通信学报 ›› 2022, Vol. 43 ›› Issue (3): 196-210.doi: 10.11959/j.issn.1000-436x.2022032

• 综述 • 上一篇    下一篇

工业物联网异常检测技术综述

孙海丽1, 龙翔1,2, 韩兰胜1,3, 黄炎4, 李清波1   

  1. 1 华中科技大学网络空间安全学院,湖北 武汉 430074
    2 湖北生物科技职业学院,湖北 武汉 430070
    3 鹏城实验室网络空间安全研究中心,广东 深圳 518000
    4 华中科技大学计算机科学与技术学院,湖北 武汉 430074
  • 修回日期:2022-01-24 出版日期:2022-03-25 发布日期:2022-03-01
  • 作者简介:孙海丽(1991- ),女,湖北武汉人,华中科技大学博士生,主要研究方向为工业物联网安全、入侵检测与预防、隐私保护、恶意行为识别等
    龙翔(1973- ),男,湖北武汉人,华中科技大学博士生,湖北生物科技职业学院副教授,主要研究方向为网络空间安全、网络虚拟化、网络空间安全仿真等
    韩兰胜(1972- ),男,湖北武汉人,华中科技大学教授、博士生导师,主要研究方向为网络安全、大数据安全、软件安全、恶意代码、移动终端安全等
    黄炎(1988- ),男,湖北武汉人,华中科技大学博士生,主要研究方向为网络功能虚拟化、人工智能安全、知识图谱等
    李清波(1998- ),女,江西宜春人,华中科技大学硕士生,主要研究方向为移动终端安全、隐私保护等
  • 基金资助:
    国家自然科学基金资助项目(61272033);国家自然科学基金资助项目(62072200);国家自然科学基金资助项目(6217071437);国家自然科学基金资助项目(62127808)

Overview of anomaly detection techniques for industrial Internet of things

Haili SUN1, Xiang LONG1,2, Lansheng HAN1,3, Yan HUANG4, Qingbo LI1   

  1. 1 School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan 430074, China
    2 Hubei Vocational College of Bio-Technology, Wuhan 430070, China
    3 Cyberspace Security Center, Peng Cheng Laboratory, Shenzhen 518000, China
    4 School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China
  • Revised:2022-01-24 Online:2022-03-25 Published:2022-03-01
  • Supported by:
    The National Natural Science Foundation of China(61272033);The National Natural Science Foundation of China(62072200);The National Natural Science Foundation of China(6217071437);The National Natural Science Foundation of China(62127808)

摘要:

针对不同的异常检测方法的差异及应用于工业物联网(IIoT)安全防护的适用性问题,从技术原理出发,调研分析2000—2021年发表的关于网络异常检测的论文,总结了工业物联网面临的安全威胁,归纳了9种网络异常检测方法及其特点,通过纵向对比梳理了不同方法的优缺点和适用工业物联网场景。另外,对常用数据集做了统计分析和对比,并从4个方向对未来发展趋势进行展望。分析结果可以指导按应用场景选择适配方法,发现待解决关键问题并为后续研究指明方向。

关键词: 工业物联网, 异常检测, 网络入侵, 网络攻击

Abstract:

In view of the differences of existing anomaly detection methods and the applicability when applied to security protection of the industrial Internet of things (IIoT), based on technical principles, the network anomaly detection papers published from 2000 to 2021 were investigated and the security threats faced by IIoT were summarized.Then, network anomaly detection methods were classified into 9 classes and the characteristics of each class was studied.Through longitudinal comparison, the merits and shortcomings of different methods and their applicability to IIoT scenarios were sorted out.In addition, statistical analysis and comparison of common data sets were made, and the development trend in the future was forecasted from 4 directions.The analysis results can guide the selection of adaptive methods according to application scenarios, identify key problems to be solved, and point out the direction for subsequent research.

Key words: industrial Internet of things, anomaly detection, network intrusion, cyber attack

中图分类号: 

No Suggested Reading articles found!