Open Access iconOpen Access

REVIEW

Intrusion Detection Systems in Industrial Control Systems: Landscape, Challenges and Opportunities

Tong Wu, Dawei Zhou, Qingyu Ou*, Fang Luo

Department of Information Security, Naval University of Engineering, Wuhan, 430000, China

* Corresponding Author: Qingyu Ou. Email: email

Computers, Materials & Continua 2026, 86(3), 4 https://doi.org/10.32604/cmc.2025.073482

Abstract

The increasing interconnection of modern industrial control systems (ICSs) with the Internet has enhanced operational efficiency, but also made these systems more vulnerable to cyberattacks. This heightened exposure has driven a growing need for robust ICS security measures. Among the key defences, intrusion detection technology is critical in identifying threats to ICS networks. This paper provides an overview of the distinctive characteristics of ICS network security, highlighting standard attack methods. It then examines various intrusion detection methods, including those based on misuse detection, anomaly detection, machine learning, and specialised requirements. This paper concludes by exploring future directions for developing intrusion detection systems to advance research and ensure the continued security and reliability of ICS operations.

Keywords

Industrial control system; industrial control system network security; intrusion detection; cyberspace security; ICS network; network security

Cite This Article

APA Style
Wu, T., Zhou, D., Ou, Q., Luo, F. (2026). Intrusion Detection Systems in Industrial Control Systems: Landscape, Challenges and Opportunities. Computers, Materials & Continua, 86(3), 4. https://doi.org/10.32604/cmc.2025.073482
Vancouver Style
Wu T, Zhou D, Ou Q, Luo F. Intrusion Detection Systems in Industrial Control Systems: Landscape, Challenges and Opportunities. Comput Mater Contin. 2026;86(3):4. https://doi.org/10.32604/cmc.2025.073482
IEEE Style
T. Wu, D. Zhou, Q. Ou, and F. Luo, “Intrusion Detection Systems in Industrial Control Systems: Landscape, Challenges and Opportunities,” Comput. Mater. Contin., vol. 86, no. 3, pp. 4, 2026. https://doi.org/10.32604/cmc.2025.073482



cc Copyright © 2026 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 540

    View

  • 168

    Download

  • 0

    Like

Share Link