Network-Based Intrusion Detection for Industrial and Robotics Systems: A Comprehensive Survey

被引:0
|
作者
Holdbrook, Richard [1 ]
Odeyomi, Olusola [1 ]
Yi, Sun [2 ]
Roy, Kaushik [1 ]
机构
[1] North Carolina Agr & Tech State Univ, Dept Comp Sci, Greensboro, NC 27411 USA
[2] North Carolina Agr & Tech State Univ, Dept Mech Engn, Greensboro, NC 27411 USA
基金
美国国家科学基金会;
关键词
robotics security; industrial control systems; network-based intrusion detection systems; anomaly detection; machine learning; GENERATION; INTERNET; DATASET; CYBER; IOT;
D O I
10.3390/electronics13224440
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the face of rapidly evolving cyber threats, network-based intrusion detection systems (NIDS) have become critical to the security of industrial and robotic systems. This survey explores the specialized requirements, advancements, and challenges unique to deploying NIDS within these environments, where traditional intrusion detection systems (IDS) often fall short. This paper discusses NIDS methodologies, including machine learning, deep learning, and hybrid systems, which aim to improve detection accuracy, adaptability, and real-time response. Additionally, this paper addresses the complexity of industrial settings, limitations in current datasets, and the cybersecurity needs of cyber-physical Systems (CPS) and Industrial Control Systems (ICS). The survey provides a comprehensive overview of modern approaches and their suitability for industrial applications by reviewing relevant datasets, emerging technologies, and sector-specific challenges. This underscores the importance of innovative solutions, such as federated learning, blockchain, and digital twins, to enhance the security and resilience of NIDS in safeguarding industrial and robotic systems.
引用
收藏
页数:23
相关论文
共 50 条
  • [31] A Survey of Network Intrusion Detection Systems for Controller Area Network
    Dupont, Guillaume
    den Hartog, Jerry
    Etalle, Sandro
    Lekidis, Alexios
    2019 IEEE INTERNATIONAL CONFERENCE OF VEHICULAR ELECTRONICS AND SAFETY (ICVES 19), 2019,
  • [32] Decision analysis of network-based intrusion detection systems for denial-of-service attacks
    Li, M
    Jia, WJ
    Zhao, W
    2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, : E1 - E6
  • [33] Network-based intrusion detection systems evaluation through a short term experimental script
    Fagundes, Leonardo Lemes
    Gaspary, Luciano Paschoal
    E-BUSINESS AND TELECOMMUNICATION NETWORKS, 2006, : 159 - +
  • [34] Cellular Neural Network-Based Methods for Distributed Network Intrusion Detection
    Xie, Kang
    Yang, Yixian
    Xin, Yang
    Xia, Guangsheng
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2015, 2015
  • [35] A Network-based Internet Worm Intrusion Detection and Prevention System
    Wattanapongsakorn, N.
    Wonghirunsombat, E.
    Assawaniwed, T.
    Hanchana, V.
    Srakaew, S.
    Charnsripinyo, C.
    2013 INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2013,
  • [36] A Quantum Generative Adversarial Network-based Intrusion Detection System
    Rahman, Md Abdur
    Shahriar, Hossain
    Clincy, Victor
    Hossain, Md Faruque
    Rahman, Muhammad
    2023 IEEE 47TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC, 2023, : 1810 - 1815
  • [37] Network-based anomaly intrusion detection system using SOMs
    Depren, MÖ
    Topallar, M
    Anarim, E
    Ciliz, K
    PROCEEDINGS OF THE IEEE 12TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE, 2004, : 76 - 79
  • [38] HIDMN: A Host and Network-based Intrusion Detection for Mobile Networks
    Bijani, Shahriar
    Kazemitabar, Maryamosadat A.
    ICCEE 2008: PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, 2008, : 204 - 208
  • [39] Modeling and performance analysis of network-based intrusion detection cluster
    Jiang, YX
    Lin, C
    Shan, ZG
    Chen, Z
    PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, 2004, : 530 - 535
  • [40] Survey on network-based botnet detection methods
    Garcia, Sebastian
    Zunino, Alejandro
    Campo, Marcelo
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (05) : 878 - 903