A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems
Industry 4.0 represents the fourth phase of industry and manufacturing revolution, unique in that it provides Internet-connected smart systems, including automated factories, organizations, development on demand, and `just-in-time' development. Industry 4.0 includes the integration of cyber-phy...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2018-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8374422/ |
id |
doaj-1e5be2e0dfca489f95ce41d30ca90a20 |
---|---|
record_format |
Article |
spelling |
doaj-1e5be2e0dfca489f95ce41d30ca90a202021-03-29T21:07:40ZengIEEEIEEE Access2169-35362018-01-016329103292410.1109/ACCESS.2018.28447948374422A New Threat Intelligence Scheme for Safeguarding Industry 4.0 SystemsNour Moustafa0Erwin Adi1Benjamin Turnbull2Jiankun Hu3https://orcid.org/0000-0003-0230-1432School of Engineering and Information Technology, University of New South Wales at ADFA, Canberra, ACT, AustraliaSchool of Engineering and Information Technology, University of New South Wales at ADFA, Canberra, ACT, AustraliaSchool of Engineering and Information Technology, University of New South Wales at ADFA, Canberra, ACT, AustraliaSchool of Engineering and Information Technology, University of New South Wales at ADFA, Canberra, ACT, AustraliaIndustry 4.0 represents the fourth phase of industry and manufacturing revolution, unique in that it provides Internet-connected smart systems, including automated factories, organizations, development on demand, and `just-in-time' development. Industry 4.0 includes the integration of cyber-physical systems (CPSs), Internet of Things (IoT), cloud and fog computing paradigms for developing smart systems, smart homes, and smart cities. Given Industry 4.0 is comprised sensor fields, actuators, fog and cloud processing paradigms, and network systems, designing a secure architecture faces two major challenges: handling heterogeneous sources at scale and maintaining security over a large, disparate, data-driven system that interacts with the physical environment. This paper addresses these challenges by proposing a new threat intelligence scheme that models the dynamic interactions of industry 4.0 components including physical and network systems. The scheme consists of two components: a smart management module and a threat intelligence module. The smart data management module handles heterogeneous data sources, one of the foundational requirements for interacting with an Industry 4.0 system. This includes data to and from sensors, actuators, in addition to other forms of network traffic. The proposed threat intelligence technique is designed based on beta mixture-hidden Markov models (MHMMs) for discovering anomalous activities against both physical and network systems. The scheme is evaluated on two well-known datasets: the CPS dataset of sensors and actuators and the UNSW-NB15 dataset of network traffic. The results reveal that the proposed technique outperforms five peer mechanisms, suggesting its effectiveness as a viable deployment methodology in real-Industry 4.0 systems.https://ieeexplore.ieee.org/document/8374422/Industry 4.0threat intelligencecyber-attackscyber-physical systems (CPS)Internet of Things (IoT)cloud |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Nour Moustafa Erwin Adi Benjamin Turnbull Jiankun Hu |
spellingShingle |
Nour Moustafa Erwin Adi Benjamin Turnbull Jiankun Hu A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems IEEE Access Industry 4.0 threat intelligence cyber-attacks cyber-physical systems (CPS) Internet of Things (IoT) cloud |
author_facet |
Nour Moustafa Erwin Adi Benjamin Turnbull Jiankun Hu |
author_sort |
Nour Moustafa |
title |
A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems |
title_short |
A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems |
title_full |
A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems |
title_fullStr |
A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems |
title_full_unstemmed |
A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems |
title_sort |
new threat intelligence scheme for safeguarding industry 4.0 systems |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2018-01-01 |
description |
Industry 4.0 represents the fourth phase of industry and manufacturing revolution, unique in that it provides Internet-connected smart systems, including automated factories, organizations, development on demand, and `just-in-time' development. Industry 4.0 includes the integration of cyber-physical systems (CPSs), Internet of Things (IoT), cloud and fog computing paradigms for developing smart systems, smart homes, and smart cities. Given Industry 4.0 is comprised sensor fields, actuators, fog and cloud processing paradigms, and network systems, designing a secure architecture faces two major challenges: handling heterogeneous sources at scale and maintaining security over a large, disparate, data-driven system that interacts with the physical environment. This paper addresses these challenges by proposing a new threat intelligence scheme that models the dynamic interactions of industry 4.0 components including physical and network systems. The scheme consists of two components: a smart management module and a threat intelligence module. The smart data management module handles heterogeneous data sources, one of the foundational requirements for interacting with an Industry 4.0 system. This includes data to and from sensors, actuators, in addition to other forms of network traffic. The proposed threat intelligence technique is designed based on beta mixture-hidden Markov models (MHMMs) for discovering anomalous activities against both physical and network systems. The scheme is evaluated on two well-known datasets: the CPS dataset of sensors and actuators and the UNSW-NB15 dataset of network traffic. The results reveal that the proposed technique outperforms five peer mechanisms, suggesting its effectiveness as a viable deployment methodology in real-Industry 4.0 systems. |
topic |
Industry 4.0 threat intelligence cyber-attacks cyber-physical systems (CPS) Internet of Things (IoT) cloud |
url |
https://ieeexplore.ieee.org/document/8374422/ |
work_keys_str_mv |
AT nourmoustafa anewthreatintelligenceschemeforsafeguardingindustry40systems AT erwinadi anewthreatintelligenceschemeforsafeguardingindustry40systems AT benjaminturnbull anewthreatintelligenceschemeforsafeguardingindustry40systems AT jiankunhu anewthreatintelligenceschemeforsafeguardingindustry40systems AT nourmoustafa newthreatintelligenceschemeforsafeguardingindustry40systems AT erwinadi newthreatintelligenceschemeforsafeguardingindustry40systems AT benjaminturnbull newthreatintelligenceschemeforsafeguardingindustry40systems AT jiankunhu newthreatintelligenceschemeforsafeguardingindustry40systems |
_version_ |
1724193482181967872 |