Industrial Internet Security Framework v 1.0 | Page 99

Security Framework 10: Security Monitoring and Analysis Predictive monitoring and analysis systems gather and analyze data identify trends suggesting that new attacks are about to occur, or that IIoT systems have changed in ways that might make them more susceptible to future attacks. Examples of data that may suggest new attacks are an increase in the frequency of audit function shutdowns, system configuration changes and unexpected user account creation. These may suggest a system has become vulnerable to attacks and that proper policies and procedures are not being followed. 10.2.2 TYPES OF SECURITY ANALYTICS SYSTEMS Security analytics traditionally tend to be either behavioral or rules-based. These are also known as anomaly-based or signature-based systems, respectively. Behavioral/anomaly-based systems first learn the characteristics of “normal” operation. Once complete, the system generates alerts when tracked characteristics deviate significantly from that learned normal operation. Anomaly-based network intrusion detection systems and file system monitoring systems are examples of behavioral analytics. Safety-critical and reliabilitycritical systems are good candidates for behavioral analysis because they change slowly. Rule/signature-based analytics rely on a library of rules or signatures to identify suspicious behavior. When a set of security values is received that matches a rule, an alert is raised. Both kinds of analytics may result in false negatives (when the analytic engine fails to recognize an attack), or false positives (when the engine incorrectly diagnoses legitimate activity as an attack). There is a trade-off between false-negative and false-positive errors; the lower the threshold for suspicious behavior, the smaller the risk of false negative missed alarms, but the greater the number of false positive alarms. Analysis should use both behavioral and rule-based indicators. Behavioral indicators detect those events that are difficult to define with rules alone. Rule-based indicators detect those events that are clearly never intended to occur and are difficult for the analytics to learn from training. The rules and signatures must be kept up to date, a possible challenge. Behavioral systems may also require management to correct or modify the training if bad behavior is perceived as good. IIC:PUB:G4:V1.0:PB:20160926 - 99 -