Machine Learning for Intrusion Detection in Industrial Control Systems: Applications, Challenges, and Recommendations

02/24/2022
by   Muhammad Azmi Umer, et al.
0

Methods from machine learning are being applied to design Industrial Control Systems resilient to cyber-attacks. Such methods focus on two major areas: the detection of intrusions at the network-level using the information acquired through network packets, and detection of anomalies at the physical process level using data that represents the physical behavior of the system. This survey focuses on four types of methods from machine learning in use for intrusion and anomaly detection, namely, supervised, semi-supervised, unsupervised, and reinforcement learning. Literature available in the public domain was carefully selected, analyzed, and placed in a 7-dimensional space for ease of comparison. The survey is targeted at researchers, students, and practitioners. Challenges associated in using the methods and research gaps are identified and recommendations are made to fill the gaps.

READ FULL TEXT
research
12/02/2022

A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection

Cyber intrusion attacks that compromise the users' critical and sensitiv...
research
05/11/2023

Anomaly Detection Dataset for Industrial Control Systems

Over the past few decades, Industrial Control Systems (ICSs) have been t...
research
04/27/2021

Extending Isolation Forest for Anomaly Detection in Big Data via K-Means

Industrial Information Technology (IT) infrastructures are often vulnera...
research
11/05/2021

IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems

The increasing interconnection of industrial networks with the Internet ...
research
08/31/2023

Towards Low-Barrier Cybersecurity Research and Education for Industrial Control Systems

The protection of Industrial Control Systems (ICS) that are employed in ...
research
02/10/2021

A Survey on Industrial Control System Testbeds and Datasets for Security Research

The increasing digitization and interconnection of legacy Industrial Con...
research
02/28/2019

A comparative evaluation of novelty detection algorithms for discrete sequences

The identification of anomalies in temporal data is a core component of ...

Please sign up or login with your details

Forgot password? Click here to reset