Abstract
Developments, expansions and upgrades in the field of industrial information technology have introduced a large number of new threats to industries. This real-time data demonstrates whether additional attention to system is needed and requirements in terms of resources, performance, or improvements are being met. Cyber threat actors have become exceptionally skilled at infiltrating their victim targets. Industrial Control Systems (ICS) are also recognized as attractive targets for threat actors. While these networks were generally thought to be more secure due to lack of connection to outside world of the corporate network or on the internet, now it is not the same case and attackers have managed to compromise them and steal valuable production data. Additionally, mechanical control can be undertaken or compromised, centrifugation can be dynamically rearranged or devices can be reprogrammed in order to accelerate or slow down ICS operations post such specialized attacks. This may result in total industrial equipment being destroyed or permanently damaged, or also may endanger personnel’s life who is working at the ICS site. This chapter surveys about the latest research and methodologies undertaken for measuring and managing industrial cyber threats risks, and talks about a dearth of industrial-control-system-specific security metrics that has been identified as a barrier to implementing these methodologies. Some of the most effective tools in combating these threats are the emerging techniques in Artificial Intelligence. By combining these threats with real-time data monitoring along with orchestration and automated response, AI analytics solutions are proving their best possible desirable outcome when compared to legacy systems and human-intervention driven response times.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
H. Karimipour, A. Dehghantanha, R.M. Parizi, R. Choo, H. Leung, A deep and scalable unsupervised machine learning system for cyber-attack detection in large-scale smart grids. IEEE Access 7, 80778 (2019)
J. Sakhnini, A. Dehghantanha, H. Karimipour, Smart grid cyber attacks detection using supervised learning and heuristic feature selection, in IEEE International Conference on Smart Energy Grid Engineering (SEGE), Oshawa, Canada (2019), pp. 1–5
A. Almalawi, X. Yu, Z. Tari, A. Fahad, I. Khalil, An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems. Comput. Secur. 46, 94–110 (2014)
H. Karimipour, V. Dinavahi, Accelerated parallel WLS state estimation for large-scale power systems on GPU, in IEEE North American Power Symposium (NAPS), Manhatan, USA (2013), pp. 1–6
H. Karimipour, V. Dinavahi, Robust massively parallel dynamic state estimation of power systems against cyber-attack. IEEE Access 6, 2984–2995 (2017)
H.M. Ruzbahani, A. Rahimnejad, H. Karimipour, Smart households demand response management with micro grid, in IEEE Innovative Smart Grid Technologies (ISGT 2019), Washington, DC (2019), pp. 1–5
F. Ghalavand, B.M. Alizadeh, H. Karimipour, Micro grid islanding detection based on mathematical morphology. J. Energy 11(10), 456–477 (2018)
S. Geris, H. Karimipour, A feature selection-based approach for joint cyber-attack detection and state estimation, in IEEE International Conference on Smart Energy Grid Engineering (SEGE), Oshawa, Canada (2019), pp. 1–5
S. Vishwanath, Industrial control systems, PWC, India
L.D. Xu, E.L. Xu, L. Li, Industry 4.0: state of the art and future trends. Int. J. Prod. Res. 56(8), 2941–2962 (2018)
E. Modiri, A. Azmoodeh, A. Dehghantanha, H. Karimipour, Fuzzy pattern tree for edge attack detection and categorization. J. Syst. Archit. 9, 1–15 (2018)
H. Karimipour, S. Geris, A. Dehghantanha, H. Leung, Intelligent anomaly detection for large-scale smart grids, in IEEE CCECE, Edmonton, Canada (2019), pp. 1–4
M. Conti, A. Dehghantanha, K. Franke, S. Watson, Internet of things security and forensics: challenges and opportunities. 78, 544–546 (2018)
S. Arun, in IoT for oil & gas - the power of big data and ML (Cloud Next ’18), VP data science and analytics (BHGE, 2018)
H. Karimipour, V. Dinavahi, On false data injection attack against dynamic state estimation on smart power grids, in IEEE International Conference on Smart Energy Grid Engineering, Oshawa, Canada (2017), pp. 1–7
M.R. Begli, F. Derakhshan, H. Karimipour, A layered intrusion detection system for critical infrastructure using machine learning, in IEEE International Conference on Smart Energy Grid Engineering (SEGE), Oshawa, Canada (2019), pp. 1–5
S. Mohammadi, H. Mirvaziri, M.G. Ahsaee, H. Karimipour, Cyber intrusion detection by combined feature selection algorithm. J. Inf. Secur. Appl. 44, 80–88 (2018)
K. Stouffer, V. Pillitteri, S. Lightman, M. Abrams, A. Hahn, Guide to industrial control systems (ICS) security, Revision 2, National Institute of Standards and Technology, May 2015
D. Hanes, G. Salgueiro, P. Grossetete, R. Barton, J. Henry, IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things (Cisco Press, Indianapolis, 2017)
W. Knowles, D. Princea, D. Hutchison, J.F.P. Dissob, K. Jonesb, A survey of cyber security management in industrial control systems. Int. J. Crit. Infrastruct. Prot. 9, 52 (2015)
Sentryo, ICS architecture: everything you must know, Apr 2015
R. Barton, P. Grossetete, D. Hanes, J. Henry, G. Salgueiro, Securing IoT, Oct 2017
A. Lakhani, The role of artificial intelligence in IoT and OT security, Oct 2018
C. Shen, C. Liu, H. Tan, Z. Wang, D. Xu, X. Su, Hybrid-augmented device fingerprinting for intrusion detection in industrial control system networks. IEEE Wirel. Commun. 25(6), 26–31 (2018)
Kaspersky lab ICS CERT, Threat landscape for industrial automation systems in the second half of 2016 (2016)
Kaspersky lab, The state of industrial cybersecurity 2018 (2018)
A. Azmoodeh, A. Dehghantanha, M. Conti, K.-K.R. Choo, Detecting crypto-ransomware in IoT networks based on energy consumption footprint. J. Ambient. Intell. Humaniz. Comput. 9(4), 1141–1152 (2018)
L. Obregon, Secure architecture for industrial control systems, Sept 2015
H.H. Pajouh, R. Javidan, R. Khayami, A. Dehghantanha, K.R. Choo, A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans. Emerg. Top. Comput. 7(2), 314–323 (2019)
M. Jose, X. del Toro-Garcia, J-C. Lopez-Lopez, in Artificial Intelligence Techniques for Smart Grid Applications, vol. XII, no. 4 (2011)
O.M. Alhawi, A. Akinbi, A. Dehghantanha, Evaluation and application of two fuzzing approaches for security testing of IoT applications, in Handbook of Big Data and IoT Security (Springer, Cham, 2019), pp. 301–327
A. Darejeh, H.H. Pajouh, A. Darejeh, in An Investigation on the Use of Expert Systems in Developing Web-Based Fitness Exercise Plan Generator (2014)
S.J. Pan, Q. Yang, A survey on transfer learning. IEEE Trans. Knowl. Data Eng. 22(10), 1345–1359 (2009)
H.H. Pajouh, G. Dastghaibyfard, S. Hashemi, Two-tier network anomaly detection model: a machine learning approach. J. Intell. Inf. Syst. 48(1), 61–74 (2017)
E.M. Dovom, A. Azmoodeh, A. Dehghantanha, D.E. Newton, R.M. Parizi, H. Karimipour, Fuzzy pattern tree for edge malware detection and categorization in IoT. J. Syst. Archit. 97, 1–7 (2019)
H. HaddadPajouh, A. Dehghantanha, R. Khayami, K.K. Choo, A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting. Futur. Gener. Comput. Syst. 85, 88–96 (2018)
Y. Harel, I.B. Gala, Y. Elovicib, Cyber security and the role of intelligent systems in addressing its challenges (Tel Aviv Universitya, Ben-Gurion University of the Negevb, 2017)
A. Tsonchev, OT security and the next generation of industrial cyber-attacks, Jan 2018
E. Capdevielle, ICS anomaly detection: finding the right needle in the relevant electric haystack, Nov 2017
Y. Saydun, Artificial intelligence and ICS networks: filling security gaps in operations technology, Apr 2018
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Singh, S., Karimipour, H., HaddadPajouh, H., Dehghantanha, A. (2020). Artificial Intelligence and Security of Industrial Control Systems. In: Choo, KK., Dehghantanha, A. (eds) Handbook of Big Data Privacy. Springer, Cham. https://doi.org/10.1007/978-3-030-38557-6_7
Download citation
DOI: https://doi.org/10.1007/978-3-030-38557-6_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-38556-9
Online ISBN: 978-3-030-38557-6
eBook Packages: Computer ScienceComputer Science (R0)