Abstract

The modern industrial control systems now exhibit an increasing connectivity to the corporate Internet technology networks so as to make full use of the rich resource on the Internet. The increasing interaction between industrial control systems and the outside Internet world, however, has made them an attractive target for a variety of cyber attacks, raising a great need to secure industrial control systems. Intrusion detection technology is one of the most important security precautions for industrial control systems. It can effectively detect potential attacks against industrial control systems. In this survey, we elaborate on the characteristics and the new security requirements of industrial control systems. After that, we present a new taxonomy of intrusion detection systems for industrial control systems based on different techniques: protocol analysis based, traffic mining based, and control process analysis based. In addition, we analyze the advantages and disadvantages of different categories of intrusion detection systems and discuss some future developments of intrusion detection systems for industrial control systems, in order to promote further research on intrusion detection technology for industrial control systems.

Highlights

  • Industrial control systems (ICS)[1] is a general term that encompasses several types of control systems and associated components used for industrial process control

  • In section ‘‘New Taxonomy of ICS Intrusion detection systems (IDS),’’ we propose a new taxonomy of ICS IDS based on different techniques

  • Due to the particularity of ICS, traditional IDS designed for Internet technology (IT) systems cannot work very well on ICS

Read more

Summary

Introduction

Industrial control systems (ICS)[1] is a general term that encompasses several types of control systems and associated components used for industrial process control. ICS are mainly responsible for real-time data acquisition, system monitoring and automatic control and management of industrial processes. ICS have been widely used in important fields such as finance, transportation, water treatment, manufacturing, and power generation and distribution. They play an important role in a nation’s critical infrastructure and directly affect a nation’s economy. The security issue of ICS has aroused wide public concerns, and the number of cyber attacks against ICS are increasing quickly.

Objectives
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call