Intrusion Detection System for Cyber-Manufacturing System

被引:22
作者
Wu, Mingtao [1 ]
Moon, Young B. [1 ]
机构
[1] Syracuse Univ, Dept Mech & Aerosp Engn, 263 Link Hall, Syracuse, NY 13244 USA
来源
JOURNAL OF MANUFACTURING SCIENCE AND ENGINEERING-TRANSACTIONS OF THE ASME | 2019年 / 141卷 / 03期
关键词
intrusion detection; cyber-manufacturing system; security; cyber-physical attack; ATTACKS;
D O I
10.1115/1.4042053
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Cyber-manufacturing system (CMS) offers a blueprint for future manufacturing systems in which physical components are fully integrated with computational processes in a connected environment. Similar concepts and visions have been developed to different extents and under different names-"Industrie 4.0" in Germany, "Monozukuri" in Japan, " Factories of the Future" in the EU, and "Industrial Internet" by GE. However, CMS opens a door for cyber-physical attacks on manufacturing systems. Current computer and information security methods-firewalls and intrusion detection system (IDS), etc.-cannot detect the malicious attacks in CMS with adequate response time and accuracy. Realization of the promising CMS depends on addressing cyber-physical security issues effectively. These attacks can cause physical damages to physical components-machines, equipment, parts, assemblies, products-through over-wearing, breakage, scrap parts or other changes that designers did not intend. This research proposes a conceptual design of a system to detect cyber-physical intrusions in CMS. To accomplish this objective, physical data from the manufacturing process level and production system level are integrated with cyber data from network-based and host-based IDSs. The correlations between the cyber and physical data are analyzed. Machine learning methods are adapted to detect the intrusions. Three-dimensional (3D) printing and computer numerical control (CNC) milling process are used as examples of manufacturing processes for detecting cyber-physical attacks. A cyber-physical attack scenario is presented with preliminary results to illustrate how the system can be used.
引用
收藏
页数:9
相关论文
共 50 条
[31]   A Cyber-Physical Power System Test Bed for Intrusion Detection Systems [J].
Adhikari, Uttam ;
Morris, Thomas H. ;
Pan, Shengyi .
2014 IEEE PES GENERAL MEETING - CONFERENCE & EXPOSITION, 2014,
[32]   Intrusion Detection in SCADA System: A Survey [J].
Zeng, Pu ;
Zhou, Peng .
INTELLIGENT COMPUTING AND INTERNET OF THINGS, PT II, 2018, 924 :342-351
[33]   A Survey on Intrusion Detection System for Software Defined Networks (SDN) [J].
Hande, Yogita ;
Muddana, Akkalashmi .
INTERNATIONAL JOURNAL OF BUSINESS DATA COMMUNICATIONS AND NETWORKING, 2020, 16 (01) :28-47
[34]   Intrusion Detection System and Neutrosophic Theory for MANETs: A Comparative Study [J].
ElWahsh, Haitham ;
Gamal, Mona ;
Salama, A. A. ;
El-Henawy, I. M. .
NEUTROSOPHIC SETS AND SYSTEMS, 2018, 23 :16-22
[35]   A new intrusion detection method for cyber-physical system in emerging industrial IoT [J].
Mittal, Himanshu ;
Tripathi, Ashish Kumar ;
Pandey, Avinash Chandra ;
Alshehri, Mohammad Dahman ;
Saraswat, Mukesh ;
Pal, Raju .
COMPUTER COMMUNICATIONS, 2022, 190 :24-35
[36]   An efficient Intrusion Detection System against cyber-physical attacks in the smart grid [J].
Attia, Mohamed ;
Senouci, Sidi Mohammed ;
Sedjelmaci, Hichem ;
Aglzim, El-Hassane ;
Chrenko, Daniela .
COMPUTERS & ELECTRICAL ENGINEERING, 2018, 68 :499-512
[37]   Efficient, Lightweight Cyber Intrusion Detection System for IoT Ecosystems Using MI2G Algorithm [J].
Kaushik, Sunil ;
Bhardwaj, Akashdeep ;
Alomari, Abdullah ;
Bharany, Salil ;
Alsirhani, Amjad ;
Alshahrani, Mohammed Mujib .
COMPUTERS, 2022, 11 (10)
[38]   Distributed cyber-physical intrusion detection using stacking learning for wide-area protection system [J].
Lu, Qiuyu ;
Gao, Qize ;
Li, June ;
Xie, Xuanxuan ;
Guo, Wenrui ;
Wang, Jin .
COMPUTER COMMUNICATIONS, 2024, 215 :91-102
[39]   An intrusion detection system based on system call [J].
Shen, Yue ;
Yu, Fei ;
Zhang, Ling-Fen ;
An, Ji-Yao ;
Zhu, Miao-Liang .
2005 1ST IEEE/IFIP INTERNATIONAL CONFERENCE IN CENTRAL ASIA ON INTERNET (ICI), 2005, :150-153
[40]   An Adaptive Automatically Tuning Intrusion Detection System [J].
Yu, Zhenwei ;
Tsai, Jeffrey J. P. ;
Weigert, Thomas .
ACM TRANSACTIONS ON AUTONOMOUS AND ADAPTIVE SYSTEMS, 2008, 3 (03)