2018
DOI: 10.1109/access.2018.2844794
|View full text |Cite
|
Sign up to set email alerts
|

A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
60
0
2

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 125 publications
(75 citation statements)
references
References 37 publications
0
60
0
2
Order By: Relevance
“…More specifically, threat intelligence enables efficient event and network traffic monitoring and analysis, using a signature-based method exploiting a predefined blacklist of existing attack signatures, an anomaly-based method taking advantage of profiles of normal events to recognize attacks or a hybrid technique, where an anomaly generally defines something that visibly deviates from the norm/standard and can be identified by analysing the sensed data or traffic patterns. In Reference [81], a novel threat intelligence scheme based on beta mixture-hidden Markov models (MHMMs) was proposed that intends to model the dynamic interactions of Industry 4.0 subsystems and discover known and unknown attacks, while surpassing existing signature-and anomaly-based methods. In this scheme, Industry 4.0 key elements, that is, CPS and IoT, interact and two principal components are included; a smart management module, handling the heterogeneous data sources of sensors, actuators and network nodes and a threat intelligence module monitoring and indicating abnormal activities and cyber-attacks in the physical and network domains.…”
Section: Security and Threat Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…More specifically, threat intelligence enables efficient event and network traffic monitoring and analysis, using a signature-based method exploiting a predefined blacklist of existing attack signatures, an anomaly-based method taking advantage of profiles of normal events to recognize attacks or a hybrid technique, where an anomaly generally defines something that visibly deviates from the norm/standard and can be identified by analysing the sensed data or traffic patterns. In Reference [81], a novel threat intelligence scheme based on beta mixture-hidden Markov models (MHMMs) was proposed that intends to model the dynamic interactions of Industry 4.0 subsystems and discover known and unknown attacks, while surpassing existing signature-and anomaly-based methods. In this scheme, Industry 4.0 key elements, that is, CPS and IoT, interact and two principal components are included; a smart management module, handling the heterogeneous data sources of sensors, actuators and network nodes and a threat intelligence module monitoring and indicating abnormal activities and cyber-attacks in the physical and network domains.…”
Section: Security and Threat Detectionmentioning
confidence: 99%
“…Moustafa et al, 2018 [81] Monitoring and detection of cyber-attacks in Industry 4.0 MHMM Wu et al, 2019 [87] Detection of cyber-physical attacks in 3-D printing processes KNN, RandF, and anomaly detection Park et al, 2018 [88] Detection of anomalies in multi-variety production systems DNN Keliris et al, 2016 [89] Detection of abnormalities and malicious activities SVM…”
Section: Target Of Security Mechanisms ML Solutionmentioning
confidence: 99%
“…", are still at the initial stage. However, many of these publications are devoted to the problems of processing big data that are collected during the operation of such systems [19][20][21][22][23][24][25].…”
Section: Resultsmentioning
confidence: 99%
“…The detection rates for the attack types Analysis, Backdoor, DoS, Exploits, Fuzzer, Generic, Normal, Reconnaissance, Shellcode and Worms are 83.3%, 91.8%, 95.1%, 96%, 60%, 99.5%, 98.9%, 96.8%, 81.1% and 76% respectively. Moustafa et al [38] proposed a new threat intelligence scheme. It models the dynamic interactions of industry 4.0 component including physical and network systems.…”
Section: International Journal Of Engineering and Advanced Technologymentioning
confidence: 99%