A Review of Research Work on Network-Based SCADA Intrusion Detection Systems

被引:61
|
作者
Rakas, Slavica V. Bostjancic [1 ]
Stojanovic, Mirjana D. [2 ]
Markovic-Petrovic, Jasna D. [3 ]
机构
[1] Univ Belgrade, Mihailo Pupin Inst, Belgrade 11060, Serbia
[2] Univ Belgrade, Fac Transport & Traff Engn, Belgrade 11000, Serbia
[3] CE Djerdap Hydroelect Power Plants Ltd, Negotin 19300, Serbia
关键词
Anomaly-based detection; network security; SCADA; signature-based detection; specification-based detection; ANOMALY DETECTION; SECURITY; CLASSIFICATION;
D O I
10.1109/ACCESS.2020.2994961
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Specific intrusion detection systems (IDSs) are needed to secure modern supervisory control and data acquisition (SCADA) systems due to their architecture, stringent real-time requirements, network traffic features and specific application layer protocols. This article aims to contribute to assess the state-of-the-art, identify the open issues and provide an insight for future study areas. To achieve these objectives, we start from the factors that impact the design of dedicated intrusion detection systems in SCADA networks and focus on network-based IDS solutions. We propose a structured evaluation methodology that encompasses detection techniques, protected protocols, implementation tools, test environments and IDS performance. Special attention is focused on assessing implementation maturity as well as the applicability of each surveyed solution in the Future Internet environment. Based on that, we provide a brief description and evaluation of 26 selected research papers, published in the period 2015 & x2013;2019. Results of our analysis indicate considerable progress regarding the development of machine learning-based detection methods, implementation platforms, and to some extent, sophisticated testbeds. We also identify research gaps and conclude the analysis with a list of the most important directions for further research.
引用
收藏
页码:93083 / 93108
页数:26
相关论文
共 50 条
  • [21] Method of evolutionary neural network-based intrusion detection
    Wang, L
    Yu, G
    Wang, GR
    Wang, D
    2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, : E13 - E18
  • [22] Method of evolutionary neural network-based intrusion detection
    Wang, Li-Na
    Dong, Xiao-Mei
    Yu, Ge
    Wang, Dong
    Dongbei Daxue Xuebao/Journal of Northeastern University, 2002, 23 (02): : 107 - 110
  • [23] A survey of network-based intrusion detection data sets
    Ring, Markus
    Wunderlich, Sarah
    Scheuring, Deniz
    Landes, Dieter
    Hotho, Andreas
    COMPUTERS & SECURITY, 2019, 86 : 147 - 167
  • [24] Network-based intrusion detection - Modeling for a larger picture
    Totsuka, A
    Ohwada, H
    Fujita, N
    Chakraborty, D
    Keeni, GM
    Shiratori, N
    USENIX ASSOCIATION PROCEEDINGS OF THE SIXTEENTH SYSTEMS ADMINISTRATION CONFERENCE (LISA XVI), 2002, : 227 - 232
  • [25] Network-based intrusion detection with support vector machines
    Kim, DS
    Park, JS
    INFORMATION NETWORKING: NETWORKING TECHNOLOGIES FOR ENHANCED INTERNET SERVICES, 2003, 2662 : 747 - 756
  • [26] Policy management for network-based intrusion detection and prevention
    Chen, YM
    Yang, YY
    NOMS 2004: IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, APPLICATION SESSIONS: MANAGING NEXT GENERATION CONVERGENCE NETWORKS AND SERVICES, 2004, : 219 - 232
  • [27] Problems of network-based intrusion detection system and their countermeasures
    Zhang, Minglai
    Jin, Chengbiao
    Zhao, Wenyun
    Jisuanji Gongcheng/Computer Engineering, 2002, 28 (01):
  • [28] Network-based intrusion detection using Adaboost algorithm
    Hu, W
    Hu, WM
    2005 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE, PROCEEDINGS, 2005, : 712 - 717
  • [29] Agent-based intrusion detection for network-based application
    Zeng, Jianping
    Guo, Donghui
    International Journal of Network Security, 2009, 8 (03) : 201 - 210
  • [30] Research on Intrusion Detection Systems and Unknown Malcode Detection based on Network Behavior
    Yu, Xiaoyong
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (05): : 315 - 325