Yang Ting, Zhang Jiayuan, Huang Zaiqi, Chen Yujie, Huang Chenglong, Zhou Wei, Liu Peng, Feng Tao, Zhang Yuqing. Survey of Industrial Control Systems Security[J]. Journal of Computer Research and Development, 2022, 59(5): 1035-1053. DOI: 10.7544/issn1000-1239.20211154
Citation:
Yang Ting, Zhang Jiayuan, Huang Zaiqi, Chen Yujie, Huang Chenglong, Zhou Wei, Liu Peng, Feng Tao, Zhang Yuqing. Survey of Industrial Control Systems Security[J]. Journal of Computer Research and Development, 2022, 59(5): 1035-1053. DOI: 10.7544/issn1000-1239.20211154
Yang Ting, Zhang Jiayuan, Huang Zaiqi, Chen Yujie, Huang Chenglong, Zhou Wei, Liu Peng, Feng Tao, Zhang Yuqing. Survey of Industrial Control Systems Security[J]. Journal of Computer Research and Development, 2022, 59(5): 1035-1053. DOI: 10.7544/issn1000-1239.20211154
Citation:
Yang Ting, Zhang Jiayuan, Huang Zaiqi, Chen Yujie, Huang Chenglong, Zhou Wei, Liu Peng, Feng Tao, Zhang Yuqing. Survey of Industrial Control Systems Security[J]. Journal of Computer Research and Development, 2022, 59(5): 1035-1053. DOI: 10.7544/issn1000-1239.20211154
1(School of Cyber Engineering, Xidian University, Xi’an 710071)
2(National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing 101408)
3(School of Computer and Communication, Lanzhou University of Technology, Lanzhou 730050)
4(School of Cyber Science and Engineering, Huazhong University of Science & Technology, Wuhan 430074)
5(College of Information Sciences and Technology, Pennsylvania State University, State College, PA, USA 16802)
6(School of Computer Science and Cyberspace Security, Hainan University, Haikou 570228)
Funds: This work was supported by the National Natural Science Foundation of China (U1836210) and the National Key Research & Development Program of China (2018YFB0804701).
In addition to the application of manufacturing industries, industrial control systems are also widely used in critical infrastructure such as transportation, energy, and water treatment industries. Accelerated application of digital, network, and intelligent technologies in industrial control systems, more and more smart devices are connected to it, leading to severe challenges to its security. Therefore, the security of industrial control systems has attracted the attention of researchers. In order to let the researchers systematically understand the current research progress, we have researched the core database of Web of Science, EI database, the network and information security related papers of CCF recommended international academic conferences and other high-level research work in the past three years. First, the architecture of industrial control systems is introduced, then the security threats that ICS faces are introduced. Moreover, according to the architecture of the industrial control systems, we divide the security research work into three parts: the communication security of industrial control system and cloud, the communication security of human machine interface (HMI) to device, the security of device firmware and other security research issues, analyze them from the perspective of attack and defense. Finally, we put forward the main challenges that security research faces, identify open problems for future research directions.