The increasing interconnection of industrial networks exposes them to an ever-growing risk of cyber attacks. To reveal such attacks early and prevent any damage, industrial intrusion detection searches for anomalies in otherwise predictable communication or process behavior. However, current efforts mostly focus on specific domains and protocols, leading to a research landscape broken up into isolated silos. Thus, existing approaches cannot be applied to other industries that would equally benefit from powerful detection. To better understand this issue, we survey 53 detection systems and find no fundamental reason for their narrow focus. Although they are often coupled to specific industrial protocols in practice, many approaches could generalize to new industrial scenarios in theory. To unlock this potential, we propose IPAL, our industrial protocol abstraction layer, to decouple intrusion detection from domain-specific industrial protocols. After proving IPAL's correctness in a reproducibility study of related work, we showcase its unique benefits by studying the generalizability of existing approaches to new datasets and conclude that they are indeed not restricted to specific domains or protocols and can perform outside their restricted silos.
翻译:工业网络日益相互连接,使它们面临日益增大的网络攻击风险。为了及早揭露这种攻击,防止任何损害,工业入侵探测寻找在本来可以预测的通信或过程行为中出现异常现象。然而,目前的努力主要集中于特定领域和协议,导致研究环境被分割成孤立的筒仓。因此,现有办法不能适用于同样受益于强大探测的其他行业。为了更好地了解这一问题,我们调查53个探测系统,发现它们没有狭隘关注的根本性理由。虽然它们往往与具体的工业协议相联,但许多办法都可以在理论上概括新的工业情景。为了释放这种潜力,我们建议我们的工业协议抽象层IPAL,即我们的工业协议抽象层,将入侵探测与特定领域的工业协议脱钩。在对相关工作的再生研究中证明IPAL的正确性之后,我们通过研究现有方法对新数据集的普遍适用性来展示其独特的好处,并得出结论,它们确实不限于特定领域或协议,可以在其限制的范围以外执行。