Skip to Main content Skip to Navigation
Conference papers

Process Discovery for Industrial Control System Cyber Attack Detection

Abstract : Industrial Control Systems (ICSs) are moving from dedicated communications to Ethernet-based interconnected networks, placing them at risk of cyber attack. ICS networks are typically monitored by an Intrusion Detection System (IDS), however traditional IDSs do not detect attacks which disrupt the control flow of an ICS. ICSs are unique in the repetition and restricted number of tasks that are undertaken. Thus there is the opportunity to use Process Mining, a series of techniques focused on discovering, monitoring and improving business processes, to detect ICS control flow anomalies. In this paper we investigate the suitability of various process mining discovery algorithms for the task of detecting cyber attacks on ICSs by examining logs from control devices. Firstly, we identify the requirements of this unique environment, and then evaluate the appropriateness of several commonly used process discovery algorithms to satisfy these requirements. Secondly, the comparison was performed and validated using ICS logs derived from a case study, containing successful attacks on industrial control systems. Our research shows that the Inductive Miner process discovery method, without the use of noise filtering, is the most suitable for discovering a process model that is effective in detecting cyber-attacks on industrial control systems, both in time spent and accuracy.
Document type :
Conference papers
Complete list of metadata

Cited literature [17 references]  Display  Hide  Download
Contributor : Hal Ifip Connect in order to contact the contributor
Submitted on : Monday, November 27, 2017 - 10:32:36 AM
Last modification on : Monday, November 27, 2017 - 10:33:58 AM


Files produced by the author(s)


Distributed under a Creative Commons Attribution 4.0 International License



David Myers, Kenneth Radke, Suriadi Suriadi, Ernest Foo. Process Discovery for Industrial Control System Cyber Attack Detection. 32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.61-75, ⟨10.1007/978-3-319-58469-0_5⟩. ⟨hal-01649023⟩



Les métriques sont temporairement indisponibles