IIoT (Industrial Internet-of-Things) systems are getting more prone to attacks by APT (Advanced Persistent Threat) adversaries. Past APT attacks on IIoT systems such as the 2016 Ukrainian power grid attack which cut off the capital Kyiv off power for an hour and the 2017 Saudi petrochemical plant attack which almost shut down the plant's safety controllers have shown that APT campaigns can disrupt industrial processes, shut down critical systems and endanger human lives. In this work, we propose RAPTOR, a system to detect APT campaigns in IIoT environments. RAPTOR detects and correlates various APT attack stages (adapted to IIoT) using multiple data sources. Subsequently, it constructs a high-level APT campaign graph which can be used by cybersecurity analysts towards attack analysis and mitigation. A performance evaluation of RAPTOR's APT stage detection stages shows high precision and low false positive/negative rates. We also show that RAPTOR is able to construct the APT campaign graph for APT attacks (modelled after real-world attacks on ICS/OT infrastructure) executed on our IIoT testbed.
翻译:IPT过去对IIOT系统的攻击,例如2016年乌克兰电网攻击使首都基辅停电一小时,2017年沙特石油化工厂攻击几乎关闭了该厂的安全控制器,表明APT运动可以扰乱工业过程,关闭关键系统,危害人的生命。在这项工作中,我们提议RAPtor,这是一个在IIOT环境中探测APT运动的系统。RAPTOR利用多种数据源探测和连接APT攻击的各个阶段(改编为IIOT)。随后,它建造了一个高级APT运动图,网络安全分析员可以用来分析和减轻攻击。对APTT的APT阶段的性能评估显示,APT阶段的性能非常精确,而且低假阳性/负性率。我们还表明,RAPtor能够为APT攻击建立APT运动图(在IC/OT基础设施受到真实世界攻击后,模拟了IPT),用于我们的IIT测试。