Cargando…
Survey on Intrusion Detection Systems Based on Machine Learning Techniques for the Protection of Critical Infrastructure
Industrial control systems (ICSs), supervisory control and data acquisition (SCADA) systems, and distributed control systems (DCSs) are fundamental components of critical infrastructure (CI). CI supports the operation of transportation and health systems, electric and thermal plants, and water treat...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10007329/ https://www.ncbi.nlm.nih.gov/pubmed/36904618 http://dx.doi.org/10.3390/s23052415 |
_version_ | 1784905493673672704 |
---|---|
author | Pinto, Andrea Herrera, Luis-Carlos Donoso, Yezid Gutierrez, Jairo A. |
author_facet | Pinto, Andrea Herrera, Luis-Carlos Donoso, Yezid Gutierrez, Jairo A. |
author_sort | Pinto, Andrea |
collection | PubMed |
description | Industrial control systems (ICSs), supervisory control and data acquisition (SCADA) systems, and distributed control systems (DCSs) are fundamental components of critical infrastructure (CI). CI supports the operation of transportation and health systems, electric and thermal plants, and water treatment facilities, among others. These infrastructures are not insulated anymore, and their connection to fourth industrial revolution technologies has expanded the attack surface. Thus, their protection has become a priority for national security. Cyber-attacks have become more sophisticated and criminals are able to surpass conventional security systems; therefore, attack detection has become a challenging area. Defensive technologies such as intrusion detection systems (IDSs) are a fundamental part of security systems to protect CI. IDSs have incorporated machine learning (ML) techniques that can deal with broader kinds of threats. Nevertheless, the detection of zero-day attacks and having technological resources to implement purposed solutions in the real world are concerns for CI operators. This survey aims to provide a compilation of the state of the art of IDSs that have used ML algorithms to protect CI. It also analyzes the security dataset used to train ML models. Finally, it presents some of the most relevant pieces of research on these topics that have been developed in the last five years. |
format | Online Article Text |
id | pubmed-10007329 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-100073292023-03-12 Survey on Intrusion Detection Systems Based on Machine Learning Techniques for the Protection of Critical Infrastructure Pinto, Andrea Herrera, Luis-Carlos Donoso, Yezid Gutierrez, Jairo A. Sensors (Basel) Review Industrial control systems (ICSs), supervisory control and data acquisition (SCADA) systems, and distributed control systems (DCSs) are fundamental components of critical infrastructure (CI). CI supports the operation of transportation and health systems, electric and thermal plants, and water treatment facilities, among others. These infrastructures are not insulated anymore, and their connection to fourth industrial revolution technologies has expanded the attack surface. Thus, their protection has become a priority for national security. Cyber-attacks have become more sophisticated and criminals are able to surpass conventional security systems; therefore, attack detection has become a challenging area. Defensive technologies such as intrusion detection systems (IDSs) are a fundamental part of security systems to protect CI. IDSs have incorporated machine learning (ML) techniques that can deal with broader kinds of threats. Nevertheless, the detection of zero-day attacks and having technological resources to implement purposed solutions in the real world are concerns for CI operators. This survey aims to provide a compilation of the state of the art of IDSs that have used ML algorithms to protect CI. It also analyzes the security dataset used to train ML models. Finally, it presents some of the most relevant pieces of research on these topics that have been developed in the last five years. MDPI 2023-02-22 /pmc/articles/PMC10007329/ /pubmed/36904618 http://dx.doi.org/10.3390/s23052415 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Review Pinto, Andrea Herrera, Luis-Carlos Donoso, Yezid Gutierrez, Jairo A. Survey on Intrusion Detection Systems Based on Machine Learning Techniques for the Protection of Critical Infrastructure |
title | Survey on Intrusion Detection Systems Based on Machine Learning Techniques for the Protection of Critical Infrastructure |
title_full | Survey on Intrusion Detection Systems Based on Machine Learning Techniques for the Protection of Critical Infrastructure |
title_fullStr | Survey on Intrusion Detection Systems Based on Machine Learning Techniques for the Protection of Critical Infrastructure |
title_full_unstemmed | Survey on Intrusion Detection Systems Based on Machine Learning Techniques for the Protection of Critical Infrastructure |
title_short | Survey on Intrusion Detection Systems Based on Machine Learning Techniques for the Protection of Critical Infrastructure |
title_sort | survey on intrusion detection systems based on machine learning techniques for the protection of critical infrastructure |
topic | Review |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10007329/ https://www.ncbi.nlm.nih.gov/pubmed/36904618 http://dx.doi.org/10.3390/s23052415 |
work_keys_str_mv | AT pintoandrea surveyonintrusiondetectionsystemsbasedonmachinelearningtechniquesfortheprotectionofcriticalinfrastructure AT herreraluiscarlos surveyonintrusiondetectionsystemsbasedonmachinelearningtechniquesfortheprotectionofcriticalinfrastructure AT donosoyezid surveyonintrusiondetectionsystemsbasedonmachinelearningtechniquesfortheprotectionofcriticalinfrastructure AT gutierrezjairoa surveyonintrusiondetectionsystemsbasedonmachinelearningtechniquesfortheprotectionofcriticalinfrastructure |