期刊文献+

单类支持向量机在工业控制系统入侵检测中的应用研究综述 被引量:16

Overview of one-class support vector machine in intrusion detection of industrial control system
下载PDF
导出
摘要 通信行为的异常检测是工业控制系统入侵检测的难点问题。在现有研究工作基础上,阐述了工业控制系统入侵检测技术的国内外研究现状,归纳和总结了现存的问题,指出单类支持向量机(OCSVM)算法在工业控制系统入侵检测中的优越性。结合工业控制系统的专有协议特点,介绍了单类支持向量机在工业控制系统入侵检测中的应用原理及其现有工作;最后指出了单类支持向量机在工业控制系统入侵检测中存在的问题及发展方向。 Anomaly detection based on communication behavior is a difficuh problem in intrusion detection of industrial con- trol systems. This paper described the research status of intrusion detection technology of industrial control system, summarized the existing problems on the basis of the existing studies, and pointed out the superiority of one-class support vector machine (OCSVM) algorithm in intrusion detection of industrial control systems. This paper introduced principle and the existing work of OCSVM in intrusion detection of industrial control systems combined features of proprietary protocols of industrial control systems. In the end, it refered to problems and development direction of one-class support vector machine in intrusion detec- tion of industrial control systems.
出处 《计算机应用研究》 CSCD 北大核心 2016年第1期7-11,共5页 Application Research of Computers
基金 国家"863"计划资助项目(2015AA043901)
关键词 工业控制系统 入侵检测 单类支持向量机 通信协议 industrial control systems intrusion detection one-class SVM communication protocol
  • 相关文献

参考文献43

  • 1Patel S C,Sanyal P.Securing SCADA systems[J].Information Management & Computer Security,2008,16(4):398-414.
  • 2彭勇,江常青,谢丰,戴忠华,熊琦,高洋.工业控制系统信息安全研究进展[J].清华大学学报(自然科学版),2012,52(10):1396-1408. 被引量:175
  • 3Igure V M,Laughter S A,Williams R D.Security issues in SCADA networks[J].Computers & Security,2006,25(7):498-506.
  • 4Morris T,Srivastava A,Reaves B,et al.A control system testbed to validate critical infrastructure protection concepts[J].International Journal of Critical Infrastructure Protection,2011,4(2):88-103.
  • 5Zhu B,Sastry S.SCADA-specific intrusion detection/prevention systems:a survey and taxonomy[C] //Proc of the 1st Workshop on Secure Control Systems.2010:1-16.
  • 6Papa S M.A behavioral intrusion detection system for SCADA systems[D].Dallas:Southern Methodist University,2013.
  • 7Garcia-Teodoro P,Diaz-Verdejo J,Maciá-Fernández G,et al.Anomaly-based network intrusion detection:techniques,systems and challenges[J].Computers & Security,2009,28(1):18-28.
  • 8Park Y.A statistical process control approach for network intrusion detection[D].Atlanta:Georgia Institute of Technology,2005.
  • 9Cardenas A A,Amin S,Lin Z S,et al.Attacks against process control systems:risk assessment,detection,and response[C] //Proc of the 6th ACM Symposium on Information,Computer and Communications Security.New York:ACM Press,2011:355-366.
  • 10Wei Min,Kim K.Intrusion detection scheme using traffic prediction for wireless industrial networks[J].Journal of Communications and Networks,2012,14(3):310-318.

二级参考文献203

共引文献320

同被引文献114

引证文献16

二级引证文献96

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部