![Page 1: Analysis of cybersecurity threats in Industry 4.0: the ... · Analysis of cybersecurity threats in Industry 4.0: the case of intrusion detection Juan Enrique Rubio Rodrigo Roman Javier](https://reader030.vdocument.in/reader030/viewer/2022040605/5eaa400a28761a4dac1b4f5f/html5/thumbnails/1.jpg)
AnalysisofcybersecuritythreatsinIndustry4.0:thecaseofintrusion
detectionJuanEnriqueRubioRodrigoRomanJavierLopez
UniversityofMalaga
![Page 2: Analysis of cybersecurity threats in Industry 4.0: the ... · Analysis of cybersecurity threats in Industry 4.0: the case of intrusion detection Juan Enrique Rubio Rodrigo Roman Javier](https://reader030.vdocument.in/reader030/viewer/2022040605/5eaa400a28761a4dac1b4f5f/html5/thumbnails/2.jpg)
Outline
1. Introduction
2. Cyber-securitythreatsofIndustry4.0enablingtechnologies
3. Cyber-securityissuesinIndustry4.0innovativeservices
4. IntrusionDetectioninIndustry4.0
2
![Page 3: Analysis of cybersecurity threats in Industry 4.0: the ... · Analysis of cybersecurity threats in Industry 4.0: the case of intrusion detection Juan Enrique Rubio Rodrigo Roman Javier](https://reader030.vdocument.in/reader030/viewer/2022040605/5eaa400a28761a4dac1b4f5f/html5/thumbnails/3.jpg)
INTRODUCTION
3
![Page 4: Analysis of cybersecurity threats in Industry 4.0: the ... · Analysis of cybersecurity threats in Industry 4.0: the case of intrusion detection Juan Enrique Rubio Rodrigo Roman Javier](https://reader030.vdocument.in/reader030/viewer/2022040605/5eaa400a28761a4dac1b4f5f/html5/thumbnails/4.jpg)
ITandOTintegration
§ SCADA systems (Supervisory Control and DataAcquisition) are now present in most criticalinfrastructures.
§ Traditionally, these systems and industrialnetworks (Operational Technology) had to beisolated from other environments.
§ However, at present, they have beeninterconnected with external networks(Information Technology).
IT
OT
4
![Page 5: Analysis of cybersecurity threats in Industry 4.0: the ... · Analysis of cybersecurity threats in Industry 4.0: the case of intrusion detection Juan Enrique Rubio Rodrigo Roman Javier](https://reader030.vdocument.in/reader030/viewer/2022040605/5eaa400a28761a4dac1b4f5f/html5/thumbnails/5.jpg)
TowardsIndustry4.0
§ Digitization of all components within the industry to make theproductive processes digitally connected and distributed, providing ahighly integrated value chain
Interoperability
Virtualization
Decentralization
Realtime
Service Orientation
Modularity
Interactivity
5
![Page 6: Analysis of cybersecurity threats in Industry 4.0: the ... · Analysis of cybersecurity threats in Industry 4.0: the case of intrusion detection Juan Enrique Rubio Rodrigo Roman Javier](https://reader030.vdocument.in/reader030/viewer/2022040605/5eaa400a28761a4dac1b4f5f/html5/thumbnails/6.jpg)
Industry4.0innovativeservicesandsecurity
§ Creation of innovative services:q Novel cooperative infrastructuresq Cloudmanufacturingq Agents for decisionmakingq Advanced interactionsq …
§ The increase in security threats caused by the Industry 4.0technologies and its innovative services must be addressed
§ It is essential to study the requirements of intrusiondetection systems in the upcoming industrial context
6
![Page 7: Analysis of cybersecurity threats in Industry 4.0: the ... · Analysis of cybersecurity threats in Industry 4.0: the case of intrusion detection Juan Enrique Rubio Rodrigo Roman Javier](https://reader030.vdocument.in/reader030/viewer/2022040605/5eaa400a28761a4dac1b4f5f/html5/thumbnails/7.jpg)
CYBER-SECURITYTHREATSOFINDUSTRY4.0TECHNOLOGIES
7
![Page 8: Analysis of cybersecurity threats in Industry 4.0: the ... · Analysis of cybersecurity threats in Industry 4.0: the case of intrusion detection Juan Enrique Rubio Rodrigo Roman Javier](https://reader030.vdocument.in/reader030/viewer/2022040605/5eaa400a28761a4dac1b4f5f/html5/thumbnails/8.jpg)
Introduction:theIndustry4.0concept
Industry4.0
Cloudcomputing
Virtualization
BigData
IndustrialInternetofThings
8
![Page 9: Analysis of cybersecurity threats in Industry 4.0: the ... · Analysis of cybersecurity threats in Industry 4.0: the case of intrusion detection Juan Enrique Rubio Rodrigo Roman Javier](https://reader030.vdocument.in/reader030/viewer/2022040605/5eaa400a28761a4dac1b4f5f/html5/thumbnails/9.jpg)
Cyber-securitythreatsofIndustry4.0enablingtechnologies
Industrial Internet of Things
o Massive interconnection of machines,operators and the product itself
• The main concern are the attacksperpetrated against their availability,due to the scarcity of resources (CPU,memory or battery)
9
![Page 10: Analysis of cybersecurity threats in Industry 4.0: the ... · Analysis of cybersecurity threats in Industry 4.0: the case of intrusion detection Juan Enrique Rubio Rodrigo Roman Javier](https://reader030.vdocument.in/reader030/viewer/2022040605/5eaa400a28761a4dac1b4f5f/html5/thumbnails/10.jpg)
Cyber-securitythreatsofIndustry4.0enablingtechnologies
Cloud computing
o Processing of information retrieved by IIoT devices, cloud-basedmanufacturing
• The most common attack goes against its availability, by means of aDenial of service (DoS) attacks against the infrastructure
• Confidentiality problems arise when putting trust in the serviceprovider, who has total access to the stored data
10
![Page 11: Analysis of cybersecurity threats in Industry 4.0: the ... · Analysis of cybersecurity threats in Industry 4.0: the case of intrusion detection Juan Enrique Rubio Rodrigo Roman Javier](https://reader030.vdocument.in/reader030/viewer/2022040605/5eaa400a28761a4dac1b4f5f/html5/thumbnails/11.jpg)
Cyber-securitythreatsofIndustry4.0enablingtechnologies
Big Data
o Data analytics with the information extracted from theindustrial network to optimize operations and identifyanomalies
• Difficult to ensure the security of all components andnodes
• Confidentiality and Integrity of data are threatened ifappropriate measures are not applied, which is frequentin this context to improve efficiency
11
![Page 12: Analysis of cybersecurity threats in Industry 4.0: the ... · Analysis of cybersecurity threats in Industry 4.0: the case of intrusion detection Juan Enrique Rubio Rodrigo Roman Javier](https://reader030.vdocument.in/reader030/viewer/2022040605/5eaa400a28761a4dac1b4f5f/html5/thumbnails/12.jpg)
Cyber-securitythreatsofIndustry4.0enablingtechnologies
Virtualization
o VirtualrepresentationsofmachinesforsimulationsandAR/VRdevicestointeractwiththeproductionchain
• Themainchallengeisthesecureinformationexchangebetweenthephysicalassetsandtheirvirtualrepresentations
• Authenticationissuesexistwiththedisseminationofinformationovermultiplevulnerableplatforms(e.g.,smartphones)
12
![Page 13: Analysis of cybersecurity threats in Industry 4.0: the ... · Analysis of cybersecurity threats in Industry 4.0: the case of intrusion detection Juan Enrique Rubio Rodrigo Roman Javier](https://reader030.vdocument.in/reader030/viewer/2022040605/5eaa400a28761a4dac1b4f5f/html5/thumbnails/13.jpg)
CYBER-SECURITYTHREATSININDUSTRY4.0INNOVATIVESERVICES
13
![Page 14: Analysis of cybersecurity threats in Industry 4.0: the ... · Analysis of cybersecurity threats in Industry 4.0: the case of intrusion detection Juan Enrique Rubio Rodrigo Roman Javier](https://reader030.vdocument.in/reader030/viewer/2022040605/5eaa400a28761a4dac1b4f5f/html5/thumbnails/14.jpg)
Cyber-securitythreatsinIndustry4.0innovativeservices
Novelinfrastructures• Decentralizedarchitecturewhereanyelementcooperateswithanyother• Attacks could belaunched fromanyelement ofthe infrastructure,blurring the authenticationbarriers between the differentsubsystems
Retrofitting• IntegrationofIndustry4.0technologiestolegacysystems• New ways for attacks against legacy systems,exposing their information
Industrialdataspace• Secureexchangeofinformationbetweenindustrialpartners• Extraction ofcompetitive intelligence
14
![Page 15: Analysis of cybersecurity threats in Industry 4.0: the ... · Analysis of cybersecurity threats in Industry 4.0: the case of intrusion detection Juan Enrique Rubio Rodrigo Roman Javier](https://reader030.vdocument.in/reader030/viewer/2022040605/5eaa400a28761a4dac1b4f5f/html5/thumbnails/15.jpg)
Cyber-securitythreatsinIndustry4.0innovativeservices
Cloudmanufacturing• Productcustomizationinthecloud• Availability andconfidentiality ofbusiness dataaffected
Agents• Workflowplannersorself-organisingassemblysystems• Compromised agents toinfluence decisionsandthe overall workflow
Otherenhancedinteractions• DigitaltwinsandadvancedHMIs• They canbemanipulated tolaunch other attacks andextract information
15
![Page 16: Analysis of cybersecurity threats in Industry 4.0: the ... · Analysis of cybersecurity threats in Industry 4.0: the case of intrusion detection Juan Enrique Rubio Rodrigo Roman Javier](https://reader030.vdocument.in/reader030/viewer/2022040605/5eaa400a28761a4dac1b4f5f/html5/thumbnails/16.jpg)
Cyber-securitythreatsinIndustry4.0innovativeservices
Novelinfrastructures
Retrofitting IndustrialDataSpace
Cloudmanufacturing
Agents Otherinteractions
Availability Wideattacksurface
Singlepointoffailure
Cascadeeffects Wide attacksurface
Agentsasmalware
Denialofservice
Confidentiality Globaldatainlocalcontext
Exposureofsensing layer
Informationleakage
Businessprocessleakage
Agentdatainlocalcontext
Informationleakage
Integrity Behaviourmanipulation
Cross-cuttingattacks
Cascadeeffects Manipulationofcomponents
Tampereddata/agents
Disrupt decisionmakingprocesses
Authentication Complexity andmisconfiguration
Fakelegacy/sensinglayers
Biggerscopeofattacks
Managementissues
Attacksfrom/toagents
Privilegeescalation
16
![Page 17: Analysis of cybersecurity threats in Industry 4.0: the ... · Analysis of cybersecurity threats in Industry 4.0: the case of intrusion detection Juan Enrique Rubio Rodrigo Roman Javier](https://reader030.vdocument.in/reader030/viewer/2022040605/5eaa400a28761a4dac1b4f5f/html5/thumbnails/17.jpg)
INTRUSIONDETECTIONININDUSTRY4.0
17
![Page 18: Analysis of cybersecurity threats in Industry 4.0: the ... · Analysis of cybersecurity threats in Industry 4.0: the case of intrusion detection Juan Enrique Rubio Rodrigo Roman Javier](https://reader030.vdocument.in/reader030/viewer/2022040605/5eaa400a28761a4dac1b4f5f/html5/thumbnails/18.jpg)
IntrusionDetectioninIndustry4.0
§ Requirements for the design, deployment and managementof intrusion detection systems (IDS):
ü Coverage
ü Holism
• All interactions andelements ofan Industry 4.0
• Easily upgradablewith newdetection algorithms.
• Users,configurations,potential points offailure andcascadeeffects aretaken into account
• They must befamiliarizedwith the cooperative nature
18
![Page 19: Analysis of cybersecurity threats in Industry 4.0: the ... · Analysis of cybersecurity threats in Industry 4.0: the case of intrusion detection Juan Enrique Rubio Rodrigo Roman Javier](https://reader030.vdocument.in/reader030/viewer/2022040605/5eaa400a28761a4dac1b4f5f/html5/thumbnails/19.jpg)
IntrusionDetectioninIndustry4.0
§ Requirements for the design, deployment and managementof intrusion detection systems (IDS):
ü Intelligence
ü Symbiosis
§ The state of the art on IDS for the current industrial ecosystems donot fully cover the previouslymentioned requirements
• Behavioral analysis andinformationcorrelation toconsiderthe existence ofmoreadvanced attacks
• Close interactionwith other protectionmechanisms,such asprevention systems andforensics,aswell asthe Industry 4.0services
19
![Page 20: Analysis of cybersecurity threats in Industry 4.0: the ... · Analysis of cybersecurity threats in Industry 4.0: the case of intrusion detection Juan Enrique Rubio Rodrigo Roman Javier](https://reader030.vdocument.in/reader030/viewer/2022040605/5eaa400a28761a4dac1b4f5f/html5/thumbnails/20.jpg)
Conclusions
§ We have introduced the Industry 4.0 enabling technologiesand provided an overview of their threats
§ The main threats arisen as consequence of the integration ofthese novel technologies in the industrial ecosystems havebeen studied
§ Based on this, we have identified a set of requirements forfuture intrusion detection mechanisms in the industry.
20
![Page 21: Analysis of cybersecurity threats in Industry 4.0: the ... · Analysis of cybersecurity threats in Industry 4.0: the case of intrusion detection Juan Enrique Rubio Rodrigo Roman Javier](https://reader030.vdocument.in/reader030/viewer/2022040605/5eaa400a28761a4dac1b4f5f/html5/thumbnails/21.jpg)
ThanksAnalysisofcybersecuritythreatsinIndustry4.0:
thecaseofintrusiondetection
JuanEnriqueRubioRodrigoRomanJavierLopez
21