作者
Muhammad Azmi Umer, Khurum Nazir Junejo, Muhammad Taha Jilani, Aditya P Mathur
发表日期
2022/9/1
来源
International Journal of Critical Infrastructure Protection
卷号
38
页码范围
100516
出版商
Elsevier
简介
Methods from machine learning are used in the design of secure Industrial Control Systems. Such methods focus on two major areas: detection of intrusions at the network level using the information acquired through network packets, and detection of anomalies at the physical process level using data that represents the physical behavior of the system. This survey focuses on four types of methods from machine learning for intrusion and anomaly detection, namely, supervised, semi-supervised, unsupervised, and reinforcement learning. The literature available in the public domain was carefully selected, analyzed, and placed along a 10-dimensional space for ease of comparison. This multi-dimensional approach is found valuable in the comparison of the methods considered and enables a scientific discussion on their utility in specific environments. The challenges associated in using machine learning, and gaps …
引用总数
学术搜索中的文章
MA Umer, KN Junejo, MT Jilani, AP Mathur - International Journal of Critical Infrastructure Protection, 2022