검색 상세

A Comprehensive IIoT Security Framework : Proactive Vulnerability Analysis and Reactive Anomaly Detection

초록/요약

With the advent of the Industrial Internet of Things (IIoT) era, industrial control systems have become more efficient to operate; however, it has caused the increase of risks of security accidents in field devices because the boundaries between each layer disappear and connection with the outside increase. ICS (Industrial Control System) ​has been suffered from advanced attacks such as APT (Advanced Persistent Threat) using zero-day vulnerabilities. To cope with the advanced attacks, it is necessary to apply vulnerability analysis and intrusion detection systems; however, since most industrial facilities are still operating without security considerations, security incidents are expected to continue. In this thesis, we propose a comprehensive security framework composed of proactive and reactive technologies for IIoT security to respond to attacks toward ICS. The proposed framework consists of two protocol vulnerability analysis methods and two abnormal behavior detection methods that can be applied to various environments using general ICS characteristics. In the case of the protocol vulnerability analysis technique, we propose a black box-based vulnerability analysis technique that can be performed for all protocol stacks. We verified the effectiveness of the proposed techniques through experiments with ICS communication protocols. In the case of anomaly detection techniques, we proposed two deep learning-based anomaly detection techniques that minimize the data analysis process so that it can be used even in small-scale factories and in various domains. We verified the effectiveness of these two techniques experimentally.

more

목차

Chapter 1 Introduction 1
1.1 Overall Framework 3
1.2 Contribution to the Field 5
1.3 Thesis outline 7
Chapter 2 Background 8
2.1 ICS changes by the 4th industrial revolution 9
2.2 Related works of fuzzing test for IIoT 14
2.3 Related works of intrusion detection for IIoT 16
Chapter 3 Black box Fuzzing Test for IIoT 18
3.1 Introduction 18
3.2 Field classification based fuzzing test case generation 21
3.3 Smart seed selection-based effective black box fuzzing 38
3.4 Discussion 53
Chapter 4 Deep learning based Anomaly Detection for IIoT 55
4.1 Introduction 55
4.2 Autoencoder Based Payload Anomaly Detection 58
4.3 Communication Pattern based Anomaly Detection 75
4.4 Discussion 98
Chapter 5. Conclusion 99
5.1 Summary 99
5.2 Future Work 101
5.3 Closing Remark 101

more