Network Security in the Industrial Control System: A Survey
- URL: http://arxiv.org/abs/2308.03478v1
- Date: Mon, 7 Aug 2023 11:19:24 GMT
- Title: Network Security in the Industrial Control System: A Survey
- Authors: Yang Li and Shihao Wu and Quan Pan
- Abstract summary: In recent years, there has been much research on the security of the ICS network.
In this paper, we give a complete review of the protocols that are usually used in ICS.
Then, we give a comprehensive review on network security in terms of Defence in Depth (DiD)
- Score: 11.926258867333686
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Along with the development of intelligent manufacturing, especially with the
high connectivity of the industrial control system (ICS), the network security
of ICS becomes more important. And in recent years, there has been much
research on the security of the ICS network. However, in practical usage, there
are many types of protocols, which means a high vulnerability in protocols.
Therefore, in this paper, we give a complete review of the protocols that are
usually used in ICS. Then, we give a comprehensive review on network security
in terms of Defence in Depth (DiD), including data encryption, access control
policy, intrusion detection system, software-defined network, etc. Through
these works, we try to provide a new perspective on the exciting new
developments in this field.
Related papers
- Time-to-Lie: Identifying Industrial Control System Honeypots Using the Internet Control Message Protocol [4.328586290529485]
This paper presents a side-channel method of covertly identifying ICS honeypots using the time-to-live (TTL) values of target devices.
We show that many ICS honeypots can be readily identified, via minimal interactions, using only basic networking tools.
arXiv Detail & Related papers (2024-10-23T10:06:02Z) - A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv Detail & Related papers (2024-01-19T14:52:04Z) - ICS-Sniper: A Targeted Blackhole Attack on Encrypted ICS Traffic [7.188557101906752]
We show that an Internet adversary in the path of an ICS's communication can cause damage to the ICS without infiltrating it.
We present ICS-Sniper, a targeted blackhole attack that analyzes the packet metadata to identify the packets carrying critical ICS commands or data, and drops the critical packets to disrupt the ICS's operations.
arXiv Detail & Related papers (2023-12-11T06:02:56Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - When Authentication Is Not Enough: On the Security of Behavioral-Based Driver Authentication Systems [53.2306792009435]
We develop two lightweight driver authentication systems based on Random Forest and Recurrent Neural Network architectures.
We are the first to propose attacks against these systems by developing two novel evasion attacks, SMARTCAN and GANCAN.
Through our contributions, we aid practitioners in safely adopting these systems, help reduce car thefts, and enhance driver security.
arXiv Detail & Related papers (2023-06-09T14:33:26Z) - Security for Quantum Networks [0.0]
We aim to construct a comprehensive framework for developing and assessing secure quantum networks.
Our work will lead to the development of a hardware-independent framework for securing general quantum networks.
arXiv Detail & Related papers (2021-09-29T00:03:24Z) - Safe RAN control: A Symbolic Reinforcement Learning Approach [62.997667081978825]
We present a Symbolic Reinforcement Learning (SRL) based architecture for safety control of Radio Access Network (RAN) applications.
We provide a purely automated procedure in which a user can specify high-level logical safety specifications for a given cellular network topology.
We introduce a user interface (UI) developed to help a user set intent specifications to the system, and inspect the difference in agent proposed actions.
arXiv Detail & Related papers (2021-06-03T16:45:40Z) - Dos and Don'ts of Machine Learning in Computer Security [74.1816306998445]
Despite great potential, machine learning in security is prone to subtle pitfalls that undermine its performance.
We identify common pitfalls in the design, implementation, and evaluation of learning-based security systems.
We propose actionable recommendations to support researchers in avoiding or mitigating the pitfalls where possible.
arXiv Detail & Related papers (2020-10-19T13:09:31Z) - A Review of Computer Vision Methods in Network Security [11.380790116533912]
Network security has become an area of significant importance more than ever.
Traditional machine learning methods have been frequently used in the context of network security.
Recent years witnessed a phenomenal growth in computer vision mainly driven by the advances in the area of convolutional neural networks.
arXiv Detail & Related papers (2020-05-07T08:29:11Z) - Survey of Network Intrusion Detection Methods from the Perspective of
the Knowledge Discovery in Databases Process [63.75363908696257]
We review the methods that have been applied to network data with the purpose of developing an intrusion detector.
We discuss the techniques used for the capture, preparation and transformation of the data, as well as, the data mining and evaluation methods.
As a result of this literature review, we investigate some open issues which will need to be considered for further research in the area of network security.
arXiv Detail & Related papers (2020-01-27T11:21:05Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.