A survey of intrusion detection on industrial control systems
The modern industrial control systems now exhibit an increasing connectivity to the corporate Internet technology networks so as to make full use of the rich resource on the Internet. The increasing interaction between industrial control systems and the outside Internet world, however, has made them...
Saved in:
Published in | International journal of distributed sensor networks Vol. 14; no. 8; p. 155014771879461 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
London, England
SAGE Publications
01.08.2018
Wiley |
Subjects | |
Online Access | Get full text |
ISSN | 1550-1477 1550-1477 |
DOI | 10.1177/1550147718794615 |
Cover
Abstract | The modern industrial control systems now exhibit an increasing connectivity to the corporate Internet technology networks so as to make full use of the rich resource on the Internet. The increasing interaction between industrial control systems and the outside Internet world, however, has made them an attractive target for a variety of cyber attacks, raising a great need to secure industrial control systems. Intrusion detection technology is one of the most important security precautions for industrial control systems. It can effectively detect potential attacks against industrial control systems. In this survey, we elaborate on the characteristics and the new security requirements of industrial control systems. After that, we present a new taxonomy of intrusion detection systems for industrial control systems based on different techniques: protocol analysis based, traffic mining based, and control process analysis based. In addition, we analyze the advantages and disadvantages of different categories of intrusion detection systems and discuss some future developments of intrusion detection systems for industrial control systems, in order to promote further research on intrusion detection technology for industrial control systems. |
---|---|
AbstractList | The modern industrial control systems now exhibit an increasing connectivity to the corporate Internet technology networks so as to make full use of the rich resource on the Internet. The increasing interaction between industrial control systems and the outside Internet world, however, has made them an attractive target for a variety of cyber attacks, raising a great need to secure industrial control systems. Intrusion detection technology is one of the most important security precautions for industrial control systems. It can effectively detect potential attacks against industrial control systems. In this survey, we elaborate on the characteristics and the new security requirements of industrial control systems. After that, we present a new taxonomy of intrusion detection systems for industrial control systems based on different techniques: protocol analysis based, traffic mining based, and control process analysis based. In addition, we analyze the advantages and disadvantages of different categories of intrusion detection systems and discuss some future developments of intrusion detection systems for industrial control systems, in order to promote further research on intrusion detection technology for industrial control systems. |
Author | Sun, Limin Yang, An Sun, Yuyan Li, Hong Hu, Yan |
Author_xml | – sequence: 1 givenname: Yan surname: Hu fullname: Hu, Yan – sequence: 2 givenname: An surname: Yang fullname: Yang, An – sequence: 3 givenname: Hong surname: Li fullname: Li, Hong email: lihong@iie.ac.cn – sequence: 4 givenname: Yuyan surname: Sun fullname: Sun, Yuyan – sequence: 5 givenname: Limin surname: Sun fullname: Sun, Limin |
BookMark | eNp9UE1LAzEUDFLBtnr3uH9gNW_zuQcPpfhRELzoOWSzSUnZbiTJCv337loFKSg8eMMwM7w3CzTrQ28RugZ8AyDELTCGgQoBUtSUAztD84kqJ272C1-gRUo7jAmvOMzR3apIQ_ywhyK4wvc5DsmHvmhttiZPaBzft0PK0euuMGGUhK5Ih5TtPl2ic6e7ZK--9xK9Pdy_rp_K55fHzXr1XBoi61yC1JLVUhgQlGBcCcpazCi2AozkjbTYAZUGHMdN7VxDGgdNA45IDi0HQ5Zoc8xtg96p9-j3Oh5U0F59ESFulY7Zm84qUhEqmXW6lppabhqKQVZCY2ZbA6wZs_gxy8SQUrROGZ_19GuO2ncKsJoKVaeFjkZ8Yvw55B9LebQkvbVqF4bYjzX9rf8EqJiFJw |
CitedBy_id | crossref_primary_10_1016_j_asoc_2020_106658 crossref_primary_10_3390_s22062100 crossref_primary_10_1002_int_22435 crossref_primary_10_1145_3670414 crossref_primary_10_1016_j_cose_2021_102532 crossref_primary_10_3390_electronics14020323 crossref_primary_10_1016_j_ijcip_2019_100323 crossref_primary_10_3390_s19143119 crossref_primary_10_1002_cpe_7826 crossref_primary_10_1002_spy2_440 crossref_primary_10_1007_s10207_024_00845_9 crossref_primary_10_3390_s23031561 crossref_primary_10_3390_pr11030918 crossref_primary_10_3390_electronics13224440 crossref_primary_10_1109_ACCESS_2020_2994961 crossref_primary_10_1007_s12243_022_00922_x crossref_primary_10_1016_j_ifacol_2023_01_083 crossref_primary_10_1155_2021_7154587 crossref_primary_10_3390_fi12030044 crossref_primary_10_3390_app13053244 crossref_primary_10_2118_217430_PA crossref_primary_10_1109_TIA_2023_3305361 crossref_primary_10_1007_s00170_021_08001_6 crossref_primary_10_1109_ACCESS_2021_3106873 crossref_primary_10_1145_3587255 crossref_primary_10_3390_computers10040045 crossref_primary_10_1155_2022_5363764 crossref_primary_10_1016_j_jnca_2023_103760 crossref_primary_10_1016_j_segan_2023_101167 crossref_primary_10_1080_23742917_2022_2088113 crossref_primary_10_1109_COMST_2023_3264680 crossref_primary_10_47277_IJCEIT_12_5_1 crossref_primary_10_1007_s10207_023_00720_z crossref_primary_10_1109_ACCESS_2024_3478830 crossref_primary_10_1155_2022_4043309 crossref_primary_10_1016_j_cie_2023_109166 crossref_primary_10_1109_COMST_2021_3094360 crossref_primary_10_1002_ett_4069 crossref_primary_10_1109_ACCESS_2021_3057766 crossref_primary_10_1007_s10723_020_09528_w crossref_primary_10_1016_j_eng_2023_01_013 crossref_primary_10_1016_j_cities_2022_103794 crossref_primary_10_1016_j_cose_2024_104210 crossref_primary_10_1109_TII_2022_3216575 crossref_primary_10_1109_ACCESS_2024_3370911 crossref_primary_10_1016_j_jprocont_2022_05_014 crossref_primary_10_1007_s40998_022_00493_6 crossref_primary_10_1155_2021_8887666 crossref_primary_10_1109_ACCESS_2024_3494057 crossref_primary_10_3390_electronics13061009 crossref_primary_10_3390_electronics11142184 crossref_primary_10_1109_OJIES_2023_3335976 crossref_primary_10_1016_j_aej_2025_02_042 crossref_primary_10_3233_JIFS_222643 crossref_primary_10_3390_app15052316 crossref_primary_10_1016_j_jisa_2025_103990 crossref_primary_10_1007_s11227_024_06018_8 crossref_primary_10_1109_TICPS_2024_3406505 crossref_primary_10_1016_j_future_2020_09_003 crossref_primary_10_1007_s43926_025_00100_0 crossref_primary_10_3390_e25030461 crossref_primary_10_3390_info13100450 crossref_primary_10_3390_s22124417 crossref_primary_10_1088_1742_6596_1856_1_012028 crossref_primary_10_1016_j_iot_2024_101413 crossref_primary_10_3390_info13070322 crossref_primary_10_12720_jcm_16_6_210_216 |
Cites_doi | 10.1016/S0005-1098(96)00189-6 10.1016/S1389-1286(99)00112-7 10.1007/978-3-642-04117-4 10.1145/2542049 10.1109/TAC.2016.2565379 10.1109/TSG.2014.2298195 10.1016/j.ins.2016.04.019 10.1016/S1367-5788(97)00020-5 10.1109/TCST.2012.2211873 10.1109/TII.2010.2099234 10.1109/MSP.2011.67 10.1049/iet-stg.2018.0050 |
ContentType | Journal Article |
Copyright | The Author(s) 2018 |
Copyright_xml | – notice: The Author(s) 2018 |
DBID | AFRWT AAYXX CITATION DOA |
DOI | 10.1177/1550147718794615 |
DatabaseName | Sage Journals GOLD Open Access 2024 CrossRef DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef |
DatabaseTitleList | CrossRef |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: AFRWT name: Sage Journals GOLD Open Access 2024 url: http://journals.sagepub.com/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1550-1477 |
ExternalDocumentID | oai_doaj_org_article_323485efa98a4e6cb401827a05edc15b 10_1177_1550147718794615 10.1177_1550147718794615 |
GrantInformation_xml | – fundername: Fundamental Research Funds for the Central Universities grantid: FRF-TP-17-058A1 – fundername: National Natural Science Foundation of China grantid: 61702506 funderid: https://doi.org/10.13039/501100001809 – fundername: National Social Science Foundation of China grantid: 17ZDA331 – fundername: National Natural Science Foundation of China grantid: 61503365 funderid: https://doi.org/10.13039/501100001809 – fundername: National Natural Science Foundation of China grantid: 61502466 funderid: https://doi.org/10.13039/501100001809 |
GroupedDBID | .4S .DC 0R~ 24P 29J 4.4 54M 5GY 5VS 8FE 8FG AAJEY AAJPV AAKPC AASGM ABAWP ABJCF ABQXT ABUWG ACCMX ACGEJ ACGFS ACIWK ACROE ADBBV ADMLS ADXPE AEDFJ AENEX AEWDL AFCOW AFKRA AFKRG AFRWT AJUZI ALMA_UNASSIGNED_HOLDINGS ARAPS ARCSS AUTPY AWYRJ AYAKG AZQEC BCNDV BDDNI BENPR BGLVJ BPHCQ CAG CCPQU COF CS3 CWDGH DU5 DWQXO EBS EDO EJD GNUQQ GROUPED_DOAJ H13 HCIFZ I-F IAO ICD IEA IL9 IPNFZ ITC J8X K.F K6V K7- KQ8 L6V M4Z M7S O9- OK1 P2P P62 PHGZM PHGZT PIMPY PQQKQ PROAC PTHSS RIG RNS ROL SAUOL SCNPE SFC TDBHL TFW TUS TWF TWQ XH6 AAYXX CITATION ACHEB |
ID | FETCH-LOGICAL-c389t-18a85987c1743002745d0540e71c86b8e0f148c1f60b9ffb3bf1bb1f3861d61c3 |
IEDL.DBID | DOA |
ISSN | 1550-1477 |
IngestDate | Wed Aug 27 01:30:26 EDT 2025 Thu Apr 24 22:56:57 EDT 2025 Tue Jul 01 04:10:56 EDT 2025 Tue Jun 17 22:49:13 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 8 |
Keywords | traffic mining Industrial control systems intrusion detection protocol analysis control process analysis |
Language | English |
License | This article is distributed under the terms of the Creative Commons Attribution 4.0 License (http://www.creativecommons.org/licenses/by/4.0/) which permits any use, reproduction and distribution of the work without further permission provided the original work is attributed as specified on the SAGE and Open Access pages (https://us.sagepub.com/en-us/nam/open-access-at-sage). |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c389t-18a85987c1743002745d0540e71c86b8e0f148c1f60b9ffb3bf1bb1f3861d61c3 |
OpenAccessLink | https://doaj.org/article/323485efa98a4e6cb401827a05edc15b |
ParticipantIDs | doaj_primary_oai_doaj_org_article_323485efa98a4e6cb401827a05edc15b crossref_citationtrail_10_1177_1550147718794615 crossref_primary_10_1177_1550147718794615 sage_journals_10_1177_1550147718794615 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2018-08-01 |
PublicationDateYYYYMMDD | 2018-08-01 |
PublicationDate_xml | – month: 08 year: 2018 text: 2018-08-01 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | London, England |
PublicationPlace_xml | – name: London, England |
PublicationTitle | International journal of distributed sensor networks |
PublicationYear | 2018 |
Publisher | SAGE Publications Wiley |
Publisher_xml | – name: SAGE Publications – name: Wiley |
References | Mitchell, Chen 2014; 46 Tian, Tan, Guan 2018; 1 Edelmayer, Bokor, Szigeti 1997; 33 Ashfaq, Wang, Huang 2017; 378 Liu, Ning, Reiter 2011; 14 Kung, Dey, Shi 2017; 62 Dong, Wu, Zhang 2018; 20 Carcano, Coletta, Guglielmi 2011; 7 Aghdam, Kabiri 2016; 18 Sridhar, Govindarasu 2014; 5 Paxson 1999; 31 Hou, Jiang, Rui 2012; 46 Langner 2011; 9 Patton 1997; 21 Amin, Litrico, Sastry 2013; 21 Maglaras, Jiang Tian J (bibr56-1550147718794615) 2018; 1 Hong J (bibr15-1550147718794615) Yang Y (bibr17-1550147718794615) Myers D (bibr57-1550147718794615) Linda O (bibr25-1550147718794615) Dong RH (bibr37-1550147718794615) 2018; 20 Kiss I (bibr42-1550147718794615) Caselli M (bibr34-1550147718794615) Lee RM (bibr3-1550147718794615) 2016 Gao W (bibr43-1550147718794615) Carcano A (bibr45-1550147718794615) bibr13-1550147718794615 Hadeli H (bibr18-1550147718794615) bibr52-1550147718794615 Marsden T (bibr36-1550147718794615) Morris T (bibr11-1550147718794615) bibr47-1550147718794615 Staggs J (bibr4-1550147718794615) 2017 Yang Y (bibr16-1550147718794615) bibr7-1550147718794615 Kiss I (bibr32-1550147718794615) bibr55-1550147718794615 Luo Y (bibr28-1550147718794615) 2013 Ferling B (bibr35-1550147718794615) Urbina DI (bibr53-1550147718794615) Hou C (bibr21-1550147718794615) 2012; 46 Colbert E (bibr41-1550147718794615) Vollmer T (bibr22-1550147718794615) bibr24-1550147718794615 Kleinmann A (bibr54-1550147718794615) 2017 Yusheng W (bibr19-1550147718794615) bibr20-1550147718794615 bibr2-1550147718794615 Linda O (bibr27-1550147718794615) bibr50-1550147718794615 Linda O (bibr23-1550147718794615) Linda O (bibr26-1550147718794615) bibr40-1550147718794615 Lin H (bibr46-1550147718794615) bibr49-1550147718794615 Tsang CH (bibr31-1550147718794615) Aghdam MH (bibr30-1550147718794615) 2016; 18 Caselli M (bibr33-1550147718794615) Liu Y (bibr51-1550147718794615) 2011; 14 |
References_xml | – volume: 21 start-page: 103 year: 1997 end-page: 123 article-title: Robustness in model-based fault diagnosis: the 1995 situation publication-title: Ann Rev Contr – volume: 21 start-page: 1963 issue: 5 year: 2013 end-page: 1970 article-title: Cyber security of water SCADA systems—part I: analysis and experimentation of stealthy deception attacks publication-title: IEEE T Contr Syst Technol – volume: 7 start-page: 179 issue: 2 year: 2011 end-page: 186 article-title: A multidimensional critical state analysis for detecting intrusions in SCADA systems publication-title: IEEE T Indus Inform – volume: 9 start-page: 49 issue: 3 year: 2011 end-page: 51 article-title: Stuxnet: dissecting a cyberwarfare weapon publication-title: IEEE Secur Priv – volume: 18 start-page: 420 issue: 3 year: 2016 end-page: 432 article-title: Feature selection for intrusion detection system using ant colony optimization publication-title: Int J Netw Secur – volume: 46 start-page: 70 year: 2012 end-page: 75 article-title: A probabilistic principal component analysis approach for detecting traffic anomaly in industrial networks publication-title: J Xi’an Jiaotong Univ – volume: 62 start-page: 941 issue: 2 year: 2017 end-page: 947 article-title: The performance and limitations of -stealthy attacks on higher order systems publication-title: IEEE T Automat Contr – volume: 378 start-page: 484 year: 2017 end-page: 497 article-title: Fuzziness based semi-supervised learning approach for intrusion detection system publication-title: Inform Sci – volume: 5 start-page: 580 issue: 2 year: 2014 end-page: 591 article-title: Model-based attack detection and mitigation for automatic generation control publication-title: IEEE T Smart Grid – start-page: 626 end-page: 631 article-title: Intrusion detection in SCADA systems using machine learning techniques – volume: 31 start-page: 2435 issue: 23–24 year: 1999 end-page: 2463 article-title: Bro: a system for detecting network intruders in real-time publication-title: Comput Netw – volume: 33 start-page: 471 issue: 3 year: 1997 end-page: 475 article-title: Robust detection filter design in the presence of time-varying system perturbations publication-title: Automatica – volume: 20 start-page: 359 issue: 2 year: 2018 end-page: 370 article-title: Traffic characteristic map-based intrusion detection model for industrial internet publication-title: Int J Netw Secur – volume: 1 start-page: 1 issue: 1 year: 2018 end-page: 15 article-title: Enhanced hidden moving target defense in smart grids publication-title: IEEE T Smart Grid – volume: 14 start-page: 13 issue: 1 year: 2011 article-title: False data injection attacks against state estimation in electric power grids publication-title: ACM T Inform Syst Secur – volume: 46 start-page: 55 issue: 4 year: 2014 article-title: A survey of intrusion detection techniques for cyber-physical systems publication-title: ACM Comput Surv – ident: bibr49-1550147718794615 doi: 10.1016/S0005-1098(96)00189-6 – ident: bibr13-1550147718794615 doi: 10.1016/S1389-1286(99)00112-7 – volume: 20 start-page: 359 issue: 2 year: 2018 ident: bibr37-1550147718794615 publication-title: Int J Netw Secur – start-page: 48 volume-title: Proceedings of the 2012 5th international symposium on resilient control systems (ISRCS) ident: bibr27-1550147718794615 – start-page: 1 volume-title: Proceedings of the 2013 IEEE power and energy society general meeting (PES) ident: bibr17-1550147718794615 – ident: bibr20-1550147718794615 doi: 10.1007/978-3-642-04117-4 – start-page: 93 volume-title: Computer security year: 2017 ident: bibr54-1550147718794615 – start-page: 51 volume-title: Proceedings of the 2005 IEEE international conference on industrial technology (ICIT) ident: bibr31-1550147718794615 – start-page: 13 volume-title: Proceedings of the 2015 1st ACM workshop on cyber-physical system security ident: bibr34-1550147718794615 – start-page: 202 volume-title: Proceedings of the 2011 IEEE symposium on computational intelligence in cyber security (CICS) ident: bibr25-1550147718794615 – ident: bibr7-1550147718794615 doi: 10.1145/2542049 – ident: bibr55-1550147718794615 doi: 10.1109/TAC.2016.2565379 – volume-title: Analysis of the cyber attack on the Ukrainian power grid year: 2016 ident: bibr3-1550147718794615 – volume: 18 start-page: 420 issue: 3 year: 2016 ident: bibr30-1550147718794615 publication-title: Int J Netw Secur – volume-title: Research and design on intrusion detection methods for industrial control system year: 2013 ident: bibr28-1550147718794615 – start-page: 497 volume-title: Proceedings of the 2016 international conference on cyber warfare and security ident: bibr41-1550147718794615 – ident: bibr50-1550147718794615 doi: 10.1109/TSG.2014.2298195 – start-page: 1 volume-title: Proceedings of the 2014 IEEE PES conference on innovative smart grid technologies conference (ISGT) ident: bibr15-1550147718794615 – start-page: 53 volume-title: Proceedings of the 2018 international conference on measurement, modelling and evaluation of computing systems ident: bibr35-1550147718794615 – start-page: 142 volume-title: Proceedings of the 2015 IEEE 13th international conference on industrial informatics (INDIN) ident: bibr42-1550147718794615 – volume-title: Proceedings of the 2013 2nd IET renewable power generation conference (RPG) ident: bibr16-1550147718794615 – ident: bibr24-1550147718794615 doi: 10.1016/j.ins.2016.04.019 – volume-title: Adventures in attacking wind farm control networks year: 2017 ident: bibr4-1550147718794615 – start-page: 1827 volume-title: Proceedings of the 2009 international joint conference on neural networks (IJCNN) ident: bibr23-1550147718794615 – ident: bibr47-1550147718794615 doi: 10.1016/S1367-5788(97)00020-5 – start-page: 2338 volume-title: Proceedings of the 2012 45th Hawaii international conference on system science (HICSS) ident: bibr11-1550147718794615 – start-page: 1092 volume-title: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security ident: bibr53-1550147718794615 – ident: bibr52-1550147718794615 doi: 10.1109/TCST.2012.2211873 – start-page: 1 volume-title: Proceedings of the 2009 IEEE conference on emerging technologies & factory automation (ETFA) ident: bibr18-1550147718794615 – start-page: 29 volume-title: Proceedings of the 2013 first ACM workshop on smart energy grid security ident: bibr46-1550147718794615 – start-page: 25 volume-title: Proceedings of the 2009 2nd international symposium on resilient control systems (ISRCS) ident: bibr22-1550147718794615 – start-page: 26 volume-title: Proceedings of the 2011 4th international symposium on resilient control systems (ISRCS) ident: bibr26-1550147718794615 – start-page: 49 volume-title: Proceedings of the 2015 international conference on critical infrastructure protection ident: bibr33-1550147718794615 – ident: bibr40-1550147718794615 doi: 10.1109/TII.2010.2099234 – ident: bibr2-1550147718794615 doi: 10.1109/MSP.2011.67 – start-page: 138 volume-title: Proceedings of the 2009 international workshop on critical information infrastructures security ident: bibr45-1550147718794615 – volume: 1 start-page: 1 issue: 1 year: 2018 ident: bibr56-1550147718794615 publication-title: IEEE T Smart Grid doi: 10.1049/iet-stg.2018.0050 – start-page: 353 volume-title: Proceedings of 2017 international conference on mobile networks and management ident: bibr36-1550147718794615 – volume: 46 start-page: 70 year: 2012 ident: bibr21-1550147718794615 publication-title: J Xi’an Jiaotong Univ – start-page: 275 volume-title: Proceedings of the 2014 IEEE international conference on intelligent computer communication and processing (ICCP) ident: bibr32-1550147718794615 – start-page: 156 volume-title: Proceedings Proceeding of the 2017 IEEE 13th international symposium on autonomous decentralized system (ISADS) ident: bibr19-1550147718794615 – start-page: 1 volume-title: Proceedings of the eCrime researchers summit (eCrime) ident: bibr43-1550147718794615 – volume: 14 start-page: 13 issue: 1 year: 2011 ident: bibr51-1550147718794615 publication-title: ACM T Inform Syst Secur – start-page: 61 volume-title: Proceedings of the 2017 IFIP international conference on ICT systems security and privacy protection ident: bibr57-1550147718794615 |
SSID | ssj0036261 |
Score | 2.499784 |
Snippet | The modern industrial control systems now exhibit an increasing connectivity to the corporate Internet technology networks so as to make full use of the rich... |
SourceID | doaj crossref sage |
SourceType | Open Website Enrichment Source Index Database Publisher |
StartPage | 155014771879461 |
SummonAdditionalLinks | – databaseName: Sage Journals GOLD Open Access 2024 dbid: AFRWT link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3dSxwxEB_s-dKXWrXS0yp5KIU-pLe5fO5DKaf0kIJ9KIq-LZsvEXRPvDvB_97MbvbEiqWwTyEhy8wkM5OZ-Q3AZx-Mk6YWtPCRU6FMpEktlNQyz6MvdFlYfO84-a2Oz8SvC3mxBk1fC5MpOP-GaVXpj9rLGk83vkaPcpBxhHY1E1pjq2yRdPKP5eKm6l67-6YaOILh6eUNRrYd5kM-0L667Q2sj7UScgDrk-mf89P-7kZslg5hVRYUN3gKbL7Y85kia_H-nyWDtfpp-h7eZcOSTDpJ2IS10GzBRt-0geQzvA3fJ2S-vLsPD2QWyVWDNReJNcSHRZuU1ZD0Xa36eZCcyk46xOf5Bzib_jw9Oqa5hwJ1yRRZUGZqI0ujHXoerQ8qPVppQTNnlDWhiMkhciyqwpYxWm4js5ZFbhTzijm-A4Nm1oSPQAquveReCW-jSF6SsTrG0tW8VkqOpR_CqCdI5TLAOPa5uK5YxhT_m4RD-LpacduBa_xj7iHSeDUPYbHbgdndZZVPWcXHXBgZYl0m8QvK2eQ9mrGuCxm8Y9IO4QtyqOql7NXddv934h68TSaU6VICP8EgcS3sJzNlYQ-ybD0CtEXeSg priority: 102 providerName: SAGE Publications |
Title | A survey of intrusion detection on industrial control systems |
URI | https://journals.sagepub.com/doi/full/10.1177/1550147718794615 https://doaj.org/article/323485efa98a4e6cb401827a05edc15b |
Volume | 14 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1NS8MwGA4yL178FufHyEEED2XJ8n3wMMUxFAVlw91K8wUD6cRNwX9v0mZzCupFKD2UtCnv2yTP0759HgBOrJOGyYJmyHqSUS59FpYFlWlsibdIKKTj-47bO94f0usRGy1ZfcWasFoeuA5cm3QIlcz5QoUrOm50IASyIwrEnDWY6Tj7IoXmZKqeg6PGCv78KNmOOBxTIaK1NuXRAndpEaq0-r8UclVrS28TrCdQCLv1zWyBFVdug4254QJM428HnHfh9PXlzb3DiYfjMv4vEcIKrZtVBVUlDNt44cUBUxk6rNWap7tg2LsaXPaz5H-QmQAjZhmWhWRKChNZQ8UfmY0IywlsJNfSIR_IjMGeI62810R7rDX2RHJsOTZkDzTKSen2AUREWEYsp1Z7GhiO1MJ7ZQpScM46zDZBex6Q3CRx8OhR8ZTjpAf-PYRNcLY447kWxvil7UWM8aJdlLSuDoRE5ynR-V-JboLTmKE8jbHpj70d_Edvh2AtQCNZl_odgUbIqDsO8GOmW2C123t4HLSqJy7sb-7lB6111E8 |
linkProvider | Directory of Open Access Journals |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS8MwFA-yHfTitzg_cxDBQ7RZmjQ9eJjimLrtIBvuVpovGUgn2xT8703atDpFEXoqL215H3nvNe_9HgAnSnNJeRqiQBmCQsYNsm4hRgIrYlQQxYFw_zt6fdYZhncjOvoy6stzcHbuyqrsF-WbdWXdrk-cupOwKHJTskPm2svrIc1jo3qr_fA4KLdhB7NSgKXSALkFn2eUP56x4JNy6P6Fuq7c1bTXwaqPEWGrEOoGWNLZJlgr5y9Ab45b4LIFZ6_TN_0OJwaOM9c-YbkMlZ7n9VUZtNe4Gs0BfVU6LMCbZ9tg2L4ZXHeQH4eApI0q5gjzlNOYR9IlEXk6SZULuHSEJWeC68DY3EZiwwIRGyOIMFgIbAhnWDEsyQ6oZZNM7wIYkEhRoliohAltwsNFZEwsU5IyRptUNcBFyZBEeqxwN7LiOcEeHvw7CxvgrFrxUuBk_EF75Xhc0TmE6_zGZPqUeINJSJOEnGqTxlaTNJPCJoK8GaUB1UpiKhrg1EkoKRXm17ft_ZfwGCx3Br1u0r3t3--DFRsZ8aLS7wDUrAT1oY0-5uLI69kHdw7Lqg |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1ZS8NAEF6kgvjiLdZzH0TwITbbPbJ58KEexbOItOhbyF5SkFRsFfz37iTbShVFyFOYTcIcOzPZmW8Q2jdWai5zFsXG0YgJ6SLvFtJIEUOdiZM0VvC_47YjLnrs6pE_htoc6IUJHBweQVmV_6JyswbrfjGuEc4YGxBWE5YkMCmbCWgxn2UwQreGZlvt-4fueCsGqJUKMJXHESz4Oqf88Ywpv1TC90_VdpXupr2EFkKciFuVYJfRjC1W0OJ4BgMOJrmKjlt4-Pb6bj_wwOF-AS0UntPY2FFZY1Vgf_Un4zlwqEzHFYDzcA312ufd04sojESItI8sRhGRueSpTDQkEmVKyQ0EXTYhWgolbex8fqOJE7FKnVNUOaIUcVQKYgTRdB3VikFhNxCOaWI4NYIZ5ZhPeqRKnEt1TnMheJObOmqMGZLpgBcOYyueMxIgwr-zsI4OJyteKqyMP2hPgMcTOkC5Lm8MXp-yYDQZbVImuXV56rXJCq18MiibSR5zazThqo4OQELZWGl-fdvmfwn30NzdWTu7uexcb6F5HxzJqthvG9W8AO2OD0BGajeo2SfIVMzD |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+survey+of+intrusion+detection+on+industrial+control+systems&rft.jtitle=International+journal+of+distributed+sensor+networks&rft.au=Yan+Hu&rft.au=An+Yang&rft.au=Hong+Li&rft.au=Yuyan+Sun&rft.date=2018-08-01&rft.pub=Wiley&rft.eissn=1550-1477&rft.volume=14&rft_id=info:doi/10.1177%2F1550147718794615&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_323485efa98a4e6cb401827a05edc15b |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1550-1477&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1550-1477&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1550-1477&client=summon |