Artificial Intelligence-Based Cyber Security in the Context of Industry 4.0—A Survey
Abstract
:1. Introduction
2. Theoretical Background
2.1. Artificial Intelligence
2.1.1. Machine Learning
2.1.2. Deep Learning
2.2. Cyber Security
2.3. Industry 4.0
2.4. Cyber-Physical Systems
3. Methodology
Steps of the Search Process
4. Related Works
5. Analysis and Results
5.1. Steps of the Search Process
- Application protocol attacks: attacks that aim, through application protocols, to send false commands at irregular intervals to devices that do not use authentication and encryption mechanisms [67].
- Attacks Against Machine Learning and Data Analytics: attacks that can manipulate the training samples to control the accuracy of the ML model, attacking the availability of the sample data to reduce reliability in the model used, generating malicious behavior that is then identified as legitimate [55].
- Response and Measurement Injection Attacks: attacks that aim to capture network packets to alter the content during transmission from the server to the client. Response injections can be created and transmitted by a third-party device on the network, exploiting a vulnerability in authentication capabilities to legitimize the origin of packets [6,57].
- Escalation Privilege: attacks that aim to bypass authentication and authorization mechanisms on critical devices and services. To establish protection from these attacks, there is a challenge of defining a zone of trust to enforce authentication and authorization for local and/or remote access to production workflows [6,48].
- Phishing and Spear Phishing attacks: attacks that aim to steal data and credentials from systems, using emails, links, and communication scams, mainly from ICS. In the process, people who work for the company are specifically exploited as a vulnerability and are considered the weakest link in the security chain. In this way, the attackers gain access to important data and to the company’s networks. The interconnectivity of the Internet makes it easy for fraudsters to access sensitive information from the production environment [6,67].
- Deception attacks and False Data Injection attacks: attacks that aim to send false information from sensors and controllers, by exploiting the operator’s trust to accept a scenario as true, which could degrade ICS performance. The attacker obtains the secret keys used in the devices or compromises sensors and controllers to launch the attacks [63].
- Poisoning and Evasion attacks: attacks that aim to decrease the prediction and accuracy of the DL algorithm. Evasion attacks target the DL prediction process. In this case, the attacker inserts wrong data into the neural network generating an inappropriate classification result [57].
- DDoS attacks: attacks that can reach all device control services that are connected to the Internet, such as SCADA, Distributed Control Systems (DCS), Open Platform Communications Unified Architecture (OPC) servers, and smart meters [55]. These attacks send a large amount of data to a target device or system, aiming to freeze and stop the service temporarily [20,48,63].
- Advanced Persistent Threat: attacks that use Zero-Day vulnerabilities to steal confidential information, and perform cyber espionage to gain a competitive advantage, such as targeting competing states and companies [48].
- Man-in-the-Middle attacks and Eavesdropping attacks: attacks that aim to spy on traffic between communication devices by routing the communication not directly but through a third party or device. These attacks sabotage key exchange protocols of the control system and an actuator device, change the quality and consistency of the final product causing physical damage to production, and monitor the network to obtain information about network behavior to implement new attacks. Analyzing network traffic allows for impacting the privacy of communication information [41,67].
- Information Modification: attacks that target the AI aspect of robotics, with modifications that affect the AI’s ability to distinguish images and impact the accuracy of performing the intended tasks [52].
5.2. Countermeasures for Cyber Defense
5.3. ML and DL Applied in Industry
- Convolutional Neural Networks (CNN): is a neural network designed to process inputs stored in arrays. Three types of layers make up the CNN architecture: convolution layers, clustering layers, and classification layers [20]. The detection of CNN-based cyber security attacks is divided into single CNN, Multi-CNN, CNN Variants, CNN Acoustic Model, and CNN Limited Weight Sharing [72].
- Deep Autoencoders (DAE): are unsupervised neural networks that learn to encode compressed data, presenting versatility with unsupervised learning. The encoder and decoder are the fundamental components of the autoencoder. DAE is a suitable application for the security of IoT devices, intrusion systems, and sensor fault detection [20,48,72].
- Deep Belief Network (DBN): probabilistic generative model, that works with a combination of supervised and unsupervised multilayer learning networks. DBNs can be classified as (i) Deep Boltzmann Machine (DBM); (ii) Restricted Boltzmann Machine (RBM); and (iii) Deep Restricted Boltzmann Machine (DRBM) [20,57].
- Recurrent Neural Network (RNN): machine learning model adapted from neural networks for learning to map sequential inputs and outputs. RNN can be used for sentiment analysis, with the application for co-communication analysis by intelligence communities. The limitations of RNN are improved with bidirectional RNN application, which uses past and future input data to train the RNN [6,48,72].
- Generative Adversarial Network (GAN): uses unsupervised machine learning with two neural networks. One network plays the role of a generator and the second one plays the role of a discriminator. The generator network receives the input data and produces output data with characteristics like the actual data. The second network receives the real data and data from the first network to try to identify whether the input data is real or fake [20,72].
- Deep Reinforcement Learning (DRL): is the combination of both deep neural networks with reinforcement learning algorithms (e.g., Q-learning, Deep Q-Networks, Policy Gradients). The combination of the two algorithms provides a solution useful in scenarios where the decision-making process is complex and requires a combination of perception, cognition, and action. DRL algorithms are based on experience repetition but use more memory for processing [48,72].
5.4. Advantages and Disadvantages of AI for Cyber Security
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Zhong, R.Y.; Xu, X.; Klotz, E.; Newman, S.T. Intelligent Manufacturing in the Context of Industry 4.0: A Review. Engineering 2017, 3, 616–630. [Google Scholar] [CrossRef]
- Schumacher, A.; Sihn, W.; Erol, S. Automation, digitization and digitalization and their implications for manufacturing processes. In Innovation and Sustainability Conference Bukarest; Elsevier: Amsterdam, The Netherlands, 2016; pp. 1–5. [Google Scholar]
- Matt, D.T.; Modrák, V.; Zsifkovits, H. Industry 4.0 for SMEs: Challenges, Opportunities and Requirements; Springer: Cham, Switzerland, 2020. [Google Scholar]
- Wu, D.; Ren, A.; Zhang, W.; Fan, F.; Liu, P.; Fu, X.; Terpenny, J. Cybersecurity for digital manufacturing. J. Manuf. Syst. 2018, 48, 3–12. [Google Scholar] [CrossRef]
- Corallo, A.; Lazoi, M.; Lezzi, M. Cybersecurity in the context of industry 4.0: A structured classification of critical assets and business impacts. Comput. Ind. 2020, 114, 103165. [Google Scholar] [CrossRef]
- Kaloudi, N.; Jingyue, L.I. The AI-based cyber threat landscape: A survey. ACM Comput. Surv. 2020, 53, 20. [Google Scholar] [CrossRef]
- Matsuda, W.; Fujimoto, M.; Aoyama, T.; Mitsunaga, T. Cyber Security Risk Assessment on Industry 4.0 using ICS testbed with AI and Cloud. In Proceedings of the 2019 IEEE Conference on Application, Information and Network Security, AINS, Penang, Malaysia, 19–21 November 2019; pp. 54–59. [Google Scholar]
- Angelopoulos, A.; Michailidis, E.T.; Nomikos, N.; Trakadas, P.; Hatziefremidis, A.; Voliotis, S.; Zahariadis, T. Tackling Faults in the Industry 4.0 Era-A Survey of Machine-Learning Solutions and Key Aspects. Sensors 2020, 20, 109. [Google Scholar] [CrossRef]
- Li, J. hua: Cyber security meets artificial intelligence: A survey. Front. Inf. Technol. Electron. Eng. 2018, 19, 1462–1474. [Google Scholar] [CrossRef]
- Ji, H.; Alfarraj, O.; Tolba, A. Artificial Intelligence-Empowered Edge of Vehicles: Architecture, Enabling Technologies, and Applications. IEEE Access 2020, 8, 61020–61034. [Google Scholar] [CrossRef]
- Trifonov, R.; Nakov, O.; Mladenov, V. Artificial intelligence in cyber threats intelligence. In Proceedings of the 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC), Plaine Magnien, Mauritius, 6–7 December 2018; pp. 1–4. [Google Scholar]
- Brundage, M.; Avin, S.; Clark, J.; Toner, H.; Eckersley, P.; Garfinkel, B.; Dafoe, A.; Scharre, P.; Zeitzoff, T.; Filar, B.; et al. The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation. arXiv 2018, arXiv:1802.07228. [Google Scholar]
- Monostori, L.; Kádár, B.; Bauernhansl, T.; Kondoh, S.; Kumara, S.; Reinhart, G.; Sauer, O.; Schuh, G.; Sihn, W.; Ueda, K. Cyber-physical systems in manufacturing. CIRP Ann. 2016, 65, 621–641. [Google Scholar] [CrossRef]
- Novikov, I. How AI can be applied to cyberattacks. Retrieved Novemb. 2018, 25, 2019. [Google Scholar]
- Mubarakova, S.R.; Amanzholova, S.T.; Uskenbayeva, R.K. Using Machine Learning Methods in Cybersecurity. Eurasian J. Math. Comput. Appl. 2022, 10, 69–78. [Google Scholar] [CrossRef]
- Batta, M. Machine Learning Algorithms—A Review. Int. J. Sci. Res. 2020, 9, 381. [Google Scholar] [CrossRef]
- Nguyen, T.T.; Reddi, V.J. Deep Reinforcement Learning for Cyber Security. IEEE Trans. Neural Netw. Learn. Syst. 2021, 1–17. [Google Scholar] [CrossRef] [PubMed]
- Wuest, T.; Weimer, D.; Irgens, C.; Thoben, K.D. Machine learning in manufacturing: Advantages, challenges, and applications. Prod. Manuf. Res. 2016, 4, 23–45. [Google Scholar] [CrossRef]
- Xin, Y.; Kong, L.; Liu, Z.; Chen, Y.; Li, Y.; Zhu, H.; Gao, M.; Hou, H.; Wang, C. Machine Learning and Deep Learning Methods for Cybersecurity. IEEE Access 2018, 6, 35365–35381. [Google Scholar] [CrossRef]
- Berman, D.S.; Buczak, A.L.; Chavis, J.S.; Corbett, C.L. A survey of deep learning methods for cyber security. Information 2019, 10, 122. [Google Scholar] [CrossRef]
- Wu, M.; Song, Z.; Moon, Y.B. Detecting cyber-physical attacks in CyberManufacturing systems with machine learning methods. J. Intell. Manuf. 2019, 30, 1111–1123. [Google Scholar] [CrossRef]
- Alkahtani, H.; Aldhyani, T.H.H. Artificial Intelligence Algorithms for Malware Detection in Android-Operated Mobile Devices. Sensors 2022, 22, 2268. [Google Scholar] [CrossRef]
- Kotsiopoulos, T.; Sarigiannidis, P.; Ioannidis, D.; Tzovaras, D. Machine Learning and Deep Learning in smart manufacturing: The Smart Grid paradigm. Comput. Sci. Rev. 2021, 40, 100341. [Google Scholar] [CrossRef]
- Avdoshin, S.M.; Lazarenko, A.B.; Chichileva, N.I.; Naumov, P.A.; Klyucharev, P.G. Machine Learning Use Cases in Cybersecurity. Proc. Inst. Syst. Program. RAS 2019, 31, 191–202. [Google Scholar] [CrossRef]
- Wang, J.; Ma, Y.; Zhang, L.; Gao, R.X.; Wu, D. Deep learning for smart manufacturing: Methods and applications. J. Manuf. Syst. 2018, 48, 144–156. [Google Scholar] [CrossRef]
- Huang, T.H.; De Kao, H.Y. R2-D2: ColoR-inspired Convolutional NeuRal Network (CNN)-based AndroiD Malware Detections. In Proceedings of the 2018 IEEE International Conference on Big Data, Seattle, WA, USA, 10–13 December 2018; pp. 2633–2642. [Google Scholar] [CrossRef]
- Husák, M.; Bartoš, V.; Sokol, P.; Gajdoš, A. Predictive methods in cyber defense: Current experience and research challenges. Future Gener. Comput. Syst. 2021, 115, 517–530. [Google Scholar] [CrossRef]
- Guan, Y.; Ge, X. Distributed attack detection and secure estimation of networked cyber-physical systems against false data injection attacks and jamming attacks. IEEE Trans. Signal Inf. Process. Netw. 2017, 4, 48–59. [Google Scholar] [CrossRef]
- Schumacher, A.; Erol, S.; Sihn, W. A Maturity Model for Assessing Industry 4.0 Readiness and Maturity of Manufacturing Enterprises. Procedia CIRP 2016, 52, 161–166. [Google Scholar] [CrossRef]
- Mirani, A.A.; Velasco-Hernandez, G.; Awasthi, A.; Walsh, J. Key Challenges and Emerging Technologies in Industrial IoT Architectures: A Review. Sensors 2022, 22, 5836. [Google Scholar] [CrossRef]
- Zhang, Z.; Ning, H.; Shi, F.; Farha, F.; Xu, Y.; Xu, J.; Zhang, F.; Choo, K.K.R. Artificial intelligence in cyber security: Research advances, challenges, and opportunities. Artif. Intell. Rev. 2022, 55, 1029–1053. [Google Scholar] [CrossRef]
- WEF. The Global Risks Report 2021, 16th ed.; World Economic Forum: Geneva, Switzerland, 2021. [Google Scholar]
- Ervural, B.C.; Ervural, B. Overview of Cyber Security in the Industry 4.0 Era. In Industry 4.0: Managing the Digital Transformation; Springer: Berlin/Heidelberg, Germany, 2018; pp. 267–284. [Google Scholar] [CrossRef]
- World Economic Forum. Cyber Information Sharing: Building Collective Security; World Economic Forum: Geneva, Switzerland, 2020; Volume 26. [Google Scholar]
- Jamai, I.; Ben Azzouz, L.; Saïdane, L.A. Security issues in Industry 4.0. In Proceedings of the 2020 International Wireless Communications and Mobile Computing (IWCMC), Limassol, Cyprus, 15–19 June 2020; pp. 481–488. [Google Scholar] [CrossRef]
- Liu, Y.; Xu, X. Industry 4.0 and cloud manufacturing: A comparative analysis. J. Manuf. Sci. Eng. Trans. ASME 2017, 139, 1–8. [Google Scholar] [CrossRef]
- Schuh, G.G.; Anderl, R.; Gausemeier, J.J.; ten Hompel, M.M.; Wahlster, W. Industrie 4.0 Maturity Index. Managing the Digital Transformation of Companies; Ander, L., Gausemeier, J.J., ten Hompel, M.M., Wahlster, W., Eds.; Acatech Study; Herbert Utz Verlag: München, Germany, 2020; p. 64. [Google Scholar]
- Bousdekis, A.; Apostolou, D.; Mentzas, G. A human cyber physical system framework for operator 4.0—Artificial intelligence symbiosis. Manuf. Lett. 2020, 25, 10–15. [Google Scholar] [CrossRef]
- Chen, H.; Li, L.; Chen, Y. Explore success factors that impact artificial intelligence adoption on telecom industry in China. J. Manag. Anal. 2021, 8, 36–68. [Google Scholar] [CrossRef]
- Ribeiro, J.; Lima, R.; Eckhardt, T.; Paiva, S. Robotic Process Automation and Artificial Intelligence in Industry 4.0—A Literature review. Procedia Comput. Sci. 2021, 181, 51–58. [Google Scholar] [CrossRef]
- Tuptuk, N.; Hailes, S. Security of smart manufacturing systems. J. Manuf. Syst. 2018, 47, 93–106. [Google Scholar] [CrossRef]
- Kagermann, H.; Wahlster, W.; Helbig, J. Securing the Future of German Manufacturing Industry: Recommendations for Implementing the Strategic Initiative INDUSTRIE 4.0; Final Report of the Industrie 4.0 Working Group: München, Germany, 2013; pp. 1–84. [Google Scholar]
- Ashibani, Y.; Mahmoud, Q.H. Cyber physical systems security: Analysis, challenges and solutions. Comput. Secur. 2017, 68, 81–97. [Google Scholar] [CrossRef]
- Nogueira, I.B.R.; Ribeiro, A.M.; Requião, R.; Pontes, K.V.; Koivisto, H.; Rodrigues, A.E.; Loureiro, J.M. A quasi-virtual online analyser based on an artificial neural networks and offline measurements to predict purities of raffinate/extract in simulated moving bed processes. Appl. Soft Comput. J. 2018, 67, 29–47. [Google Scholar] [CrossRef]
- Humayed, A.; Lin, J.; Li, F.; Luo, B. Cyber-Physical Systems Security—A Survey. IEEE Internet Things J. 2017, 4, 1802–1831. [Google Scholar] [CrossRef]
- Lee, J.; Davari, H.; Singh, J.; Pandhare, V. Industrial Artificial Intelligence for industry 4.0-based manufacturing systems. Manuf. Lett. 2018, 18, 20–23. [Google Scholar] [CrossRef]
- Moher, D.; Moher, D.; Liberati, A.; Tetzlaff, J.; Altman, D.G.; The PRISMA Group. Preferred Reporting Items for Systematic Reviews and Meta-Analyses: The PRISMA Statement. PLoS Med. 2009, 6, e1000097. [Google Scholar] [CrossRef] [PubMed]
- Abdullahi, M.; Baashar, Y.; Alhussian, H.; Alwadain, A.; Aziz, N.; Capretz, L.F.; Abdulkadir, S.J. Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review. Electronics 2022, 11, 198. [Google Scholar] [CrossRef]
- Ahamad, B.; Khan, M.A.; Khan, J.; Alghamdi, A.A. Cybersecurity Challenges and Threats in Adoption of Industry 4.0: A Disscussion over Integration of Blockchain. Int. J. Early Child. Spec. Educ. 2022, 14, 3616–3623. [Google Scholar] [CrossRef]
- Alohali, M.A.; Al-Wesabi, F.N.; Hilal, A.M.; Goel, S.; Gupta, D.; Khanna, A. Artificial intelligence enabled intrusion detection systems for cognitive cyber-physical systems in industry 4.0 environment. Cogn. Neurodyn. 2022, 16, 1045–1057. [Google Scholar] [CrossRef]
- Barton, M.; Budjac, R.; Tanuska, P.; Gaspar, G.; Schreiber, P. Identification Overview of Industry 4.0 Essential Attributes and Resource-Limited Embedded Artificial-Intelligence-of-Things Devices for Small and Medium-Sized Enterprises. Appl. Sci. 2022, 12, 5672. [Google Scholar] [CrossRef]
- Blanco-Medina, P.; Fidalgo, E.; Alegre, E.; Vasco-Carofilis, R.A.; Jañez-Martino, F.; Villar, V.F. Detecting vulnerabilities in critical infrastructures by classifying exposed industrial control systems using deep learning. Appl. Sci. 2021, 11, 367. [Google Scholar] [CrossRef]
- Chang, V.; Doan, L.M.T.; Di Stefano, A.; Sun, Z.; Fortino, G. Digital payment fraud detection methods in digital ages and Industry 4.0. Comput. Electr. Eng. 2022, 100, 107734. [Google Scholar] [CrossRef]
- Chen, K.C.; Lin, S.C.; Hsiao, J.H.; Liu, C.H.; Molisch, A.F.; Fettweis, G.P. Wireless Networked Multirobot Systems in Smart Factories. Proc. IEEE 2021, 109, 468–494. [Google Scholar] [CrossRef]
- Elsisi, M.; Tran, M.Q.; Mahmoud, K.; Mansour, D.E.A.; Lehtonen, M.; Darwish, M.M.F. Towards Secured Online Monitoring for Digitalized GIS against Cyber-Attacks Based on IoT and Machine Learning. IEEE Access 2021, 9, 78415–78427. [Google Scholar] [CrossRef]
- Khaled, A.; Ouchani, S.; Tari, Z.; Drira, K. Assessing the severity of smart attacks in industrial cyber-physical systems. ACM Trans. Cyber-Phys. Syst. 2021, 5, 10. [Google Scholar] [CrossRef]
- Laghari, S.U.A.; Manickam, S.; Al-Ani, A.K.; Rehman, S.U.; Karuppayah, S. SECS/GEMsec: A Mechanism for Detection and Prevention of Cyber-Attacks on SECS/GEM Communications in Industry 4.0 Landscape. IEEE Access 2021, 9, 154380–154394. [Google Scholar] [CrossRef]
- Le, D.D.; Pham, V.; Nguyen, H.N.; Dang, T. Visualization and explainable machine learning for efficient manufacturing and system operations. Smart Sustain. Manuf. Syst. 2019, 3, 127–147. [Google Scholar] [CrossRef]
- Mahesh, P.; Tiwari, A.; Jin, C.; Kumar, P.R.; Reddy, A.L.N.; Bukkapatanam, S.T.S.; Gupta, N.; Karri, R. A Survey of Cybersecurity of Digital Manufacturing. Proc. IEEE 2021, 109, 495–516. [Google Scholar] [CrossRef]
- Mendonça, R.V.; Silva, J.C.; Rosa, R.L.; Saadi, M.; Rodriguez, D.Z.; Farouk, A. A lightweight intelligent intrusion detection system for industrial internet of things using deep learning algorithms. Expert Syst. 2022, 39, e12917. [Google Scholar] [CrossRef]
- Mpatziakas, A.; Drosou, A.; Papadopoulos, S.; Tzovaras, D. IoT threat mitigation engine empowered by artificial intelligence multi-objective optimization. J. Netw. Comput. Appl. 2022, 203, 103398. [Google Scholar] [CrossRef]
- Mudassir, M.; Unal, D.; Hammoudeh, M.; Azzedin, F. Detection of Botnet Attacks against Industrial IoT Systems by Multilayer Deep Learning Approaches. Wirel. Commun. Mob. Comput. 2022, 2022, 2845446. [Google Scholar] [CrossRef]
- Saghezchi, F.B.; Mantas, G.; Violas, M.A.; de Oliveira Duarte, A.M.; Rodriguez, J. Machine learning for DDoS attack detection in industry 4.0 CPPSs. Electronics 2022, 11, 602. [Google Scholar] [CrossRef]
- Saleem, K.; Alabduljabbar, G.; Alrowais, N.; Al-Muhtadi, J.; Imran, M.; Rodrigues, J.J.P.C. Bio-Inspired Network Security for 5G-enabled IoT Applications. IEEE Access 2020, 8, 229152–229160. [Google Scholar] [CrossRef]
- Singh, N.; Krishnaswamy, V.; Zhang, J.Z. Intellectual structure of cybersecurity research in enterprise information systems. Enterp. Inf. Syst. 2022, 1–25. [Google Scholar] [CrossRef]
- Tamy, S.; Belhadaoui, H.; Rabbah, N.; Rifi, M. Cyber security-based machine learning algorithms applied to industry 4.0 application case: Development of network intrusion detection system using hybrid method. J. Theor. Appl. Inf. Technol. 2020, 98, 2078–2091. [Google Scholar]
- Szymanski, T.H. The “Cyber Security via Determinism” Paradigm for a Quantum Safe Zero Trust Deterministic Internet of Things (IoT). IEEE Access 2022, 10, 45893–45930. [Google Scholar] [CrossRef]
- Tange, K.; De Donno, M.; Fafoutis, X.; Dragoni, N. A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities. IEEE Commun. Surv. Tutor. 2020, 22, 2489–2520. [Google Scholar] [CrossRef]
- Torbacki, W. A hybrid mcdm model combining danp and promethee ii methods for the assessment of cybersecurity in industry 4.0. Sustainability 2021, 13, 8833. [Google Scholar] [CrossRef]
- Tran, M.Q.; Elsisi, M.; Mahmoud, K.; Liu, M.K.; Lehtonen, M.; Darwish, M.M.F. Experimental Setup for Online Fault Diagnosis of Induction Machines via Promising IoT and Machine Learning: Towards Industry 4.0 Empowerment. IEEE Access 2021, 9, 115429–115441. [Google Scholar] [CrossRef]
- Yang, H.; Zhan, K.; Kadoch, M.; Liang, Y.; Cheriet, M. BLCS: Brain-Like Distributed Control Security in Cyber Physical Systems. IEEE Netw. 2020, 34, 8–15. [Google Scholar] [CrossRef]
- Aouedi, O.; Piamrat, K.; Muller, G.; Singh, K. Federated Semi-Supervised Learning for Attack Detection in Industrial Internet of Things. IEEE Trans. Ind. Inform. 2022, 19, 286–295. [Google Scholar] [CrossRef]
- Trung, N.D.; Huy, D.T.N.; Huong, L.T.T.; Van Thanh, T.; Thanh, N.T.P.; Dung, N.T. Digital Transformation, AI Applications and IoTs in Blockchain Managing Commerce Secrets: And Cybersecurity Risk Solutions in the Era of Industry 4.0 and Further. Webology 2021, 18, 453–465. [Google Scholar] [CrossRef]
- Haleem, A.; Javaid, M.; Singh, R.P.; Rab, S.; Suman, R. Perspectives of cybersecurity for ameliorative Industry 4.0 era: A review-based framework. Ind. Robot Int. J. Robot. Res. Appl. 2022, 49, 582–597. [Google Scholar] [CrossRef]
Query | Web of Science | Scopus |
---|---|---|
(“Artificial Intelligence” AND “Cyber Security” AND “Industry 4.0”) | 18 | 22 |
(“Artificial Intelligence” AND “Cybersecurity” AND “Industry 4.0”) | 35 | 35 |
(“Machine Learning” AND “Cyber Security” AND “Industry 4.0”) | 8 | 13 |
(“Machine Learning” AND “Cybersecurity” AND “Industry 4.0”) | 27 | 34 |
(“Deep Learning” AND “Cyber Security” AND “Industry 4.0”) | 3 | 4 |
(“Deep Learning” AND “Cybersecurity” AND “Industry 4.0”) | 10 | 10 |
Sub-total | 101 | 118 |
219 | ||
Repeated | 81 | |
Total | 138 |
No. | Article Title | Reference/Year |
---|---|---|
1 | Detecting Cybersecurity Attacks in the Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review | [48] 2022 |
2 | Cybersecurity Challenges and Threats in Adoption of Industry 4.0: A Discussion Over Integration of Blockchain | [49] 2022 |
3 | Artificial intelligence-enabled intrusion detection systems for cognitive cyber-physical systems in the industry 4.0 environment | [50] 2022 |
4 | Identification Overview of Industry 4.0 Essential Attributes and Resource-Limited Embedded Artificial-Intelligence-of-Things Devices for Small and Medium-Sized Enterprises | [51] 2022 |
5 | Detecting vulnerabilities in critical infrastructures by classifying exposed industrial control systems using deep learning | [52] 2021 |
6 | Digital payment fraud detection methods in digital ages and Industry 4.0 | [53] 2022 |
7 | Wireless Networked Multirobot Systems in Smart Factories | [54] 2021 |
8 | Towards Secured Online Monitoring for Digitalized GIS against Cyber-Attacks Based on IoT and Machine Learning | [55] 2021 |
9 | Assessing the severity of smart attacks in industrial cyber-physical systems | [56] 2021 |
10 | SECS/GEMsec: A Mechanism for Detection and Prevention of Cyber-Attacks on SECS/GEM Communications in Industry 4.0 Landscape | [57] 2021 |
11 | Visualization and explainable machine learning for efficient manufacturing and system operations | [58] 2019 |
12 | A Survey of Cybersecurity of Digital Manufacturing | [59] 2021 |
13 | A lightweight intelligent intrusion detection system for the industrial Internet of Things using deep learning algorithms | [60] 2022 |
14 | IoT threat mitigation engine empowered by artificial intelligence multi-objective optimization | [61] 2022 |
15 | Detection of Botnet Attacks against Industrial IoT Systems by Multilayer Deep Learning Approaches | [62] 2022 |
16 | Machine learning for DDoS attack detection in industry 4.0 CPPSs | [63] 2022 |
17 | Bio-Inspired Network Security for 5G-enabled IoT Applications | [64] 2020 |
18 | Intellectual structure of cybersecurity research in enterprise information systems | [65] 2022 |
19 | Cyber security-based machine learning algorithms applied to industry 4.0 application case: Development of network intrusion detection system using a hybrid method | [66] 2020 |
20 | The ‘Cyber Security via Determinism’ Paradigm for a Quantum-Safe Zero Trust Deterministic Internet of Things (IoT) | [67] 2022 |
21 | A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities | [68] 2020 |
22 | A hybrid MCDM model combining Demp and Promethee ii methods for the assessment of cybersecurity in Industry 4.0 | [69] 2021 |
23 | Experimental Setup for Online Fault Diagnosis of Induction Machines via Promising IoT and Machine Learning: Towards Industry 4.0 Empowerment | [70] 2021 |
24 | BLCS: Brain-Like Distributed Control Security in Cyber-Physical Systems | [71] 2020 |
25 | Federated Semi-Supervised Learning for Attack Detection in Industrial Internet of Things | [72] 2022 |
26 | Digital Transformation, AI Applications, and IoTs in Blockchain Managing Commerce Secrets: And Cybersecurity Risk Solutions in the Era of Industry 4.0 and further | [73] 2021 |
27 | Perspectives of cybersecurity for ameliorative Industry 4.0 era: a review-based framework | [74] 2022 |
Targets | Attacks |
---|---|
Sensors, actuators, robots, and field devices | Application protocol attacks, Response and Measurement Injection Attacks, Time delay attacks |
Industrial control systems (ICS) | Spoofing attacks, False sequential logic attacks, Deception attacks and False Data Injection attacks, DDoS attacks, Zero-Day attacks, Phishing and Spear Phishing attacks, Ransomware |
Cyber-physical systems (CPS) | Attacks Against Machine Learning and Data Analytics, Poisoning and Evasion attacks, Advanced Persistent Threats, Man-in-the-Middle attacks, Eavesdropping attacks, and Information Modification |
Advantages | Disadvantages |
---|---|
It can process a large volume of data | More data collection leads to privacy and protection issues |
Automate the creation of algorithms to detect cyber security | Hackers can use AI to launch complex and large-scale attacks |
Enabled cyber security solutions can detect any changes that arise to eliminate the risks | It can help hackers effectively find and exploit vulnerabilities |
Monitoring of information technology infrastructure to detect malicious entities and attempted network breach | These methods could be used by repressive countries and governments to track their adversaries |
Allows cyber security researchers to work on developing algorithms or explore emerging threats | It can be misused for personal privacy monitoring, tracking, and other violations |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
de Azambuja, A.J.G.; Plesker, C.; Schützer, K.; Anderl, R.; Schleich, B.; Almeida, V.R. Artificial Intelligence-Based Cyber Security in the Context of Industry 4.0—A Survey. Electronics 2023, 12, 1920. https://doi.org/10.3390/electronics12081920
de Azambuja AJG, Plesker C, Schützer K, Anderl R, Schleich B, Almeida VR. Artificial Intelligence-Based Cyber Security in the Context of Industry 4.0—A Survey. Electronics. 2023; 12(8):1920. https://doi.org/10.3390/electronics12081920
Chicago/Turabian Stylede Azambuja, Antonio João Gonçalves, Christian Plesker, Klaus Schützer, Reiner Anderl, Benjamin Schleich, and Vilson Rosa Almeida. 2023. "Artificial Intelligence-Based Cyber Security in the Context of Industry 4.0—A Survey" Electronics 12, no. 8: 1920. https://doi.org/10.3390/electronics12081920
APA Stylede Azambuja, A. J. G., Plesker, C., Schützer, K., Anderl, R., Schleich, B., & Almeida, V. R. (2023). Artificial Intelligence-Based Cyber Security in the Context of Industry 4.0—A Survey. Electronics, 12(8), 1920. https://doi.org/10.3390/electronics12081920