• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
高级检索

工业控制系统入侵检测技术综述

杨安, 孙利民, 王小山, 石志强

杨安, 孙利民, 王小山, 石志强. 工业控制系统入侵检测技术综述[J]. 计算机研究与发展, 2016, 53(9): 2039-2054. DOI: 10.7544/issn1000-1239.2016.20150465
引用本文: 杨安, 孙利民, 王小山, 石志强. 工业控制系统入侵检测技术综述[J]. 计算机研究与发展, 2016, 53(9): 2039-2054. DOI: 10.7544/issn1000-1239.2016.20150465
Yang An, Sun Limin, Wang Xiaoshan, Shi Zhiqiang. Intrusion Detection Techniques for Industrial Control Systems[J]. Journal of Computer Research and Development, 2016, 53(9): 2039-2054. DOI: 10.7544/issn1000-1239.2016.20150465
Citation: Yang An, Sun Limin, Wang Xiaoshan, Shi Zhiqiang. Intrusion Detection Techniques for Industrial Control Systems[J]. Journal of Computer Research and Development, 2016, 53(9): 2039-2054. DOI: 10.7544/issn1000-1239.2016.20150465
杨安, 孙利民, 王小山, 石志强. 工业控制系统入侵检测技术综述[J]. 计算机研究与发展, 2016, 53(9): 2039-2054. CSTR: 32373.14.issn1000-1239.2016.20150465
引用本文: 杨安, 孙利民, 王小山, 石志强. 工业控制系统入侵检测技术综述[J]. 计算机研究与发展, 2016, 53(9): 2039-2054. CSTR: 32373.14.issn1000-1239.2016.20150465
Yang An, Sun Limin, Wang Xiaoshan, Shi Zhiqiang. Intrusion Detection Techniques for Industrial Control Systems[J]. Journal of Computer Research and Development, 2016, 53(9): 2039-2054. CSTR: 32373.14.issn1000-1239.2016.20150465
Citation: Yang An, Sun Limin, Wang Xiaoshan, Shi Zhiqiang. Intrusion Detection Techniques for Industrial Control Systems[J]. Journal of Computer Research and Development, 2016, 53(9): 2039-2054. CSTR: 32373.14.issn1000-1239.2016.20150465

工业控制系统入侵检测技术综述

基金项目: 国家自然科学基金项目(61472418);中国科学院国防科技创新基金重点基金项目(CXJJ-14-Z68);中国科学院战略性先导科技专项基金项目(XDA06040101);新疆维吾尔族自治区科技专项基金项目(201230122)
详细信息
  • 中图分类号: TP309

Intrusion Detection Techniques for Industrial Control Systems

  • 摘要: 随着工业控制系统(industrial control systems, ICS)的逐渐开放,暴露出严重的脆弱性问题.入侵检测作为重要的安全防御措施,根据误用和行为检测,可及时发现可能或潜在的入侵行为.首先,介绍了ICS的系统架构及特性,并对ICS的安全理念进行阐释;其次,依据ICS的特性,给出了对工业控制入侵检测系统(intrusion detection system, IDS)(简写为ICS IDS)的需求和解释;再次,基于检测对象角度,从流量检测、协议检测、设备状态检测3个方面,对现有的ICS IDS技术、算法进行了分类及详细的分析;最后,从检测性能指标、检测技术、检测架构3个方面,对整个ICS IDS的研究趋势进行了展望.
    Abstract: In recent decades, with the introduction of Ethernet and the more close connection with external network, an increasingly larger number of vulnerabilities have been found in the industrial control system (ICS), exposing its serious security problem. These security issues cannot be handled completely due to the variety of the vulnerability. Therefore, we must construct the defense-in-depth system for ICS. In particular, the intrusion detection system (IDS) is one of the most important parts in the defense-in-depth system of ICS. The IDS is able to discover the potential intrusion by misuse detection and anomaly detection. In this survey, we analyze the architecture and characteristics of ICS and provide the detailed descriptions of the security concept of ICS. Then, according to the characteristics of ICS, we put forward a clear requirement of ICS IDS and elaborate its connotation. Moreover, we categorize the existing IDS methods based on the detection strategy, including traffic detection, protocol detection and equipment state detection. In each category, we analyze the detection technique and discuss the detection algorithm. Finally, for future work, from the perspective of the disadvantages of current solutions and the constraints for ICS applications, we summarize some research trends of ICS IDS from the aspects of performance metric, detection technique and detection architecture.
  • 期刊类型引用(10)

    1. 杨秀璋,彭国军,刘思德,田杨,李晨光,傅建明. 面向APT攻击的溯源和推理研究综述. 软件学报. 2025(01): 203-252 . 百度学术
    2. 申国霞,常鑫. 基于可信密码模块的网络信道潜在攻击挖掘. 信息技术. 2023(10): 152-156+162 . 百度学术
    3. 谢峥,路广平,付安民. 一种可扩展的实时多步攻击场景重构方法. 信息安全研究. 2023(12): 1173-1179 . 百度学术
    4. 黄维贵,孙怡峰,欧旺,王玉宾. 基于不确定攻击图的违规外联风险分析. 信息工程大学学报. 2022(05): 570-577 . 百度学术
    5. 王文娟,杜学绘,单棣斌. 基于动态概率攻击图的云环境攻击场景构建方法. 通信学报. 2021(01): 1-17 . 百度学术
    6. 潘亚峰,朱俊虎,周天阳. APT攻击场景重构方法综述. 信息工程大学学报. 2021(01): 55-60+80 . 百度学术
    7. 罗智勇,杨旭,刘嘉辉,许瑞. 基于贝叶斯攻击图的网络入侵意图分析模型. 通信学报. 2020(09): 160-169 . 百度学术
    8. 王硕,王建华,汤光明,裴庆祺,张玉臣,刘小虎. 一种智能高效的最优渗透路径生成方法. 计算机研究与发展. 2019(05): 929-941 . 本站查看
    9. 吴东,郭春,申国伟. 一种基于多因素的告警关联方法. 计算机与现代化. 2019(06): 30-37 . 百度学术
    10. 韩宜轩,秦元庆. 基于因果关联的电力工控系统攻击场景还原. 信息技术. 2019(08): 41-44+48 . 百度学术

    其他类型引用(12)

计量
  • 文章访问数:  2446
  • HTML全文浏览量:  6
  • PDF下载量:  1953
  • 被引次数: 22
出版历程
  • 发布日期:  2016-08-31

目录

    /

    返回文章
    返回