Journal on Communications ›› 2022, Vol. 43 ›› Issue (3): 196-210.doi: 10.11959/j.issn.1000-436x.2022032

• Comprehensive Reviews • Previous Articles     Next Articles

Overview of anomaly detection techniques for industrial Internet of things

Haili SUN1, Xiang LONG1,2, Lansheng HAN1,3, Yan HUANG4, Qingbo LI1   

  1. 1 School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan 430074, China
    2 Hubei Vocational College of Bio-Technology, Wuhan 430070, China
    3 Cyberspace Security Center, Peng Cheng Laboratory, Shenzhen 518000, China
    4 School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China
  • Revised:2022-01-24 Online:2022-03-25 Published:2022-03-01
  • Supported by:
    The National Natural Science Foundation of China(61272033);The National Natural Science Foundation of China(62072200);The National Natural Science Foundation of China(6217071437);The National Natural Science Foundation of China(62127808)

Abstract:

In view of the differences of existing anomaly detection methods and the applicability when applied to security protection of the industrial Internet of things (IIoT), based on technical principles, the network anomaly detection papers published from 2000 to 2021 were investigated and the security threats faced by IIoT were summarized.Then, network anomaly detection methods were classified into 9 classes and the characteristics of each class was studied.Through longitudinal comparison, the merits and shortcomings of different methods and their applicability to IIoT scenarios were sorted out.In addition, statistical analysis and comparison of common data sets were made, and the development trend in the future was forecasted from 4 directions.The analysis results can guide the selection of adaptive methods according to application scenarios, identify key problems to be solved, and point out the direction for subsequent research.

Key words: industrial Internet of things, anomaly detection, network intrusion, cyber attack

CLC Number: 

No Suggested Reading articles found!