A Review of Research Work on Network-Based SCADA Intrusion Detection Systems

被引:61
|
作者
Rakas, Slavica V. Bostjancic [1 ]
Stojanovic, Mirjana D. [2 ]
Markovic-Petrovic, Jasna D. [3 ]
机构
[1] Univ Belgrade, Mihailo Pupin Inst, Belgrade 11060, Serbia
[2] Univ Belgrade, Fac Transport & Traff Engn, Belgrade 11000, Serbia
[3] CE Djerdap Hydroelect Power Plants Ltd, Negotin 19300, Serbia
关键词
Anomaly-based detection; network security; SCADA; signature-based detection; specification-based detection; ANOMALY DETECTION; SECURITY; CLASSIFICATION;
D O I
10.1109/ACCESS.2020.2994961
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Specific intrusion detection systems (IDSs) are needed to secure modern supervisory control and data acquisition (SCADA) systems due to their architecture, stringent real-time requirements, network traffic features and specific application layer protocols. This article aims to contribute to assess the state-of-the-art, identify the open issues and provide an insight for future study areas. To achieve these objectives, we start from the factors that impact the design of dedicated intrusion detection systems in SCADA networks and focus on network-based IDS solutions. We propose a structured evaluation methodology that encompasses detection techniques, protected protocols, implementation tools, test environments and IDS performance. Special attention is focused on assessing implementation maturity as well as the applicability of each surveyed solution in the Future Internet environment. Based on that, we provide a brief description and evaluation of 26 selected research papers, published in the period 2015 & x2013;2019. Results of our analysis indicate considerable progress regarding the development of machine learning-based detection methods, implementation platforms, and to some extent, sophisticated testbeds. We also identify research gaps and conclude the analysis with a list of the most important directions for further research.
引用
收藏
页码:93083 / 93108
页数:26
相关论文
共 50 条
  • [41] A Network-based Internet Worm Intrusion Detection and Prevention System
    Wattanapongsakorn, N.
    Wonghirunsombat, E.
    Assawaniwed, T.
    Hanchana, V.
    Srakaew, S.
    Charnsripinyo, C.
    2013 INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2013,
  • [42] A Quantum Generative Adversarial Network-based Intrusion Detection System
    Rahman, Md Abdur
    Shahriar, Hossain
    Clincy, Victor
    Hossain, Md Faruque
    Rahman, Muhammad
    2023 IEEE 47TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC, 2023, : 1810 - 1815
  • [43] Network-based anomaly intrusion detection system using SOMs
    Depren, MÖ
    Topallar, M
    Anarim, E
    Ciliz, K
    PROCEEDINGS OF THE IEEE 12TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE, 2004, : 76 - 79
  • [44] HIDMN: A Host and Network-based Intrusion Detection for Mobile Networks
    Bijani, Shahriar
    Kazemitabar, Maryamosadat A.
    ICCEE 2008: PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, 2008, : 204 - 208
  • [45] Modeling and performance analysis of network-based intrusion detection cluster
    Jiang, YX
    Lin, C
    Shan, ZG
    Chen, Z
    PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, 2004, : 530 - 535
  • [46] Design on Test Method of Network-based Intrusion Detection System
    Shen, Liang
    Yang, Yuanyuan
    Wang, Zhijia
    Zhang, Xiaoxiao
    Gu, Jian
    2012 INTERNATIONAL CONFERENCE ON CONTROL ENGINEERING AND COMMUNICATION TECHNOLOGY (ICCECT 2012), 2012, : 661 - 664
  • [47] Research On Intrusion Detection Based On Campus Network
    Wang, Baoyi
    Li, Feng
    Zhang, Shaomin
    2009 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL 1, PROCEEDINGS, 2009, : 468 - 471
  • [48] Neural network based anomaly detection for SCADA systems
    Reuter, Lenhard
    Jung, Oliver
    Magin, Julian
    2020 23RD CONFERENCE ON INNOVATION IN CLOUDS, INTERNET AND NETWORKS AND WORKSHOPS (ICIN 2020), 2020, : 194 - 201
  • [49] Deep Neural Network-Based Intrusion Detection in Internet of Things: A State-of-the-Art Review
    Li, Zhiqi
    Fang, Weidong
    Zhu, Chunsheng
    Chen, Wentao
    Gao, Zhiwei
    Jiang, Xinhang
    Zhang, Wuxiong
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT III, ICIC 2024, 2024, 14864 : 13 - 23
  • [50] Network Security Enhanced with Deep Neural Network-Based Intrusion Detection System
    Alrayes, Fatma S.
    Zakariah, Mohammed
    Amin, Syed Umar
    Khan, Zafar Iqbal
    Alqurni, Jehad Saad
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 80 (01): : 1457 - 1490