Intrusion Detection Algorithm of Industrial Control System Based on Improved Bloom Filter

被引:1
作者
Chen, Yanru [1 ]
Zhang, Yuanyuan [1 ]
Lin, Youlin [1 ]
Huang, Xinmao [2 ]
Xing, Bin [3 ]
Long, Ping [3 ]
Li, Yang [4 ]
Chen, Liangyin [1 ]
机构
[1] Sichuan Univ, Chengdu, Sichuan, Peoples R China
[2] Sichuan GreatWall Comp Syst Co Ltd, Luzhou, Sichuan, Peoples R China
[3] Chongqing Innovat Ctr Ind Big Data Co Ltd, Chongqing, Peoples R China
[4] Inst Southwestern Commun, Chengdu, Sichuan, Peoples R China
来源
COMPUTER SUPPORTED COOPERATIVE WORK AND SOCIAL COMPUTING, CHINESECSCW 2021, PT I | 2022年 / 1491卷
关键词
Intrusion detection; Industrial control system; Bloom filter; Misuse-based;
D O I
10.1007/978-981-19-4546-5_13
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the upgrading of industrial manufacturing, industrial control system (ICS) is gradually changing from closed island to open, and it adopts network automation. Meantime, this change brings many risks and constant threats to ICS security. ICS is widely used in many fields closely related to people's livelihood. Once the ICS in these fields is threatened, itmay cause very serious consequences. As an active system security protection technology, intrusion detection technology can effectively make up for the shortcomings of firewall and other traditional security protection technologies. It is considered as the second security defense line of ICS. In view of limited resources of ICS equipment, there are no more resources to store the intrusion feature database and carry out complex calculation, this paper proposes an intrusion detection algorithm of ICS based on improved bloom filter (IDA-ICS-IBF). The experimental results show that the IDA-ICS-IBF algorithm has low memory occupation, fast detection speed, and can be applied to ICS environment.
引用
收藏
页码:164 / 175
页数:12
相关论文
共 17 条
[1]  
[Anonymous], 2020, IND INTERNET PLATFOR
[2]   Intrusion detection techniques in network environment: a systematic review [J].
Ayyagari, Maruthi Rohit ;
Kesswani, Nishtha ;
Kumar, Munish ;
Kumar, Krishan .
WIRELESS NETWORKS, 2021, 27 (02) :1269-1285
[3]  
Eirini A., 2021, J CYBERSECUR, V7
[4]  
Firoz Noor Farjana, 2020, Cyber Security and Computer Science. Second EAI International Conference, ICONCS 2020. Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST 325), P14, DOI 10.1007/978-3-030-52856-0_2
[5]   Intrusion detection systems in the Internet of things: A comprehensive investigation [J].
Hajiheidari, Somayye ;
Wakil, Karzan ;
Badri, Maryam ;
Navimipour, Nima Jafari .
COMPUTER NETWORKS, 2019, 160 :165-191
[6]   Detecting stealthy attacks on industrial control systems using a permutation entropy-based method [J].
Hu, Yan ;
Li, Hong ;
Luan, Tom H. ;
Yang, An ;
Sun, Limin ;
Wang, Zhiliang ;
Wang, Rui .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 108 (1230-1240) :1230-1240
[7]   A GA-LR wrapper approach for feature selection in network intrusion detection [J].
Khammassi, Chaouki ;
Krichen, Saoussen .
COMPUTERS & SECURITY, 2017, 70 :255-277
[8]   基于流量特征指纹的工控系统网络入侵检测 [J].
刘姜涛 ;
邓其军 ;
董文恒 .
武汉大学学报(工学版), 2019, 52 (07) :642-650
[9]  
Menachem D., 2020, P FUTURE TECHNOLOGIE, P889, DOI [10.1007/978-3-030-63092-8_60, DOI 10.1007/978-3-030-63092-8_60]
[10]  
Meng W., 2020, J PARALLEL DISTR COM, V112, P2023