单类支持向量机在工业控制系统入侵检测中的应用研究综述
Overview of one-class support vector machine in intrusion detection of industrial control system
查看参考文献43篇
文摘
|
通信行为的异常检测是工业控制系统入侵检测的难点问题。在现有研究工作基础上,阐述了工业控制系统入侵检测技术的国内外研究现状,归纳和总结了现存的问题,指出单类支持向量机(OCSVM)算法在工业控制系统入侵检测中的优越性。结合工业控制系统的专有协议特点,介绍了单类支持向量机在工业控制系统入侵检测中的应用原理及其现有工作;最后指出了单类支持向量机在工业控制系统入侵检测中存在的问题及发展方向。 |
其他语种文摘
|
Anomaly detection based on communication behavior is a difficult problem in intrusion detection of industrial control systems. This paper described the research status of intrusion detection technology of industrial control system, summarized the existing problems on the basis of the existing studies, and pointed out the superiority of one-class support vector machine (OCSVM) algorithm in intrusion detection of industrial control systems. This paper introduced principle and the existing work of OCSVM in intrusion detection of industrial control systems combined features of proprietary protocols of industrial control systems. In the end, it refered to problems and development direction of one-class support vector machine in intrusion detection of industrial control systems. |
来源
|
计算机应用研究
,2016,33(1):7-11 【扩展库】
|
DOI
|
10.3969/j.issn.1001-3695.2016.01.002
|
关键词
|
工业控制系统
;
入侵检测
;
单类支持向量机
;
通信协议
|
地址
|
1.
沈阳理工大学自动化与电气工程学院, 中国科学院网络化控制系统重点实验室, 沈阳, 110159
2.
中国科学院沈阳自动化研究所, 中国科学院网络化控制系统重点实验室, 沈阳, 110016
3.
沈阳理工大学自动化与电气工程学院, 沈阳, 110159
|
语种
|
中文 |
文献类型
|
综述型 |
ISSN
|
1001-3695 |
学科
|
自动化技术、计算机技术 |
基金
|
国家863计划
|
文献收藏号
|
CSCD:5611797
|
参考文献 共
43
共3页
|
1.
Patel S C. Securing SCADA systems.
Information Management & Computer Security,2008,16(4):398-414
|
被引
4
次
|
|
|
|
2.
彭勇. 工业控制系统信息安全研究进展.
清华大学学报:自然科学版,2012,52(10):1396-1405
|
被引
45
次
|
|
|
|
3.
Igure V M. Security issues in SCADA networks.
Computers & Security,2006,25(7):498-506
|
被引
12
次
|
|
|
|
4.
Morris T. A control system testbed to validate critical infrastructure protection concepts.
International Journal of Critical Infrastructure Protection,2011,4(2):88-103
|
被引
2
次
|
|
|
|
5.
Zhu B. SCADA-specific intrusion detection/prevention systems: a survey and taxonomy.
Proc of the 1st Workshop on Secure Control Systems,2010:1-16
|
被引
1
次
|
|
|
|
6.
Papa S M.
A behavioral intrusion detection system for SCADA systems,2013
|
被引
3
次
|
|
|
|
7.
Garcia-Teodoro P. Anomaly-based network intrusion detection: techniques, systems and challenges.
Computers & Security,2009,28(1):18-28
|
被引
25
次
|
|
|
|
8.
Park Y.
A statistical process control approach for network intrusion detection,2005
|
被引
1
次
|
|
|
|
9.
Cardenas A A. Attacks against process control systems: risk assessment, detection, and response.
Proc of the 6th ACM Symposium on Information, Computer and Communications Security,2011:355-366
|
被引
3
次
|
|
|
|
10.
Wei Min. Intrusion detection scheme using traffic prediction for wireless industrial networks.
Journal of Communications and Networks,2012,14(3):310-318
|
被引
6
次
|
|
|
|
11.
张云贵. 基于工业控制模型的非参数CUSUM入侵检测方法.
东南大学学报:自然科学版,2012,42(S1):55-59
|
被引
7
次
|
|
|
|
12.
Goldenberg N. Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems.
International Journal of Critical Infrastructure Protection,2013,6(2):63-75
|
被引
16
次
|
|
|
|
13.
Carcano A. A multidimensional critical state analysis for detecting intrusions in SCADA systems.
IEEE Trans on Industrial Informatics,2011,7(2):179-186
|
被引
11
次
|
|
|
|
14.
Fovino N I. Modbus/DNP3 state-based intrusion detection system.
Proc of the 24th International Conference on Advanced Information Networking and Applications,2010:729-736
|
被引
1
次
|
|
|
|
15.
Linda O. Fuzzy logic based anomaly detection for embedded network security cyber sensor.
Proc of IEEE Symposium on Computational Intelligence in Cyber Security,2011:202-209
|
被引
1
次
|
|
|
|
16.
Mitchell R. Behavior-rule based intrusion detection systems for safety critical smart grid applications.
IEEE Trans on Smart Grid,2013,4(3):1254-1263
|
被引
6
次
|
|
|
|
17.
Yang Y. Intrusion detection system for IEC 60870-5-104 based SCADA networks.
Proc of Power and Energy Society General Meeting,2013:1-5
|
被引
2
次
|
|
|
|
18.
Barbosa R R R. Flow whitelisting in SCADA networks.
International Journal of Critical Infrastructure Protection,2013,6(3/4):150-158
|
被引
4
次
|
|
|
|
19.
Rushi J L.
Composite intrusion detection in process control networks,2009
|
被引
1
次
|
|
|
|
20.
Linda O. Neural network based intrusion detection system for critical infrastructures.
Proc of International Joint Conference on Neural Networks,2009:1827-1834
|
被引
1
次
|
|
|
|
|