A survey of intrusion detection on industrial control systems

The modern industrial control systems now exhibit an increasing connectivity to the corporate Internet technology networks so as to make full use of the rich resource on the Internet. The increasing interaction between industrial control systems and the outside Internet world, however, has made them...

Full description

Saved in:
Bibliographic Details
Published inInternational journal of distributed sensor networks Vol. 14; no. 8; p. 155014771879461
Main Authors Hu, Yan, Yang, An, Li, Hong, Sun, Yuyan, Sun, Limin
Format Journal Article
LanguageEnglish
Published London, England SAGE Publications 01.08.2018
Wiley
Subjects
Online AccessGet full text
ISSN1550-1477
1550-1477
DOI10.1177/1550147718794615

Cover

Abstract The modern industrial control systems now exhibit an increasing connectivity to the corporate Internet technology networks so as to make full use of the rich resource on the Internet. The increasing interaction between industrial control systems and the outside Internet world, however, has made them an attractive target for a variety of cyber attacks, raising a great need to secure industrial control systems. Intrusion detection technology is one of the most important security precautions for industrial control systems. It can effectively detect potential attacks against industrial control systems. In this survey, we elaborate on the characteristics and the new security requirements of industrial control systems. After that, we present a new taxonomy of intrusion detection systems for industrial control systems based on different techniques: protocol analysis based, traffic mining based, and control process analysis based. In addition, we analyze the advantages and disadvantages of different categories of intrusion detection systems and discuss some future developments of intrusion detection systems for industrial control systems, in order to promote further research on intrusion detection technology for industrial control systems.
AbstractList The modern industrial control systems now exhibit an increasing connectivity to the corporate Internet technology networks so as to make full use of the rich resource on the Internet. The increasing interaction between industrial control systems and the outside Internet world, however, has made them an attractive target for a variety of cyber attacks, raising a great need to secure industrial control systems. Intrusion detection technology is one of the most important security precautions for industrial control systems. It can effectively detect potential attacks against industrial control systems. In this survey, we elaborate on the characteristics and the new security requirements of industrial control systems. After that, we present a new taxonomy of intrusion detection systems for industrial control systems based on different techniques: protocol analysis based, traffic mining based, and control process analysis based. In addition, we analyze the advantages and disadvantages of different categories of intrusion detection systems and discuss some future developments of intrusion detection systems for industrial control systems, in order to promote further research on intrusion detection technology for industrial control systems.
Author Sun, Limin
Yang, An
Sun, Yuyan
Li, Hong
Hu, Yan
Author_xml – sequence: 1
  givenname: Yan
  surname: Hu
  fullname: Hu, Yan
– sequence: 2
  givenname: An
  surname: Yang
  fullname: Yang, An
– sequence: 3
  givenname: Hong
  surname: Li
  fullname: Li, Hong
  email: lihong@iie.ac.cn
– sequence: 4
  givenname: Yuyan
  surname: Sun
  fullname: Sun, Yuyan
– sequence: 5
  givenname: Limin
  surname: Sun
  fullname: Sun, Limin
BookMark eNp9UE1LAzEUDFLBtnr3uH9gNW_zuQcPpfhRELzoOWSzSUnZbiTJCv337loFKSg8eMMwM7w3CzTrQ28RugZ8AyDELTCGgQoBUtSUAztD84kqJ272C1-gRUo7jAmvOMzR3apIQ_ywhyK4wvc5DsmHvmhttiZPaBzft0PK0euuMGGUhK5Ih5TtPl2ic6e7ZK--9xK9Pdy_rp_K55fHzXr1XBoi61yC1JLVUhgQlGBcCcpazCi2AozkjbTYAZUGHMdN7VxDGgdNA45IDi0HQ5Zoc8xtg96p9-j3Oh5U0F59ESFulY7Zm84qUhEqmXW6lppabhqKQVZCY2ZbA6wZs_gxy8SQUrROGZ_19GuO2ncKsJoKVaeFjkZ8Yvw55B9LebQkvbVqF4bYjzX9rf8EqJiFJw
CitedBy_id crossref_primary_10_1016_j_asoc_2020_106658
crossref_primary_10_3390_s22062100
crossref_primary_10_1002_int_22435
crossref_primary_10_1145_3670414
crossref_primary_10_1016_j_cose_2021_102532
crossref_primary_10_3390_electronics14020323
crossref_primary_10_1016_j_ijcip_2019_100323
crossref_primary_10_3390_s19143119
crossref_primary_10_1002_cpe_7826
crossref_primary_10_1002_spy2_440
crossref_primary_10_1007_s10207_024_00845_9
crossref_primary_10_3390_s23031561
crossref_primary_10_3390_pr11030918
crossref_primary_10_3390_electronics13224440
crossref_primary_10_1109_ACCESS_2020_2994961
crossref_primary_10_1007_s12243_022_00922_x
crossref_primary_10_1016_j_ifacol_2023_01_083
crossref_primary_10_1155_2021_7154587
crossref_primary_10_3390_fi12030044
crossref_primary_10_3390_app13053244
crossref_primary_10_2118_217430_PA
crossref_primary_10_1109_TIA_2023_3305361
crossref_primary_10_1007_s00170_021_08001_6
crossref_primary_10_1109_ACCESS_2021_3106873
crossref_primary_10_1145_3587255
crossref_primary_10_3390_computers10040045
crossref_primary_10_1155_2022_5363764
crossref_primary_10_1016_j_jnca_2023_103760
crossref_primary_10_1016_j_segan_2023_101167
crossref_primary_10_1080_23742917_2022_2088113
crossref_primary_10_1109_COMST_2023_3264680
crossref_primary_10_47277_IJCEIT_12_5_1
crossref_primary_10_1007_s10207_023_00720_z
crossref_primary_10_1109_ACCESS_2024_3478830
crossref_primary_10_1155_2022_4043309
crossref_primary_10_1016_j_cie_2023_109166
crossref_primary_10_1109_COMST_2021_3094360
crossref_primary_10_1002_ett_4069
crossref_primary_10_1109_ACCESS_2021_3057766
crossref_primary_10_1007_s10723_020_09528_w
crossref_primary_10_1016_j_eng_2023_01_013
crossref_primary_10_1016_j_cities_2022_103794
crossref_primary_10_1016_j_cose_2024_104210
crossref_primary_10_1109_TII_2022_3216575
crossref_primary_10_1109_ACCESS_2024_3370911
crossref_primary_10_1016_j_jprocont_2022_05_014
crossref_primary_10_1007_s40998_022_00493_6
crossref_primary_10_1155_2021_8887666
crossref_primary_10_1109_ACCESS_2024_3494057
crossref_primary_10_3390_electronics13061009
crossref_primary_10_3390_electronics11142184
crossref_primary_10_1109_OJIES_2023_3335976
crossref_primary_10_1016_j_aej_2025_02_042
crossref_primary_10_3233_JIFS_222643
crossref_primary_10_3390_app15052316
crossref_primary_10_1016_j_jisa_2025_103990
crossref_primary_10_1007_s11227_024_06018_8
crossref_primary_10_1109_TICPS_2024_3406505
crossref_primary_10_1016_j_future_2020_09_003
crossref_primary_10_1007_s43926_025_00100_0
crossref_primary_10_3390_e25030461
crossref_primary_10_3390_info13100450
crossref_primary_10_3390_s22124417
crossref_primary_10_1088_1742_6596_1856_1_012028
crossref_primary_10_1016_j_iot_2024_101413
crossref_primary_10_3390_info13070322
crossref_primary_10_12720_jcm_16_6_210_216
Cites_doi 10.1016/S0005-1098(96)00189-6
10.1016/S1389-1286(99)00112-7
10.1007/978-3-642-04117-4
10.1145/2542049
10.1109/TAC.2016.2565379
10.1109/TSG.2014.2298195
10.1016/j.ins.2016.04.019
10.1016/S1367-5788(97)00020-5
10.1109/TCST.2012.2211873
10.1109/TII.2010.2099234
10.1109/MSP.2011.67
10.1049/iet-stg.2018.0050
ContentType Journal Article
Copyright The Author(s) 2018
Copyright_xml – notice: The Author(s) 2018
DBID AFRWT
AAYXX
CITATION
DOA
DOI 10.1177/1550147718794615
DatabaseName Sage Journals GOLD Open Access 2024
CrossRef
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
DatabaseTitleList CrossRef


Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: AFRWT
  name: Sage Journals GOLD Open Access 2024
  url: http://journals.sagepub.com/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1550-1477
ExternalDocumentID oai_doaj_org_article_323485efa98a4e6cb401827a05edc15b
10_1177_1550147718794615
10.1177_1550147718794615
GrantInformation_xml – fundername: Fundamental Research Funds for the Central Universities
  grantid: FRF-TP-17-058A1
– fundername: National Natural Science Foundation of China
  grantid: 61702506
  funderid: https://doi.org/10.13039/501100001809
– fundername: National Social Science Foundation of China
  grantid: 17ZDA331
– fundername: National Natural Science Foundation of China
  grantid: 61503365
  funderid: https://doi.org/10.13039/501100001809
– fundername: National Natural Science Foundation of China
  grantid: 61502466
  funderid: https://doi.org/10.13039/501100001809
GroupedDBID .4S
.DC
0R~
24P
29J
4.4
54M
5GY
5VS
8FE
8FG
AAJEY
AAJPV
AAKPC
AASGM
ABAWP
ABJCF
ABQXT
ABUWG
ACCMX
ACGEJ
ACGFS
ACIWK
ACROE
ADBBV
ADMLS
ADXPE
AEDFJ
AENEX
AEWDL
AFCOW
AFKRA
AFKRG
AFRWT
AJUZI
ALMA_UNASSIGNED_HOLDINGS
ARAPS
ARCSS
AUTPY
AWYRJ
AYAKG
AZQEC
BCNDV
BDDNI
BENPR
BGLVJ
BPHCQ
CAG
CCPQU
COF
CS3
CWDGH
DU5
DWQXO
EBS
EDO
EJD
GNUQQ
GROUPED_DOAJ
H13
HCIFZ
I-F
IAO
ICD
IEA
IL9
IPNFZ
ITC
J8X
K.F
K6V
K7-
KQ8
L6V
M4Z
M7S
O9-
OK1
P2P
P62
PHGZM
PHGZT
PIMPY
PQQKQ
PROAC
PTHSS
RIG
RNS
ROL
SAUOL
SCNPE
SFC
TDBHL
TFW
TUS
TWF
TWQ
XH6
AAYXX
CITATION
ACHEB
ID FETCH-LOGICAL-c389t-18a85987c1743002745d0540e71c86b8e0f148c1f60b9ffb3bf1bb1f3861d61c3
IEDL.DBID DOA
ISSN 1550-1477
IngestDate Wed Aug 27 01:30:26 EDT 2025
Thu Apr 24 22:56:57 EDT 2025
Tue Jul 01 04:10:56 EDT 2025
Tue Jun 17 22:49:13 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 8
Keywords traffic mining
Industrial control systems
intrusion detection
protocol analysis
control process analysis
Language English
License This article is distributed under the terms of the Creative Commons Attribution 4.0 License (http://www.creativecommons.org/licenses/by/4.0/) which permits any use, reproduction and distribution of the work without further permission provided the original work is attributed as specified on the SAGE and Open Access pages (https://us.sagepub.com/en-us/nam/open-access-at-sage).
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c389t-18a85987c1743002745d0540e71c86b8e0f148c1f60b9ffb3bf1bb1f3861d61c3
OpenAccessLink https://doaj.org/article/323485efa98a4e6cb401827a05edc15b
ParticipantIDs doaj_primary_oai_doaj_org_article_323485efa98a4e6cb401827a05edc15b
crossref_citationtrail_10_1177_1550147718794615
crossref_primary_10_1177_1550147718794615
sage_journals_10_1177_1550147718794615
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2018-08-01
PublicationDateYYYYMMDD 2018-08-01
PublicationDate_xml – month: 08
  year: 2018
  text: 2018-08-01
  day: 01
PublicationDecade 2010
PublicationPlace London, England
PublicationPlace_xml – name: London, England
PublicationTitle International journal of distributed sensor networks
PublicationYear 2018
Publisher SAGE Publications
Wiley
Publisher_xml – name: SAGE Publications
– name: Wiley
References Mitchell, Chen 2014; 46
Tian, Tan, Guan 2018; 1
Edelmayer, Bokor, Szigeti 1997; 33
Ashfaq, Wang, Huang 2017; 378
Liu, Ning, Reiter 2011; 14
Kung, Dey, Shi 2017; 62
Dong, Wu, Zhang 2018; 20
Carcano, Coletta, Guglielmi 2011; 7
Aghdam, Kabiri 2016; 18
Sridhar, Govindarasu 2014; 5
Paxson 1999; 31
Hou, Jiang, Rui 2012; 46
Langner 2011; 9
Patton 1997; 21
Amin, Litrico, Sastry 2013; 21
Maglaras, Jiang
Tian J (bibr56-1550147718794615) 2018; 1
Hong J (bibr15-1550147718794615)
Yang Y (bibr17-1550147718794615)
Myers D (bibr57-1550147718794615)
Linda O (bibr25-1550147718794615)
Dong RH (bibr37-1550147718794615) 2018; 20
Kiss I (bibr42-1550147718794615)
Caselli M (bibr34-1550147718794615)
Lee RM (bibr3-1550147718794615) 2016
Gao W (bibr43-1550147718794615)
Carcano A (bibr45-1550147718794615)
bibr13-1550147718794615
Hadeli H (bibr18-1550147718794615)
bibr52-1550147718794615
Marsden T (bibr36-1550147718794615)
Morris T (bibr11-1550147718794615)
bibr47-1550147718794615
Staggs J (bibr4-1550147718794615) 2017
Yang Y (bibr16-1550147718794615)
bibr7-1550147718794615
Kiss I (bibr32-1550147718794615)
bibr55-1550147718794615
Luo Y (bibr28-1550147718794615) 2013
Ferling B (bibr35-1550147718794615)
Urbina DI (bibr53-1550147718794615)
Hou C (bibr21-1550147718794615) 2012; 46
Colbert E (bibr41-1550147718794615)
Vollmer T (bibr22-1550147718794615)
bibr24-1550147718794615
Kleinmann A (bibr54-1550147718794615) 2017
Yusheng W (bibr19-1550147718794615)
bibr20-1550147718794615
bibr2-1550147718794615
Linda O (bibr27-1550147718794615)
bibr50-1550147718794615
Linda O (bibr23-1550147718794615)
Linda O (bibr26-1550147718794615)
bibr40-1550147718794615
Lin H (bibr46-1550147718794615)
bibr49-1550147718794615
Tsang CH (bibr31-1550147718794615)
Aghdam MH (bibr30-1550147718794615) 2016; 18
Caselli M (bibr33-1550147718794615)
Liu Y (bibr51-1550147718794615) 2011; 14
References_xml – volume: 21
  start-page: 103
  year: 1997
  end-page: 123
  article-title: Robustness in model-based fault diagnosis: the 1995 situation
  publication-title: Ann Rev Contr
– volume: 21
  start-page: 1963
  issue: 5
  year: 2013
  end-page: 1970
  article-title: Cyber security of water SCADA systems—part I: analysis and experimentation of stealthy deception attacks
  publication-title: IEEE T Contr Syst Technol
– volume: 7
  start-page: 179
  issue: 2
  year: 2011
  end-page: 186
  article-title: A multidimensional critical state analysis for detecting intrusions in SCADA systems
  publication-title: IEEE T Indus Inform
– volume: 9
  start-page: 49
  issue: 3
  year: 2011
  end-page: 51
  article-title: Stuxnet: dissecting a cyberwarfare weapon
  publication-title: IEEE Secur Priv
– volume: 18
  start-page: 420
  issue: 3
  year: 2016
  end-page: 432
  article-title: Feature selection for intrusion detection system using ant colony optimization
  publication-title: Int J Netw Secur
– volume: 46
  start-page: 70
  year: 2012
  end-page: 75
  article-title: A probabilistic principal component analysis approach for detecting traffic anomaly in industrial networks
  publication-title: J Xi’an Jiaotong Univ
– volume: 62
  start-page: 941
  issue: 2
  year: 2017
  end-page: 947
  article-title: The performance and limitations of -stealthy attacks on higher order systems
  publication-title: IEEE T Automat Contr
– volume: 378
  start-page: 484
  year: 2017
  end-page: 497
  article-title: Fuzziness based semi-supervised learning approach for intrusion detection system
  publication-title: Inform Sci
– volume: 5
  start-page: 580
  issue: 2
  year: 2014
  end-page: 591
  article-title: Model-based attack detection and mitigation for automatic generation control
  publication-title: IEEE T Smart Grid
– start-page: 626
  end-page: 631
  article-title: Intrusion detection in SCADA systems using machine learning techniques
– volume: 31
  start-page: 2435
  issue: 23–24
  year: 1999
  end-page: 2463
  article-title: Bro: a system for detecting network intruders in real-time
  publication-title: Comput Netw
– volume: 33
  start-page: 471
  issue: 3
  year: 1997
  end-page: 475
  article-title: Robust detection filter design in the presence of time-varying system perturbations
  publication-title: Automatica
– volume: 20
  start-page: 359
  issue: 2
  year: 2018
  end-page: 370
  article-title: Traffic characteristic map-based intrusion detection model for industrial internet
  publication-title: Int J Netw Secur
– volume: 1
  start-page: 1
  issue: 1
  year: 2018
  end-page: 15
  article-title: Enhanced hidden moving target defense in smart grids
  publication-title: IEEE T Smart Grid
– volume: 14
  start-page: 13
  issue: 1
  year: 2011
  article-title: False data injection attacks against state estimation in electric power grids
  publication-title: ACM T Inform Syst Secur
– volume: 46
  start-page: 55
  issue: 4
  year: 2014
  article-title: A survey of intrusion detection techniques for cyber-physical systems
  publication-title: ACM Comput Surv
– ident: bibr49-1550147718794615
  doi: 10.1016/S0005-1098(96)00189-6
– ident: bibr13-1550147718794615
  doi: 10.1016/S1389-1286(99)00112-7
– volume: 20
  start-page: 359
  issue: 2
  year: 2018
  ident: bibr37-1550147718794615
  publication-title: Int J Netw Secur
– start-page: 48
  volume-title: Proceedings of the 2012 5th international symposium on resilient control systems (ISRCS)
  ident: bibr27-1550147718794615
– start-page: 1
  volume-title: Proceedings of the 2013 IEEE power and energy society general meeting (PES)
  ident: bibr17-1550147718794615
– ident: bibr20-1550147718794615
  doi: 10.1007/978-3-642-04117-4
– start-page: 93
  volume-title: Computer security
  year: 2017
  ident: bibr54-1550147718794615
– start-page: 51
  volume-title: Proceedings of the 2005 IEEE international conference on industrial technology (ICIT)
  ident: bibr31-1550147718794615
– start-page: 13
  volume-title: Proceedings of the 2015 1st ACM workshop on cyber-physical system security
  ident: bibr34-1550147718794615
– start-page: 202
  volume-title: Proceedings of the 2011 IEEE symposium on computational intelligence in cyber security (CICS)
  ident: bibr25-1550147718794615
– ident: bibr7-1550147718794615
  doi: 10.1145/2542049
– ident: bibr55-1550147718794615
  doi: 10.1109/TAC.2016.2565379
– volume-title: Analysis of the cyber attack on the Ukrainian power grid
  year: 2016
  ident: bibr3-1550147718794615
– volume: 18
  start-page: 420
  issue: 3
  year: 2016
  ident: bibr30-1550147718794615
  publication-title: Int J Netw Secur
– volume-title: Research and design on intrusion detection methods for industrial control system
  year: 2013
  ident: bibr28-1550147718794615
– start-page: 497
  volume-title: Proceedings of the 2016 international conference on cyber warfare and security
  ident: bibr41-1550147718794615
– ident: bibr50-1550147718794615
  doi: 10.1109/TSG.2014.2298195
– start-page: 1
  volume-title: Proceedings of the 2014 IEEE PES conference on innovative smart grid technologies conference (ISGT)
  ident: bibr15-1550147718794615
– start-page: 53
  volume-title: Proceedings of the 2018 international conference on measurement, modelling and evaluation of computing systems
  ident: bibr35-1550147718794615
– start-page: 142
  volume-title: Proceedings of the 2015 IEEE 13th international conference on industrial informatics (INDIN)
  ident: bibr42-1550147718794615
– volume-title: Proceedings of the 2013 2nd IET renewable power generation conference (RPG)
  ident: bibr16-1550147718794615
– ident: bibr24-1550147718794615
  doi: 10.1016/j.ins.2016.04.019
– volume-title: Adventures in attacking wind farm control networks
  year: 2017
  ident: bibr4-1550147718794615
– start-page: 1827
  volume-title: Proceedings of the 2009 international joint conference on neural networks (IJCNN)
  ident: bibr23-1550147718794615
– ident: bibr47-1550147718794615
  doi: 10.1016/S1367-5788(97)00020-5
– start-page: 2338
  volume-title: Proceedings of the 2012 45th Hawaii international conference on system science (HICSS)
  ident: bibr11-1550147718794615
– start-page: 1092
  volume-title: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security
  ident: bibr53-1550147718794615
– ident: bibr52-1550147718794615
  doi: 10.1109/TCST.2012.2211873
– start-page: 1
  volume-title: Proceedings of the 2009 IEEE conference on emerging technologies & factory automation (ETFA)
  ident: bibr18-1550147718794615
– start-page: 29
  volume-title: Proceedings of the 2013 first ACM workshop on smart energy grid security
  ident: bibr46-1550147718794615
– start-page: 25
  volume-title: Proceedings of the 2009 2nd international symposium on resilient control systems (ISRCS)
  ident: bibr22-1550147718794615
– start-page: 26
  volume-title: Proceedings of the 2011 4th international symposium on resilient control systems (ISRCS)
  ident: bibr26-1550147718794615
– start-page: 49
  volume-title: Proceedings of the 2015 international conference on critical infrastructure protection
  ident: bibr33-1550147718794615
– ident: bibr40-1550147718794615
  doi: 10.1109/TII.2010.2099234
– ident: bibr2-1550147718794615
  doi: 10.1109/MSP.2011.67
– start-page: 138
  volume-title: Proceedings of the 2009 international workshop on critical information infrastructures security
  ident: bibr45-1550147718794615
– volume: 1
  start-page: 1
  issue: 1
  year: 2018
  ident: bibr56-1550147718794615
  publication-title: IEEE T Smart Grid
  doi: 10.1049/iet-stg.2018.0050
– start-page: 353
  volume-title: Proceedings of 2017 international conference on mobile networks and management
  ident: bibr36-1550147718794615
– volume: 46
  start-page: 70
  year: 2012
  ident: bibr21-1550147718794615
  publication-title: J Xi’an Jiaotong Univ
– start-page: 275
  volume-title: Proceedings of the 2014 IEEE international conference on intelligent computer communication and processing (ICCP)
  ident: bibr32-1550147718794615
– start-page: 156
  volume-title: Proceedings Proceeding of the 2017 IEEE 13th international symposium on autonomous decentralized system (ISADS)
  ident: bibr19-1550147718794615
– start-page: 1
  volume-title: Proceedings of the eCrime researchers summit (eCrime)
  ident: bibr43-1550147718794615
– volume: 14
  start-page: 13
  issue: 1
  year: 2011
  ident: bibr51-1550147718794615
  publication-title: ACM T Inform Syst Secur
– start-page: 61
  volume-title: Proceedings of the 2017 IFIP international conference on ICT systems security and privacy protection
  ident: bibr57-1550147718794615
SSID ssj0036261
Score 2.499784
Snippet The modern industrial control systems now exhibit an increasing connectivity to the corporate Internet technology networks so as to make full use of the rich...
SourceID doaj
crossref
sage
SourceType Open Website
Enrichment Source
Index Database
Publisher
StartPage 155014771879461
SummonAdditionalLinks – databaseName: Sage Journals GOLD Open Access 2024
  dbid: AFRWT
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3dSxwxEB_s-dKXWrXS0yp5KIU-pLe5fO5DKaf0kIJ9KIq-LZsvEXRPvDvB_97MbvbEiqWwTyEhy8wkM5OZ-Q3AZx-Mk6YWtPCRU6FMpEktlNQyz6MvdFlYfO84-a2Oz8SvC3mxBk1fC5MpOP-GaVXpj9rLGk83vkaPcpBxhHY1E1pjq2yRdPKP5eKm6l67-6YaOILh6eUNRrYd5kM-0L667Q2sj7UScgDrk-mf89P-7kZslg5hVRYUN3gKbL7Y85kia_H-nyWDtfpp-h7eZcOSTDpJ2IS10GzBRt-0geQzvA3fJ2S-vLsPD2QWyVWDNReJNcSHRZuU1ZD0Xa36eZCcyk46xOf5Bzib_jw9Oqa5hwJ1yRRZUGZqI0ujHXoerQ8qPVppQTNnlDWhiMkhciyqwpYxWm4js5ZFbhTzijm-A4Nm1oSPQAquveReCW-jSF6SsTrG0tW8VkqOpR_CqCdI5TLAOPa5uK5YxhT_m4RD-LpacduBa_xj7iHSeDUPYbHbgdndZZVPWcXHXBgZYl0m8QvK2eQ9mrGuCxm8Y9IO4QtyqOql7NXddv934h68TSaU6VICP8EgcS3sJzNlYQ-ybD0CtEXeSg
  priority: 102
  providerName: SAGE Publications
Title A survey of intrusion detection on industrial control systems
URI https://journals.sagepub.com/doi/full/10.1177/1550147718794615
https://doaj.org/article/323485efa98a4e6cb401827a05edc15b
Volume 14
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1NS8MwGA4yL178FufHyEEED2XJ8n3wMMUxFAVlw91K8wUD6cRNwX9v0mZzCupFKD2UtCnv2yTP0759HgBOrJOGyYJmyHqSUS59FpYFlWlsibdIKKTj-47bO94f0usRGy1ZfcWasFoeuA5cm3QIlcz5QoUrOm50IASyIwrEnDWY6Tj7IoXmZKqeg6PGCv78KNmOOBxTIaK1NuXRAndpEaq0-r8UclVrS28TrCdQCLv1zWyBFVdug4254QJM428HnHfh9PXlzb3DiYfjMv4vEcIKrZtVBVUlDNt44cUBUxk6rNWap7tg2LsaXPaz5H-QmQAjZhmWhWRKChNZQ8UfmY0IywlsJNfSIR_IjMGeI62810R7rDX2RHJsOTZkDzTKSen2AUREWEYsp1Z7GhiO1MJ7ZQpScM46zDZBex6Q3CRx8OhR8ZTjpAf-PYRNcLY447kWxvil7UWM8aJdlLSuDoRE5ynR-V-JboLTmKE8jbHpj70d_Edvh2AtQCNZl_odgUbIqDsO8GOmW2C123t4HLSqJy7sb-7lB6111E8
linkProvider Directory of Open Access Journals
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS8MwFA-yHfTitzg_cxDBQ7RZmjQ9eJjimLrtIBvuVpovGUgn2xT8703atDpFEXoqL215H3nvNe_9HgAnSnNJeRqiQBmCQsYNsm4hRgIrYlQQxYFw_zt6fdYZhncjOvoy6stzcHbuyqrsF-WbdWXdrk-cupOwKHJTskPm2svrIc1jo3qr_fA4KLdhB7NSgKXSALkFn2eUP56x4JNy6P6Fuq7c1bTXwaqPEWGrEOoGWNLZJlgr5y9Ab45b4LIFZ6_TN_0OJwaOM9c-YbkMlZ7n9VUZtNe4Gs0BfVU6LMCbZ9tg2L4ZXHeQH4eApI0q5gjzlNOYR9IlEXk6SZULuHSEJWeC68DY3EZiwwIRGyOIMFgIbAhnWDEsyQ6oZZNM7wIYkEhRoliohAltwsNFZEwsU5IyRptUNcBFyZBEeqxwN7LiOcEeHvw7CxvgrFrxUuBk_EF75Xhc0TmE6_zGZPqUeINJSJOEnGqTxlaTNJPCJoK8GaUB1UpiKhrg1EkoKRXm17ft_ZfwGCx3Br1u0r3t3--DFRsZ8aLS7wDUrAT1oY0-5uLI69kHdw7Lqg
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1ZS8NAEF6kgvjiLdZzH0TwITbbPbJ58KEexbOItOhbyF5SkFRsFfz37iTbShVFyFOYTcIcOzPZmW8Q2jdWai5zFsXG0YgJ6SLvFtJIEUOdiZM0VvC_47YjLnrs6pE_htoc6IUJHBweQVmV_6JyswbrfjGuEc4YGxBWE5YkMCmbCWgxn2UwQreGZlvt-4fueCsGqJUKMJXHESz4Oqf88Ywpv1TC90_VdpXupr2EFkKciFuVYJfRjC1W0OJ4BgMOJrmKjlt4-Pb6bj_wwOF-AS0UntPY2FFZY1Vgf_Un4zlwqEzHFYDzcA312ufd04sojESItI8sRhGRueSpTDQkEmVKyQ0EXTYhWgolbex8fqOJE7FKnVNUOaIUcVQKYgTRdB3VikFhNxCOaWI4NYIZ5ZhPeqRKnEt1TnMheJObOmqMGZLpgBcOYyueMxIgwr-zsI4OJyteKqyMP2hPgMcTOkC5Lm8MXp-yYDQZbVImuXV56rXJCq18MiibSR5zazThqo4OQELZWGl-fdvmfwn30NzdWTu7uexcb6F5HxzJqthvG9W8AO2OD0BGajeo2SfIVMzD
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+survey+of+intrusion+detection+on+industrial+control+systems&rft.jtitle=International+journal+of+distributed+sensor+networks&rft.au=Yan+Hu&rft.au=An+Yang&rft.au=Hong+Li&rft.au=Yuyan+Sun&rft.date=2018-08-01&rft.pub=Wiley&rft.eissn=1550-1477&rft.volume=14&rft_id=info:doi/10.1177%2F1550147718794615&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_323485efa98a4e6cb401827a05edc15b
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1550-1477&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1550-1477&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1550-1477&client=summon