Sequence-Based Anomaly Detection in Critical Infrastructure Networks
Conference
·
OSTI ID:3023455
- Georgia Tech
- Idaho National Laboratory
- Duke University
- University of Florida
United States critical infrastructure faces new cyber threats from adversarial nation-state actors in the form of malware-free attacks. Traditional cybersecurity techniques use rules-based methods to identify indicators of compromise on networks, often missing these sophisticated attacks. Our approach leverages multiple state of the art machine learning models in a pipeline to identify abnormal network events through sequential analysis. We combine both device and packet-level information into individual events to characterize anomalous network actions. The model is trained and tested on real network traffic from the Idaho National Lab High Performance Computing (HPC) with greater than 98% precision. It is capable of flagging malicious tactics used by adversaries in malware-free attacks, severe changes to the network, and abnormal user activity by network devices.
- Research Organization:
- Idaho National Laboratory (INL), Idaho Falls, ID (United States)
- Sponsoring Organization:
- USDOE Office of Nuclear Energy (NE); USDOE Office of Nuclear Energy (NE)
- DOE Contract Number:
- AC07-05ID14517;
- OSTI ID:
- 3023455
- Report Number(s):
- INL/MIS-24-79682
- Resource Type:
- Conference proceedings
- Conference Information:
- Idaho National Laboratory Intern Poster Session, Idaho Falls, 04/07/2024 - 04/07/2024
- Country of Publication:
- United States
- Language:
- English
Similar Records
Real-Time SCADA Cyber Protection Using Compression Techniques
SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) 2013
PRECURSOR ANALYSIS REPORT: INDUSTROYER2 AND WIPER MALWARE TARGETING UKRAINIAN ENERGY PROVIDER 2022
Conference
·
Thu Oct 31 20:00:00 EDT 2013
·
OSTI ID:1122126
SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) 2013
Technical Report
·
Mon Dec 31 23:00:00 EST 2012
·
OSTI ID:1070143
PRECURSOR ANALYSIS REPORT: INDUSTROYER2 AND WIPER MALWARE TARGETING UKRAINIAN ENERGY PROVIDER 2022
Technical Report
·
Mon Oct 13 20:00:00 EDT 2025
·
OSTI ID:3030047