Detecting Semantic Attack in SCADA System: A Behavioral Model Based on Secondary Labeling of States-Duration Evolution Graph

Lijuan Xu, Bailing Wang, Xiaoming Wu, Dawei Zhao, Lei Zhang, Zhen Wang

Research output: Contribution to journalArticlepeer-review

19 Scopus citations

Abstract

By violating semantic constraints that the control process impose, the semantic attack leads the Industry Control Systems (ICS) into an undesirable state or critical state. The spread of semantic attack has caused huge economic losses and casualties to critical infrastructure. Therefore, detecting semantic attack is referred to an urgent and critical task. However, few existing detecting techniques can achieve satisfactory effects in detecting semantic attack of ICS, due to the high requirements of complete critical state-based semantic behavior features description, joint detection on multivariate type state variables, and validity of field states datasets under semantic attacks. In an effort to deal with above challenges, We label device states databases with temporal characteristics and divide impacts on states of field devices under semantic attacks into three categories, including absent in states set, confused sequences, irregular frequency. On this basis, we establish a behavioral model based on secondary labeling of states-duration evolution graph (BMSLS), then implement an adaptive secure state-based semantic attack detection framework furtherly. Compared with the traditional Auto Regression (AR) algorithm, the newer time series correlation graph model, and other five deep learning algorithms, our proposed framework demonstrates the superior effect on the detection of semantic attack.

Original languageEnglish
Pages (from-to)703-715
Number of pages13
JournalIEEE Transactions on Network Science and Engineering
Volume9
Issue number2
DOIs
StatePublished - 2022

Keywords

  • Critical state
  • Semantic attack
  • State-based duration evolation graph
  • Supervisory control and data acquisition (SCADA)

Fingerprint

Dive into the research topics of 'Detecting Semantic Attack in SCADA System: A Behavioral Model Based on Secondary Labeling of States-Duration Evolution Graph'. Together they form a unique fingerprint.

Cite this