Softwarization of SCADA: Lightweight Statistical SDN-Agents for Anomaly DetectionRinaldi, Giulia ; Adamsky, Florian ; Soua, Ridha et alin 10th International Conference on Networks of the Future (NoF) (2019, October 04) The increasing connectivity of restricted areas suchas Critical Infrastructures (CIs) raises major security concernsfor Supervisory Control And Data Acquisition (SCADA) systems,which are deployed to ... [more ▼] The increasing connectivity of restricted areas suchas Critical Infrastructures (CIs) raises major security concernsfor Supervisory Control And Data Acquisition (SCADA) systems,which are deployed to monitor their operation. Given the impor-tance of an early anomaly detection, Intrusion Detection Systems(IDSs) are introduced in SCADA systems to detect malicious ac-tivities as early as possible. Agents or probes form the cornerstoneof any IDS by capturing network packets and extracting relevantinformation. However, IDSs are facing unprecedented challengesdue to the escalation in the number, scale and diversity of attacks.Software-Defined Network (SDN) then comes into play and canprovide the required flexibility and scalability. Building on that,we introduce Traffic Agent Controllers (TACs) that monitor SDN-enabled switches via OpenFlow. By using lightweight statisticalmetrics such as Kullback-Leibler Divergence (KLD), we are ableto detect the slightest anomalies, such as stealth port scans, evenin the presence of background traffic. The obtained metrics canalso be used to locate the anomalies with precision over 90%inside a hierarchical network topology. [less ▲] Detailed reference viewed: 101 (13 UL) Forget the Myth of the Air Gap: Machine Learningfor Reliable Intrusion Detection in SCADA Systems; Adamsky, Florian ; Soua, Ridha et alin EAI Endorsed Transactions on Security and Safety (2019) Since Critical Infrastructures (CIs) use systems and equipment that are separated by long distances,Supervisory Control And Data Acquisition (SCADA) systems are used to monitor their behaviour and to send ... [more ▼] Since Critical Infrastructures (CIs) use systems and equipment that are separated by long distances,Supervisory Control And Data Acquisition (SCADA) systems are used to monitor their behaviour and to send commands remotely. For a long time, operator of CIs applied the air gap principle, a security strategy that physically isolates the control network from other communication channels. True isolation, however,is difficult nowadays due to the massive spread of connectivity: using open protocols and more connectivity opens new network attacks against CIs. To cope with this dilemma, sophisticated security measures are needed to address malicious intrusions, which are steadily increasing in number and variety. However, traditional Intrusion Detection Systems (IDSs) cannot detect attacks that are not already present in their databases. To this end, we assess in this paper Machine Learning (ML) techniques for anomaly detection in SCADA systems using a real data set collected from a gas pipeline system and provided by the Mississippi State University (MSU).The contribution of this paper is two-fold: 1) The evaluation of four techniques for missing data estimation and two techniques for data normalization, 2) The performances of Support Vector Machine (SVM), Random Forest (RF), Bidirectional Long Short Term Memory (BLSTM) are assessed in terms of accuracy, precision,recall and F1 score for intrusion detection. Two cases are differentiated: binary and categorical classifications.Our experiments reveal that RF and BLSTM detect intrusions effectively, with an F1 score of respectively>99% and>96% [less ▲] Detailed reference viewed: 64 (10 UL) POSTER: WLAN Device Fingerprinting using Channel State Information (CSI)Adamsky, Florian ; Retunskaia, Tatiana ; Schiffner, Stefan et alin 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec) (2018, June) Detailed reference viewed: 260 (14 UL) Multi-Access Edge Computing for Vehicular Networks: a Position PaperSoua, Ridha ; Turcanu, Ion ; Adamsky, Florian et alin 2018 IEEE Global Communications Conference: Workshops: Vehicular Networking and Intelligent Transportation Systems (2018) Detailed reference viewed: 170 (14 UL) Poster: Performance Evaluation of an Open-Source Audio-Video Bridging/Time-Sensitive Networking Testbed for Automotive Ethernet; Adamsky, Florian ; Turcanu, Ion et alPoster (2018) Automotive Ethernet (AE) is becoming more and more relevant to the automotive industry due to its support of emerging in-car applications, which have high bandwidth demands and stringent requirements in ... [more ▼] Automotive Ethernet (AE) is becoming more and more relevant to the automotive industry due to its support of emerging in-car applications, which have high bandwidth demands and stringent requirements in terms of latency and time synchronization. One of the standards under consideration for AE is IEEE 802.1 Audio Video Bridging (AVB)/Time Sensitive Networking (TSN) that provides deterministic data link layer and bounded latency to real-time traffic classes. So far, this protocol stack has only been evaluated using either simulations or proprietary and expensive platforms. In this paper, we design a real testbed system for AE using general-purpose single-board computers and conduct experiments to assess the real-time performance of an open-source AVB/TSN implementation. Our preliminary results show that even under heavy load, AVB/TSN can fulfil the latency requirements of AE while keeping a constant latency variation. [less ▲] Detailed reference viewed: 195 (22 UL) Machine Learning for Reliable Network Attack Detection in SCADA Systems; Adamsky, Florian ; Soua, Ridha et alin 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18) (2018) Detailed reference viewed: 341 (40 UL) Integrated Protection of Industrial Control Systems from Cyber-attacks: the ATENA ApproachAdamsky, Florian ; ; et alin Elsevier International Journal of Critical Infrastructure Protection (2018) Detailed reference viewed: 148 (4 UL) Analysis of Bandwidth Attacks in a Bittorrent SwarmAdamsky, Florian ![]() Doctoral thesis (2016) Detailed reference viewed: 63 (8 UL) P2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS AttacksAdamsky, Florian ; ; et alin USENIX Workshop on Offensive Technologies (WOOT '15) (2015) Detailed reference viewed: 22 (0 UL) Stealing Bandwidth from BitTorrent SeedersAdamsky, Florian ; ; et alin Computers & Security (2014) Detailed reference viewed: 69 (2 UL) Security Analysis of the Micro Transport Protocol with a Misbehaving ReceiverAdamsky, Florian ; ; et alin International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover (CyberC) (2012) Detailed reference viewed: 68 (0 UL) A Novel Concept for Hybrid Quality Improvements in Consumer NetworksAdamsky, Florian ; ; et alin ICCE-Berlin 2011: 2011 IEEE International Conference on Consumer Electronics - Berlin (ICCE-Berlin) (2011) Detailed reference viewed: 49 (2 UL) POSTER: Destabilizing BitTorrent’s Clusters to Attack High Bandwidth LeechersAdamsky, Florian ; ; et alin In 18th ACM Conference on Computer and Communications Security (ACM CCS) (2011) Detailed reference viewed: 38 (0 UL) Enhancements to Statistical Protocol IDentification (SPID) for Self-Organised QoS in LANs; ; Adamsky, Florian et alin ICCCN 2010 Track on Network Algorithms, Performance Evaluation and Theory (NAPET) (ICCCN 2010 NAPET) (2010) Since most real-time audio and video applications lack of QoS support, QoS demand of such IP data streams shall be detected and applied automatically. To support QoS in LANs, especially in home ... [more ▼] Since most real-time audio and video applications lack of QoS support, QoS demand of such IP data streams shall be detected and applied automatically. To support QoS in LANs, especially in home environments, a system was developed, which enables self-organised QoS for unmanaged networks through host implementations - in contrast to traditional solutions without network support. It supports per-link reservation and prioritisation and works without a need for application support. One part of this system is an automated traffic identification and classification system, which is subject of this paper. An efficient set of attribute meters, based on the Statistical Protocol IDentification (SPID), was investigated, enhanced and evaluated. We improved the performance, added support for UDP protocols and real-time identification. It is shown that using our implementation efficient near real-time protocol identification on per-flow basis is possible to support self-organised resource reservation. [less ▲] Detailed reference viewed: 51 (0 UL) |
||