IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A Novel IDS Securing Industrial Control System of Critical Infrastructure Using Deception Technology

A Novel IDS Securing Industrial Control System of Critical Infrastructure Using Deception Technology
View Sample PDF
Author(s): Shaobo Zhang (Beijing Institute of Technology, China), Yuhang Liu (Peking University, China) and Dequan Yang (Beijing Institute of Technology, China)
Copyright: 2022
Volume: 14
Issue: 2
Pages: 20
Source title: International Journal of Digital Crime and Forensics (IJDCF)
Editor(s)-in-Chief: Feng Liu (Chinese Academy of Sciences, China)
DOI: 10.4018/IJDCF.302874

Purchase

View A Novel IDS Securing Industrial Control System of Critical Infrastructure Using Deception Technology on the publisher's website for pricing and purchasing information.

Abstract

The Industrial Control System (ICS) has become the key concept in the modern industrial world, enabling process monitoring and system control for general industrial systems and critical infrastructures. High-skilled hackers can invade an imperfect ICS by existing vulnerabilities without much effort. Conventional defenses (such as encryption and firewall) to keep invaders away are getting less and less effective when an attack is carried out by exploiting an array of particular vulnerabilities. Under this circumstance, a new-type intrusion detection system (IDS) based on deception strategy using honeypot technique is proposed, which is of dramatic effectiveness in protecting ICSs of critical infrastructures. In this honeypot-based model, we capture malicious Internet flows and system operations. We analyze the collected data before alerting and preventing the intrusion alike when it affects the system in the future. This paper deals with the model's concept, architecture, deployment, and what else can be achieved in the field of Critical Infrastructure Cybersecurity (CIC).

Related Content

Louay Karadsheh, Haroun Alryalat, Ja'far Alqatawna, Samer Fawaz Alhawari, Mufleh Amin AL Jarrah. © 2022. 26 pages.
Wan Chen, Daojun Han, Lei Zhang, Qi Xiao, Qiuyue Li, Hongzhen Xiang. © 2022. 13 pages.
Jing Wang, Jianhou Gan, Jun Wang, Juxiang Zhou, Zeguang Lu. © 2022. 12 pages.
Wenqian Jiang, Ce Zhang, Di Liu, Kaiwei Liu, Zhichao Sun, Jianyuan Wang, Zhongyin Qiu, Weigong Lv. © 2022. 19 pages.
Shaobo Zhang, Yuhang Liu, Dequan Yang. © 2022. 20 pages.
Dawei Xu, Tianxin Chen, Zhonghua Tan, Fudong Wu, Jiaqi Gao, Yunfan Yang. © 2022. 17 pages.
Xiubo Liang, Yu Zhao, Junhan Wu, Keting Yin. © 2022. 20 pages.
Body Bottom