• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于机器学习技术的关键基础设施保护入侵检测系统调查。

Survey on Intrusion Detection Systems Based on Machine Learning Techniques for the Protection of Critical Infrastructure.

机构信息

Systems and Computer Engineering Department, School of Engineering, University of the Andes, Bogotá 111711, Colombia.

Colombian Defense Ministry's CSIRT, Bogotá 111321, Colombia.

出版信息

Sensors (Basel). 2023 Feb 22;23(5):2415. doi: 10.3390/s23052415.

DOI:10.3390/s23052415
PMID:36904618
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10007329/
Abstract

Industrial control systems (ICSs), supervisory control and data acquisition (SCADA) systems, and distributed control systems (DCSs) are fundamental components of critical infrastructure (CI). CI supports the operation of transportation and health systems, electric and thermal plants, and water treatment facilities, among others. These infrastructures are not insulated anymore, and their connection to fourth industrial revolution technologies has expanded the attack surface. Thus, their protection has become a priority for national security. Cyber-attacks have become more sophisticated and criminals are able to surpass conventional security systems; therefore, attack detection has become a challenging area. Defensive technologies such as intrusion detection systems (IDSs) are a fundamental part of security systems to protect CI. IDSs have incorporated machine learning (ML) techniques that can deal with broader kinds of threats. Nevertheless, the detection of zero-day attacks and having technological resources to implement purposed solutions in the real world are concerns for CI operators. This survey aims to provide a compilation of the state of the art of IDSs that have used ML algorithms to protect CI. It also analyzes the security dataset used to train ML models. Finally, it presents some of the most relevant pieces of research on these topics that have been developed in the last five years.

摘要

工业控制系统 (ICSs)、监控和数据采集 (SCADA) 系统以及分布式控制系统 (DCSs) 是关键基础设施 (CI) 的基本组成部分。CI 支持交通和医疗系统、电力和热力厂以及水处理设施等的运行。这些基础设施不再孤立,它们与第四次工业革命技术的连接扩大了攻击面。因此,保护它们已成为国家安全的优先事项。网络攻击变得更加复杂,犯罪分子能够超越传统的安全系统;因此,攻击检测已成为一个具有挑战性的领域。入侵检测系统 (IDSs) 等防御技术是保护 CI 的安全系统的基本组成部分。IDSs 已经采用了机器学习 (ML) 技术,可以应对更广泛的威胁。然而,检测零日攻击以及拥有在现实世界中实施有针对性解决方案的技术资源是 CI 运营商关注的问题。本调查旨在提供一个使用 ML 算法来保护 CI 的 IDS 最新技术的汇编。它还分析了用于训练 ML 模型的安全数据集。最后,它介绍了过去五年中在这些主题上开发的一些最相关的研究。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1152/10007329/37ccaca1c0d1/sensors-23-02415-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1152/10007329/89d4cee78401/sensors-23-02415-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1152/10007329/37ccaca1c0d1/sensors-23-02415-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1152/10007329/89d4cee78401/sensors-23-02415-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1152/10007329/37ccaca1c0d1/sensors-23-02415-g002.jpg

相似文献

1
Survey on Intrusion Detection Systems Based on Machine Learning Techniques for the Protection of Critical Infrastructure.基于机器学习技术的关键基础设施保护入侵检测系统调查。
Sensors (Basel). 2023 Feb 22;23(5):2415. doi: 10.3390/s23052415.
2
A stacked deep learning approach to cyber-attacks detection in industrial systems: application to power system and gas pipeline systems.一种用于工业系统中网络攻击检测的堆叠深度学习方法:在电力系统和天然气管道系统中的应用。
Cluster Comput. 2022;25(1):561-578. doi: 10.1007/s10586-021-03426-w. Epub 2021 Oct 5.
3
Ensemble Learning Framework for DDoS Detection in SDN-Based SCADA Systems.基于软件定义网络(SDN)的监控与数据采集(SCADA)系统中分布式拒绝服务(DDoS)检测的集成学习框架
Sensors (Basel). 2023 Dec 27;24(1):155. doi: 10.3390/s24010155.
4
Toward an Applied Cyber Security Solution in IoT-Based Smart Grids: An Intrusion Detection System Approach.迈向基于物联网的智能电网中的应用网络安全解决方案:入侵检测系统方法。
Sensors (Basel). 2019 Nov 14;19(22):4952. doi: 10.3390/s19224952.
5
Securing Industrial Control Systems: Components, Cyber Threats, and Machine Learning-Driven Defense Strategies.保障工业控制系统安全:组件、网络威胁及机器学习驱动的防御策略
Sensors (Basel). 2023 Oct 30;23(21):8840. doi: 10.3390/s23218840.
6
EIFDAA: Evaluation of an IDS with function-discarding adversarial attacks in the IIoT.EIFDAA:工业物联网中具有功能丢弃对抗攻击的入侵检测系统评估
Heliyon. 2023 Feb 9;9(2):e13520. doi: 10.1016/j.heliyon.2023.e13520. eCollection 2023 Feb.
7
Predicting Cybersecurity Threats in Critical Infrastructure for Industry 4.0: A Proactive Approach Based on Attacker Motivations.预测工业 4.0 关键基础设施中的网络安全威胁:基于攻击者动机的主动方法。
Sensors (Basel). 2023 May 6;23(9):4539. doi: 10.3390/s23094539.
8
Evaluation of Machine Learning Techniques for Traffic Flow-Based Intrusion Detection.基于流量的入侵检测的机器学习技术评估。
Sensors (Basel). 2022 Nov 30;22(23):9326. doi: 10.3390/s22239326.
9
The Effect of Dataset Imbalance on the Performance of SCADA Intrusion Detection Systems.数据集失衡对 SCADA 入侵检测系统性能的影响。
Sensors (Basel). 2023 Jan 9;23(2):758. doi: 10.3390/s23020758.
10
Development of a Machine-Learning Intrusion Detection System and Testing of Its Performance Using a Generative Adversarial Network.开发机器学习入侵检测系统并使用生成对抗网络测试其性能。
Sensors (Basel). 2023 Jan 24;23(3):1315. doi: 10.3390/s23031315.

引用本文的文献

1
Generative AI and LLMs for Critical Infrastructure Protection: Evaluation Benchmarks, Agentic AI, Challenges, and Opportunities.用于关键基础设施保护的生成式人工智能和大语言模型:评估基准、智能体人工智能、挑战与机遇
Sensors (Basel). 2025 Mar 7;25(6):1666. doi: 10.3390/s25061666.
2
Adaptive Multiobjective Evolutionary Generative Adversarial Network for Metaverse Network Intrusion Detection.用于元宇宙网络入侵检测的自适应多目标进化生成对抗网络
Research (Wash D C). 2025 Apr 15;8:0665. doi: 10.34133/research.0665. eCollection 2025.
3
Dual-hybrid intrusion detection system to detect False Data Injection in smart grids.

本文引用的文献

1
Intrusion Detection in Internet of Things Systems: A Review on Design Approaches Leveraging Multi-Access Edge Computing, Machine Learning, and Datasets.物联网系统中的入侵检测:关于利用多接入边缘计算、机器学习和数据集的设计方法的综述
Sensors (Basel). 2022 May 14;22(10):3744. doi: 10.3390/s22103744.
2
Classification and Explanation for Intrusion Detection System Based on Ensemble Trees and SHAP Method.基于集成树和 SHAP 方法的入侵检测系统分类与解释。
Sensors (Basel). 2022 Feb 3;22(3):1154. doi: 10.3390/s22031154.
3
Deep Reinforcement Learning for Cyber Security.
用于检测智能电网中虚假数据注入的双混合入侵检测系统。
PLoS One. 2025 Jan 27;20(1):e0316536. doi: 10.1371/journal.pone.0316536. eCollection 2025.
4
Cybersecurity Solutions for Industrial Internet of Things-Edge Computing Integration: Challenges, Threats, and Future Directions.工业物联网与边缘计算集成的网络安全解决方案:挑战、威胁与未来方向
Sensors (Basel). 2025 Jan 2;25(1):213. doi: 10.3390/s25010213.
5
Securing Industrial Control Systems: Components, Cyber Threats, and Machine Learning-Driven Defense Strategies.保障工业控制系统安全:组件、网络威胁及机器学习驱动的防御策略
Sensors (Basel). 2023 Oct 30;23(21):8840. doi: 10.3390/s23218840.
用于网络安全的深度强化学习
IEEE Trans Neural Netw Learn Syst. 2023 Aug;34(8):3779-3795. doi: 10.1109/TNNLS.2021.3121870. Epub 2023 Aug 4.
4
A Survey of Anomaly Detection in Industrial Wireless Sensor Networks with Critical Water System Infrastructure as a Case Study.以关键水系统基础设施为案例研究的工业无线传感器网络异常检测综述。
Sensors (Basel). 2018 Aug 1;18(8):2491. doi: 10.3390/s18082491.