2021
DOI: 10.14569/ijacsa.2021.0120506
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Specification-based Intrusion Detection Techniques for Cyber-Physical Systems

Abstract: Cyber-physical systems (CPS) integrate computation and communication capabilities to monitor and control physical systems. Even though this integration improves the performance of the overall system and facilitates the application of CPS in several domains, it also introduces security challenges. Over the years, intrusion detection systems (IDS) have been deployed as one of the security controls for addressing these security challenges. Traditionally, there are three main approaches to IDS, namely: anomaly det… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 32 publications
0
10
0
Order By: Relevance
“…The proliferation of different attack types in the network [5,10] and the growing increase in the exchange of data between devices pose the requirement to secure IoT networks and devices. Currently, there are different techniques to detect such attacks [7,8,[12][13][14], and Figure 2 presents the techniques involved in deploying and detecting intrusions or attacks in IDS.…”
Section: Intrusion Detectionmentioning
confidence: 99%
See 2 more Smart Citations
“…The proliferation of different attack types in the network [5,10] and the growing increase in the exchange of data between devices pose the requirement to secure IoT networks and devices. Currently, there are different techniques to detect such attacks [7,8,[12][13][14], and Figure 2 presents the techniques involved in deploying and detecting intrusions or attacks in IDS.…”
Section: Intrusion Detectionmentioning
confidence: 99%
“…The proliferation of different attack types in the network [5,10] and the growing increase in the exchange of data between devices pose the requirement to secure IoT networks and devices. Currently, there are different techniques to detect such attacks [7,8,[12][13][14], and Figure 2 presents the techniques involved in deploying and detecting intrusions or attacks in IDS. Anomaly-based IDS (AIDS) are designed to identify malicious activities by establishing a baseline of normal device or network behaviour and signalling any deviations as potential intrusions.…”
Section: Intrusion Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…It can base its operation on different modalities, the most common of them are: (i) anomaly-based, according to which it classifies the network activities based on a rules/heuristic-based strategy, then by analyzing their behavior instead querying a database of known patterns [25]; (ii) signature-based, where the new network activity pattern is compared to the known patterns stored in a database, and it is classified based on the basis of this comparison process [26]; (iii) specification-based, according to which the system inspects the involved protocols to detect anomalous sequences that may refer to an attack in progress [27]; (iv) hybrid-based, which does not represent a pure modality but a combination of the previous ones [28].…”
Section: Background and Related Workmentioning
confidence: 99%
“…When sufficient information about a system's behaviors is not available, a specification source is developed by simulation. This source is then used to identify intrusions by monitoring the deviation of system behaviors from simulated attack-free specifications [128].…”
Section: ) Traditional Idssmentioning
confidence: 99%