Network Traffic Obfuscation System for IIoT-Cloud Control Systems |
| |
Authors: | Yangjae Lee Sung Hoon Baek Jung Taek Seo Ki-Woong Park |
| |
Affiliation: | 1.SysCore Lab., Sejong University, Seoul, 05006, Korea2 Department of Computer System Engineering, Jungwon University, Chungcheongbuk-do, 28024, Korea3 Department of Computer Engineering, Gachon University, Gyeonggi-do, 13120, Korea |
| |
Abstract: | One of the latest technologies enabling remote control, operational efficiency upgrades, and real-time big-data monitoring in an industrial control system (ICS) is the IIoT-Cloud ICS, which integrates the Industrial Internet of Things (IIoT) and the cloud into the ICS. Although an ICS benefits from the application of IIoT and the cloud in terms of cost reduction, efficiency improvement, and real-time monitoring, the application of this technology to an ICS poses an unprecedented security risk by exposing its terminal devices to the outside world. An adversary can collect information regarding senders, recipients, and prime-time slots through traffic analysis and use it as a linchpin for the next attack, posing a potential threat to the ICS. To address this problem, we designed a network traffic obfuscation system (NTOS) for the IIoT-Cloud ICS, based on the requirements derived from the ICS characteristics and limitations of existing NTOS models. As a strategy to solve this problem wherein a decrease in the traffic volume facilitates traffic analysis or reduces the packet transmission speed, we proposed an NTOS based on packet scrambling, wherein a packet is split into multiple pieces before transmission, thus obfuscating network analysis. To minimize the ICS modification and downtime, the proposed NTOS was designed using an agent-based model. In addition, for the ICS network traffic analyzer to operate normally in an environment wherein the NTOS is applied, a rule-based NTOS was adopted such that the actual traffic flow is known only to the device that is aware of the rule and is blocked for attackers. The experimental results verified that the same time requested for response and level of difficulty of analysis were maintained by the application of an NTOS based on packet scrambling, even when the number of requests received by the server per second was reduced. The network traffic analyzer of the ICS can capture the packet flow by using the pre-communicated NTOS rule. In addition, by designing an NTOS using an agent-based model, the impact on the ICS was minimized such that the system could be applied with short downtime. |
| |
Keywords: | Cloud computing system moving-target defense container orchestration |
|
| 点击此处可从《计算机、材料和连续体(英文)》浏览原始摘要信息 |
|
点击此处可从《计算机、材料和连续体(英文)》下载全文 |
|