Artificial Intelligence-Based Cyber Security in Industry 4.0: Comparison
Please note this is a comparison between Version 2 by Catherine Yang and Version 3 by Catherine Yang.

The increase in cyber-attacks impacts the performance of organizations in the industrial sector, exploiting the vulnerabilities of networked machines. The increasing digitization and technologies present in the context of Industry 4.0 have led to a rise in investments in innovation and automation. However, there are risks associated with this digital transformation, particularly regarding cyber security. Targeted cyber-attacks are constantly changing and improving their attack strategies, with a focus on applying artificial intelligence in the execution process. Artificial Intelligence-based cyber-attacks can be used in conjunction with conventional technologies, generating exponential damage in organizations in Industry 4.0. The increasing reliance on networked information technology has increased the cyber-attack surface. 

  • artificial intelligence
  • cyber security
  • industry 4.0
  • machine learning
  • deep learning

1. Introduction

The fourth industrial revolution, known as Industry 4.0, aims to establish an industrial environment for real-time manufacturing ecosystems, smart factories, and autonomous systems. Industry 4.0-related projects use information technologies such as cyber-physical systems (CPS), the Internet of Things (IoT), cloud computing, automation, big data, and artificial intelligence (AI). These projects are being implemented as a response to increased competitiveness and the need to deal with digital transformation [1].
The technological advance of Industry 4.0 has enabled the application of a wide range of technologies related to digitization, connectivity, and automation. The digital transformation present in Industry 4.0 provides an exponential increase in the volume of data in cyberspace [2]. The potential of Industry 4.0 is becoming a reality. However, it requires companies to have a methodological framework to deal with the new concepts of digitization and the interconnection of machines to increase competitiveness.
The complexity of the CPS network poses risks, especially in terms of cyber security [3]. The digitization of operational processes and business models that depend on information technologies brings with it increased exposure to possible cyber-attacks [4]. Cyber security has become a priority on the agenda of the leadership of public and private organizations [5]. Mainly due to the cyber-attacks already carried out, such as Black Energy in Ukraine (2007), Stuxnet (2010), Havex (A remote access trojan, capable of harvesting data from industrial control systems, 2014), SolarWinds (2020), Colonial Pipeline (2021), and Pilz (a German manufacturer of industrial automation and safety products, 2021).
Cyber-attacks vary their methods and attack strategies to increase their attack capability with a focus on the application of AI technologies. The malicious use of AI has changed the scenario of potential threats in the cyber environment [6]. Manufacturing devices connected to a network, through the Internet, offer a greater surface for cyber-attacks. Attackers exploit the attack intelligence to enhance the reach of their actions. They eliminate the geographic boundaries of their targets and minimize the evidence of their malicious activities [7].
Therefore, knowledge about cybercrime trends becomes essential to conduct effective defense actions. Technological evolution demands up-to-date studies to defend against AI being used as a malicious tool by cyber criminals. In this sense, this research aims to fill this gap. The objective of this paper is to present systematic literature research to identify publications on AI-based cyber-attacks in the literature and analyze them for their applicability to cyber security in Industry 4.0. The analysis intends to provide the research community with insights to structure defenses against potential future threats from the use of AI.

2. Artificial Intelligence

AI dates to the 1950s and recent AI technological advances have impacted growth in innovation and automation in manufacturing. Despite the inherent benefits of AI technologies, the use of these techniques has sparked debates about their use in malicious ways [8]. AI is a field of computer science that develops theories, methods, techniques, and systems to simulate and expand human intellect into machines [9]. The goal of AI is to endow machines with human intelligence. Machine learning is a method to implement AI using algorithms to analyze and learn from data. Deep learning is a technology used in the process of machine learning, enabling the expansion of the scope of AI [10]. The essence of AI is based on the context that human intelligence can be accurately described, enabling its replication by machines and/or software [11]. AI addresses topics such as reasoning, knowledge, planning, automation, machine learning, natural language processing, robotics, human intelligence, and cyber security [11]. AI applications form a multidisciplinary intersection with cyber security issues. However, as AI technologies become more advanced and ubiquitous, cyber-attacks on CPS are on the rise, exploiting the interface between the connection of physical and cyber elements [12][13]. The threat landscape involves multiple players, attackers seek different types of vulnerabilities to launch their attacks. These attacks include the complexity and sophistication of advanced persistent threats, malicious actions in cyberspace, and monetization of cybercrime [6]. The cyber security community needs to understand how AI can be used for cyber-attacks and identify its weaknesses in order to implement defense actions [14].

2.1. Machine Learning

Machine learning (ML) is a method used to implement AI algorithms to analyze data, learn from the data, and make decisions about real-world events [10]. ML systems can be divided into (i) systems for initial training on the dataset; (ii) systems already trained for later decision-making [15]. Given the large amount of data available, there is a strong demand for the application of ML techniques. Researchers apply various approaches to deal with this large amount of data. Industry applies these techniques to extract relevant data. ML relies on different algorithms to solve data problems. The type of algorithm depends on the problem to be solved, considering the variables involved in the learning process [16]. In the age of digital transformation, ML is a relevant discipline in the research field of AI-based cyber security. Importantly, AI, particularly ML, has been used in both attack and defense of cyberspace. From the attacker’s point of view, ML is employed to compromise cyber protection strategies. On the defense side, ML is applied to provide robust resilience against threats, in order to adaptively minimize the damaging impacts of cyber-attacks [17]. ML algorithms can be categorized into supervised learning, unsupervised learning, and reinforcement learning [18]. The following is a contextualization of these algorithms. Supervised learning is when the model learns from predefined results by using past values for the target variable to learn what its output results should be [15]. Unsupervised learning, unlike supervised learning, does not have predefined results for the model to use as a reference for learning. The model works with a set of data and tries to find patterns and differences in this data [15]. Supervised and unsupervised learning applications are widely used for intrusion, malware detection, cyber-physical attacks, and data privacy protection [19][20][21]. Reinforcement learning, a branch of ML, demands sequential actions in an omitted way with or without knowledge of the environment, thus allowing a closer approximation to human learning [17]. There are several ML algorithms used in industry. For example: (i) Supervised Learning: Additive Models, Artificial Neural Networks, Bayesian Networks, Decision Tree, Random Forest, K-Nearest Neighbors, Logistic Regression, Naïve Bayesian Networks, and Regression Tree; (ii) Unsupervised Learning: K-means, and Self Organizing Map; (iii) Reinforcement Learning: Smart, and Pilco [8][22][23].

2.2. Deep Learning

Deep learning (DL) is a powerful ML technique that seeks to establish an artificial neural network that simulates the human brain for analytical learning in the interpretation of data [24]. An artificial neural network is a series of algorithms that seek to recognize implicit relationships in a dataset, through a process that mimics the way the human brain works. Neural networks refer to a system of neurons, either organic or artificial in nature [16]. DL uses multiple layers to build artificial neural networks with the ability to make intelligent decisions by processing large amounts of data with a high level of complexity without human intervention [25]. DL techniques can process a large amount of cyber security-related data made available in cyberspace. Researchers use ML and DL methods to detect malicious behavior in information systems arising from cyber-attacks [26]. The applications of DL techniques provide proactive monitoring in the industrial environment, producing essential data about the manufacturing process [23]. The combination of deep learning and reinforcement learning indicates excellent effectiveness and efficiency for cyber security applications dealing with increasingly dynamic and complex cyber-attacks [17]. There are several deep learning models used in industry. For example, (i) Supervised Learning: Convolutional Neural Network, Multiple Linear Perceptron, Recurrent Neural Network, Restricted Boltzmann Machine, Multiple Linear Perceptron, and YOLO v5; (ii) Unsupervised Learning: Auto Encoders, CAMP-BD, and Restricted Boltzmann Machine [8][17][22][23].

3. Cyber Security

Cyber security is constantly changing as the research environment changes rapidly. The cyber security community recognizes that cyber threats cannot be totally eliminated [27]. Therefore, research and technology development is essential to reduce the harmful impacts of cyber-attacks [28]. Research has sought a more proactive approach to preventing or mitigating security incidents before they cause damage in cyberspace. Cyber security threats are growing exponentially, becoming one of the main challenges for companies, due to the disruptive concepts of digital transformation present in the Industry 4.0 ecosystem [29]. Cyber security makes use of various measures, methods, and means to ensure that systems are protected against threats and vulnerabilities. Cyber-attacks aim to gain access to connected services, resources, or systems in an attempt to compromise their confidentiality, integrity, and availability [30][31]. To increase the level of cyber security, intelligent methods for cyber defense must be developed to cope with the diversity and dynamics of attacks [9]. Cyber security has evolved over the years from a technical domain focused on network security to an issue of global concern. It is a topic that is becoming increasingly important on the agenda of business leaders [32]. Proactively addressing AI-based security issues is a key factor for an industrial environment with smart factories, autonomous systems, CPS, IoT, cloud computing, and big data [33]. In this sense, AI has the potential to automatically provide significant cyber security insights without human interaction. AI and ML are potentially transformative tools for cyber security and information sharing in cyberspace [34].

4. Industry 4.0

Industry 4.0, a term that originated in Germany in 2011, is a product of the information technology age. Technological development paves the way for intelligent factories with machines based on automated and digitized manufacturing systems [35]. These systems comprise computer network technologies and physical processes that enable the interconnection of the physical and technological environment and enable data processing through technologies such as the Internet [36]. The incorporation of digitization into industrial activity, integrating physical and virtual components, is a characteristic of Industry 4.0. This integration allows greater data capture, transport, storage, and analysis. Connected products, machines, and equipment became sources of data and information to support decision-making. The main industrialized countries have focused on the development of Industry 4.0, as a strategic instrument of industrial policy to increase their competitiveness [37]. Intelligent manufacturing processes use AI in automation systems for machine interaction. Intelligent automation platforms play a key role in obtaining, processing, and interpreting data generated in industrial production [38]. AI provides information to track all activities in the manufacturing process. It makes it possible to improve management to increase or decrease production, considering demand, aiming to reduce downtime to ensure constant efficiency of the production line [39]. While technological advancement is a competitive differentiator, factors such as smart production, smart maintenance, smart logistics, CPS connectivity, machine-to-machine variations, and production data quality demand actions with greater cyber security control in the Industry 4.0 ecosystem [35][40][41].

5. Cyber-Physical Systems

Cyber-Physical Systems are one of the most significant advances in the development of computer science [42]. In CPS there is a combination of networked physical processes integrated with cybernetic components, sensors, and actuators, which interact in a process monitoring cycle, providing information for decision-making in the production line [43]. Industry 4.0 seeks to create smart factories where CPS operations are monitored, controlled, coordinated, and integrated by a computing and communication core. The human-machine and machine-to-machine interactions are essential concepts in the context of smart manufacturing. Such production makes use of technologies for flexible, intelligent, and reconfigurable manufacturing according to market dynamics [1]. CPS, considering automated process information, make use of AI algorithms to automatically obtain data, aiming at individual process analysis and monitoring [44]. With the exponential growth of CPS, new cyber security challenges have emerged. The exploitation of vulnerabilities in integrated and connected cyber-physical systems, due to technological evolution, demands technical detection measures of the application, transmission, and perception layers of CPS [45]. The focus of CPS security has shifted from computer risk assessment to risk in the computational network, in which there is the presence of embedded systems with sensors, actuators, and information system processing, in conjunction with a communication layer [37]. The increasing use of connected technologies makes the manufacturing system vulnerable to cyber risks [41]. Cyber security for CPS is attracting interest from academia and industry, though it is problematic because it benefits both defensive and offensive sides [46]. Even though companies are investing resources to develop cyber defense applications, the number of cyber-attacks has increased in quantity and complexity with the application of AI.

References

  1. Zhong, R.Y.; Xu, X.; Klotz, E.; Newman, S.T. Intelligent Manufacturing in the Context of Industry 4.0: A Review. Engineering 2017, 3, 616–630.
  2. Schumacher, A.; Sihn, W.; Erol, S. Automation, digitization and digitalization and their implications for manufacturing processes. In Innovation and Sustainability Conference Bukarest; Elsevier: Amsterdam, The Netherlands, 2016; pp. 1–5.
  3. Matt, D.T.; Modrák, V.; Zsifkovits, H. Industry 4.0 for SMEs: Challenges, Opportunities and Requirements; Springer: Cham, Switzerland, 2020.
  4. Wu, D.; Ren, A.; Zhang, W.; Fan, F.; Liu, P.; Fu, X.; Terpenny, J. Cybersecurity for digital manufacturing. J. Manuf. Syst. 2018, 48, 3–12.
  5. Corallo, A.; Lazoi, M.; Lezzi, M. Cybersecurity in the context of industry 4.0: A structured classification of critical assets and business impacts. Comput. Ind. 2020, 114, 103165.
  6. Kaloudi, N.; Jingyue, L.I. The AI-based cyber threat landscape: A survey. ACM Comput. Surv. 2020, 53, 20.
  7. Matsuda, W.; Fujimoto, M.; Aoyama, T.; Mitsunaga, T. Cyber Security Risk Assessment on Industry 4.0 using ICS testbed with AI and Cloud. In Proceedings of the 2019 IEEE Conference on Application, Information and Network Security, AINS, Penang, Malaysia, 19–21 November 2019; pp. 54–59.
  8. Angelopoulos, A.; Michailidis, E.T.; Nomikos, N.; Trakadas, P.; Hatziefremidis, A.; Voliotis, S.; Zahariadis, T. Tackling Faults in the Industry 4.0 Era-A Survey of Machine-Learning Solutions and Key Aspects. Sensors 2020, 20, 109.
  9. Li, J. hua: Cyber security meets artificial intelligence: A survey. Front. Inf. Technol. Electron. Eng. 2018, 19, 1462–1474.
  10. Ji, H.; Alfarraj, O.; Tolba, A. Artificial Intelligence-Empowered Edge of Vehicles: Architecture, Enabling Technologies, and Applications. IEEE Access 2020, 8, 61020–61034.
  11. Trifonov, R.; Nakov, O.; Mladenov, V. Artificial intelligence in cyber threats intelligence. In Proceedings of the 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC), Plaine Magnien, Mauritius, 6–7 December 2018; pp. 1–4.
  12. Brundage, M.; Avin, S.; Clark, J.; Toner, H.; Eckersley, P.; Garfinkel, B.; Dafoe, A.; Scharre, P.; Zeitzoff, T.; Filar, B.; et al. The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation. arXiv 2018, arXiv:1802.07228.
  13. Monostori, L.; Kádár, B.; Bauernhansl, T.; Kondoh, S.; Kumara, S.; Reinhart, G.; Sauer, O.; Schuh, G.; Sihn, W.; Ueda, K. Cyber-physical systems in manufacturing. CIRP Ann. 2016, 65, 621–641.
  14. Novikov, I. How AI can be applied to cyberattacks. Retrieved Novemb. 2018, 25, 2019.
  15. Mubarakova, S.R.; Amanzholova, S.T.; Uskenbayeva, R.K. Using Machine Learning Methods in Cybersecurity. Eurasian J. Math. Comput. Appl. 2022, 10, 69–78.
  16. Batta, M. Machine Learning Algorithms—A Review. Int. J. Sci. Res. 2020, 9, 381.
  17. Nguyen, T.T.; Reddi, V.J. Deep Reinforcement Learning for Cyber Security. IEEE Trans. Neural Netw. Learn. Syst. 2021, 1–17.
  18. Wuest, T.; Weimer, D.; Irgens, C.; Thoben, K.D. Machine learning in manufacturing: Advantages, challenges, and applications. Prod. Manuf. Res. 2016, 4, 23–45.
  19. Xin, Y.; Kong, L.; Liu, Z.; Chen, Y.; Li, Y.; Zhu, H.; Gao, M.; Hou, H.; Wang, C. Machine Learning and Deep Learning Methods for Cybersecurity. IEEE Access 2018, 6, 35365–35381.
  20. Berman, D.S.; Buczak, A.L.; Chavis, J.S.; Corbett, C.L. A survey of deep learning methods for cyber security. Information 2019, 10, 122.
  21. Wu, M.; Song, Z.; Moon, Y.B. Detecting cyber-physical attacks in CyberManufacturing systems with machine learning methods. J. Intell. Manuf. 2019, 30, 1111–1123.
  22. Alkahtani, H.; Aldhyani, T.H.H. Artificial Intelligence Algorithms for Malware Detection in Android-Operated Mobile Devices. Sensors 2022, 22, 2268.
  23. Kotsiopoulos, T.; Sarigiannidis, P.; Ioannidis, D.; Tzovaras, D. Machine Learning and Deep Learning in smart manufacturing: The Smart Grid paradigm. Comput. Sci. Rev. 2021, 40, 100341.
  24. Avdoshin, S.M.; Lazarenko, A.B.; Chichileva, N.I.; Naumov, P.A.; Klyucharev, P.G. Machine Learning Use Cases in Cybersecurity. Proc. Inst. Syst. Program. RAS 2019, 31, 191–202.
  25. Wang, J.; Ma, Y.; Zhang, L.; Gao, R.X.; Wu, D. Deep learning for smart manufacturing: Methods and applications. J. Manuf. Syst. 2018, 48, 144–156.
  26. Huang, T.H.; De Kao, H.Y. R2-D2: ColoR-inspired Convolutional NeuRal Network (CNN)-based AndroiD Malware Detections. In Proceedings of the 2018 IEEE International Conference on Big Data, Seattle, WA, USA, 10–13 December 2018; pp. 2633–2642.
  27. Husák, M.; Bartoš, V.; Sokol, P.; Gajdoš, A. Predictive methods in cyber defense: Current experience and research challenges. Future Gener. Comput. Syst. 2021, 115, 517–530.
  28. Guan, Y.; Ge, X. Distributed attack detection and secure estimation of networked cyber-physical systems against false data injection attacks and jamming attacks. IEEE Trans. Signal Inf. Process. Netw. 2017, 4, 48–59.
  29. Schumacher, A.; Erol, S.; Sihn, W. A Maturity Model for Assessing Industry 4.0 Readiness and Maturity of Manufacturing Enterprises. Procedia CIRP 2016, 52, 161–166.
  30. Mirani, A.A.; Velasco-Hernandez, G.; Awasthi, A.; Walsh, J. Key Challenges and Emerging Technologies in Industrial IoT Architectures: A Review. Sensors 2022, 22, 5836.
  31. Zhang, Z.; Ning, H.; Shi, F.; Farha, F.; Xu, Y.; Xu, J.; Zhang, F.; Choo, K.K.R. Artificial intelligence in cyber security: Research advances, challenges, and opportunities. Artif. Intell. Rev. 2022, 55, 1029–1053.
  32. WEF. The Global Risks Report 2021, 16th ed.; World Economic Forum: Geneva, Switzerland, 2021.
  33. Ervural, B.C.; Ervural, B. Overview of Cyber Security in the Industry 4.0 Era. In Industry 4.0: Managing the Digital Transformation; Springer: Berlin/Heidelberg, Germany, 2018; pp. 267–284.
  34. World Economic Forum. Cyber Information Sharing: Building Collective Security; World Economic Forum: Geneva, Switzerland, 2020; Volume 26.
  35. Jamai, I.; Ben Azzouz, L.; Saïdane, L.A. Security issues in Industry 4.0. In Proceedings of the 2020 International Wireless Communications and Mobile Computing (IWCMC), Limassol, Cyprus, 15–19 June 2020; pp. 481–488.
  36. Liu, Y.; Xu, X. Industry 4.0 and cloud manufacturing: A comparative analysis. J. Manuf. Sci. Eng. Trans. ASME 2017, 139, 1–8.
  37. Schuh, G.G.; Anderl, R.; Gausemeier, J.J.; ten Hompel, M.M.; Wahlster, W. Industrie 4.0 Maturity Index. Managing the Digital Transformation of Companies; Ander, L., Gausemeier, J.J., ten Hompel, M.M., Wahlster, W., Eds.; Acatech Study; Herbert Utz Verlag: München, Germany, 2020; p. 64.
  38. Bousdekis, A.; Apostolou, D.; Mentzas, G. A human cyber physical system framework for operator 4.0—Artificial intelligence symbiosis. Manuf. Lett. 2020, 25, 10–15.
  39. Chen, H.; Li, L.; Chen, Y. Explore success factors that impact artificial intelligence adoption on telecom industry in China. J. Manag. Anal. 2021, 8, 36–68.
  40. Ribeiro, J.; Lima, R.; Eckhardt, T.; Paiva, S. Robotic Process Automation and Artificial Intelligence in Industry 4.0—A Literature review. Procedia Comput. Sci. 2021, 181, 51–58.
  41. Tuptuk, N.; Hailes, S. Security of smart manufacturing systems. J. Manuf. Syst. 2018, 47, 93–106.
  42. Kagermann, H.; Wahlster, W.; Helbig, J. Securing the Future of German Manufacturing Industry: Recommendations for Implementing the Strategic Initiative INDUSTRIE 4.0; Final Report of the Industrie 4.0 Working Group: München, Germany, 2013; pp. 1–84.
  43. Ashibani, Y.; Mahmoud, Q.H. Cyber physical systems security: Analysis, challenges and solutions. Comput. Secur. 2017, 68, 81–97.
  44. Nogueira, I.B.R.; Ribeiro, A.M.; Requião, R.; Pontes, K.V.; Koivisto, H.; Rodrigues, A.E.; Loureiro, J.M. A quasi-virtual online analyser based on an artificial neural networks and offline measurements to predict purities of raffinate/extract in simulated moving bed processes. Appl. Soft Comput. J. 2018, 67, 29–47.
  45. Humayed, A.; Lin, J.; Li, F.; Luo, B. Cyber-Physical Systems Security—A Survey. IEEE Internet Things J. 2017, 4, 1802–1831.
  46. Lee, J.; Davari, H.; Singh, J.; Pandhare, V. Industrial Artificial Intelligence for industry 4.0-based manufacturing systems. Manuf. Lett. 2018, 18, 20–23.
More
Video Production Service