A Novel IDS Securing Industrial Control System of Critical Infrastructure Using Deception Technology

被引:0
作者
Zhang, Shaobo [1 ]
Liu, Yuhang [2 ]
Yang, Dequan [1 ]
机构
[1] Beijing Inst Technol, Beijing, Peoples R China
[2] Peking Univ, Beijing, Peoples R China
关键词
Critical Infrastructure; Honeypot; Industrial Control System; Intrusion Detection System; INTERNET;
D O I
10.4018/IJDCF.302874
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The industrial control system (ICS) has become the key concept in the modern industrial world, enabling process monitoring and system control for general industrial systems and critical infrastructures. High-skilled hackers can invade an imperfect ICS by existing vulnerabilities without much effort. Conventional defenses (such as encryption and firewall) to keep invaders away are getting less effective when an attack is carried out by exploiting an array of particular vulnerabilities. Under this circumstance, a new-type intrusion detection system (IDS) based on deception strategy using honeypot technique is proposed, which is of dramatic effectiveness in protecting ICSs of critical infrastructures. In this honeypot-based model, the authors capture malicious internet flows and system operations. They analyze the collected data before alerting and preventing the intrusion alike when it affects the system in the future. This paper deals with the model's concept, architecture, deployment, and what else can be achieved in the field of critical infrastructure cybersecurity (CIC).
引用
收藏
页数:20
相关论文
共 26 条
  • [1] Critical Control System Protection in the 21st Century
    Alcaraz, Cristina
    Zeadally, Sherali
    [J]. COMPUTER, 2013, 46 (10) : 74 - 83
  • [2] Ani U.P.D., 2017, Journal of Cyber Security Technology, V1, P32, DOI DOI 10.1080/23742917.2016.1252211
  • [3] Mitigating cyberattack related domino effects in process plants via ICS segmentation
    Arief, Raditya
    Khakzad, Nima
    Pieters, Wolter
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 51
  • [4] Cybersecurity in industrial control systems: Issues, technologies, and challenges
    Asghar, Muhammad Rizwan
    Hu, Qinwen
    Zeadally, Sherali
    [J]. COMPUTER NETWORKS, 2019, 165
  • [5] Bace R., 2001, Technical Report 800-31
  • [6] Bolton W., 2015, PROGRAMMABLE LOGIC C
  • [7] Case DU, 2016, ANAL CYBER ATTACK UK, V388
  • [8] Cyber security training for critical infrastructure protection: A literature review
    Chowdhury, Nabin
    Gkioulos, Vasileios
    [J]. COMPUTER SCIENCE REVIEW, 2021, 40
  • [9] Cole P.H., 2008, Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting
  • [10] Framework and principles for active cyber defense
    Denning, Dorothy E.
    [J]. COMPUTERS & SECURITY, 2014, 40 : 108 - 113