IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems

dc.bibliographicCitation.bookTitleProceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2022)eng
dc.bibliographicCitation.firstPage510eng
dc.bibliographicCitation.lastPage525eng
dc.contributor.authorWolsing, Konrad
dc.contributor.authorWagner, Eric
dc.contributor.authorSaillard, Antoine
dc.contributor.authorHenze, Martin
dc.date.accessioned2022-10-28T08:50:35Z
dc.date.available2022-10-28T08:50:35Z
dc.date.issued2022-10-26
dc.description.abstractThe increasing interconnection of industrial networks exposes them to an ever-growing risk of cyber attacks. To reveal such attacks early and prevent any damage, industrial intrusion detection searches for anomalies in otherwise predictable communication or process behavior. However, current efforts mostly focus on specific domains and protocols, leading to a research landscape broken up into isolated silos. Thus, existing approaches cannot be applied to other industries that would equally benefit from powerful detection. To better understand this issue, we survey 53 detection systems and find no fundamental reason for their narrow focus. Although they are often coupled to specific industrial protocols in practice, many approaches could generalize to new industrial scenarios in theory. To unlock this potential, we propose IPAL, our industrial protocol abstraction layer, to decouple intrusion detection from domain-specific industrial protocols. After proving IPAL's correctness in a reproducibility study of related work, we showcase its unique benefits by studying the generalizability of existing approaches to new datasets and conclude that they are indeed not restricted to specific domains or protocols and can perform outside their restricted silos.eng
dc.description.versionpublishedVersioneng
dc.identifier.urihttps://oa.tib.eu/renate/handle/123456789/10351
dc.identifier.urihttp://dx.doi.org/10.34657/9387
dc.language.isoengeng
dc.publisherNew York City : Association for Computing Machineryeng
dc.relation.doihttps://doi.org/10.1145/3545948.3545968
dc.relation.hasversionhttp://arxiv.org/abs/2111.03438v2
dc.relation.isbn978-1-4503-9704-9
dc.rights.licenseCC BY 4.0 Unportedeng
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/eng
dc.subject.ddc004eng
dc.subject.gndKonferenzschriftger
dc.subject.otherIndustrial Intrusion Detectioneng
dc.subject.otherIDSeng
dc.subject.otherCPSeng
dc.subject.otherICSeng
dc.subject.otherIndustrial Protocolseng
dc.titleIPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systemseng
dc.typeBookParteng
dc.typeTexteng
dcterms.eventRAID 2022: 25th International Symposium on Research in Attacks, Intrusions and Defenses, Limassol Cyprus, October 26 - 28, 2022
tib.accessRightsopenAccesseng
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
3545948.3545968.pdf
Size:
3.56 MB
Format:
Adobe Portable Document Format
Description:
Collections