2018
DOI: 10.1177/1550147718794615
|View full text |Cite
|
Sign up to set email alerts
|

A survey of intrusion detection on industrial control systems

Abstract: The modern industrial control systems now exhibit an increasing connectivity to the corporate Internet technology networks so as to make full use of the rich resource on the Internet. The increasing interaction between industrial control systems and the outside Internet world, however, has made them an attractive target for a variety of cyber attacks, raising a great need to secure industrial control systems. Intrusion detection technology is one of the most important security precautions for industrial contro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
77
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 127 publications
(77 citation statements)
references
References 44 publications
0
77
0
Order By: Relevance
“…Hu et al provided a survey of intrusion detection on industrial control systems [26]. They proposed IDS taxonomy based on the following techniques: protocol analysis, traffic mining, and control process analysis, and analyzed the advantages and disadvantages of different IDS categories.…”
Section: Motivation and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Hu et al provided a survey of intrusion detection on industrial control systems [26]. They proposed IDS taxonomy based on the following techniques: protocol analysis, traffic mining, and control process analysis, and analyzed the advantages and disadvantages of different IDS categories.…”
Section: Motivation and Related Workmentioning
confidence: 99%
“…Third, we try to establish correspondence between different approaches to the classification of intrusion detection methodologies used in SCADA networks. Unlike [22], [23] and [26], we do not attempt to propose SCADA-specific classification trees, but rather follow a well-established IDS classification for general-purpose IT systems.…”
Section: Motivation and Related Workmentioning
confidence: 99%
“…[1]. Intrusion detection can be a viable approach to safeguard the ICS against cyber-attacks [2]. Apart from monitoring the network traffic, there is growing interest in exploiting physical properties (e.g., temperature, pressure, etc.)…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, when talking about Industrial Control Systems (ICSs) that have specific requirements and characteristics novel taxonomies were recently proposed. Authors in [6] proposed a classification of IDSs ICS that divides them into three new categories: protocol analysis-based, traffic mining-based, and control process analysis-based.Countermeasures are taken according to the information obtained regarding the detected attacks from the detection systems. The better classification of the type of attack is provided, the more efficient will the chosen countermeasures be and the less will they affect the proper operation of the system or network.…”
mentioning
confidence: 99%
“…Moreover, when talking about Industrial Control Systems (ICSs) that have specific requirements and characteristics novel taxonomies were recently proposed. Authors in [6] proposed a classification of IDSs ICS that divides them into three new categories: protocol analysis-based, traffic mining-based, and control process analysis-based.…”
mentioning
confidence: 99%