帮助 关于我们

返回检索结果

单类支持向量机在工业控制系统入侵检测中的应用研究综述
Overview of one-class support vector machine in intrusion detection of industrial control system

查看参考文献43篇

李琳 1   尚文利 2 *   姚俊 3   赵剑明 2   曾鹏 2  
文摘 通信行为的异常检测是工业控制系统入侵检测的难点问题。在现有研究工作基础上,阐述了工业控制系统入侵检测技术的国内外研究现状,归纳和总结了现存的问题,指出单类支持向量机(OCSVM)算法在工业控制系统入侵检测中的优越性。结合工业控制系统的专有协议特点,介绍了单类支持向量机在工业控制系统入侵检测中的应用原理及其现有工作;最后指出了单类支持向量机在工业控制系统入侵检测中存在的问题及发展方向。
其他语种文摘 Anomaly detection based on communication behavior is a difficult problem in intrusion detection of industrial control systems. This paper described the research status of intrusion detection technology of industrial control system, summarized the existing problems on the basis of the existing studies, and pointed out the superiority of one-class support vector machine (OCSVM) algorithm in intrusion detection of industrial control systems. This paper introduced principle and the existing work of OCSVM in intrusion detection of industrial control systems combined features of proprietary protocols of industrial control systems. In the end, it refered to problems and development direction of one-class support vector machine in intrusion detection of industrial control systems.
来源 计算机应用研究 ,2016,33(1):7-11 【扩展库】
DOI 10.3969/j.issn.1001-3695.2016.01.002
关键词 工业控制系统 ; 入侵检测 ; 单类支持向量机 ; 通信协议
地址

1. 沈阳理工大学自动化与电气工程学院, 中国科学院网络化控制系统重点实验室, 沈阳, 110159  

2. 中国科学院沈阳自动化研究所, 中国科学院网络化控制系统重点实验室, 沈阳, 110016  

3. 沈阳理工大学自动化与电气工程学院, 沈阳, 110159

语种 中文
文献类型 综述型
ISSN 1001-3695
学科 自动化技术、计算机技术
基金 国家863计划
文献收藏号 CSCD:5611797

参考文献 共 43 共3页

1.  Patel S C. Securing SCADA systems. Information Management & Computer Security,2008,16(4):398-414 被引 4    
2.  彭勇. 工业控制系统信息安全研究进展. 清华大学学报:自然科学版,2012,52(10):1396-1405 被引 45    
3.  Igure V M. Security issues in SCADA networks. Computers & Security,2006,25(7):498-506 被引 12    
4.  Morris T. A control system testbed to validate critical infrastructure protection concepts. International Journal of Critical Infrastructure Protection,2011,4(2):88-103 被引 2    
5.  Zhu B. SCADA-specific intrusion detection/prevention systems: a survey and taxonomy. Proc of the 1st Workshop on Secure Control Systems,2010:1-16 被引 1    
6.  Papa S M. A behavioral intrusion detection system for SCADA systems,2013 被引 3    
7.  Garcia-Teodoro P. Anomaly-based network intrusion detection: techniques, systems and challenges. Computers & Security,2009,28(1):18-28 被引 25    
8.  Park Y. A statistical process control approach for network intrusion detection,2005 被引 1    
9.  Cardenas A A. Attacks against process control systems: risk assessment, detection, and response. Proc of the 6th ACM Symposium on Information, Computer and Communications Security,2011:355-366 被引 3    
10.  Wei Min. Intrusion detection scheme using traffic prediction for wireless industrial networks. Journal of Communications and Networks,2012,14(3):310-318 被引 6    
11.  张云贵. 基于工业控制模型的非参数CUSUM入侵检测方法. 东南大学学报:自然科学版,2012,42(S1):55-59 被引 7    
12.  Goldenberg N. Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems. International Journal of Critical Infrastructure Protection,2013,6(2):63-75 被引 16    
13.  Carcano A. A multidimensional critical state analysis for detecting intrusions in SCADA systems. IEEE Trans on Industrial Informatics,2011,7(2):179-186 被引 11    
14.  Fovino N I. Modbus/DNP3 state-based intrusion detection system. Proc of the 24th International Conference on Advanced Information Networking and Applications,2010:729-736 被引 1    
15.  Linda O. Fuzzy logic based anomaly detection for embedded network security cyber sensor. Proc of IEEE Symposium on Computational Intelligence in Cyber Security,2011:202-209 被引 1    
16.  Mitchell R. Behavior-rule based intrusion detection systems for safety critical smart grid applications. IEEE Trans on Smart Grid,2013,4(3):1254-1263 被引 6    
17.  Yang Y. Intrusion detection system for IEC 60870-5-104 based SCADA networks. Proc of Power and Energy Society General Meeting,2013:1-5 被引 2    
18.  Barbosa R R R. Flow whitelisting in SCADA networks. International Journal of Critical Infrastructure Protection,2013,6(3/4):150-158 被引 4    
19.  Rushi J L. Composite intrusion detection in process control networks,2009 被引 1    
20.  Linda O. Neural network based intrusion detection system for critical infrastructures. Proc of International Joint Conference on Neural Networks,2009:1827-1834 被引 1    
引证文献 5

1 高一为 基于仿真建模的工业控制网络入侵检测方法研究 通信学报,2017,38(7):2017133-1-2017133-13
被引 0 次

2 刘万军 基于改进单类支持向量机的工业控制网络入侵检测方法 计算机应用,2018,38(5):1360-1365,1371
被引 5

显示所有5篇文献

论文科学数据集
PlumX Metrics
相关文献

 作者相关
 关键词相关
 参考文献相关

版权所有 ©2008 中国科学院文献情报中心 制作维护:中国科学院文献情报中心
地址:北京中关村北四环西路33号 邮政编码:100190 联系电话:(010)82627496 E-mail:cscd@mail.las.ac.cn 京ICP备05002861号-4 | 京公网安备11010802043238号