World Congress on Internet Security (WorldCIS-2020) in collaboration with the International Conference for Internet Technology and Secured Transactions (ICITST-2020), World Congress on Sustainable Technologies (WCST-2020) and World Congress on Industrial Control Systems Security (WCICSS-2020)

2020 ◽  
2018 ◽  
Vol 14 (8) ◽  
pp. 155014771879461 ◽  
Author(s):  
Yan Hu ◽  
An Yang ◽  
Hong Li ◽  
Yuyan Sun ◽  
Limin Sun

The modern industrial control systems now exhibit an increasing connectivity to the corporate Internet technology networks so as to make full use of the rich resource on the Internet. The increasing interaction between industrial control systems and the outside Internet world, however, has made them an attractive target for a variety of cyber attacks, raising a great need to secure industrial control systems. Intrusion detection technology is one of the most important security precautions for industrial control systems. It can effectively detect potential attacks against industrial control systems. In this survey, we elaborate on the characteristics and the new security requirements of industrial control systems. After that, we present a new taxonomy of intrusion detection systems for industrial control systems based on different techniques: protocol analysis based, traffic mining based, and control process analysis based. In addition, we analyze the advantages and disadvantages of different categories of intrusion detection systems and discuss some future developments of intrusion detection systems for industrial control systems, in order to promote further research on intrusion detection technology for industrial control systems.


Author(s):  
Joshua Lubell

Baseline Tailor is an innovative web application for users of the National Institute of Standards and Technology (NIST) Cybersecurity Framework and Special Publication (SP) 800-53. Baseline Tailor makes the information in these widely referenced publications easily accessible to both security professionals and downstream software by addressing the following barriers: Complexity of the rules for tailoring SP 800-53 security controls, Differences in the Framework's and SP 800-53 organizational approach, and Lack of a computer-readable data format for representing tailored security controls. The NIST Engineering Laboratory’s Cybersecurity for Smart Manufacturing Systems project used Baseline Tailor to help develop a Cybersecurity Framework profile for the manufacturing environment. This “manufacturing profile” uses guidance from NIST SP 800-53 and from NIST SP 800-82 Guide to Industrial Control Systems Security to provide manufacturers with a roadmap for reducing cybersecurity risk.


Sign in / Sign up

Export Citation Format

Share Document