Modern Industrial Control Systems (ICS) attacks evade existing tools by using knowledge of ICS processes to blend their activities with benign Supervisory Control and Data Acquisition (SCADA) operation, causing physical world damages. We present SCAPHY to detect ICS attacks in SCADA by leveraging the unique execution phases of SCADA to identify the limited set of legitimate behaviors to control the physical world in different phases, which differentiates from attackers activities. For example, it is typical for SCADA to setup ICS device objects during initialization, but anomalous during processcontrol. To extract unique behaviors of SCADA execution phases, SCAPHY first leverages open ICS conventions to generate a novel physical process dependency and impact graph (PDIG) to identify disruptive physical states. SCAPHY then uses PDIG to inform a physical process-aware dynamic analysis, whereby code paths of SCADA process-control execution is induced to reveal API call behaviors unique to legitimate process-control phases. Using this established behavior, SCAPHY selectively monitors attackers physical world-targeted activities that violates legitimate processcontrol behaviors. We evaluated SCAPHY at a U.S. national lab ICS testbed environment. Using diverse ICS deployment scenarios and attacks across 4 ICS industries, SCAPHY achieved 95% accuracy & 3.5% false positives (FP), compared to 47.5% accuracy and 25% FP of existing work. We analyze SCAPHYs resilience to futuristic attacks where attacker knows our approach.
翻译:现代工业控制系统(ICS)袭击利用ICS程序知识将其活动与无害监督控制和数据采集(SCADA)操作结合起来,从而造成物质世界损害,从而回避现有工具。我们提出SCAPHY,通过利用SCAD的独特执行阶段,查明在不同的阶段控制物理世界的有限合法行为,这与攻击者活动不同。例如,SCADA通常在初始阶段设置ICS设备对象,但在过程控制期间却有异常现象。为了提取SCADA执行阶段的独特行为,SCACCHY首先利用ICS公约的开放,以产生新的物理过程依赖性和影响图(PDIG)来检测SCADA袭击。我们提出SCAPHY在物理过程认知性动态分析中,从而引导SCA程序控制执行的代码路径显示API称为合法过程控制阶段所独有的行为。使用这种既定行为,SCAPC选择性方法监测攻击者在合理的程序控制行为中,我们评估了SCSBICS的物理依赖性和影响,在US.S.S.CFA45号国家实验室的精确度测试环境,在SHICS.