Abstract
Supervisory control and data acquisition (SCADA) systems monitor and control physical processes associated with the critical infrastructure. Weaknesses in the application layer protocols, however, leave SCADA networks vulnerable to attack. In response, cyber security researchers have developed myriad intrusion detection systems. Researchers primarily rely on unique threat models and the corresponding network traffic data sets to train and validate their intrusion detection systems. This leads to a situation in which researchers cannot independently verify the results, cannot compare the effectiveness of different intrusion detection systems, and cannot adequately validate the ability of intrusion detection systems to detect various classes of attacks. Indeed, a common data set is needed that can be used by researchers to compare intrusion detection approaches and implementations. This paper describes four data sets, which include network traffic, process control and process measurement features from a set of 28 attacks against two laboratory-scale industrial control systems that use the MODBUS application layer protocol. The data sets, which are freely available, enable effective comparisons of intrusion detection solutions for SCADA systems.
Chapter PDF
Similar content being viewed by others
References
A. Carcano, A. Coletta, M. Guglielmi, M. Masera, I. Fovino and A. Trombetta, A multidimensional critical state analysis for detecting intrusions in SCADA systems, IEEE Transactions on Industrial Informatics, vol. 7(2), pp. 179–186, 2011.
S. Cheung, B. Dutertre, M. Fong, U. Lindqvist, K. Skinner and A. Valdes, Using model-based intrusion detection for SCADA networks, Proceedings of the SCADA Security Scientific Symposium, 2007.
N. Falliere, L. O’Murchu and E. Chien, W32.Stuxnet Dossier, Version 1.4, Symantec, Mountain View, California, 2011.
W. Gao, Cyber Threats, Attacks and Intrusion Detection in Supervisory Control and Data Acquisition Networks, Ph.D. Dissertation, Department of Electrical and Computer Engineering, Mississippi State University, Mississippi State, Mississippi, 2014.
M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann and I. Witten, The WEKA data mining software: An update, ACM SIGKDD Explorations, vol. 11(1), pp. 10–18, 2009.
S. Hettich and S. Bay, The UCI KDD Archive, Department of Information and Computer Science, University of California at Irvine, Irvine, California ( http://kdd.ics.uci.edu ), 1999.
O. Linda, M. Manic and M. McQueen, Improving control system cyber-state awareness using known secure sensor measurements, Proceedings of the Seventh International Conference on Critical Information Infrastructures Security, pp. 46–58, 2012.
O. Linda, T. Vollmer and M. Manic, Neural network based intrusion detection system for critical infrastructures, Proceedings of the International Joint Conference on Neural Networks, pp. 1827–1834, 2009.
T. Morris, A. Srivastava, B. Reaves, W. Gao, K. Pavurapu and R. Reddi, A control system testbed to validate critical infrastructure protection concepts, International Journal of Critical Infrastructure Protection, vol. 4(2), pp. 88–103, 2011.
P. Oman and M. Phillips, Intrusion detection and event monitoring in SCADA networks, in Critical Infrastructure Protection, E. Goetz and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 161–173, 2008.
K. Poulsen, Slammer worm crashed Ohio nuke plant network, SecurityFocus, Symantec, Mountain View, California ( www.securityfocus.com/news/6767 ), August 19, 2003.
J. Rrushi and K. Kang, Detecting anomalies in process control networks, in Critical Infrastructure Protection III, C. Palmer and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 151–165, 2009.
J. Slay and M. Miller, Lessons learned from the Maroochy water breach, in Critical Infrastructure Protection, E. Goetz and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 73–82, 2008.
C. Ten, J. Hong and C. Liu, Anomaly detection for cybersecurity of substations, IEEE Transactions on Smart Grid, vol. 2(4), pp. 865–873, 2011.
A. Valdes and S. Cheung, Communication pattern anomaly detection in process control systems, Proceedings of the IEEE Conference on Technologies for Homeland Security, pp. 22–29, 2009.
D. Yang, A. Usynin and J. Hines, Anomaly-based intrusion detection for SCADA systems, presented at the IAEA Technical Meeting on Cyber Security of Nuclear Power Plant Instrumentation and Control and Information Systems, 2006.
Y. Zhang, L. Wang, W. Sun, R. Green and M. Alam, Distributed intrusion detection system in a multi-layer network architecture of smart grids, IEEE Transactions on Smart Grid, vol. 2(4), pp. 796–808, 2011
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 IFIP International Federation for Information Processing
About this paper
Cite this paper
Morris, T., Gao, W. (2014). Industrial Control System Traffic Data Sets for Intrusion Detection Research. In: Butts, J., Shenoi, S. (eds) Critical Infrastructure Protection VIII. ICCIP 2014. IFIP Advances in Information and Communication Technology, vol 441. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45355-1_5
Download citation
DOI: https://doi.org/10.1007/978-3-662-45355-1_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-45354-4
Online ISBN: 978-3-662-45355-1
eBook Packages: Computer ScienceComputer Science (R0)