A survey of intrusion detection on industrial control systems

被引:100
作者
Hu, Yan [1 ]
Yang, An [2 ,3 ]
Li, Hong [2 ,3 ]
Sun, Yuyan [2 ,3 ]
Sun, Limin [2 ,3 ]
机构
[1] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing Key Lab IoT Informat Secur, 65 Xingshikou Rd, Beijing 100195, Peoples R China
[3] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
来源
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS | 2018年 / 14卷 / 08期
基金
中国国家自然科学基金;
关键词
Industrial control systems; intrusion detection; protocol analysis; traffic mining; control process analysis;
D O I
10.1177/1550147718794615
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The modern industrial control systems now exhibit an increasing connectivity to the corporate Internet technology networks so as to make full use of the rich resource on the Internet. The increasing interaction between industrial control systems and the outside Internet world, however, has made them an attractive target for a variety of cyber attacks, raising a great need to secure industrial control systems. Intrusion detection technology is one of the most important security precautions for industrial control systems. It can effectively detect potential attacks against industrial control systems. In this survey, we elaborate on the characteristics and the new security requirements of industrial control systems. After that, we present a new taxonomy of intrusion detection systems for industrial control systems based on different techniques: protocol analysis based, traffic mining based, and control process analysis based. In addition, we analyze the advantages and disadvantages of different categories of intrusion detection systems and discuss some future developments of intrusion detection systems for industrial control systems, in order to promote further research on intrusion detection technology for industrial control systems.
引用
收藏
页数:14
相关论文
共 57 条
[1]  
Aghdam Mehdi Hosseinzadeh, 2016, International Journal of Network Security, V18, P420
[2]   Cyber Security of Water SCADA Systems-Part I: Analysis and Experimentation of Stealthy Deception Attacks [J].
Amin, Saurabh ;
Litrico, Xavier ;
Sastry, Shankar ;
Bayen, Alexandre M. .
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2013, 21 (05) :1963-1970
[3]  
[Anonymous], 2018, IEEE T EVOLUT COMPUT, VPP, P1
[4]  
[Anonymous], 2014, INNOVATIVE SMART GRI
[5]  
[Anonymous], 2011, GUIDE IND CONTROL SY
[6]  
[Anonymous], 2018, INT J NETW SECUR
[7]  
[Anonymous], 2016, PROC 9 EAI INT C BIO, DOI DOI 10.4108/EAI.3-12-2015.2262516
[8]  
[Anonymous], 2016, CCS, DOI [DOI 10.1145/2976749, DOI 10.1145/2976749.2978388]
[9]   Fuzziness based semi-supervised learning approach for intrusion detection system [J].
Ashfaq, Rana Aamir Raza ;
Wang, Xi-Zhao ;
Huang, Joshua Zhexue ;
Abbas, Haider ;
He, Yu-Lin .
INFORMATION SCIENCES, 2017, 378 :484-497
[10]   A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems [J].
Carcano, A. ;
Coletta, A. ;
Guglielmi, M. ;
Masera, M. ;
Fovino, I. Nai ;
Trombetta, A. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2011, 7 (02) :179-186