On Using Physical Based Intrusion Detection in SCADA Systems

被引:17
作者
Al-Asiri, Majed [1 ]
El-Alfy, El-Sayed M. [1 ]
机构
[1] King Fahd Univ Petr & Minerals, Dhahran 31261, Saudi Arabia
来源
11TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT) / THE 3RD INTERNATIONAL CONFERENCE ON EMERGING DATA AND INDUSTRY 4.0 (EDI40) / AFFILIATED WORKSHOPS | 2020年 / 170卷
关键词
Information Security; SCADA; Industrial Control Systems; Cyber Physical Systems (CPS); Industrial Internet of Things (IIoT); Intrusion Detection; Taxonomy; SECURITY;
D O I
10.1016/j.procs.2020.03.007
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion detection in SCADA systems has received increased attention from researchers as connectivity to public networks became a necessity in many industries. The nature and characteristics of SCADA systems call for special considerations and techniques of intrusion detection. Many works have been made in this field, ranging from generic intrusion detection techniques to customized solutions designed specifically for SCADA systems. In the recent years, some works have focused on using physical metrics in addition to the popular network-based and host-based intrusion detection approaches. This paper presents a taxonomy that considers the special features of cyberphysical intrusion detection systems (IDSs) with examples from the literature. Moreover, a case study is presented for a simulated gas pipeline dataset to compare the effectiveness of decision tree classifiers for various categories of features in SCADA systems. The results show that an IDS that uses a combination of physical and network metrics significantly outperforms an IDS that only uses network metrics or physical metrics. (C) 2020 The Authors. Published by Elsevier B.V.
引用
收藏
页码:34 / 42
页数:9
相关论文
共 50 条
[41]   A Survey of Intrusion Detection Techniques for Cyber-Physical Systems [J].
Mitchell, Robert ;
Chen, Ing-Ray .
ACM COMPUTING SURVEYS, 2014, 46 (04)
[42]   Intrusion Detection in Cyber-Physical Systems: Techniques and Challenges [J].
Han, Song ;
Xie, Miao ;
Chen, Hsiao-Hwa ;
Ling, Yun .
IEEE SYSTEMS JOURNAL, 2014, 8 (04) :1049-1059
[43]   Distributed Intrusion Detection System using Semantic-based Rules for SCADA in Smart Grid [J].
Mohan, Sathya Narayana ;
Ravikumar, Gelli ;
Govindarasu, Manimaran .
2020 IEEE/PES TRANSMISSION AND DISTRIBUTION CONFERENCE AND EXPOSITION (T&D), 2020,
[44]   Intrusion detection system framework for cyber-physical systems [J].
Rehman, Shafiq ur ;
Alhulayyil, Hisham ;
Alzahrani, Taher ;
AlSagri, Hatoon ;
Khalid, Muhammad U. ;
Gruhn, Volker .
EGYPTIAN INFORMATICS JOURNAL, 2025, 30
[45]   Intrusion Detection in Cyber-Physical Systems Based on Petri Net [J].
Ghazi, Z. ;
Doustmohammadi, A. .
INFORMATION TECHNOLOGY AND CONTROL, 2018, 47 (02) :220-235
[46]   A Hybrid Model for Anomaly-based Intrusion Detection in SCADA Networks [J].
Ullah, Imtiaz ;
Mahmoud, Qusay H. .
2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2017, :2160-2167
[47]   Add-On Anomaly Threshold Technique for Improving Unsupervised Intrusion Detection on SCADA Data [J].
Almalawi, Abdulmohsen ;
Fahad, Adil ;
Tari, Zahir ;
Khan, Asif Irshad ;
Alzahrani, Nouf ;
Bakhsh, Sheikh Tahir ;
Alassafi, Madini O. ;
Alshdadi, Abdulrahman ;
Qaiyum, Sana .
ELECTRONICS, 2020, 9 (06) :1-20
[48]   Deep Learning-Based Intrusion Detection Systems: A Systematic Review [J].
Lansky, Jan ;
Ali, Saqib ;
Mohammadi, Mokhtar ;
Majeed, Mohammed Kamal ;
Karim, Sarkhel H. Taher ;
Rashidi, Shima ;
Hosseinzadeh, Mehdi ;
Rahmani, Amir Masoud .
IEEE ACCESS, 2021, 9 :101574-101599
[49]   Intrusion detection and event monitoring in SCADA networks [J].
Oman, Paul ;
Phillips, Matthew .
CRITICAL INFRASTRUCTURE PROTE CTION, 2008, 253 :161-+
[50]   Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems [J].
Mitchell, Robert ;
Chen, Ing-Ray .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (01) :16-30