• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
高级检索

工业控制系统入侵检测技术综述

杨安, 孙利民, 王小山, 石志强

杨安, 孙利民, 王小山, 石志强. 工业控制系统入侵检测技术综述[J]. 计算机研究与发展, 2016, 53(9): 2039-2054. DOI: 10.7544/issn1000-1239.2016.20150465
引用本文: 杨安, 孙利民, 王小山, 石志强. 工业控制系统入侵检测技术综述[J]. 计算机研究与发展, 2016, 53(9): 2039-2054. DOI: 10.7544/issn1000-1239.2016.20150465
Yang An, Sun Limin, Wang Xiaoshan, Shi Zhiqiang. Intrusion Detection Techniques for Industrial Control Systems[J]. Journal of Computer Research and Development, 2016, 53(9): 2039-2054. DOI: 10.7544/issn1000-1239.2016.20150465
Citation: Yang An, Sun Limin, Wang Xiaoshan, Shi Zhiqiang. Intrusion Detection Techniques for Industrial Control Systems[J]. Journal of Computer Research and Development, 2016, 53(9): 2039-2054. DOI: 10.7544/issn1000-1239.2016.20150465
杨安, 孙利民, 王小山, 石志强. 工业控制系统入侵检测技术综述[J]. 计算机研究与发展, 2016, 53(9): 2039-2054. CSTR: 32373.14.issn1000-1239.2016.20150465
引用本文: 杨安, 孙利民, 王小山, 石志强. 工业控制系统入侵检测技术综述[J]. 计算机研究与发展, 2016, 53(9): 2039-2054. CSTR: 32373.14.issn1000-1239.2016.20150465
Yang An, Sun Limin, Wang Xiaoshan, Shi Zhiqiang. Intrusion Detection Techniques for Industrial Control Systems[J]. Journal of Computer Research and Development, 2016, 53(9): 2039-2054. CSTR: 32373.14.issn1000-1239.2016.20150465
Citation: Yang An, Sun Limin, Wang Xiaoshan, Shi Zhiqiang. Intrusion Detection Techniques for Industrial Control Systems[J]. Journal of Computer Research and Development, 2016, 53(9): 2039-2054. CSTR: 32373.14.issn1000-1239.2016.20150465

工业控制系统入侵检测技术综述

基金项目: 国家自然科学基金项目(61472418);中国科学院国防科技创新基金重点基金项目(CXJJ-14-Z68);中国科学院战略性先导科技专项基金项目(XDA06040101);新疆维吾尔族自治区科技专项基金项目(201230122)
详细信息
  • 中图分类号: TP309

Intrusion Detection Techniques for Industrial Control Systems

  • 摘要: 随着工业控制系统(industrial control systems, ICS)的逐渐开放,暴露出严重的脆弱性问题.入侵检测作为重要的安全防御措施,根据误用和行为检测,可及时发现可能或潜在的入侵行为.首先,介绍了ICS的系统架构及特性,并对ICS的安全理念进行阐释;其次,依据ICS的特性,给出了对工业控制入侵检测系统(intrusion detection system, IDS)(简写为ICS IDS)的需求和解释;再次,基于检测对象角度,从流量检测、协议检测、设备状态检测3个方面,对现有的ICS IDS技术、算法进行了分类及详细的分析;最后,从检测性能指标、检测技术、检测架构3个方面,对整个ICS IDS的研究趋势进行了展望.
    Abstract: In recent decades, with the introduction of Ethernet and the more close connection with external network, an increasingly larger number of vulnerabilities have been found in the industrial control system (ICS), exposing its serious security problem. These security issues cannot be handled completely due to the variety of the vulnerability. Therefore, we must construct the defense-in-depth system for ICS. In particular, the intrusion detection system (IDS) is one of the most important parts in the defense-in-depth system of ICS. The IDS is able to discover the potential intrusion by misuse detection and anomaly detection. In this survey, we analyze the architecture and characteristics of ICS and provide the detailed descriptions of the security concept of ICS. Then, according to the characteristics of ICS, we put forward a clear requirement of ICS IDS and elaborate its connotation. Moreover, we categorize the existing IDS methods based on the detection strategy, including traffic detection, protocol detection and equipment state detection. In each category, we analyze the detection technique and discuss the detection algorithm. Finally, for future work, from the perspective of the disadvantages of current solutions and the constraints for ICS applications, we summarize some research trends of ICS IDS from the aspects of performance metric, detection technique and detection architecture.
计量
  • 文章访问数:  2446
  • HTML全文浏览量:  6
  • PDF下载量:  1953
  • 被引次数: 0
出版历程
  • 发布日期:  2016-08-31

目录

    /

    返回文章
    返回