A Survey of Intrusion Detection Techniques for Cyber-Physical Systems

被引:474
作者
Mitchell, Robert [1 ]
Chen, Ing-Ray [1 ]
机构
[1] Virginia Tech, Blacksburg, VA USA
关键词
Security; Cyber-physical systems; classification; intrusion detection; security; PERFORMANCE ANALYSIS; MANAGEMENT; ALGORITHMS;
D O I
10.1145/2542049
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Pervasive healthcare systems, smart grids, and unmanned aircraft systems are examples of Cyber-Physical Systems (CPSs) that have become highly integrated in the modern world. As this integration deepens, the importance of securing these systems increases. In order to identify gaps and propose research directions in CPS intrusion detection research, we survey the literature of this area. Our approach is to classify modern CPS Intrusion Detection System (IDS) techniques based on two design dimensions: detection technique and audit material. We summarize advantages and drawbacks of each dimension's options. We also summarize the most and least studied CPS IDS techniques in the literature and provide insight on the effectiveness of IDS techniques as they apply to CPSs. Finally, we identify gaps in CPS IDS research and suggest future research areas.
引用
收藏
页数:29
相关论文
共 90 条
[1]   Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks [J].
Al-Hamadi, Hamid ;
Chen, Ing-Ray .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2013, 10 (02) :189-203
[2]  
Ali Khattab M., 2009, 2009 4th IEEE Conference on Industrial Electronics and Applications, P1236, DOI 10.1109/ICIEA.2009.5138399
[3]  
[Anonymous], 11898 ISO
[4]  
[Anonymous], 2010, 18152010 DNP3 IEEE, P1
[5]  
[Anonymous], 2009, MILCOM 2009 2009 IEE
[6]  
Asfaw B., 2010, CRiSIS IEEE, P1
[7]  
Barbosa RRR, 2010, LECT NOTES COMPUT SC, V6155, P163, DOI 10.1007/978-3-642-13986-4_23
[8]  
Bastani F. B., 1994, Annual Reliability and Maintainability Symposium. 1994 Proceedings (Cat. No.94CH3391-0), P442, DOI 10.1109/RAMS.1994.291149
[9]  
Bellettini C, 2008, PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, P285
[10]  
Bigham J, 2003, LECT NOTES COMPUT SC, V2776, P171