A Survey of Intrusion Detection Techniques for Cyber-Physical Systems

被引:474
作者
Mitchell, Robert [1 ]
Chen, Ing-Ray [1 ]
机构
[1] Virginia Tech, Blacksburg, VA USA
关键词
Security; Cyber-physical systems; classification; intrusion detection; security; PERFORMANCE ANALYSIS; MANAGEMENT; ALGORITHMS;
D O I
10.1145/2542049
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Pervasive healthcare systems, smart grids, and unmanned aircraft systems are examples of Cyber-Physical Systems (CPSs) that have become highly integrated in the modern world. As this integration deepens, the importance of securing these systems increases. In order to identify gaps and propose research directions in CPS intrusion detection research, we survey the literature of this area. Our approach is to classify modern CPS Intrusion Detection System (IDS) techniques based on two design dimensions: detection technique and audit material. We summarize advantages and drawbacks of each dimension's options. We also summarize the most and least studied CPS IDS techniques in the literature and provide insight on the effectiveness of IDS techniques as they apply to CPSs. Finally, we identify gaps in CPS IDS research and suggest future research areas.
引用
收藏
页数:29
相关论文
共 90 条
[61]  
Mitchell Robert, 2012, P IEEE INT C COMP CO
[62]  
Mitchell Robert, 2013, IEEE T SYSTEMS MAN C
[63]  
Modbus Application, 2012, MODBUS APPL PROT SPE
[64]  
Modbus Messaging, 2006, MODBUS MESS TCP IP I
[65]  
National Science Foundation of the United States, 2011, CYB PHYS SYST CPS PR
[66]  
Ni L, 2007, PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, P3217
[67]  
Oman P, 2008, INT FED INFO PROC, V253, P161
[68]  
Park K., 2010, P 3 INT C PERVASIVE, P1
[69]   Bro: a system for detecting network intruders in real-time [J].
Paxson, V .
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (23-24) :2435-2463
[70]   Trust Management In Privacy - Preserving Information System [J].
Peng, Kun ;
Bao, Feng .
PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 7, 2010, :1-4