A Survey of Specification-based Intrusion Detection Techniques for Cyber-Physical Systems

被引:0
|
作者
Nweke, Livinus Obiora [1 ]
机构
[1] Norwegain Univ Sci & Technol NTNU, Dept Informat Secur & Commun Technol, Gjovik, Norway
关键词
Cyber-physical systems; intrusion detection systems; specification-based intrusion detection mechanism; security; SECURITY; VOIP;
D O I
10.14569/IJACSA.2021.0120506
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cyber-physical systems (CPS) integrate computation and communication capabilities to monitor and control physical systems. Even though this integration improves the performance of the overall system and facilitates the application of CPS in several domains, it also introduces security challenges. Over the years, intrusion detection systems (IDS) have been deployed as one of the security controls for addressing these security challenges. Traditionally, there are three main approaches to IDS, namely: anomaly detection, misuse detection and specification-based detection. However, due to the unique attributes of CPS, the traditional IDS need to be modified or completely replaced before it can be deployed for CPS. In this paper, we present a survey of specification-based intrusion detection techniques for CPS. We classify the existing specification-based intrusion detection techniques in the literature according to the following attributes: specification source, specification extraction, specification modelling, detection mechanism, detector placement and validation strategy. We also discuss the details of each attribute and describe our observations, concerns and future research directions. We argue that reducing the efforts and time needed to extract the system specification of specification-based intrusion detection techniques for CPS and verifying the correctness of the extracted system specification are open issues that must be addressed in the future.
引用
收藏
页码:37 / 45
页数:9
相关论文
共 50 条
  • [1] A Survey of Intrusion Detection Techniques for Cyber-Physical Systems
    Mitchell, Robert
    Chen, Ing-Ray
    ACM COMPUTING SURVEYS, 2014, 46 (04)
  • [2] Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems
    Mitchell, Robert
    Chen, Ing-Ray
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (01) : 16 - 30
  • [3] Intrusion Detection in Cyber-Physical Systems: Techniques and Challenges
    Han, Song
    Xie, Miao
    Chen, Hsiao-Hwa
    Ling, Yun
    IEEE SYSTEMS JOURNAL, 2014, 8 (04): : 1049 - 1059
  • [4] BRIoT: Behavior Rune Specification-Based Misbehavior Detection for IoT-Embedded Cyber-Physical Systems
    Sharma, Vishal
    You, Ilsun
    Vim, Kangbin
    Chen, Ing-Ray
    Cho, Jin-Hee
    IEEE ACCESS, 2019, 7 : 118556 - 118580
  • [5] Assessing Machine Learning Techniques for Intrusion Detection in Cyber-Physical Systems
    Santos, Vinicius F.
    Albuquerque, Celio
    Passos, Diego
    Quincozes, Silvio E.
    Mosse, Daniel
    ENERGIES, 2023, 16 (16)
  • [6] A Survey of Physics-Based Attack Detection in Cyber-Physical Systems
    Giraldo, Jairo
    Urbina, David
    Cardenas, Alvaro
    Valente, Junia
    Faisal, Mustafa
    Ruths, Justin
    Tippenhauer, Nils Ole
    Sandberg, Henrik
    Candell, Richard
    ACM COMPUTING SURVEYS, 2018, 51 (04)
  • [7] Intrusion Detection in Cyber-Physical Systems Based on Petri Net
    Ghazi, Z.
    Doustmohammadi, A.
    INFORMATION TECHNOLOGY AND CONTROL, 2018, 47 (02): : 220 - 235
  • [8] An intelligent cognitive computing based intrusion detection for industrial cyber-physical systems
    Althobaiti, Maha M.
    Kumar, K. Pradeep Mohan
    Gupta, Deepak
    Kumar, Sachin
    Mansour, Romany F.
    MEASUREMENT, 2021, 186
  • [9] INTRUSION DETECTION OF CYBER-PHYSICAL ATTACKS IN MANUFACTURING SYSTEMS: A REVIEW
    Wu, Mingtao
    Moon, Young B.
    PROCEEDINGS OF THE ASME INTERNATIONAL MECHANICAL ENGINEERING CONGRESS AND EXPOSITION, 2019, VOL 2B, 2019,
  • [10] A survey on the security of cyber-physical systems
    Wu G.
    Sun J.
    Chen J.
    Control Theory and Technology, 2016, 14 (1) : 2 - 10