A Novel IDS Securing Industrial Control System of Critical Infrastructure Using Deception Technology

被引:0
|
作者
Zhang, Shaobo [1 ]
Liu, Yuhang [2 ]
Yang, Dequan [1 ]
机构
[1] Beijing Inst Technol, Beijing, Peoples R China
[2] Peking Univ, Beijing, Peoples R China
关键词
Critical Infrastructure; Honeypot; Industrial Control System; Intrusion Detection System; INTERNET;
D O I
10.4018/IJDCF.302874
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The industrial control system (ICS) has become the key concept in the modern industrial world, enabling process monitoring and system control for general industrial systems and critical infrastructures. High-skilled hackers can invade an imperfect ICS by existing vulnerabilities without much effort. Conventional defenses (such as encryption and firewall) to keep invaders away are getting less effective when an attack is carried out by exploiting an array of particular vulnerabilities. Under this circumstance, a new-type intrusion detection system (IDS) based on deception strategy using honeypot technique is proposed, which is of dramatic effectiveness in protecting ICSs of critical infrastructures. In this honeypot-based model, the authors capture malicious internet flows and system operations. They analyze the collected data before alerting and preventing the intrusion alike when it affects the system in the future. This paper deals with the model's concept, architecture, deployment, and what else can be achieved in the field of critical infrastructure cybersecurity (CIC).
引用
收藏
页数:20
相关论文
共 50 条
  • [41] Authentication Technology in Industrial Control System Based on Identity Password
    Yang, Luyao
    Shang, Wenli
    Chen, Chunyu
    Wang, Tianyu
    Liu, Zhoubin
    PROCEEDINGS OF THE 39TH CHINESE CONTROL CONFERENCE, 2020, : 7677 - 7684
  • [42] Using WWW technology in a control system
    Bille, F
    Pugliese, R
    NUCLEAR INSTRUMENTS & METHODS IN PHYSICS RESEARCH SECTION A-ACCELERATORS SPECTROMETERS DETECTORS AND ASSOCIATED EQUIPMENT, 1997, 389 (1-2): : 114 - 116
  • [43] System Modeling and Risk Analysis using AADL for Critical Infrastructure Security
    Gezgin, Serhat
    Uras, Emel
    Eroglu, Emre
    Altay, Levent
    Bahtiyar, Serif
    Gur, Gurkan
    2015 7TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2015,
  • [44] Adaptive Control System for Detecting Computer Attacks on Objects of Critical Information Infrastructure
    V. M. Krundyshev
    M. O. Kalinin
    Automatic Control and Computer Sciences, 2022, 56 : 1040 - 1048
  • [45] Adaptive Control System for Detecting Computer Attacks on Objects of Critical Information Infrastructure
    Krundyshev, V. M.
    Kalinin, M. O.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2022, 56 (08) : 1040 - 1048
  • [46] Agent based Infrastructure with RFID Technology for Autonomous Shop Floor Control System
    Shieh, Peter IMing
    Jeng, Yao-Chang
    Tsai, Ming-Piao
    MATERIAL AND MANUFACTURING TECHNOLOGY II, PTS 1 AND 2, 2012, 341-342 : 596 - +
  • [47] Radio Data Infrastructure for Remote Monitoring System using LoRa Technology
    Kodali, Ravi Kishore
    2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2017, : 467 - 472
  • [48] A novel intelligent system for securing cash levels using Markov random fields
    Garcia Cabello, Julia
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2021, 36 (08) : 4468 - 4490
  • [49] A Novel Critical Infrastructure Resilience Assessment Approach using Dynamic Bayesian Networks
    Cai, Baoping
    Xie, Min
    Liu, Yonghong
    Liu, Yiliu
    Ji, Renjie
    Feng, Qiang
    2ND INTERNATIONAL CONFERENCE ON MATERIALS SCIENCE, RESOURCE AND ENVIRONMENTAL ENGINEERING (MSREE 2017), 2017, 1890
  • [50] Scheduling and Securing Drone Charging System Using Particle Swarm Optimization and Blockchain Technology
    Torky, Mohamed
    El-Dosuky, Mohamed
    Goda, Essam
    Snasel, Vaclav
    Hassanien, Aboul Ella
    DRONES, 2022, 6 (09)