Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Artificial Intelligence and Security of Industrial Control Systems

  • Chapter
  • First Online:
Handbook of Big Data Privacy

Abstract

Developments, expansions and upgrades in the field of industrial information technology have introduced a large number of new threats to industries. This real-time data demonstrates whether additional attention to system is needed and requirements in terms of resources, performance, or improvements are being met. Cyber threat actors have become exceptionally skilled at infiltrating their victim targets. Industrial Control Systems (ICS) are also recognized as attractive targets for threat actors. While these networks were generally thought to be more secure due to lack of connection to outside world of the corporate network or on the internet, now it is not the same case and attackers have managed to compromise them and steal valuable production data. Additionally, mechanical control can be undertaken or compromised, centrifugation can be dynamically rearranged or devices can be reprogrammed in order to accelerate or slow down ICS operations post such specialized attacks. This may result in total industrial equipment being destroyed or permanently damaged, or also may endanger personnel’s life who is working at the ICS site. This chapter surveys about the latest research and methodologies undertaken for measuring and managing industrial cyber threats risks, and talks about a dearth of industrial-control-system-specific security metrics that has been identified as a barrier to implementing these methodologies. Some of the most effective tools in combating these threats are the emerging techniques in Artificial Intelligence. By combining these threats with real-time data monitoring along with orchestration and automated response, AI analytics solutions are proving their best possible desirable outcome when compared to legacy systems and human-intervention driven response times.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. H. Karimipour, A. Dehghantanha, R.M. Parizi, R. Choo, H. Leung, A deep and scalable unsupervised machine learning system for cyber-attack detection in large-scale smart grids. IEEE Access 7, 80778 (2019)

    Article  Google Scholar 

  2. J. Sakhnini, A. Dehghantanha, H. Karimipour, Smart grid cyber attacks detection using supervised learning and heuristic feature selection, in IEEE International Conference on Smart Energy Grid Engineering (SEGE), Oshawa, Canada (2019), pp. 1–5

    Google Scholar 

  3. A. Almalawi, X. Yu, Z. Tari, A. Fahad, I. Khalil, An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems. Comput. Secur. 46, 94–110 (2014)

    Article  Google Scholar 

  4. H. Karimipour, V. Dinavahi, Accelerated parallel WLS state estimation for large-scale power systems on GPU, in IEEE North American Power Symposium (NAPS), Manhatan, USA (2013), pp. 1–6

    Google Scholar 

  5. H. Karimipour, V. Dinavahi, Robust massively parallel dynamic state estimation of power systems against cyber-attack. IEEE Access 6, 2984–2995 (2017)

    Article  Google Scholar 

  6. H.M. Ruzbahani, A. Rahimnejad, H. Karimipour, Smart households demand response management with micro grid, in IEEE Innovative Smart Grid Technologies (ISGT 2019), Washington, DC (2019), pp. 1–5

    Google Scholar 

  7. F. Ghalavand, B.M. Alizadeh, H. Karimipour, Micro grid islanding detection based on mathematical morphology. J. Energy 11(10), 456–477 (2018)

    Google Scholar 

  8. S. Geris, H. Karimipour, A feature selection-based approach for joint cyber-attack detection and state estimation, in IEEE International Conference on Smart Energy Grid Engineering (SEGE), Oshawa, Canada (2019), pp. 1–5

    Google Scholar 

  9. S. Vishwanath, Industrial control systems, PWC, India

    Google Scholar 

  10. L.D. Xu, E.L. Xu, L. Li, Industry 4.0: state of the art and future trends. Int. J. Prod. Res. 56(8), 2941–2962 (2018)

    Article  Google Scholar 

  11. E. Modiri, A. Azmoodeh, A. Dehghantanha, H. Karimipour, Fuzzy pattern tree for edge attack detection and categorization. J. Syst. Archit. 9, 1–15 (2018)

    Google Scholar 

  12. H. Karimipour, S. Geris, A. Dehghantanha, H. Leung, Intelligent anomaly detection for large-scale smart grids, in IEEE CCECE, Edmonton, Canada (2019), pp. 1–4

    Google Scholar 

  13. M. Conti, A. Dehghantanha, K. Franke, S. Watson, Internet of things security and forensics: challenges and opportunities. 78, 544–546 (2018)

    Google Scholar 

  14. S. Arun, in IoT for oil & gas - the power of big data and ML (Cloud Next ’18), VP data science and analytics (BHGE, 2018)

    Google Scholar 

  15. H. Karimipour, V. Dinavahi, On false data injection attack against dynamic state estimation on smart power grids, in IEEE International Conference on Smart Energy Grid Engineering, Oshawa, Canada (2017), pp. 1–7

    Google Scholar 

  16. M.R. Begli, F. Derakhshan, H. Karimipour, A layered intrusion detection system for critical infrastructure using machine learning, in IEEE International Conference on Smart Energy Grid Engineering (SEGE), Oshawa, Canada (2019), pp. 1–5

    Google Scholar 

  17. S. Mohammadi, H. Mirvaziri, M.G. Ahsaee, H. Karimipour, Cyber intrusion detection by combined feature selection algorithm. J. Inf. Secur. Appl. 44, 80–88 (2018)

    Google Scholar 

  18. K. Stouffer, V. Pillitteri, S. Lightman, M. Abrams, A. Hahn, Guide to industrial control systems (ICS) security, Revision 2, National Institute of Standards and Technology, May 2015

    Google Scholar 

  19. D. Hanes, G. Salgueiro, P. Grossetete, R. Barton, J. Henry, IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things (Cisco Press, Indianapolis, 2017)

    Google Scholar 

  20. W. Knowles, D. Princea, D. Hutchison, J.F.P. Dissob, K. Jonesb, A survey of cyber security management in industrial control systems. Int. J. Crit. Infrastruct. Prot. 9, 52 (2015)

    Article  Google Scholar 

  21. Sentryo, ICS architecture: everything you must know, Apr 2015

    Google Scholar 

  22. R. Barton, P. Grossetete, D. Hanes, J. Henry, G. Salgueiro, Securing IoT, Oct 2017

    Google Scholar 

  23. A. Lakhani, The role of artificial intelligence in IoT and OT security, Oct 2018

    Google Scholar 

  24. C. Shen, C. Liu, H. Tan, Z. Wang, D. Xu, X. Su, Hybrid-augmented device fingerprinting for intrusion detection in industrial control system networks. IEEE Wirel. Commun. 25(6), 26–31 (2018)

    Article  Google Scholar 

  25. Kaspersky lab ICS CERT, Threat landscape for industrial automation systems in the second half of 2016 (2016)

    Google Scholar 

  26. Kaspersky lab, The state of industrial cybersecurity 2018 (2018)

    Google Scholar 

  27. A. Azmoodeh, A. Dehghantanha, M. Conti, K.-K.R. Choo, Detecting crypto-ransomware in IoT networks based on energy consumption footprint. J. Ambient. Intell. Humaniz. Comput. 9(4), 1141–1152 (2018)

    Article  Google Scholar 

  28. L. Obregon, Secure architecture for industrial control systems, Sept 2015

    Google Scholar 

  29. H.H. Pajouh, R. Javidan, R. Khayami, A. Dehghantanha, K.R. Choo, A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans. Emerg. Top. Comput. 7(2), 314–323 (2019)

    Article  Google Scholar 

  30. M. Jose, X. del Toro-Garcia, J-C. Lopez-Lopez, in Artificial Intelligence Techniques for Smart Grid Applications, vol. XII, no. 4 (2011)

    Google Scholar 

  31. O.M. Alhawi, A. Akinbi, A. Dehghantanha, Evaluation and application of two fuzzing approaches for security testing of IoT applications, in Handbook of Big Data and IoT Security (Springer, Cham, 2019), pp. 301–327

    Google Scholar 

  32. A. Darejeh, H.H. Pajouh, A. Darejeh, in An Investigation on the Use of Expert Systems in Developing Web-Based Fitness Exercise Plan Generator (2014)

    Google Scholar 

  33. S.J. Pan, Q. Yang, A survey on transfer learning. IEEE Trans. Knowl. Data Eng. 22(10), 1345–1359 (2009)

    Article  Google Scholar 

  34. H.H. Pajouh, G. Dastghaibyfard, S. Hashemi, Two-tier network anomaly detection model: a machine learning approach. J. Intell. Inf. Syst. 48(1), 61–74 (2017)

    Article  Google Scholar 

  35. E.M. Dovom, A. Azmoodeh, A. Dehghantanha, D.E. Newton, R.M. Parizi, H. Karimipour, Fuzzy pattern tree for edge malware detection and categorization in IoT. J. Syst. Archit. 97, 1–7 (2019)

    Article  Google Scholar 

  36. H. HaddadPajouh, A. Dehghantanha, R. Khayami, K.K. Choo, A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting. Futur. Gener. Comput. Syst. 85, 88–96 (2018)

    Article  Google Scholar 

  37. Y. Harel, I.B. Gala, Y. Elovicib, Cyber security and the role of intelligent systems in addressing its challenges (Tel Aviv Universitya, Ben-Gurion University of the Negevb, 2017)

    Google Scholar 

  38. A. Tsonchev, OT security and the next generation of industrial cyber-attacks, Jan 2018

    Google Scholar 

  39. E. Capdevielle, ICS anomaly detection: finding the right needle in the relevant electric haystack, Nov 2017

    Google Scholar 

  40. Y. Saydun, Artificial intelligence and ICS networks: filling security gaps in operations technology, Apr 2018

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hamed HaddadPajouh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Singh, S., Karimipour, H., HaddadPajouh, H., Dehghantanha, A. (2020). Artificial Intelligence and Security of Industrial Control Systems. In: Choo, KK., Dehghantanha, A. (eds) Handbook of Big Data Privacy. Springer, Cham. https://doi.org/10.1007/978-3-030-38557-6_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-38557-6_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-38556-9

  • Online ISBN: 978-3-030-38557-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics