A survey of intrusion detection on industrial control systems

被引:100
作者
Hu, Yan [1 ]
Yang, An [2 ,3 ]
Li, Hong [2 ,3 ]
Sun, Yuyan [2 ,3 ]
Sun, Limin [2 ,3 ]
机构
[1] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing Key Lab IoT Informat Secur, 65 Xingshikou Rd, Beijing 100195, Peoples R China
[3] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
来源
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS | 2018年 / 14卷 / 08期
基金
中国国家自然科学基金;
关键词
Industrial control systems; intrusion detection; protocol analysis; traffic mining; control process analysis;
D O I
10.1177/1550147718794615
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The modern industrial control systems now exhibit an increasing connectivity to the corporate Internet technology networks so as to make full use of the rich resource on the Internet. The increasing interaction between industrial control systems and the outside Internet world, however, has made them an attractive target for a variety of cyber attacks, raising a great need to secure industrial control systems. Intrusion detection technology is one of the most important security precautions for industrial control systems. It can effectively detect potential attacks against industrial control systems. In this survey, we elaborate on the characteristics and the new security requirements of industrial control systems. After that, we present a new taxonomy of intrusion detection systems for industrial control systems based on different techniques: protocol analysis based, traffic mining based, and control process analysis based. In addition, we analyze the advantages and disadvantages of different categories of intrusion detection systems and discuss some future developments of intrusion detection systems for industrial control systems, in order to promote further research on intrusion detection technology for industrial control systems.
引用
收藏
页数:14
相关论文
共 57 条
[41]   A Survey of Intrusion Detection Techniques for Cyber-Physical Systems [J].
Mitchell, Robert ;
Chen, Ing-Ray .
ACM COMPUTING SURVEYS, 2014, 46 (04)
[42]  
Modbus-IDA, 2004, Modbus Application Protocol Specification V1.1a
[43]  
Morris T., 2012, 2012 45th Hawaii International Conference on System Sciences (HICSS), P2338, DOI 10.1109/HICSS.2012.78
[44]  
Moya C., 2018, ARXIV180603544
[45]   Process Discovery for Industrial Control System Cyber Attack Detection [J].
Myers, David ;
Radke, Kenneth ;
Suriadi, Suriadi ;
Foo, Ernest .
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2017, 2017, 502 :61-75
[46]  
Patton R. J., 1997, Annual Reviews in Control, V21, P103, DOI 10.1016/S1367-5788(97)00020-5
[47]   Bro: a system for detecting network intruders in real-time [J].
Paxson, V .
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (23-24) :2435-2463
[48]  
Roesch M, P 1999 13 SYST ADM C, V99, P229
[49]   Model-Based Attack Detection and Mitigation for Automatic Generation Control [J].
Sridhar, Siddharth ;
Govindarasu, Manimaran .
IEEE TRANSACTIONS ON SMART GRID, 2014, 5 (02) :580-591
[50]  
Staggs J., 2017, Adventures in attacking wind farm control networks