Industrial Control Systems for Cyber-Security Networks in Data Science

Authors

  • Sushanth Chandra Addimulam Sr. Infrastructure and Security Engineer, Applied Computer Techniques, 28345 Beck Road STE 308, Wixom, MI- 48393

Keywords:

Industrial control systems, threats, security, machine learning, Artificial Intelligence risk assessment

Abstract

Data science is the driving force behind the significant technological and operational changes that cyber security is going through in the computer world. Identifying trends or insights regarding security occurrences in cyber security data and creating a data-driven model that correlates with them are essential elements in creating an automated and intelligent safety system. This means gathering data from pertinent cyber security sources and applying analytics to improve the most recent trends based on data. The article also highlights important variables that affect the design choices made for the control, communication, redundancy, and reliability of ICS, as these aspects are crucial in figuring out the security requirements of the system. Network segmentation, access control, patches management, and security monitoring are just a few of the security countermeasures that are currently in place. Additionally, the paper investigates how machine learning methods might be integrated to improve ICS cyber security. Subsequently, we list the pros and cons of the available security solutions, talk about how to secure industrial control systems (ICSs) and implement additional security measures (like risk assessment methodologies), point out unresolved security research issues related to ICSs, and make recommendations for future directions in ICS security research.

Downloads

Download data is not yet available.

References

Bhamare, D., Zolanvari, M., Erbad, A., Jain, R., Khan, K., &Meskin, N. (2020). Cybersecurity for industrial control systems: A survey. computers& security, 89, 101677.

El Kamel, N., Eddabbah, M., Lmoumen, Y., &Touahni, R. (2020). A smart agent design for cyber security based on honeypot and machine learning. Security and Communication Networks, 2020, 1-9.

Wu, J., Xing, X., Wu, C., Li, B., Huang, W., Gan, P., & Zhou, H. (2020). Cyber-enabled intelligence control and security optimization for complex microgrid networks transient frequency stability analysis of power systems considering photovoltaic grid connection. Complexity, 2020, 1-10.

Yan, Z., Zhang, Y., Choo, K. K. R., & Xiang, Y. (2018). security measurements of cyber networks. Security and Communication Networks, 2018.

Yin, X., Zhang, S., Feng, L., &Xu, G. (2023). Ethernet Information Security Protocols Based on Industrial Control Wireless Sensor Networks. Journal of Sensors, 2023.

Shi, D., Kou, L., Huo, C., & Wu, T. (2022). A CAN Bus Security Testbed Framework for Automotive Cyber-Physical Systems. Wireless Communications and Mobile Computing, 2022.

Junejo, A. K., &Komninos, N. (2020). A lightweight Attribute-based security scheme for fog-enabled cyber physical systems. Wireless Communications and Mobile Computing, 2020, 1-18.

Zhong, J., &Xiong, X. (2021). Data security storage method for power distribution internet of things in cyber-physical energy systems. Wireless Communications and Mobile Computing, 2021, 1-15.

Yan, S., Nguang, S. K., & Zhang, L. (2019). Nonfragile Integral-Based Event-Triggered Control of Uncertain Cyber-Physical Systems under Cyber‐Attacks. Complexity, 2019, 1-14.

Park, S., & Lee, K. (2014). Advanced approach to information security management system model for industrial control system. The Scientific World Journal, 2014.

Attuluri, S., & Ramesh, M. (2023). Multi-objective discrete harmony search algorithm for privacy preservation in cloud data centers. International Journal of Information Technology, 1-15.

Attuluri, S., Bama, B. S., & Anand, K. (2023, June). Swarm Based Optimized Key Generation for Preserving the Privacy in Cloud Environment. In 2023 3rd International Conference on Intelligent Technologies (CONIT) (pp. 1-5). IEEE.

Asghar, M. R., Hu, Q., &Zeadally, S. (2019). Cybersecurity in industrial control systems: Issues, technologies, and challenges. Computer Networks, 165, 106946.

Genge, B., Haller, P., & Kiss, I. (2015). Cyber-security-aware network design of industrial control systems. IEEE Systems Journal, 11(3), 1373-1384.

Attaullah, H. M., Khan, R. A., & Mughal, S. (2021). Cyber security for Industrial Control System–A Survey. iKSP Journal of Emerging Trends in Basic and Applied Sciences, 1(1), 15-21.

Drias, Z., Serhrouchni, A., & Vogel, O. (2015, August). Analysis of cyber security for industrial control systems. In 2015 international conference on cyber security of smart cities, industrial control system and communications (ssic) (pp. 1-8). IEEE.

Yang, X., Yuan, J., Yang, H., Kong, Y., Zhang, H., & Zhao, J. (2023). A Highly Interactive Honeypot-Based Approach to Network Threat Management. Future Internet, 15(4), 127.

Downloads

Published

27.12.2023

How to Cite

Addimulam, S. C. . (2023). Industrial Control Systems for Cyber-Security Networks in Data Science. International Journal of Intelligent Systems and Applications in Engineering, 12(9s), 72–78. Retrieved from https://www.ijisae.org/index.php/IJISAE/article/view/4205

Issue

Section

Research Article