Intrusion Detection System for Cyber-Manufacturing System

被引:23
作者
Wu, Mingtao [1 ]
Moon, Young B. [1 ]
机构
[1] Syracuse Univ, Dept Mech & Aerosp Engn, 263 Link Hall, Syracuse, NY 13244 USA
来源
JOURNAL OF MANUFACTURING SCIENCE AND ENGINEERING-TRANSACTIONS OF THE ASME | 2019年 / 141卷 / 03期
关键词
intrusion detection; cyber-manufacturing system; security; cyber-physical attack; ATTACKS;
D O I
10.1115/1.4042053
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Cyber-manufacturing system (CMS) offers a blueprint for future manufacturing systems in which physical components are fully integrated with computational processes in a connected environment. Similar concepts and visions have been developed to different extents and under different names-"Industrie 4.0" in Germany, "Monozukuri" in Japan, " Factories of the Future" in the EU, and "Industrial Internet" by GE. However, CMS opens a door for cyber-physical attacks on manufacturing systems. Current computer and information security methods-firewalls and intrusion detection system (IDS), etc.-cannot detect the malicious attacks in CMS with adequate response time and accuracy. Realization of the promising CMS depends on addressing cyber-physical security issues effectively. These attacks can cause physical damages to physical components-machines, equipment, parts, assemblies, products-through over-wearing, breakage, scrap parts or other changes that designers did not intend. This research proposes a conceptual design of a system to detect cyber-physical intrusions in CMS. To accomplish this objective, physical data from the manufacturing process level and production system level are integrated with cyber data from network-based and host-based IDSs. The correlations between the cyber and physical data are analyzed. Machine learning methods are adapted to detect the intrusions. Three-dimensional (3D) printing and computer numerical control (CNC) milling process are used as examples of manufacturing processes for detecting cyber-physical attacks. A cyber-physical attack scenario is presented with preliminary results to illustrate how the system can be used.
引用
收藏
页数:9
相关论文
共 50 条
[41]   An intrusion detection system based on system call [J].
Shen, Yue ;
Yu, Fei ;
Zhang, Ling-Fen ;
An, Ji-Yao ;
Zhu, Miao-Liang .
2005 1ST IEEE/IFIP INTERNATIONAL CONFERENCE IN CENTRAL ASIA ON INTERNET (ICI), 2005, :150-153
[42]   IMMIX-Intrusion Detection and Prevention System [J].
Vasudeo, Sarode Harshal ;
Patil, Pravin ;
Kumar, R. Vinoth .
2015 INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES AND MANAGEMENT FOR COMPUTING, COMMUNICATION, CONTROLS, ENERGY AND MATERIALS (ICSTM), 2015, :96-101
[43]   An Adaptive Automatically Tuning Intrusion Detection System [J].
Yu, Zhenwei ;
Tsai, Jeffrey J. P. ;
Weigert, Thomas .
ACM TRANSACTIONS ON AUTONOMOUS AND ADAPTIVE SYSTEMS, 2008, 3 (03)
[44]   An intrusion detection system for wireless sensor networks [J].
Onat, I ;
Miri, A .
WIMOB 2005: IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, VOL 3, PROCEEDINGS, 2005, :253-259
[45]   An autonomous intrusion detection system for the RPL protocol [J].
Shirafkan, Mohammad ;
Shahidienjad, Ali ;
Ghobaei-Arani, Mostafa .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2022, 15 (01) :484-502
[46]   Epigenetic Algorithm for Performing Intrusion Detection System [J].
Ezzarii, Mehdi ;
Elghazi, Hamid ;
El Ghazi, Hassan ;
Sadiki, Tayeb .
2016 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION SYSTEMS AND INFORMATION SECURITY (ACOSIS), 2016, :227-232
[47]   Resilient intrusion detection system for cloud containers [J].
Abed, Amr S. ;
Azab, Mohamed ;
Clancy, Charles ;
Kashkoush, Mona S. .
INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2020, 24 (01) :1-22
[48]   Grid-based intrusion detection system [J].
Choon, OT ;
Samsudin, A .
APCC 2003: 9TH ASIA-PACIFIC CONFERENCE ON COMMUNICATION, VOLS 1-3, PROCEEDINGS, 2003, :1028-1032
[49]   Framework for Cloud Intrusion Detection System Service [J].
Aljurayban, Nouf Saleh ;
Emam, Ahmed .
2015 2ND WORLD SYMPOSIUM ON WEB APPLICATIONS AND NETWORKING (WSWAN), 2015,
[50]   Analysis of Intrusion Detection System [J].
Gu Yue-sheng ;
Feng Hong-yu ;
Wang Jian-ping .
COMPONENTS, PACKAGING AND MANUFACTURING TECHNOLOGY, 2011, 460-461 :451-454