Industrial Control Systems for Cyber-Security Networks in Data Science
Keywords:
Industrial control systems, threats, security, machine learning, Artificial Intelligence risk assessmentAbstract
Data science is the driving force behind the significant technological and operational changes that cyber security is going through in the computer world. Identifying trends or insights regarding security occurrences in cyber security data and creating a data-driven model that correlates with them are essential elements in creating an automated and intelligent safety system. This means gathering data from pertinent cyber security sources and applying analytics to improve the most recent trends based on data. The article also highlights important variables that affect the design choices made for the control, communication, redundancy, and reliability of ICS, as these aspects are crucial in figuring out the security requirements of the system. Network segmentation, access control, patches management, and security monitoring are just a few of the security countermeasures that are currently in place. Additionally, the paper investigates how machine learning methods might be integrated to improve ICS cyber security. Subsequently, we list the pros and cons of the available security solutions, talk about how to secure industrial control systems (ICSs) and implement additional security measures (like risk assessment methodologies), point out unresolved security research issues related to ICSs, and make recommendations for future directions in ICS security research.
Downloads
References
Bhamare, D., Zolanvari, M., Erbad, A., Jain, R., Khan, K., &Meskin, N. (2020). Cybersecurity for industrial control systems: A survey. computers& security, 89, 101677.
El Kamel, N., Eddabbah, M., Lmoumen, Y., &Touahni, R. (2020). A smart agent design for cyber security based on honeypot and machine learning. Security and Communication Networks, 2020, 1-9.
Wu, J., Xing, X., Wu, C., Li, B., Huang, W., Gan, P., & Zhou, H. (2020). Cyber-enabled intelligence control and security optimization for complex microgrid networks transient frequency stability analysis of power systems considering photovoltaic grid connection. Complexity, 2020, 1-10.
Yan, Z., Zhang, Y., Choo, K. K. R., & Xiang, Y. (2018). security measurements of cyber networks. Security and Communication Networks, 2018.
Yin, X., Zhang, S., Feng, L., &Xu, G. (2023). Ethernet Information Security Protocols Based on Industrial Control Wireless Sensor Networks. Journal of Sensors, 2023.
Shi, D., Kou, L., Huo, C., & Wu, T. (2022). A CAN Bus Security Testbed Framework for Automotive Cyber-Physical Systems. Wireless Communications and Mobile Computing, 2022.
Junejo, A. K., &Komninos, N. (2020). A lightweight Attribute-based security scheme for fog-enabled cyber physical systems. Wireless Communications and Mobile Computing, 2020, 1-18.
Zhong, J., &Xiong, X. (2021). Data security storage method for power distribution internet of things in cyber-physical energy systems. Wireless Communications and Mobile Computing, 2021, 1-15.
Yan, S., Nguang, S. K., & Zhang, L. (2019). Nonfragile Integral-Based Event-Triggered Control of Uncertain Cyber-Physical Systems under Cyber‐Attacks. Complexity, 2019, 1-14.
Park, S., & Lee, K. (2014). Advanced approach to information security management system model for industrial control system. The Scientific World Journal, 2014.
Attuluri, S., & Ramesh, M. (2023). Multi-objective discrete harmony search algorithm for privacy preservation in cloud data centers. International Journal of Information Technology, 1-15.
Attuluri, S., Bama, B. S., & Anand, K. (2023, June). Swarm Based Optimized Key Generation for Preserving the Privacy in Cloud Environment. In 2023 3rd International Conference on Intelligent Technologies (CONIT) (pp. 1-5). IEEE.
Asghar, M. R., Hu, Q., &Zeadally, S. (2019). Cybersecurity in industrial control systems: Issues, technologies, and challenges. Computer Networks, 165, 106946.
Genge, B., Haller, P., & Kiss, I. (2015). Cyber-security-aware network design of industrial control systems. IEEE Systems Journal, 11(3), 1373-1384.
Attaullah, H. M., Khan, R. A., & Mughal, S. (2021). Cyber security for Industrial Control System–A Survey. iKSP Journal of Emerging Trends in Basic and Applied Sciences, 1(1), 15-21.
Drias, Z., Serhrouchni, A., & Vogel, O. (2015, August). Analysis of cyber security for industrial control systems. In 2015 international conference on cyber security of smart cities, industrial control system and communications (ssic) (pp. 1-8). IEEE.
Yang, X., Yuan, J., Yang, H., Kong, Y., Zhang, H., & Zhao, J. (2023). A Highly Interactive Honeypot-Based Approach to Network Threat Management. Future Internet, 15(4), 127.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.