Machine Learning Methods for Industrial Protocol Security Analysis: Issues, Taxonomy, and Directions

被引:13
作者
Men, Jiaping [1 ]
Lv, Zhuo [2 ]
Zhou, Xiaojun [3 ]
Han, Zhen [1 ]
Xian, Hequn [4 ]
Song, Ya-Nan [5 ]
机构
[1] Beijing Jiaotong Univ, Beijing Key Lab Secur & Privacy Intelligent Trans, Beijing 100044, Peoples R China
[2] State Grid Henan Elect Power Res Inst, Zhengzhou 450052, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, Beijing 100864, Peoples R China
[4] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
[5] Macau Univ Sci & Technol, Sch Business, Taipa, Macau, Peoples R China
来源
IEEE ACCESS | 2020年 / 8卷
关键词
Protocol vulnerability; vulnerability analysis; machine learning; exploitation; ICS security; AUDIT DATA STREAMS; BAYESIAN NETWORK; INTRUSION; FEATURES; BEHAVIOR; APPS;
D O I
10.1109/ACCESS.2020.2976745
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine learning has been widely studied in the security analysis of Industrial Control Systems (ICSs). However, in industrial scenarios, the amount of data as well as the speed of data generation are very different from standard machine learning data sets. Using these heterogeneous data and finding meaningful insights for practical security applications in ICSs is a big challenge. In addition, ICSs have been built for quite a long time. Security has not been seriously taken into account when ICSs were built. Security assessment or attack prevention cannot always be done in real time, as an ICS requires to be online all the time, especially when it comes to systems that affect critical infrastructure. In this work, we are motivated to a provide a clear and comprehensive survey of the state-of-the-art work that employs machine learning in security applications in ICSs, including vulnerability analysis, vulnerability detection and exploitation, anomaly detection and security assessment. Based on our in-depth survey, we highlight the issues of industrial protocol analysis with machine learning methods, provide the security applications with machine learning in ICSs and indicate the future directions.
引用
收藏
页码:83842 / 83857
页数:16
相关论文
共 90 条
[31]  
Kalluri R., 2016, P 2016 NATL POWER SY, P1, DOI DOI 10.1109/NPSC.2016.7858908
[32]   Design of an Effective WSN-Based Interactive u-Learning Model [J].
Kim, Hye-jin ;
Caytiles, Ronnie D. ;
Kim, Tai-hoon .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2012,
[33]  
Kim S, 2016, 2016 IEEE INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC), P566, DOI 10.1109/ITNEC.2016.7560424
[34]   FAULT TREE ANALYSIS, METHODS, AND APPLICATIONS - A REVIEW [J].
LEE, WS ;
GROSH, DL ;
TILLMAN, FA ;
LIE, CH .
IEEE TRANSACTIONS ON RELIABILITY, 1985, 34 (03) :194-203
[35]   CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles [J].
Li, Lun ;
Liu, Jiqiang ;
Cheng, Lichen ;
Qiu, Shuo ;
Wang, Wei ;
Zhang, Xiangliang ;
Zhang, Zonghua .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2018, 19 (07) :2204-2220
[36]  
LIU XB, 2017, SPRINGER OPTIM APPL, V126, P1, DOI DOI 10.1007/978-3-319-64568-1_1
[37]  
Liu Xiao-Yang., 2015, IEEE Transactions on Mobile Computing
[38]  
Luswata John., 2018, 2018 29th Biennial Symposium on Communications (BSC), P1, DOI [DOI 10.1109/BSC.2018.8494686, 10.1109/BSC. 2018.84 94686]
[39]   Feature Selection for Machine Learning Based Anomaly Detection in Industrial Control System Networks [J].
Mantere, Matti ;
Sailio, Mirko ;
Noponen, Sami .
2012 IEEE INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND COMMUNICATIONS, CONFERENCE ON INTERNET OF THINGS, AND CONFERENCE ON CYBER, PHYSICAL AND SOCIAL COMPUTING (GREENCOM 2012), 2012, :771-774
[40]  
Mauw S, 2006, LECT NOTES COMPUT SC, V3935, P186