Abstract
Nowadays, industrial control systems are experiencing a new revolution with the interconnection of the operational equipment with the Internet, and the introduction of cutting-edge technologies such as Cloud Computing or Big data within the organization. These and other technologies are paving the way to the Industry 4.0. However, the advent of these technologies, and the innovative services that are enabled by them, will also bring novel threats whose impact needs to be understood. As a result, this paper provides an analysis of the evolution of these cyber-security issues and the requirements that must be satisfied by intrusion detection defense mechanisms in this context.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Davies, R.: Industry 4.0. digitalisation for productivity and growth. European Parliamentary Research Service, Briefing (2015)
ICS-CERT. Overview of cyber vulnerabilities, June 2017. https://ics-cert.us-cert.gov/content/overview-cyber-vulnerabilities
Leitão, P., Barbosa, J., Papadopoulou, M.-E.Ch., Venieris, I.S.: Standardization in cyber-physical systems: the ARUM case. In: IEEE International Conference on Industrial Technology (ICIT 2015), pp. 2988–2993 (2015)
Colombo, A.W., Karnouskos, S., Bangemann, T.: Towards the next generation of industrial cyber-physical systems. In: Colombo, A.W., et al. (eds.) Industrial Cloud-Based Cyber-Physical Systems, pp. 1–22. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-05624-1_1
Xu, X.: From cloud computing to cloud manufacturing. Robot. Comput.-Integr. Manuf. 28(1), 75–86 (2012)
Chiang, M., Zhang, T.: Fog and IoT: an overview of research opportunities. IEEE Internet Things J. 3(6), 854–864 (2016)
Moreno, A., Velez, G., Ardanza, A., Barandiaran, I., de Infante, Á.R., Chopitea, R.: Virtualisation process of a sheet metal punching machine within the industry 4.0 vision. Int. J. Interact. Des. Manuf. (IJIDeM) 11, 365–373 (2016)
Federal Office for information Security. Industrial control system security: Top 10 threats and countermeasures 2016, June 2017. https://www.allianz-fuer-cybersicherheit.de/ACS/DE/_/downloads/BSI-CS_005E.pdf?__blob=publicationFile&v=3
Tsao, T., Alexander, R., Dohler, M., Daza, V., Lozano, A., Richardson, M : A security threat analysis for the routing protocol for low-power and lossy networks (RPLs). Technical report (2015)
Zhang, K., Liang, X., Lu, R., Shen, X.: Sybil attacks and their defenses in the internet of things. IEEE Internet Things J. 1(5), 372–383 (2014)
Khalil, I.M., Khreishah, A., Azeem, M.: Cloud computing security: a survey. Computers 3(1), 1–35 (2014)
Dean, J., Ghemawat, S.: Mapreduce: simplified data processing on large clusters. Commun. ACM 51(1), 107–113 (2008)
Upadhyay, G.M., Arora, H.: Vulnerabilities of data storage security in big data. IITM J. Manag. IT 7(1), 37–41 (2016)
Brettel, M., Friederichsen, N., Keller, M., Rosenberg, M.: How virtualization, decentralization and network building change the manufacturing landscape: an industry 4.0 perspective. Int. J. Mech. Ind. Sci. Eng. 8(1), 37–44 (2014)
Stock, T., Seliger, G.: Opportunities of sustainable manufacturing in industry 4.0. Procedia CIRP 40, 536–541 (2016)
Industrial Data Space Association. Industrial data space: Reference architecture, June 2017. http://www.industrialdataspace.org/en/
Dazhong, W., Greer, M.J., Rosen, D.W., Schaefer, D.: Cloud manufacturing: Strategic vision and state-of-the-art. J. Manuf. Syst. 32(4), 564–579 (2013)
Wang, S., Wan, J., Zhang, D., Li, D., Zhang, C.: Towards smart factory for industry 4.0: a self-organized multi-agent system with big data based feedback and coordination. Comput. Netw. 101, 158–168 (2016)
Rubio, J.E., Alcaraz, C., Roman, R., Lopez, J.: Analysis of intrusion detection systems in industrial ecosystems. In: 14th International Conference on Security and Cryptography (SECRYPT 2017) (2017)
HeSec. HeSec Smart Agents, June 2017. http://he-sec.com/products/
McParland, C., Peisert, S., Scaglione, A.: Monitoring security of networked control systems: it’s the physics. IEEE Secur. Priv. 12(6), 32–39 (2014)
Acknowledgements
This work has been funded by the Spanish Ministry of Economy, Industry and Competitiveness through the SADCIP (RTC-2016-4847-8) project. The work of the first author han been partially financed by the Spanish Ministry of Education under the FPU program (FPU15/03213).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Rubio, J.E., Roman, R., Lopez, J. (2018). Analysis of Cybersecurity Threats in Industry 4.0: The Case of Intrusion Detection. In: D'Agostino, G., Scala, A. (eds) Critical Information Infrastructures Security. CRITIS 2017. Lecture Notes in Computer Science(), vol 10707. Springer, Cham. https://doi.org/10.1007/978-3-319-99843-5_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-99843-5_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-99842-8
Online ISBN: 978-3-319-99843-5
eBook Packages: Computer ScienceComputer Science (R0)