Securing Industrial Control Systems: Components, Cyber Threats, and Machine Learning-Driven Defense Strategies

被引:17
|
作者
Nankya, Mary [1 ]
Chataut, Robin [2 ]
Akl, Robert [3 ]
机构
[1] Fitchburg State Univ, Comp Sci Dept, Fitchburg, MA 01420 USA
[2] Quinnipiac Univ, Sch Comp & Engn, Hamden, CT 06514 USA
[3] Univ North Texas, Dept Comp Sci & Engn, Denton, TX 76203 USA
关键词
cyber defense; industrial control systems; SCADA; anomaly detection; cyber threats; vulnerabilities; attacks; artificial intelligence; security; ANOMALY DETECTION; INTRUSION DETECTION; ATTACKS; STATE;
D O I
10.3390/s23218840
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Industrial Control Systems (ICS), which include Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and Programmable Logic Controllers (PLC), play a crucial role in managing and regulating industrial processes. However, ensuring the security of these systems is of utmost importance due to the potentially severe consequences of cyber attacks. This article presents an overview of ICS security, covering its components, protocols, industrial applications, and performance aspects. It also highlights the typical threats and vulnerabilities faced by these systems. Moreover, the article identifies key factors that influence the design decisions concerning control, communication, reliability, and redundancy properties of ICS, as these are critical in determining the security needs of the system. The article outlines existing security countermeasures, including network segmentation, access control, patch management, and security monitoring. Furthermore, the article explores the integration of machine learning techniques to enhance the cybersecurity of ICS. Machine learning offers several advantages, such as anomaly detection, threat intelligence analysis, and predictive maintenance. However, combining machine learning with other security measures is essential to establish a comprehensive defense strategy for ICS. The article also addresses the challenges associated with existing measures and provides recommendations for improving ICS security. This paper becomes a valuable reference for researchers aiming to make meaningful contributions within the constantly evolving ICS domain by providing an in-depth examination of the present state, challenges, and potential future advancements.
引用
收藏
页数:41
相关论文
共 50 条
  • [31] Poisoning attacks on machine learning models in cyber systems and mitigation strategies
    Izmailov, Rauf
    Venkatesan, Sridhar
    Reddy, Achyut
    Chadha, Ritu
    De Lucia, Michael
    Oprea, Alina
    DISRUPTIVE TECHNOLOGIES IN INFORMATION SCIENCES VI, 2022, 12117
  • [32] Advanced Machine Learning-Driven Security and Anomaly Identification in Inverter-Based Cyber-Physical Microgrids
    Gokulraj, K.
    Venkatramanan, C. B.
    ELECTRIC POWER COMPONENTS AND SYSTEMS, 2024,
  • [33] Machine learning-driven optimization of enterprise resource planning (ERP) systems: a comprehensive review
    Jawad, Zainab Nadhim
    Balazs, Villanyi
    BENI-SUEF UNIVERSITY JOURNAL OF BASIC AND APPLIED SCIENCES, 2024, 13 (01)
  • [34] Machine learning-driven optimization of enterprise resource planning (ERP) systems: a comprehensive review
    Zainab Nadhim Jawad
    Villányi Balázs
    Beni-Suef University Journal of Basic and Applied Sciences, 13
  • [35] A dynamic games approach to proactive defense strategies against Advanced Persistent Threats in cyber-physical systems
    Huang, Linan
    Zhu, Quanyan
    COMPUTERS & SECURITY, 2020, 89
  • [36] Identification of Active Components for Sports Supplements: Machine Learning-Driven Classification and Cell-Based Validation
    Ji, Xiaoning
    Li, Qiuyun
    Liu, Zhaoping
    Wu, Weiliang
    Zhang, Chaozheng
    Sui, Haixia
    Chen, Min
    ACS OMEGA, 2024, 9 (10): : 11347 - 11355
  • [37] Machine Learning-based Defense Against Process-Aware Attacks on Industrial Control Systems
    Keliris, Anastasis
    Salehghaffari, Hossein
    Cairl, Brian
    Krishnamurthy, Prashanth
    Maniatakos, Michail
    Khorrami, Farshad
    PROCEEDINGS 2016 IEEE INTERNATIONAL TEST CONFERENCE (ITC), 2016,
  • [38] NeuPot: A Neural Network-Based Honeypot for Detecting Cyber Threats in Industrial Control Systems
    Shan, Yao
    Yao, Yu
    Zhao, Tong
    Yang, Wei
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (10) : 10512 - 10522
  • [39] Machine learning-driven habitat suitability modeling of Suaeda aegyptiaca for sustainable industrial cultivation in saline regions
    Edrisnia, Sara
    Etemadi, Mohammad
    Pourghasemi, Hamid Reza
    INDUSTRIAL CROPS AND PRODUCTS, 2025, 225
  • [40] Guest Editorial Machine Learning for Resilient Industrial Cyber-Physical Systems
    Hu, Shiyan
    Chen, Yiran
    Zhu, Qi
    Colombo, Armando Walter
    IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2023, 20 (01) : 3 - 4