Intrusion Detection in Critical Infrastructures: A Literature Review

Over the years, the digitization of all aspects of life in modern societies is considered an acquired advantage. However, like the terrestrial world, the digital world is not perfect and many dangers and threats are present. In the present work, we conduct a systematic review on the methods of network detection and cyber attacks that can take place in a critical infrastructure. As is shown, the implementation of a system that learns from the system behavior (machine learning), on multiple levels and spots any diversity, is one of the most effective solutions.

[1]  T. Lewis Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation , 2006 .

[2]  Inwhee Joe,et al.  Autoencoder-Based on Anomaly Detection with Intrusion Scoring for Smart Factory Environments , 2018, PDCAT.

[3]  Yang Yi,et al.  Reservoir Computing Meets Smart Grids: Attack Detection Using Delayed Feedback Networks , 2018, IEEE Transactions on Industrial Informatics.

[4]  Mohamed Amine Ferrag,et al.  Deep Learning Techniques for Cyber Security Intrusion Detection : A Detailed Analysis , 2019 .

[5]  Won Suk Lee,et al.  Anomaly Intrusion Detection Based on Dynamic Cluster Updating , 2007, PAKDD.

[6]  Maen Alzubi,et al.  Evaluation of machine learning algorithms for intrusion detection system , 2017, 2017 IEEE 15th International Symposium on Intelligent Systems and Informatics (SISY).

[7]  Xavier Clotet,et al.  A real-time anomaly-based IDS for cyber-attack detection at the industrial process level of Critical Infrastructures , 2018, Int. J. Crit. Infrastructure Prot..

[8]  M. A. Novotny,et al.  An evaluation of the performance of Restricted Boltzmann Machines as a model for anomaly network intrusion detection , 2018, Comput. Networks.

[9]  Yong-kuo Liu,et al.  A new perspective towards the development of robust data-driven intrusion detection for industrial control systems , 2020, Nuclear Engineering and Technology.

[10]  Juan C. Vasquez,et al.  Smart-Building Applications: Deep Learning-Based, Real-Time Load Monitoring , 2021, IEEE Industrial Electronics Magazine.

[11]  Srinivas Sampalli,et al.  SCADA (Supervisory Control and Data Acquisition) systems: Vulnerability assessment and security recommendations , 2020, Comput. Secur..

[12]  Shabnam Sharma,et al.  Study on Phishing Attacks , 2018, International Journal of Computer Applications.

[13]  Brij B. Gupta,et al.  Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment , 2018, Journal of Ambient Intelligence and Humanized Computing.

[14]  Mohamed Amine Ferrag,et al.  Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures , 2018, EAI Endorsed Trans. Security Safety.

[15]  Deris Stiawan,et al.  Investigating Brute Force Attack Patterns in IoT Network , 2019, J. Electr. Comput. Eng..

[16]  Neena Gupta,et al.  Defense mechanisms against DDoS attack based on entropy in SDN-cloud using POX controller , 2021, Telecommun. Syst..

[17]  Victor I. Chang,et al.  From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions , 2017, Algorithms.

[18]  Alessandro Orso,et al.  A Classification of SQL Injection Attacks and Countermeasures , 2006, ISSSE.

[19]  I. Santiago,et al.  Electricity demand during pandemic times: The case of the COVID-19 in Spain , 2020, Energy Policy.

[20]  Panagiotis G. Sarigiannidis,et al.  An Anomaly-Based Intrusion Detection System for the Smart Grid Based on CART Decision Tree , 2018, 2018 Global Information Infrastructure and Networking Symposium (GIIS).

[21]  Marcelo Azevedo Costa,et al.  Extended Isolation Forests for Fault Detection in Small Hydroelectric Plants , 2020, Sustainability.

[22]  Howon Kim,et al.  Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection , 2016, 2016 International Conference on Platform Technology and Service (PlatCon).

[23]  Gillian Dobbie,et al.  Phishing Detection on Twitter Streams , 2016, PAKDD Workshops.

[24]  Onur Avci,et al.  1D Convolutional Neural Networks and Applications: A Survey , 2019, Mechanical Systems and Signal Processing.

[25]  Gillian Dobbie,et al.  Attack detection in recommender systems based on target item analysis , 2014, 2014 International Joint Conference on Neural Networks (IJCNN).

[26]  Athanasios V. Vasilakos,et al.  Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues , 2018, Telecommun. Syst..

[27]  Hong Wen,et al.  A Cross-Layer Secure Communication Model Based on Discrete Fractional Fourier Fransform (DFRFT) , 2015, IEEE Transactions on Emerging Topics in Computing.

[28]  Rana Alabdan,et al.  Phishing Attacks Survey: Types, Vectors, and Technical Approaches , 2020, Future Internet.

[29]  Amitabha Chakrabarty,et al.  A comparative approach to email classification using Naive Bayes classifier and hidden Markov model , 2017, 2017 4th International Conference on Advances in Electrical Engineering (ICAEE).

[30]  Leandros A. Maglaras,et al.  Effect of Network Architecture Changes on OCSVM Based Intrusion Detection System , 2016, INISCOM.

[31]  Shikha Agrawal,et al.  Survey on Anomaly Detection using Data Mining Techniques , 2015, KES.

[32]  Brij B. Gupta,et al.  Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework , 2020, Future Gener. Comput. Syst..

[33]  D. Kushner,et al.  The real story of stuxnet , 2013, IEEE Spectrum.

[34]  Mohamed Amine Ferrag,et al.  Vulnerability Assessment of Cyber Security for SCADA Systems , 2018, Guide to Vulnerability Analysis for Computer Networks and Systems.