论文标题
工业控制系统中自动威胁狩猎的设计和开发
Design and Development of Automated Threat Hunting in Industrial Control Systems
论文作者
论文摘要
建造了传统的工业系统,例如发电厂,水处理厂等,以运行高度孤立和受控的能力。最近,工业控制系统(ICS)已接触到Internet,以方便访问和适应高级技术。但是,它创建了安全漏洞。攻击者经常利用这些漏洞来发动对ICS的攻击。为此,进行威胁狩猎是为了主动监控ICS网络的安全性并保护他们免受可能导致系统故障的威胁。威胁猎人手动确定威胁,并根据可用威胁情报提供了假设。在本文中,我们激发了缺乏研究自动化ICS网络自动化研究的差距。我们提出了自动提取威胁智力的提取以及假设的产生和验证。我们提出了一个基于ICS MITER ATT&CK框架自动化任务的威胁情报的自动威胁狩猎框架。与现有的基于云的狩猎解决方案不同,代价高昂且容易发生人类错误,我们的解决方案是使用不同的开源技术实施的中央和开源,例如Elasticsearch,Conpot,Metasploit,Web Single Page Application(SPA)和机器学习分析仪。我们的结果表明,拟议的威胁狩猎解决方案可以识别网络的攻击,并通过根据ICS MITER&CK的技术,策略和程序(TTP)产生的假设来提醒猎人。然后,机器学习分类器会自动预测攻击的未来动作。
Traditional industrial systems, e.g., power plants, water treatment plants, etc., were built to operate highly isolated and controlled capacity. Recently, Industrial Control Systems (ICSs) have been exposed to the Internet for ease of access and adaptation to advanced technologies. However, it creates security vulnerabilities. Attackers often exploit these vulnerabilities to launch an attack on ICSs. Towards this, threat hunting is performed to proactively monitor the security of ICS networks and protect them against threats that could make the systems malfunction. A threat hunter manually identifies threats and provides a hypothesis based on the available threat intelligence. In this paper, we motivate the gap in lacking research in the automation of threat hunting in ICS networks. We propose an automated extraction of threat intelligence and the generation and validation of a hypothesis. We present an automated threat hunting framework based on threat intelligence provided by the ICS MITRE ATT&CK framework to automate the tasks. Unlike the existing hunting solutions which are cloud-based, costly and prone to human errors, our solution is a central and open-source implemented using different open-source technologies, e.g., Elasticsearch, Conpot, Metasploit, Web Single Page Application (SPA), and a machine learning analyser. Our results demonstrate that the proposed threat hunting solution can identify the network's attacks and alert a threat hunter with a hypothesis generated based on the techniques, tactics, and procedures (TTPs) from ICS MITRE ATT&CK. Then, a machine learning classifier automatically predicts the future actions of the attack.