A Novel IDS Securing Industrial Control System of Critical Infrastructure Using Deception Technology

被引:0
|
作者
Zhang, Shaobo [1 ]
Liu, Yuhang [2 ]
Yang, Dequan [1 ]
机构
[1] Beijing Inst Technol, Beijing, Peoples R China
[2] Peking Univ, Beijing, Peoples R China
关键词
Critical Infrastructure; Honeypot; Industrial Control System; Intrusion Detection System; INTERNET;
D O I
10.4018/IJDCF.302874
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The industrial control system (ICS) has become the key concept in the modern industrial world, enabling process monitoring and system control for general industrial systems and critical infrastructures. High-skilled hackers can invade an imperfect ICS by existing vulnerabilities without much effort. Conventional defenses (such as encryption and firewall) to keep invaders away are getting less effective when an attack is carried out by exploiting an array of particular vulnerabilities. Under this circumstance, a new-type intrusion detection system (IDS) based on deception strategy using honeypot technique is proposed, which is of dramatic effectiveness in protecting ICSs of critical infrastructures. In this honeypot-based model, the authors capture malicious internet flows and system operations. They analyze the collected data before alerting and preventing the intrusion alike when it affects the system in the future. This paper deals with the model's concept, architecture, deployment, and what else can be achieved in the field of critical infrastructure cybersecurity (CIC).
引用
收藏
页数:20
相关论文
共 50 条
  • [1] A Novel and Interactive Industrial Control System Honeypot for Critical Smart Grid Infrastructure
    Pliatsios, Dimitrios
    Sarigiannidis, Panagiotis
    Liatifis, Thanasis
    Rompolos, Konstantinos
    Siniosoglou, Ilias
    2019 IEEE 24TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (IEEE CAMAD), 2019,
  • [2] Securing the Industrial Internet of Things for Critical Infrastructure (IIoT-CI)
    O'Raw, John
    Laverty, David
    Morrow, D. John
    2019 IEEE 5TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2019, : 70 - 75
  • [3] Securing Critical Infrastructure with Blockchain Technology: An Approach to Cyber-Resilience
    Govea, Jaime
    Gaibor-Naranjo, Walter
    Villegas-Ch, William
    COMPUTERS, 2024, 13 (05)
  • [4] CPAC: Securing Critical Infrastructure with Cyber-Physical Access Control
    Etigowni, Sriharsha
    Tian, Dave
    Hernandez, Grant
    Zonouz, Saman
    Butler, Kevin
    32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016), 2016, : 139 - 152
  • [5] A Novel Infrastructure Design of Industrial Autonomous System
    Quang Thinh Truong
    Ha Quang Thinh Ngo
    Thanh Phuong Nguyen
    Hung Nguyen
    Kim, Won-Ho
    INTERNATIONAL JOURNAL OF FUZZY LOGIC AND INTELLIGENT SYSTEMS, 2019, 19 (02) : 103 - 111
  • [6] Securing the Critical Communication in Dam Control System with SDN
    Liu, I-Hsien
    Huang, Min-Wei
    Lai, Hsin-Yu
    Lee, Meng-Huan
    Li, Jung-Shian
    JOURNAL OF ROBOTICS NETWORKING AND ARTIFICIAL LIFE, 2023, 10 (02): : 179 - 183
  • [7] Securing Critical Infrastructure in Smart Cities: Providing Scalable Access Control for Constrained Devices
    Buschsieweke, Marian
    Guenes, Mesut
    2017 IEEE 28TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2017,
  • [8] A control system using ASICs technology for industrial environments.
    Felici, S
    Perez, J
    Pelaez, S
    Insenser, JM
    ISIE '97 - PROCEEDINGS OF THE IEEE INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS, VOLS 1-3, 1997, : 84 - 87
  • [9] The Safety Assessment of Critical Infrastructure Control System
    Sokolov, Sergey S.
    Glebov, Nikolay B.
    Antonova, Ekaterina N.
    Nyrkov, Anatoliy P.
    2018 IEEE INTERNATIONAL CONFERENCE QUALITY MANAGEMENT, TRANSPORT AND INFORMATION SECURITY, INFORMATION TECHNOLOGIES (IT&QM&IS), 2018, : 154 - 157
  • [10] A survey of critical infrastructure control system effects
    Kolbe, Michael
    Williams, Paul
    3RD INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, PROCEEDINGS, 2008, : 245 - 254