K., Wagner, E., Saillard, A., & Henze, M. (2022, October). IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems (New York City : Association for Computing Machinery). New York City : Association for Computing Machinery. https://doi.org//10.1145/3545948.3545968
Collections
License
CC BY 4.0 Unported