Cybersecurity against the Loopholes in Industrial Control Systems Using Interval-Valued Complex Intuitionistic Fuzzy Relations
Abstract
:1. Introduction
2. Preliminaries
3. Interval-Valued Complex Fuzzy Relations
- is known as an IVCI reflexive fuzzy relation (IVCI-reflexive-FR) on if , .
- is known as an IVCI irreflexive fuzzy relation (IVCI-irreflexive-FR) on if , .
- Ṝ is known as an IVCI symmetric fuzzy relation (IVCI-symmetric-FR) on if , .
- is known as an IVCI antisymmetric fuzzy relation (IVCI-antisymmetric-FR) on if , and .
- is known as an IVCI asymmetric fuzzy relation (IVCI-asymmetric-FR) on if , .
- is known as an IVCI complete fuzzy relation (IVCI-complete-FR) on if , or (y, x) ∈ Ṝ.
- is known as an IVCI transitive fuzzy relation on (IVCI-transitive-FR) if , (x,y) ∈ Ṝ and .
- is known as an IVCI equivalence fuzzy relation (IVCI-equivalence-FR) onif Ṝ is IVCI-reflexive-FR, IVCI-symmetric-FR and IVCI-transitive-FR on Ḝ.
- is known as an IVCI preorder fuzzy relation (IVCI-preorder-FR) on if is IVCI-reflexive-FR and IVCI-transitive-FR on.
- is known as an IVCI strict order fuzzy relation (IVCI-strict order-FR) on if is IVCI-irreflexive-FR and IVCI-transitive-FR on.
- is known as an IVCI partial order fuzzy relation (IVCI-partial order-FR) on if is IVCI-preorder-FR and IVCI-antisymmetric-FR on.
- is known as an IVCI linear order fuzzy relation (IVCI-linear order-FR) on if is IVCI-partial order-FR and IVCI-complete-FR on.
- The IVCI-equivalence-FR on is given as
- The IVCI-preorder-FR on is given as
- The IVCI-strict order-FR on is given as
- The IVCI-partial order-FR on is given as
- The IVCI-linear order-FR on is given as
- modulo is given as
- modulo Ṝ is given as
- modulo is given as
- It is given that is an IVCI-reflexive-FR. Therefore, for any ,.Thus, is an IVCI-reflexive-FR.
- Assume that and ,then, and .However, is an IVCI-antisymmetric-FR. Therefore, .Thus, is also an IVCI-antisymmetric-FR.
- Suppose that and ,then, and .However, it is given that is an IVCI-transitive-FR. Therefore,.Thus, is also an IVCI-transitive-FR.
4. Hasse Diagram for IVCI-Partial Order-FRs
- The elements are arranged in an ascending order to distinguish the lower ranks and higher ranks. In an ordered pair of an IVCI-partial order-FR, the preceding element is considered to be smaller than the element appearing second in the pair. For example, in the ordered pair, the elementis smaller than the element. will appear higher than in the diagram.
- There are no self-loops for IVCI-reflexive-FRs. In a Hasse diagram, the self-relation is not represented by any edge, it is just assumed to be there.
- There are no directional edges. The directional edges indicate the order of the element in the ordered pair. For example, in the ordered pair, the relation in normal diagrams, would be represented by a directional edge with an arrow head pointing towards element. Thus, ranking higher than . But in a Hasse diagram, the stepwise ascending arrangement of the elements automatically distinguishes the higher ranked and lower ranked elements.
- There are no redundant edges, for instance the edge for an IVCI-transitive-FRs and IVCI-reflexive-FRs. Consider and then IVCI-transitive-FR . In normal diagrams, there would be three edges representing the above three relations. However, in a Hasse diagram, only two edges are constructed, i.e., from to and another from to . The indirect link between and via is represented by the two edges. The IVCI-transitive-FR is intuitively understood.
- The maximal element if it appears at the top of the diagram.
- The minimal if it appears at the bottom of the diagram.
- The maximum or greatest element if every element related to it is smaller than it.
- The minimum or least element if every element related to it is greater than it.
- Upper bound of Ḟ if .
- Lower bound of Ḟ if .
- Supremum of Ḟ if it is the least upper bound of Ḟ.
- Infimum of Ḟ if it is the greatest upper bound of Ḟ.
- Maximal element is .
- Minimal element is .
- Maximum elements are and .
- Minimum elements are and .
- e.
- Upper bounds of are and
- f.
- Lower bounds of are and .
- g.
- Supremum of is .
- h.
- Infimum of is .
5. Application
5.1. Security Measures
- I.
- Default-deny as a standard policy: In default-deny mode, the ICS works in a protected environment that only allows programs to run that are required for the technological process to function. All unknown and unwanted applications, including malicious programs, are blocked. Thus, a secure running environment is created with minimum load on system resources.
- II.
- Proactive protection against unknown malicious programs and automatic protection against exploits. The technology scans executable programs, assessing the security of each application by monitoring its activities when in operation.
- III.
- Device Control technology helps to manage removable devices (USB storages, GPRS modems, smartphones, USB network cards) and creates limited lists of permitted devices and the users who can access them.
- IV.
- All-in-one IT security console helps to monitor and control all solutions to ensure IT security. With the single management console, admins can install, configure and manage security, and access reports.
- V.
- Integration with SIEM (using special connectors) allows admins to export information about security incidents at protected nodes of the technological network into the corporate SIEM system.
5.2. Sources of Code Penetration
- Mobile Devices
- Via USB Ports
- Via Remote Access
- Wi-Fi
- HMI Interface
- Internet Connections
- Outside Contractors
- Via Corporate Networks
5.3. Calculations
5.4. Cyber-Security Techniques and Practices
- I.
- Access control ()If the cyberattacker is unable to access your industrial network, then they will do very limited harm. limits user access according to their responsibilities, which increases the security, and especially, internal breaches are restricted.
- II.
- Anti-malware software ()Viruses, Trojans, worms, key-loggers and spyware are all malwares, which are used to infect digital systems. Anti-malware software identifies risky programs and files, then prevents them from spreading.
- III.
- Anomaly detection ()Identifying anomalies is a difficult task. Henceforth, anomaly detection engines (ADE) are designed that allow the analysis of an industrial network. This alerts the authorities when breaches occur so that they can respond at the right times.
- IV.
- Application security ()An establishes security parameters for any applications that are relevant to industrial security.
- V.
- Data loss prevention (DLP)equipment and strategies protect employees and users from ill-use, such as giving away sensitive data.
- VI.
- Email security ()An system basically identifies risky emails. These phishing emails are usually very convincing because their target is to trick people. Further, this system also stops cyberattacks and prevents the sharing of important data.
- VII.
- Endpoint security ()These days, the difference between personal and business devices is nearly non-existent. Unfortunately, personal devices are targeted to attack businesses. Endpoint security is a defensive layer between business networks and such remote devices.
- VIII.
- Firewalls ()act as gateways in a network, used to secure the borders between the internet and local networks. They are used to manage network traffic by allowing approved traffic and blocking non-authorized traffic.
- IX.
- Intrusion prevention systems ()Different types of cyberattacks are identified and then rapidly responded to by after scanning and analyzing the traffic. These systems use databases of well-known cyberattack approaches; therefore, they immediately recognize threats.
- X.
- Network segmentation ()restricts the traffic from suspicious sources that carries risky threats, and allows the authorized and right traffic.
- XI.
- Security information and event management (SIEM)is a field of cyber-security that provides instantaneous analysis of security warnings spawned by applications and network hardware.
- XII.
- Virtual private network (VPN)The communication between secure networks and an endpoint device is authenticated by using tools. They block other parties from spying by creating an encrypted line.
- XIII.
- Web security ()is an extensive word that describes the security measures taken by businesses to ensure a harmless web experience when connected to an internal network. This prevents web-based cyberthreats from using browsers as access points to get into the network.
- XIV.
- Wireless security ()Traditional networks are generally more secure than wireless networks. Thus, severe types of measures are essential to certify that cybercriminals are not gaining access.
- XV.
- Encryption ()The encryption of data is an exceptionally effective security technique. The term “encryption” means the transformation of data to a code language or cipher text that cannot be read by a human. Special keys are used to decrypt these codes and cipher text back to a readable format. The complex encryption algorithms keep the information safe. Some of these algorithms are; Twofish algorithm, Rivest–Shamir–Adleman (RSA) algorithm and triple data encryption algorithm. Figure 6 illustrates the process of data encryption.
6. Comparative Analysis
6.1. Comparison with FRs, CFRs, IVFRs and IVCFRs
6.2. Comparison with IFRs, CIFRs and IVIFRs
6.3. Cons of Alternative Methods
- The structure of FRs, IVFRs, CFRs and IVCFRs lack the degree of non-membership.
- The IFR, CIFR and IVIFR methods discuss the degree of membership as well as the degree of no-membership, but they have certain limitations.
- IFR, with its single valued degrees, does not cope with uncertainty as efficiently as interval-valued structures. Moreover, it cannot model multivariable problems.
- Though CIFR is capable of modeling multivariable problems, it lags behind in handling uncertainty due to its single valued degrees.
- An IVIFR can grip the uncertainty quite well with its interval-valued structure, but it is only limited to one-dimensional problems.
6.4. Pros of IVCIFR
- The structure is composed of the degrees of membership and non-membership.
- Interval values cover the mistakes and errors made by the expert or that occur during the survey or experiments.
- Complex valued memberships and non-memberships can be used to cope with multidimensional variables.
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Zadeh, L.A. Fuzzy sets. Inf. Control. 1965, 8, 338–353. [Google Scholar] [CrossRef] [Green Version]
- Klir, G.J.; Folger, T.A. Fuzzy Sets, Uncertainty, and Information; Prentice Hall: Englewood Cliffs, NJ, USA, 1988. [Google Scholar]
- Mendel, J.M. Fuzzy logic systems for engineering: A tutorial. Proc. IEEE 1995, 83, 345–377. [Google Scholar] [CrossRef] [Green Version]
- Zadeh, L.A. The concept of a linguistic variable and its application to approximate reasoning—I. Inf. Sci. 1975, 8, 199–249. [Google Scholar] [CrossRef]
- Bustince, H.; Burillo, P. Mathematical analysis of interval-valued fuzzy relations: Application to approximate reasoning. Fuzzy Sets Syst. 2000, 113, 205–219. [Google Scholar] [CrossRef]
- Goguen, J.A., Jr. Concept representation in natural and artificial languages: Axioms, extensions and applications for fuzzy sets. Int. J. Man-Mach. Stud. 1974, 6, 513–561. [Google Scholar] [CrossRef]
- Żywica, P. Modelling medical uncertainties with use of fuzzy sets and their extensions. In Proceedings of the International Conference on Information Processing and Management of Uncertainty in Knowledge-Based Systems, Cádiz, Spain, 18 May 2018; Springer: Cham, Germany, 2018; pp. 369–380. [Google Scholar] [CrossRef]
- Román-Flores, H.; Barros, L.C.; Bassanezi, R.C. A note on Zadeh’s extensions. Fuzzy Sets Syst. 2001, 117, 327–331. [Google Scholar] [CrossRef]
- Dubois, D.; Prade, H. Gradualness, uncertainty and bipolarity: Making sense of fuzzy sets. Fuzzy Sets Syst. 2012, 192, 3–24. [Google Scholar] [CrossRef]
- Gehrke, M.; Walker, C.; Walker, E. Some comments on interval valued fuzzy sets! Structure 1996, 1, 2. [Google Scholar] [CrossRef]
- Bustince, H. Indicator of inclusion grade for interval-valued fuzzy sets. Application to approximate reasoning based on interval-valued fuzzy sets. Int. J. Approx. Reason. 2000, 23, 137–209. [Google Scholar] [CrossRef] [Green Version]
- Turksen, I.B. Interval-valued fuzzy sets and ‘compensatory AND’. Fuzzy Sets Syst. 1992, 51, 295–307. [Google Scholar] [CrossRef]
- Ramot, D.; Milo, R.; Friedman, M.; Kandel, A. Complex fuzzy sets. IEEE Trans. Fuzzy Syst. 2002, 10, 171–186. [Google Scholar] [CrossRef]
- Ramot, D.; Friedman, M.; Langholz, G.; Kandel, A. Complex fuzzy logic. IEEE Trans. Fuzzy Syst. 2003, 11, 450–461. [Google Scholar] [CrossRef]
- Greenfield, S.; Chiclana, F.; Dick, S. Interval-valued complex fuzzy logic. In Proceedings of the 2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), Vancouver, BC, Canada, 24–29 July 2016; pp. 2014–2019. [Google Scholar]
- Nasir, A.; Jan, N.; Gumaei, A.; Khan, S.U. Medical diagnosis and life span of sufferer using interval valued complex fuzzy relations. IEEE Access 2021, 9, 93764–93780. [Google Scholar] [CrossRef]
- Chen, Z.; Aghakhani, S.; Man, J.; Dick, S. ANCFIS: A neurofuzzy architecture employing complex fuzzy sets. IEEE Trans. Fuzzy Syst. 2010, 19, 305–322. [Google Scholar] [CrossRef]
- Yazdanbakhsh, O.; Dick, S. A systematic review of complex fuzzy sets and logic. Fuzzy Sets Syst. 2018, 338, 1–22. [Google Scholar] [CrossRef]
- Tamir, D.E.; Rishe, N.D.; Kandel, A. Complex fuzzy sets and complex fuzzy logic an overview of theory and applications. Fifty Years Fuzzy Log. Its Appl. 2015, 326, 661–681. [Google Scholar]
- Dai, S.; Bi, L.; Hu, B. Distance measures between the interval-valued complex fuzzy sets. Mathematics 2019, 7, 549. [Google Scholar] [CrossRef] [Green Version]
- Greenfield, S.; Chiclana, F.; Dick, S. Join and meet operations for interval-valued complex fuzzy logic. In Proceedings of the 2016 Annual Conference of the North American Fuzzy Information Processing Society (NAFIPS), El Paso, TX, USA, 31 October–4 November 2016; pp. 1–5. [Google Scholar]
- Atanassov, K.T. Intuitionistic fuzzy sets. Fuzzy Sets Syst. 1986, 20, 87–96. [Google Scholar] [CrossRef]
- Burillo, P.; Bustince, H. Intuitionistic fuzzy relations (Part I). Mathw. Soft Comput. 2016, 2, 5–38. [Google Scholar]
- Atanassov, K.T. Interval valued intuitionistic fuzzy sets. In Intuitionistic Fuzzy Sets; Physica: Heidelberg, Germany, 1999; pp. 139–177. [Google Scholar]
- Alkouri, A.S.; Salleh, A.R. Complex intuitionistic fuzzy sets. AIP Conf. Proc. 2012, 1482, 464. [Google Scholar]
- Garg, H.; Rani, D. Complex interval-valued intuitionistic fuzzy sets and their aggregation operators. Fundam. Inform. 2019, 164, 61–101. [Google Scholar] [CrossRef]
- Li, D.F. Multiattribute decision making models and methods using intuitionistic fuzzy sets. J. Comput. Syst. Sci. 2005, 70, 73–85. [Google Scholar] [CrossRef] [Green Version]
- De, S.K.; Biswas, R.; Roy, A.R. An application of intuitionistic fuzzy sets in medical diagnosis. Fuzzy Sets Syst. 2001, 117, 209–213. [Google Scholar] [CrossRef]
- Vlachos, I.K.; Sergiadis, G.D. Intuitionistic fuzzy information–applications to pattern recognition. Pattern Recognit. Lett. 2007, 28, 197–206. [Google Scholar] [CrossRef]
- Lee, K.M.; LEE, K.M.; CIOS, K.J. Comparison of interval-valued fuzzy sets, intuitionistic fuzzy sets, and bipolar-valued fuzzy sets. In Computing and Information Technologies: Exploring Emerging Technologies; World Scientific: Hackensack, NJ, USA, 2001; pp. 433–439. [Google Scholar] [CrossRef]
- Grzegorzewski, P. Distances between intuitionistic fuzzy sets and/or interval-valued fuzzy sets based on the Hausdorff metric. Fuzzy Sets Syst. 2004, 148, 319–328. [Google Scholar] [CrossRef]
- Nasir, A.; Jan, N.; Yang, M.-S.; Khan, S.U. Complex T-spherical fuzzy relations with their applications in economic relationships and international trades. IEEE Access 2021, 9, 66115–66131. [Google Scholar] [CrossRef]
- Khan, S.U.; Nasir, A.; Jan, N.; Ma, Z.H. Graphical Analysis of Covering and Paired Domination in the Environment of Neutrosophic Information. Math. Probl. Eng. 2021, 2021. [Google Scholar] [CrossRef]
- Nasir, A.; Jan, N.; Gumaei, A.; Khan, S.U.; Al-Rakhami, M. Evaluation of the Economic Relationships on the Basis of Statistical Decision-Making in Complex Neutrosophic Environment. Complexity 2021, 2021. [Google Scholar] [CrossRef]
- Jan, N.; Rehman, S.U.; Nasir, A.; Aydi, H.; Khan, S.U. Analysis of Economic Relationship Using the Concept of Complex Pythagorean Fuzzy Information. Secu. Comm. Nets. 2021, 2021. [Google Scholar] [CrossRef]
- Ali, M.; Tamir, D.E.; Rishe, N.D.; Kandel, A. Complex intuitionistic fuzzy classes. In Proceedings of the 2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), Vancouver, BC, Canada, 24–29 July 2016; pp. 2027–2034. [Google Scholar]
- Liu, Y.; Jiang, W. A new distance measure of interval-valued intuitionistic fuzzy sets and its application in decision making. Soft Comput. 2019, 24, 1–17. [Google Scholar] [CrossRef]
- Bustince, H.; Burillo, P. Correlation of interval-valued intuitionistic fuzzy sets. Fuzzy Sets Syst. 1995, 74, 237–244. [Google Scholar] [CrossRef]
- Nayagam, V.L.G.; Sivaraman, G. Ranking of interval-valued intuitionistic fuzzy sets. Appl. Soft Comput. 2011, 11, 3368–3372. [Google Scholar] [CrossRef]
- Otero, A.R.; Tejay, G.; Otero, L.D.; Ruiz-Torres, A.J. A fuzzy logic-based information security control assessment for organizations. In Proceedings of the 2012 IEEE Conference on Open Systems, Kuala Lumpur, Malaysia, 21–24 October 2012; pp. 1–6. [Google Scholar]
- Tariq, M.I.; Ahmed, S.; Memon, N.A.; Tayyaba, S.; Ashraf, M.W.; Nazir, M.; Hussain, A.; Balas, V.E.; Balas, M.M. Prioritization of information security controls through fuzzy AHP for cloud computing networks and wireless sensor networks. Sensors 2020, 20, 1310. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Tariq, M.I.; Tayyaba, S.; Ali Mian, N.; Sarfraz, M.S.; De-la-Hoz-Franco, E.; Butt, S.A.; Santarcangelo, V.; Rad, D.V. Combination of AHP and TOPSIS methods for the ranking of information security controls to overcome its obstructions under fuzzy environment. J. Intell. Fuzzy Sys. 2020, 38, 6075–6088. [Google Scholar] [CrossRef]
- Mokhtari, S.M.; Alinejad-Rokny, H.; Jalalifar, H. Selection of the best well control system by using fuzzy multiple-attribute decision-making methods. J. Appl. Stat. 2014, 41, 1105–1121. [Google Scholar] [CrossRef]
Security Measures | Abbreviations | Membership | Non-Membership |
---|---|---|---|
Default-deny as a standard policy | |||
Proactive protection | |||
Device Control technology | |||
All-in-one IT Security Console | |||
Integration with SIEM |
Source | Abbreviation | Membership | Non-Membership |
---|---|---|---|
Mobile Devices | |||
USB Ports | |||
Remote Access | |||
Wi-Fi | |||
HMI Interface | |||
Internet Connections | |||
Outside Contractors | |||
Corporate Networks |
Abbreviations | Full Names |
---|---|
Default-Deny as a standard policy | |
Proactive Protection | |
Integration with SIEM | |
USB Ports | |
Remote Access | |
Internet Connections | |
Outside Contractors |
Structure | Membership | Non-Membership | Multidimensional Variables | Interval-Values |
---|---|---|---|---|
FR | ✓ | ✕ | ✕ | ✕ |
CFR | ✓ | ✕ | ✓ | ✕ |
IVFR | ✓ | ✕ | ✕ | ✓ |
IVCFR | ✓ | ✕ | ✓ | ✓ |
IFR | ✓ | ✓ | ✕ | ✕ |
CIFR | ✓ | ✓ | ✓ | ✕ |
IVIFR | ✓ | ✓ | ✕ | ✓ |
IVCIFR | ✓ | ✓ | ✓ | ✓ |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Nasir, A.; Jan, N.; Gumaei, A.; Khan, S.U.; Albogamy, F.R. Cybersecurity against the Loopholes in Industrial Control Systems Using Interval-Valued Complex Intuitionistic Fuzzy Relations. Appl. Sci. 2021, 11, 7668. https://doi.org/10.3390/app11167668
Nasir A, Jan N, Gumaei A, Khan SU, Albogamy FR. Cybersecurity against the Loopholes in Industrial Control Systems Using Interval-Valued Complex Intuitionistic Fuzzy Relations. Applied Sciences. 2021; 11(16):7668. https://doi.org/10.3390/app11167668
Chicago/Turabian StyleNasir, Abdul, Naeem Jan, Abdu Gumaei, Sami Ullah Khan, and Fahad R. Albogamy. 2021. "Cybersecurity against the Loopholes in Industrial Control Systems Using Interval-Valued Complex Intuitionistic Fuzzy Relations" Applied Sciences 11, no. 16: 7668. https://doi.org/10.3390/app11167668
APA StyleNasir, A., Jan, N., Gumaei, A., Khan, S. U., & Albogamy, F. R. (2021). Cybersecurity against the Loopholes in Industrial Control Systems Using Interval-Valued Complex Intuitionistic Fuzzy Relations. Applied Sciences, 11(16), 7668. https://doi.org/10.3390/app11167668