Intrusion Detection in Cyber-Physical Systems: Techniques and Challenges

被引:119
作者
Han, Song [1 ]
Xie, Miao [2 ]
Chen, Hsiao-Hwa [3 ]
Ling, Yun [1 ]
机构
[1] Zhejiang Gongshang Univ, Sch Comp & Informat Engn, Hangzhou 310018, Zhejiang, Peoples R China
[2] Univ New S Wales, Australian Def Force Acad, Sch Engn & Informat Technol, Canberra, ACT 2600, Australia
[3] Natl Cheng Kung Univ, Dept Engn Sci, Tainan 70101, Taiwan
来源
IEEE SYSTEMS JOURNAL | 2014年 / 8卷 / 04期
基金
中国国家自然科学基金;
关键词
Cyber-physical system (CPS); intrusion detection; security; ANOMALY DETECTION;
D O I
10.1109/JSYST.2013.2257594
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-physical systems (CPSs) integrate the computation with physical processes. Embedded computers and networks monitor and control the physical processes, usually with feedback loops where physical processes affect computations and vice versa. CPS was identified as one of the eight research priority areas in the August 2007 report of the President's Council of Advisors on Science and Technology, as CPS will be the core component of many critical infrastructures and industrial control systems in the near future. However, a variety of random failures and cyber attacks exist in CPS, which greatly restrict their growth. Fortunately, an intrusion detection mechanism could take effect for protecting CPS. When a misbehavior is found by the intrusion detector, the appropriate action can be taken immediately so that any harm to the system will be minimized. As CPSs are yet to be defined universally, the application of the instruction detection mechanism remain open presently. As a result, the effort will be made to discuss how to appropriately apply the intrusion detection mechanism to CPS in this paper. By examining the unique properties of CPS, it intends to define the specific requirements first. Then, the design outline of the intrusion detection mechanism in CPS is introduced in terms of the layers of system and specific detection techniques. Finally, some significant research problems are identified for enlightening the subsequent studies.
引用
收藏
页码:1049 / 1059
页数:11
相关论文
共 51 条
[1]   Multivariate online anomaly detection using kernel recursive least squares [J].
Ahmed, Tarem ;
Coates, Mark ;
Lakhina, Anukool .
INFOCOM 2007, VOLS 1-5, 2007, :625-+
[2]  
[Anonymous], INT SEC GLOSS
[3]  
[Anonymous], 2010, THESIS UTAH STATE U
[4]  
[Anonymous], 2006, P 5 INT TOP M NUCL P
[5]  
[Anonymous], P 13 EUR WIR C APR
[6]  
[Anonymous], 2007, SELF ORG AUTONOMOUS, DOI DOI 10.1002/9780470724460
[7]  
[Anonymous], 2009, P 1 WORKSH FUT DIR C
[8]  
[Anonymous], 2006, P INT PAR DISTR PROC
[9]  
[Anonymous], 1980, Computer Security Threat Monitoring and Surveillance
[10]  
[Anonymous], 2009, P WORKSH FUT DIR CYB