Next Article in Journal
Internal and External Pipe Defect Characterization via High-Frequency Lamb Waves Generated by Unidirectional EMAT
Next Article in Special Issue
Smart Grid Security: An Effective Hybrid CNN-Based Approach for Detecting Energy Theft Using Consumption Patterns
Previous Article in Journal
Online Multi-Contact Motion Replanning for Humanoid Robots with Semantic 3D Voxel Mapping: ExOctomap
Previous Article in Special Issue
Cyber-Physical System for Smart Traffic Light Control
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Securing Industrial Control Systems: Components, Cyber Threats, and Machine Learning-Driven Defense Strategies

by
Mary Nankya
1,*,†,
Robin Chataut
2,† and
Robert Akl
3,†
1
Computer Science Department, Fitchburg State University, Fitchburg, MA 01420, USA
2
School of Computing and Engineering, Quinnipiac University, Hamden, CT 06514, USA
3
Department of Computer Science and Engineering, University of North Texas, Denton, TX 76203, USA
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Sensors 2023, 23(21), 8840; https://doi.org/10.3390/s23218840
Submission received: 19 September 2023 / Revised: 27 October 2023 / Accepted: 27 October 2023 / Published: 30 October 2023
(This article belongs to the Special Issue Cyber-Physical Systems and Industry 4.0)

Abstract

:
Industrial Control Systems (ICS), which include Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and Programmable Logic Controllers (PLC), play a crucial role in managing and regulating industrial processes. However, ensuring the security of these systems is of utmost importance due to the potentially severe consequences of cyber attacks. This article presents an overview of ICS security, covering its components, protocols, industrial applications, and performance aspects. It also highlights the typical threats and vulnerabilities faced by these systems. Moreover, the article identifies key factors that influence the design decisions concerning control, communication, reliability, and redundancy properties of ICS, as these are critical in determining the security needs of the system. The article outlines existing security countermeasures, including network segmentation, access control, patch management, and security monitoring. Furthermore, the article explores the integration of machine learning techniques to enhance the cybersecurity of ICS. Machine learning offers several advantages, such as anomaly detection, threat intelligence analysis, and predictive maintenance. However, combining machine learning with other security measures is essential to establish a comprehensive defense strategy for ICS. The article also addresses the challenges associated with existing measures and provides recommendations for improving ICS security. This paper becomes a valuable reference for researchers aiming to make meaningful contributions within the constantly evolving ICS domain by providing an in-depth examination of the present state, challenges, and potential future advancements.

1. Introduction

Industrial Control System (ICS) is an encompassing term that refers to various control systems and their associated instrumentation. It encompasses a diverse array of equipment, systems, networks, and mechanisms employed for the purpose of managing and automating industrial operations [1]. Virtually every commercial building and industrial facility, including those in production, transportation, power generation, and water treatment, relies on ICS devices and protocols. These systems heavily depend on the automation of mechanical and electrical processes. However, their connectivity to the internet poses a significant vulnerability, making them susceptible to cyber-attacks [2]. The global ICS market is experiencing substantial growth, primarily driven by the rising emphasis on automation, cloud computing, and digitization across various industries [3]. More innovative technologies are being developed, enabling remote access and control over the internet and within Information Technology environments. This shift towards increased automation and connectivity aims to achieve substantial business benefits. However, it also presents a challenge, as integrating Industrial Control Systems with external networks, such as the internet, expands the attack surface, making them more susceptible to cyber threats without proper security measures [4]. Over the past decade, cyber attacks on Industrial Control Systems have notably increased due to their heightened vulnerability to off-site attacks. Previously, these systems operated in isolated environments, relying heavily on human intervention. However, the growing inter-connectivity has exposed them to potential risks from remote adversaries. Consequently, ensuring robust security measures has become paramount to safeguarding ICSs from cyber threats [5].
An overview of an ICS contains several control loops, remote diagnostics, maintenance tools, and human interfaces built on layered network architectures using various network protocols. A summary of the basic components and process of an ICS is shown in Figure 1.
  • A process consists of activities to achieve the desired output;
  • A control loop utilizes sensors, actuators, and controllers or PLCs to adjust the output value to the desired set-point automatically;
  • A sensor detects changes in its environment and sends information as controlled variables to the controller;
  • A controller uses target set point and control algorithms to generate required output variables and transmit them to the actuators;
  • Actuators or movers are elements within a machine designed for the manipulation or regulation of a mechanism, such as control valves, circuit breakers, switches, and motors;
  • Human–Machine Interfaces (HMI) are utilities used to display process status information and monitor and configure controller parameters;
  • Remote Diagnostics and Maintenance applications do real-time diagnosis and maintenance operations such as remotely identifying, preventing, and recovering from abnormal operations or failures;
  • A Data Historian is a centralized database storing all process information within an ICS environment. The logged data is exported to the corporate Information Systems (IS) for process data analysis, control, and planning;
  • A Communications Gateway device enables communication with a distant network, such as the internet or an autonomous system, which is not accessible to the host network nodes. This gateway can be realized using either hardware or software. It directs the network traffic and may block specific traffic to protect it from malicious attacks. It also grants or denies access to computers within the network to the outside world.
In the forthcoming part of this article, Section 2 provides a more in-depth review of the ICS technologies. Section 3 outlines the system design considerations that help to determine the security needs of the ICS system. In Section 4, we present some popular examples of ICS cyber attack incidents that have occurred in the past. Section 5 discusses the vulnerability of ICS. Section 6 offers an in-depth review of ICS communication protocols for cyber vulnerabilities. We further delve into a comprehensive review of the existing measures to strengthen the cybersecurity of ICSs in Section 7. In Section 8, we explore how machine learning has been integrated to strengthen the cyber defense for ICS. In Section 9, we discuss the challenges of machine learning approaches and mechanisms for defending ICS. Section 10 presents a list of recommendations and the future direction of our research. Finally, we conclude our study in Section 11 where we summarize the key fundamental research explorations, emphasizing the future direction of our work.

2. Industrial Control Systems Technologies

ICS has different technologies such as SCADA, DCS, Industrial Automation and Control Systems (IACS), PLCs, Programmable Automation Controllers (PACs), HMI, RTUs, control servers, Intelligent Electronic Devices (IEDs), and sensors [6]. The integration of these features contributes to the widespread adoption of Industrial Control Systems, leading to a market value of USD 130,060 million in 2022. The market is expected to experience a Compound Annual Growth Rate (CAGR) of 7.55% from 2023 to 2030, primarily driven by the increasing demand for energy-efficient and safe operations [7].

2.1. Supervisory Control and Data Acquisition

SCADA is among the most widely utilized technologies in Industrial Control Systems [8]. It functions as a software application designed to control industrial processes by collecting real-time data from remote locations, allowing for the management of equipment and conditions [9]. SCADA systems are composed of both hardware and software components. The hardware gathers and sends data to field controller systems, which subsequently transmit the data to other systems for real-time processing and display through a HMI. Additionally, SCADA systems maintain a comprehensive record of all events, enabling the reporting of process status and any encountered issues. These applications also include alarm functions that notify operators when hazardous conditions arise, ensuring prompt and appropriate responses [10]. SCADA provides organizations with the tools to make and deploy data-driven decisions regarding their industrial processes [11]. Applications of SCADA include the below [12]:
  • Electricity generation, transmission, and distribution;
  • Manufacturing industries or plants;
  • Food and pharma productions
  • Telecom and IT-based systems;
  • Traffic control;
  • Lift and elevator control;
  • Oil and gas systems;
  • Mass transit and railway traction.
SCADA employs a central computer to store information related to local and remote devices, enabling the control of industrial processes and facilities. The typical components of SCADA can be classified based on their respective definitions, as depicted in Figure 2 below.
  • Supervisory control: Supervisory control serves as the fundamental role of the HMI. HMI software serves as an interface responsible for overseeing industrial processes. On the other hand, a master terminal unit (MTU) functions as a central supervisory controller that communicates with lower field devices, such as RTUs, through the ICS network;
  • Data acquisition: Data can be acquired from two primary sources in the context of SCADA system as PLCs and Remote Telemetry Units (RTUs). Both the PLCs and RTUs interface directly with actuators and sensors in the field. RTUs are specifically designed to interface with sensors and collect telemetry data, which they then transmit to a primary system for further action. On the other hand, PLCs interface with the actuators to maintain and control industrial processes based on the telemetry data collected by the RTUs [13]. PLCs and RTUs act as physical interfaces between SCADA systems and field devices. However, their communication with the SCADA system differs. RTUs are well-suited for wide geographical areas due to their use of wireless communication methods. In contrast, PLCs are more tailored to local control applications [14];
  • Data storage: The majority of SCADA systems employ a Structured Query Language (SQL) database for storing data with timestamps. A historian is a fully integrated SCADA software that collects real-time data from various SCADA devices and stores them in a database, such as mySQL;
  • Data exchange: Communication protocols are used to exchange data between SCADA components.

SCADA Architecture

This section describes the four generations of SCADA architecture in detail and summarizes the security strengths and vulnerabilities of each.
(a)
First generation-Monolithic: The first generation of SCADA systems was developed when networks were not yet in existence. These early systems were not designed to connect with other systems, and communication was typically limited to Wide Area Networks (WANs) interacting with remote terminal units (RTUs) [15]. It defines application in remote areas within a factory where the conditions are unsafe, and physical access is restricted [16]. In the early-generation systems, redundancy was achieved by deploying two mainframe systems with identical configurations. One was designated as the primary and the other as the backup. These two systems were connected at the bus level. The standby system’s main role was to act as a monitoring entity for the primary system and would smoothly take over if it detected any indications of failure. Consequently, the standby system usually operated in an idle state, performing minimal to no processing tasks until a fail-over event became necessary [17]. Figure 3 shows a typical first-generation SCADA architecture.
(b)
Distributed SCADA system: Control functions were distributed across multiple systems during second generation [18]. Distributing the individual functions of the SCADA system across multiple systems resulted in a collective processing power that exceeded what could have been achieved with a single processor [19]. During the 1980s, SCADA systems harnessed the widespread adoption of proprietary local area networks(LAN) and more compact yet potent computers. This facilitated enhanced sharing of operational data not only within the plant but also at broader levels. These individual stations were used to share real-time information and command processing for performing control tasks to trip the alarm levels of possible problems. Only the developers cared about the SCADA security [20]. Figure 4 below shows the Distributed SCADA architecture [21].
(c)
Internet of Things (IoT): IoT introduces a distinct approach to SCADA systems, substituting the requirement for PLCs with an emphasis on data modeling and advanced algorithms. This transition signifies a departure from the traditional reliance on mainframes or server in a facility, as data goes to cloud-based servers for sharing and storage [22]. IoT SCADA systems are flexible and easy to maintain and integrate. IoT brought several other advantages to SCADA, such as ease of use, flexibility, availability, cost efficiency, big data processing, and scalability [23]. Figure 5 below shows the IoT SCADA architecture.
(d)
Networked SCADA Architecture: During the third generation, the monitoring process heavily relied on the involvement of PLCs. They were integrated into the SCADA system, providing efficient and reliable data acquisition and control capabilities. This integration of PLCs enhanced the overall functionality and responsiveness of the SCADA system, enabling real-time monitoring and control of industrial processes across a distributed network. The third-generation SCADA architecture thus facilitated greater flexibility, scalability, and accessibility, making it more adaptable to modern industrial demands [24]. It can connect to the internet and third-party peripherals. Additionally, this architecture enhanced the performance level of SCADA by allowing several servers to run in parallel to handle several tasks [25]. Figure 6 below shows the description of the Networked SCADA architecture.

2.2. Distributed Control Systems (DCS)

Distributed Control Systems are comprised of controllers, sensors, and actuators that are distributed across different spatial locations [26]. The entire system’s sub-components are controlled by multiple controllers, e.g., PLC [27]. DCS is frequently employed in various industrial process industries, including but not limited to the following:
  • Agriculture;
  • Chemical plants;
  • Petrochemical and refineries;
  • Nuclear power plants;
  • Water and sewage treatment plants;
  • Food processing;
  • Automobile manufacturing;
  • Pharmaceutical manufacturing.
Within the domain of DCS, automatic control revolves around the exchange of signals, facilitating bidirectional information flow, and the computation of control actions through decision-making processes [28]. DCS is also defined as an architecture where the subsystems are geographically distributed and functionally integrated [29]. DCS coordinates and supervises a complete plant of many variable processes. See below a distributed control system in Figure 7.

2.1.2. Function and Components of DCS

Components of DCS consist of the basic components, as listed below:
  • An engineering workstation: This is the supervisory controller for the DCS as a whole. The station comes with configuration tools that empower users to undertake activities such as generating new loops, establishing input/output (I/O) points, and configuring distributed devices [30];
  • An operator station: A station operator is a location where the user observes the ongoing process. At the station operator’s interface, the operator can access process variables, control parameters, and alarms, which are essential for retrieving the current operating status [31];
  • A process control unit: This control center acts as the brain of all process control by performing all the computation process algorithms and running all logical expressions. The control module takes an input variable that will be controlled, calculates it, and the results are compared with the set point, which is the value expected of the process. If the calculation results differ from the set point, the value must be manipulated and the results sent to the actuator [31]. This controller, which relies on microprocessor technology, is specifically engineered for automatic and compound loop control;
  • A communication system: This system facilitates the transfer of data from one station to another, a crucial function in distributed control systems. The network protocols employed encompass Ethernet, Profibus, and DeviceNet;
  • Smart devices: These refer to intelligent devices or bus technologies employed to substitute older I/O systems.

2.3. Programmable Logic Controllers

PLCs are industrial computer control systems designed to constantly monitor the status of input devices and make decisions according to a customized program in order to manage the status of output devices [32]. Early PLCs were able to execute tens of instructions per second; modern PLCs can perform bit operations in nanoseconds. They can function as autonomous systems, optimizing processes intelligently and independently [33]. PLCs rely on a programmable memory that stores instructions for executing a wide range of operations, encompassing logic functions, sequence control, timing, counting, and arithmetic calculations. Using digital or analog input and output interfaces, this memory supervises and manages a variety of mechanical equipment and production processes [34]. Industries that rely on PLCs include the following:
  • Oil and Gas;
  • Food and Beverage;
  • Automotive;
  • Pharmaceuticals;
  • Transportation;
  • Off Road Construction;
  • Lifts and escalators;
  • Medical applications;
  • Automatic gate systems;
  • Heating control systems.

2.3.1. Versions of PLCs

PLCs have evolved significantly, with a version incorporating Ethernet protocol based network connectivity that enables them to share data with a variety of devices and systems such as other PCs, SCADA, and even cloud-based platforms [35]. This enhanced connectivity and data sharing capability has further signified their pivotal role in ICS, as seen below.
  • Real-Time Monitoring and Control: PLCs facilitate real-time monitoring and control of industrial processes. With their network connectivity, they can provide immediate data feedback, allowing for rapid decision-making and adjustments;
  • Data Aggregation and Analysis: PLCs can collect and transmit data to centralized systems for analysis. This data is essential for process optimization, predictive maintenance, and quality control;
  • Remote Accessibility: Connectivity enables remote accessibility to PLCs, allowing engineers and operators to manage and monitor processes from different locations, improving operational efficiency and reducing the need for onsite presence.
This version of the Ethernet protocol-based PLCs has several limitations despite its data sharing capability. These PLCs lacked standardization, leading to compatibility issues between devices from different manufacturers. They also present with data handling, processing, and storage limitations for more advanced applications. PLCs have become an integral part of the broader industrial landscape, especially within the frameworks of Industry 4.0 and the Industrial Internet of Things (IoT). A team of researchers proposed an IoT-PLC version that possesses regulatory control features, incorporates fog computing capabilities for tasks such as data filtering, field data storage, and supports various wireless interfaces that can be managed autonomously [36]. Their incorporation into these paradigms is of utmost importance and have solved the earlier mentioned limitations with the below capabilities, hence resulting into robust and secure solutions for modern industrial automation, as seen below [37].
  • Enhanced Automation and Smart Manufacturing: PLCs contribute to the automation and intelligent control of industrial processes, aligning perfectly with the objectives of Industry 4.0 and industrial IoT, which aim to create smart and interconnected factories;
  • Optimizing Resource Utilization: PLCs, as part of ICS, contribute to optimizing resource utilization, reducing energy consumption, and minimizing waste, which are central to sustainable and eco-friendly manufacturing practices;
  • Data-Driven Decision Making: In Industry 4.0 and industrial IoT, data is a valuable asset. PLCs’ connectivity enables them to generate and share data, which is the foundation for data-driven decision-making, predictive maintenance, and process optimization.

2.3.2. Components of PLC system

Figure 8 below shows the components of a PLC system.
  • Power Supply Unit: The power requirements are contingent upon the particular type of PLC employed in the application. This unit converts AC to DC voltage suitable for PLC. This unit comprises short-circuit protection switches at all levels, control transformers, switching power supply, and other components [38];
  • Processor or CPU: This component includes a microprocessor, system memory, serial communication ports, and a LAN connection. A power supply may also be included in specific cases to deliver the necessary power to the CPU;
  • Input/Out modules: Input and output modules serve as the connection points between the control environment’s field devices (comprising both input and output equipment) and the processor. The input devices encompass sensors, push buttons, limit switches, and similar items, while the output devices consist of motors, relays, solenoid valves, and the like. I/O devices can be broadly categorized into two groups: discrete or digital modules and analog modules;
  • Programmable devices: As seen in Figure 8 above, Programming tools are utilized to load the specific program into the CPU’s memory. We can develop our program using a widely recognized and user-friendly language called ladder logic.

3. ICS System Design Considerations

While Section 2 introduced the essential components and functions of Industrial Control System technologies, designing an ICS, including whether a SCADA, DCS, or PLC-based topology is used, depends on many factors. This section identifies key factors that drive design decisions regarding the ICS’s control, communication, reliability, and redundancy properties [39]. These factors also help to determine the security needs of the system.
  • Control Timing Requirements: Within ICS, a spectrum of time-related demands exists, encompassing the need for rapid responses, consistency, regularity, and synchronization. These requirements can present difficulties for humans in consistently and reliably meeting them, emphasizing the importance of implementing automated controllers. In certain specific situations, it becomes vital for computations to occur close to sensors and actuators to minimize communication delays and ensure the timely execution of essential control functions;
  • Safety: The inclusion of safety requirements in the system’s design is of utmost importance. Systems must possess the ability to detect unsafe conditions and take measures to transform them into safe conditions. In numerous safety-critical operations, the presence of human oversight and control within potentially hazardous processes remains an indispensable element of the safety system;
  • Geographic Distribution: The level of distribution in systems can exhibit a broad spectrum, ranging from compact systems such as local PLC-controlled processes to far-reaching, extensively distributed systems such as oil pipelines and the electric power grid. A higher degree of distribution often necessitates using wide-area communication methods such as leased lines, circuit switching, packet switching, and mobile communication solutions;
  • Impact of Failures: Failures in control functions can lead to varying consequences in different domains. Systems with more significant impacts often necessitate the ability to sustain operations through redundant controls or the capacity to operate in a reduced-capability state. The design must specifically cater to these requirements;
  • Hierarchy: To create a central hub that can gather data from diverse locations, supervisory control is utilized, enabling control decisions to be made based on the system’s current status. Hierarchical or centralized control is commonly employed to provide human operators with a holistic view of the entire system;
  • Control Complexity: Simple controllers and predetermined algorithms are often sufficient for managing control functions. Nevertheless, in highly complex systems such as air traffic control, the presence of human operators becomes essential to ensure that all control actions align with the overarching objectives of the system;
  • Availability: The system’s dependability, indicating its accessibility, remains critical during the design phase. Systems requiring exceptional availability or continuous operation might require heightened redundancy or alternative communication and control components strategies.

4. ICS Cyber Attack Incidents

In year 2020, the Cybersecurity and Infrastructure Security Agency detailed four primary priorities that served as the central focus of its endeavors to reduce cyber risks within control systems [40].
  • Protecting ICS environments from the most critical threats is an absolute necessity;
  • It is vital to preserve operational resilience by addressing systemic weaknesses and fortifying the capacity of control systems to withstand cyber incidents with minimal adverse effects on critical infrastructure;
  • We must provide critical infrastructure owners, operators, and cybersecurity defenders with the necessary technologies and tools to significantly increase the time, costs, and technical hurdles for adversaries;
  • Identify and proactively counteract adversaries, preempting any potential harm. CISA and its partners will cooperate to improve visibility within OT environments, guaranteeing swift detection and elimination of malicious activity before it can cause widespread damage.

4.1. Recent Attacks on ICS

In 2021, the actual threats confronting ICS garnered increased attention. The number of vulnerabilities identified in operational technology (OT) devices and their corresponding management systems witnessed a growth of over 50%. Concurrently, ransomware groups continued to target manufacturing and critical infrastructure with persistence. The reported vulnerabilities in 2021 surged by 52%, reaching almost 1440, in contrast to the prior year [41]. Cyber attacks targeting industrial facilities result in widespread repercussions [42]. Frequently, threat actors focus on Industrial Control Systems (ICS) to execute these attacks, leading to complete or partial shutdowns of crucial facilities, financial losses, data breaches, and potential health hazards [43]. In 2022, there was a significant surge in ICS, with an 87% increase in ransomware attacks targeting industrial organizations and a 35% rise in the number of ransomware groups focusing on industrial control and operational technology (OT) systems [44]. Based on the cyber incidents witnessed globally, it has become evident that threat actors’ technical capabilities have evolved substantially. Equally concerning is their readiness to cause physical harm [45]. Below are some of the recent most significant cyber attacks on industrial facilities that disrupted government and non-government facilities.

4.1.1. Colonial Pipeline—Ransomware Attack

The cyberattack that occurred on 7 May 2021, targeting Colonial Pipeline, gained worldwide attention due to its far-reaching consequences, including a severe fuel shortage and skyrocketing prices. The breach transpired when hackers managed to access the company’s network by exploiting an inactive virtual private network (VPN) account that had remote access to their computer system. To regain control of their network, Colonial Pipeline ultimately had to pay USD 4.4 million to the DarkSide hacker group in exchange for the decryption tool required for network restoration [46].

4.1.2. CPC Corp. Taiwan—Ransomware

In May 2020, CPC Corp, Taiwan’s state-owned petroleum and natural gas company, encountered a ransomware incident that left its payment system unusable. The attackers used a USB flash drive to breach the company’s computer network. While it did not affect oil production, it did disrupt CPC Corp’s payment card system. This cyberattack was attributed to the Winnti Umbrella group, a China-linked entity known for its targeting of software companies and political organizations [47].

4.1.3. Triton (2017)—Malware

During the incident in 2017, a Russian agency utilized Triton to specifically focus on a Schneider Electric Triconex safety instrumented system (SIS), which holds the responsibility of initiating safe shutdown protocols during emergencies. Following their initial access, the attackers then traversed through both IT and OT networks until they reached the safety system, where they introduced the Triton malware. This malicious software made alterations to the in-memory firmware, introducing harmful code. The FBI cautioned that this situation could have led to damage to the facility, system disruptions, or even potential loss of life if the SIS had failed to carry out the safe shutdown procedures [48,49].

4.1.4. Ukraine Power Grid Hack—Malware Attack

On 23 December 2015, a power outage that impacted approximately 1.4 million residents of Ukraine was linked to the espionage Trojan called Black Energy. This incident appears to represent the first instance of malware being employed to facilitate a widespread power disruption.

4.1.5. SFMTA Ransomware Attack

On 25 November 2016, a malware infection struck approximately 2000 of the San Francisco Municipal Transport Authority’s (SFMTA) 8000 computer systems. This malware also managed to compromise physical ticketing machines, leading to the SFMTA offering free rides to passengers over the Thanksgiving weekend. Additionally, Muni bus drivers were forced to create handwritten route assignments. The agency expected to incur a daily revenue loss of around USD 559,000 during the period when they were unable to collect fares [50].
Table 1 below provides an overview of potential ICS threat events and their corresponding descriptions.

5. Vulnerability of Industrial Control System(ICS)

Remote attacks often serve as the initial point of entry for targeting ecosystems of devices. Attackers take advantage of known vulnerabilities in specific protocol implementations, using readily available pre-written attack scripts, simplifying the attack process [51]. By monitoring non-encrypted traffic, attackers can gather valuable information about the system, enabling them to escalate the attack and eventually gain control over the targeted device. This emphasizes the significance of putting in place robust security measures, including encryption and routine vulnerability assessments, to fortify defenses against cyber threats and ensure the protection of critical industrial systems [52]. Indeed, attackers targeting industrial control systems rely on exploiting one or more existing vulnerabilities [53]. These vulnerabilities can stem from various areas, including:
  • Architecture and Design Vulnerabilities: Deficiencies in the overarching system architecture and design can be leveraged by malicious actors to obtain unauthorized access or manipulate control processes;
  • Configuration and Maintenance Vulnerabilities: Incorrect or inadequate system configurations and poor maintenance practices can create opportunities for attackers to compromise the system’s security;
  • Physical Vulnerabilities: Physical access to industrial control systems can lead to potential exploits, such as unauthorized tampering with hardware or gaining direct access to critical components;
  • Software Development Vulnerabilities: Errors or flaws in software development can introduce vulnerabilities that attackers may exploit to infiltrate and compromise the system;
  • Communication and Network Configuration Vulnerabilities: Insecure communication protocols and improperly configured networks can provide attackers with entry points to intercept or manipulate data and control commands.

5.1. Architecture and Design Vulnerabilities

(a)
Inadequate incorporation of security into architecture and design: Incorporating security into the architecture and design of ICS should be considered from the outset, considering the budget and schedule constraints of the ICS project [54]. The security architecture should be integral to the overall Enterprise Architecture [55]. To effectively address security concerns, the ICS architecture must encompass several essential aspects, including:
  • Identification and Authorization of Users: Robust authentication mechanisms should be implemented to verify the identity of users accessing the ICS. Authorization procedures must guarantee that users are allocated appropriate privileges in accordance with their designated roles and responsibilities;
  • Access Control Mechanism: Access control policies and mechanisms should be implemented to restrict and manage users’ access to critical components and functions within the ICS. This ensures that only authorized personnel can interact with specific system elements;
  • Network Topology: The network architecture of the ICS should be designed with security in mind. Network segmentation, firewalls, and other security measures should be deployed to prevent unauthorized access and isolate critical components from less secure areas;
  • System Configuration and Integrity Mechanisms: Implementing system configuration controls and integrity mechanisms ensures that the ICS operates within specified parameters and that any unauthorized changes or tampering are promptly detected and addressed.
By proactively integrating these security considerations into the ICS architecture and design, organizations can build resilient and secure systems that protect against potential cyber threats and ensure the continuity and safety of critical industrial processes.
(b)
The insecure architectural design permitted to evolve: The network infrastructure of ICS has frequently evolved and adapted to meet business and operational needs, often without sufficient consideration of the potential security consequences of these alterations. As a result, security vulnerabilities may have unintentionally emerged in certain parts of the infrastructure. In the absence of corrective measures, these vulnerabilities could serve as potential points of unauthorized access into the ICS.
(c)
No security perimeter defined: Without a clearly defined security perimeter for the ICS, it becomes challenging to guarantee the proper deployment and configuration of essential security measures [56]. This situation can result in unauthorized access to systems and data, along with other potential issues.
(d)
Inadequate collection of event data history: Investigative analysis relies on the gathering and preservation of an ample amount of data. In the absence of thorough and precise data collection, determining the cause of a security incident may become exceedingly difficult or even impossible [57]. Security incidents have the potential to go undetected, leading to additional harm and disruption. Consistent security monitoring is equally crucial for identifying issues related to security controls, such as misconfigurations and malfunctions.

5.2. Configuration and Maintenance Vulnerabilities

(a)
Operating system (OS) and application security patches are not maintained or vendor declines to patch vulnerability: Outdated operating systems and applications may house newly uncovered vulnerabilities that could be taken advantage of. It is of utmost importance to create documented guidelines for overseeing security patch management. In situations where unsupported ICS operating systems are utilized, access to security patch support may not be available. Consequently, these procedures should also incorporate backup plans for addressing vulnerabilities that may never receive prompt patch updates.
(b)
OS and vendor software patches may not be developed until a considerable time after security vulnerabilities are initially discovered: Due to the close integration between ICS software and the underlying ICS infrastructure, any modifications must undergo extensive and time-consuming regression testing, incurring significant costs. The duration required for this testing and the subsequent distribution of updated software can create a prolonged window of vulnerability.
(c)
The installation of malicious software, known as malware, is a prevalent form of attack: Installation of malicious software, or malware, is a common attack. Malware protection software, such as antivirus software, must be kept current in a dynamic environment. Outdated malware protection software and definitions open the system to new malware threats.
(d)
Insufficient examination of security modifications: Introducing modifications to hardware, firmware, and software without conducting prior testing poses a risk to the smooth operation of the ICS. It is imperative to establish well-documented procedures for evaluating the security ramifications of any changes. It is vital to refrain from using operational systems in live environments for testing. Additionally, the testing of system modifications may necessitate collaboration and coordination with system vendors and integrators.
(e)
Inadequate remote access management: There are various reasons why remote access may be required for an ICS, such as system maintenance tasks performed by vendors and system integrator or ICS engineers accessing geographically distant system components. To safeguard against unauthorized access, it is essential to maintain robust control over remote access capabilities.
(f)
Critical configurations are neither stored nor subjected to backup procedures: Procedures for restoring ICS configuration settings should be easily accessible to address unintentional or malicious configuration alterations, ensuring system availability and data protection. It is imperative to establish thorough and meticulously documented procedures for maintaining ICS configuration settings.
(g)
Unsecured information stored on portable devices: The security of the system could be compromised if confidential information, such as passwords and dial-up numbers, is stored without encryption on portable devices such as laptops and mobile devices. To minimize this risk, it is essential to implement policies, procedures, and mechanisms to safeguard this data.
(h)
Passwords generated, utilized, and safeguarded in a manner inconsistent with established policies: The extensive knowledge about password management in IT is relevant to ICS. Maintaining effectiveness requires strict compliance with password policies and procedures. Departures from these guidelines can considerably increase vulnerabilities in ICS.
(i)
Insufficient access controls implemented: Access controls should align with how the organization assigns responsibilities and privileges to its personnel. Poorly defined access controls can grant an ICS user too many privileges or restrict them excessively.
(j)
The absence of configuration management for hardware, firmware, and software can give rise to significant challenges: The organization may lack visibility into its inventory, the versions in use, their locations, or their patch status, resulting in an inconsistent and ineffective security posture. To safeguard an ICS against inadequate or improper modifications at all stages, including before, during, and after system implementation, it is essential to establish a structured process for controlling changes to hardware, firmware, software, and documentation. Failing to institute configuration change management procedures can introduce security oversights, vulnerabilities, and risks. To comprehensively secure an ICS, maintaining an accurate inventory of system assets and their current configurations is imperative [58]. These processes are essential for the implementation of business continuity and disaster recovery plans.
(k)
Improper data linking: Data storage systems within ICS can be connected to non-ICS data sources. One such example is database links, which facilitate the automatic replication of data from one database to others. However, incorrect configuration of data linkage can introduce vulnerabilities, potentially enabling unauthorized access to or manipulation of data.
(l)
Malware protection deployed without thorough testing: If malware protection software is deployed without adequate testing, it has the potential to disrupt the normal operation of the ICS and hinder the system’s ability to carry out essential control actions [59].
(m)
Denial of service (DoS): ICS software might be prone to DoS attacks, leading to the obstruction of authorized access to a system resource or the disruption of system operations and functions [60,61].
(n)
Lack of installed intrusion detection/prevention software: Incidents can result in system availability and integrity loss, data capture, modification, and deletion, and incorrect execution of control commands. IDS/IPS software may stop or prevent various types of attacks, including DoS attacks, and also identify attacked internal hosts, such as those infected with worms. IDS/IPS software must be tested before deployment to determine that it does not compromise the normal operation of the ICS.
(o)
Lack of log maintenance: In the absence of accurate logs, pinpointing the cause of a security incident can become a challenging task.
(p)
Unauthorized personnel have physical access to equipment: Limited physical access to ICS equipment should be exclusively granted to essential personnel, while considering safety prerequisites such as emergency shutdowns or restarts. Inappropriate access to ICS equipment can result in any of the following consequences:
  • Theft of data and hardware;
  • Physical harm or destruction of data and hardware;
  • Unauthorized alterations to the operational environment (e.g., data connections, unauthorized utilization of removable media, addition/removal of resources);
  • Disconnection of physical data links;
  • Untraceable interception of data (including keystroke and other input logging).
(q)
Radio frequency, electromagnetic pulse (EMP), static discharge, brownouts, and voltage spikes: Control systems hardware is susceptible to various threats, including radio frequency interference,EMP, static discharges, brownouts, and voltage spikes [62]. The consequences can vary from temporary disruption of command and control to irreversible harm to circuit boards. It is advisable to implement adequate shielding, grounding, power conditioning, and surge suppression measures.
(r)
Lack of backup power: In the absence of backup power for essential assets, a widespread power outage can result in the ICS shutdown, potentially creating a hazardous situation. Additionally, the loss of power could result in the activation of insecure default settings.
(s)
Physical ports lacking security measures: Unprotected USB and PS/2 ports could permit unauthorized connections, including thumb drives and keystroke loggers [63].

5.3. Software Development Vulnerabilities

(a)
Inadequate data validation: ICS software might fail to effectively validate user inputs or incoming data for accuracy, potentially leading to various vulnerabilities. These vulnerabilities encompass issues like buffer overflows, command injections, cross-site scripting, and path traversals.
(b)
Installed security features remain inactive in their default settings: The security features bundled with the product become ineffectual unless they are actively activated or, at a minimum, acknowledged as disabled.

5.4. Communication and Network Configuration Vulnerabilities

(a)
Unused data flows: Data flow controls are essential based on the attributes of the data, as they help regulate the permissible transfer of information between systems. These controls play a crucial role in preventing data exfiltration and unauthorized operations.
(b)
Inadequate firewall and router logs: In the absence of precise and comprehensive logs, identifying the root cause of a security incident might become an insurmountable challenge.
(c)
Standard, well-documented communication protocols are used in plain text: Adversaries with the ability to monitor ICS network activity can exploit the lack of encryption in certain protocols. Protocol analyzers and other utilities can be utilized to decode data transferred over protocols such as Telnet, File Transfer Protocol (FTP), Hypertext Transfer Protocol (HTTP), and Network File System (NFS). Since these protocols do not employ encryption, the data transmitted is easily readable by anyone monitoring the network. This exposes sensitive information, including login credentials and commands sent between devices, potentially leading to unauthorized access and manipulation of the ICS network. Adversaries can leverage this vulnerability to perform attacks against the ICS, such as eavesdropping, session hijacking, and man-in-the-middle attacks. By exploiting the lack of encryption, they can manipulate ICS network activity, disrupt operations, and potentially cause significant harm to industrial processes and critical infrastructure. To counter these threats, it is crucial to implement secure communication protocols, such as Secure Shell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS), that encrypt data transmissions and protect against unauthorized access and manipulation of ICS network activity. Employing robust authentication mechanisms and regular security assessments also enhances the overall security posture of the ICS environment.
(d)
Firewalls are either absent or configured incorrectly: Insufficiently configured firewalls can lead to unrestricted data flow between diverse networks, such as control and corporate networks. This situation can create openings for potential attacks and the spread of malware across networks, ultimately exposing sensitive data to potential monitoring, eavesdropping, and allowing unauthorized access to systems [64].
(e)
Authentication of users, data, or devices is either inadequate or entirely absent: Numerous ICS protocols lack authentication at any level. In the absence of authentication, there exists the possibility of data or device manipulation, replay attacks, and spoofing of elements like sensors and user identities.
(f)
Absence of communication integrity verification: Most industrial control protocols lack built-in integrity checks, potentially allowing adversaries to tamper with communications without detection. To ensure integrity, ICS systems can implement lower-layer protocols like IPsec, which provide data integrity protection.
(g)
Insufficient authentication measures between wireless clients and access points: It is essential to establish robust mutual authentication between wireless clients and access points to prevent clients from connecting to rogue access points deployed by adversaries. Additionally, this authentication ensures that adversaries cannot connect to any of the ICS’s wireless networks.

6. ICS Communication Protocols Cyber Vulnerabilities

With the existing system integration, the primary function of ICS is to gather real-time data, realize device automation, and supervise the entire system [65]. This is achieved through a number of communication protocols, including but not limited to DNP3, Modbus, IEC 60870-5-104, IEC 61400-25,IEEE C37.118, Message Queuing Telemetry Transport (MQTT), and Open Platform Communications(OPC). In this section, we analyze vulnerabilities of industrial protocols under an application scenario, as shown in Figure 9.
(a)
Distributed Network Protocol 3 (DNP3): DNP3 is an application layer protocol with a multi-tier structure, primarily utilized in smart grid applications [66]. DNP3 is an internationally recognized standard created to ensure dependable data transmission and support functionalities for ICS. DNP3 incorporates the Enhanced Performance Architecture (EPA), a streamlined version derived from the OSI reference model, offering significant workload reduction. DNP3 typically operates over the Transmission Control Protocol (TCP) and is assigned to port 20000. It adheres to a client–server model, involving two distinct entities: the master, which performs client functions, and the slave or outstation, which carries out server functions. The primary purpose of the slave or outstation is to respond to requests initiated by the master [67]. In this model, the master is empowered to supervise, regulate, and collect data from slaves, thereby facilitating comprehensive control over the production processes [68]. It is divided into three layers, namely:
  • The Data Link layer: It is responsible for sending and receiving frames and contains header information such as source DNP3 address and destination DNP3 address. At the same time, it is also responsible for calculating errors through Cyclic Redundancy Check (CRC) and checking the link’s status;
  • The Transport layer: The main purpose for this layer lies in the fragmentation of large packets received by the Application layer, while its header contains the information required to reassemble the fragments;
  • The Application layer: This layer creates the message to be communicated; however, this layer’s header differs depending on whether the message creator is a master or a slave, as the latter’s header contains the Internal Indications field to better describe the node’s status.
(b)
Modbus: The Modbus protocol, initially created in 1979 by the American company Gould-Modicon, is an openly available communication standard designed for enabling the communication of programmable logic controllers. With Modbus, a master device can efficiently exchange data with multiple slave devices. While theoretically, every node on the network can transmit messages, it is most common for communication to be instigated by the master device [69]. The Modbus protocol has become the most widespread protocol for communication between control devices and industrial automation. The Modbus was developed especially for industrial applications, public domain, and with no royalties charged, easy to use and maintain, while enabling Bit and word communication between devices of different manufacturers without restrictions [70]. The protocol adopts a unique protocol data unit (PDU) different from ordinary architectures. The Modbus mapping on a particular bus can bring in extra fields to the application data unit (ADU). Figure 10 below illustrates the concrete format of the general message frame of a Modbus.
They are three primary variations of the Modbus protocol, as seen below:
(a)
Modbus RTU: Modbus RTU is a widely used communication protocol in industrial automation and control systems. It is part of the Modbus family of protocols and is designed for serial communication over RS-232 or RS-485 interfaces. Modbus RTU is known for its simplicity and efficiency in transmitting data between devices such as PLCs, HMIs, sensors, and other industrial equipment [71].
Key features and characteristics of Modbus RTU include:
  • Modbus RTU uses serial communication, which is well-suited for industrial environments. It can be transmitted over RS-232 or RS-485, allowing for long-distance communication and noise immunity;
  • Modbus RTU follows a master–slave architecture, where a master device (e.g., a PLC or HMI) initiates requests, and slave devices (e.g., sensors or actuators) respond to those requests. This architecture enables centralized control and data acquisition;
  • Communication in Modbus RTU is based on frames or packets. Each frame includes a start bit, address, function code, data, and error-checking (CRC or LRC). The structure is designed for simplicity and ease of implementation;
  • Modbus RTU supports various data types, including binary (coils), discrete inputs, input registers, and holding registers, allowing for the exchange of different types of data;
  • The master device typically polls slave devices by sending requests for data. This polling mechanism allows the master to request specific information from each slave device;
  • Modbus RTU is known for its efficiency and speed in data transmission. It is suitable for real-time control and monitoring applications in industrial settings.
(b)
Modbus ASCII: Modbus ASCII is another variant of the Modbus communication protocol used in industrial automation and control systems. Like Modbus RTU, it is designed for serial communication, but it employs a different encoding format [72].
Key characteristics of Modbus ASCII include:
  • Modbus ASCII represents data using ASCII characters, making it more human-readable than Modbus RTU. Each 8-bit byte of data is converted to 2 ASCII characters;
  • Modbus ASCII is character-oriented, and each character is transmitted as a single byte (8 bits). This makes it more suitable for systems where ASCII-based communication is preferred;
  • Modbus ASCII devices can often communicate with Modbus RTU devices with proper configuration and protocol translation. This compatibility allows for flexibility when integrating different devices;
  • The ASCII format of Modbus ASCII frames makes it human-readable, which can be advantageous for troubleshooting and debugging purposes;
  • Modbus ASCII has a higher overhead compared to Modbus RTU due to the character-based encoding. This can result in slower data transfer rates, which may not be suitable for real-time applications.
(c)
Modbus TCP: Modbus TCP uses the more modern Ethernet communication protocol and is frequently employed in industrial automation and control systems to establish network connections with devices such as PLCs, HMIs, and sensors [73]. Below are some key features and characteristics of Modbus TCP
  • Modbus TCP operates over standard Ethernet networks, allowing for fast and efficient data transmission. It is well-suited for modern industrial environments and can be used alongside traditional office IT networks;
  • Modbus TCP follows a client–server architecture. In this setup, client devices (typically master devices such as PLCs or HMI) request data from server devices (slave devices), and the server responds with the requested information. This architecture allows for distributed control and monitoring;
  • Modbus TCP uses standard TCP/IP communication protocols. It relies on the widely used Transmission Control Protocol (TCP) to establish connections and ensure reliable data transfer;
  • Unlike Modbus RTU and Modbus ASCII, which use character-based frames, Modbus TCP uses binary frames. Each frame consists of a transaction identifier, protocol identifier, length field, unit identifier, function code, and data. This binary format allows for efficient data transmission;
  • Modbus TCP offers high-speed data transmission, making it suitable for real-time control and monitoring applications. Ethernet’s speed and efficiency contribute to the quick exchange of data;
  • Modbus TCP is widely used in various industries and is considered a standard for Ethernet-based communication in industrial automation and control systems;
  • Similar to other Modbus variants, Modbus TCP is an open and standardized protocol, allowing devices from various manufacturers to communicate as long as they adhere to the protocol specifications;
  • Devices using Modbus TCP communicate based on IP addresses, making it possible to have devices distributed across a network or even connected over the internet.
A group of researchers proposed the Modbus/TCP Security protocol, which incorporates authentication and authorization mechanisms to ensure protection against deliberate unauthorized access as an enhancement for improved security in the ICS framework [74].
(d)
IEC 60870-5-104: It is an unencrypted protocol, meaning it transmits data in plain text without any authentication mechanism over TCP/IP.
IEC-60870-5-104 is an international standard providing communication standards between the SCADA system and substations. In transmission, the application layer of this protocol conveys an application service data unit(ASDU).
(e)
IEC 61850: It is a collection of communication norms that outline protocols for designating devices, data, and communication systems linked to the automation of electric power substations [75].
The IEC 61850 standard presents guidelines for establishing best practices in substation engineering, encompassing protection, monitoring, integration, metering, testing, and control. Within the domain of substation automation, the need for high-speed communication is imperative to meet the data transfer rates required by modern automatic control and monitoring systems (source: [76]).
The IEC 61850 standard delivers services, protocols, and a structure engineered to streamline the modeling and communication of Intelligent Electronic Devices (IEDs) and supervisory equipment in power system automation [77].
The substation communication system is divided into three layers by IEC 61850: the process bus, the interval, and the station.
  • Process Layer: The process layer includes various primary equipment and intelligent electronics components, realizing the major functions of smart substations. The process layer within the substation involves gathering data from transformers and transducers that are interconnected with the primary power system process [78];
  • Interval Layer: This includes secondary devices like relay protection equipment and control devices and functions as a barrier between the other two layers, guaranteeing safe and dependable operations;
  • Station Control Layer: This layer primarily handles the monitoring and management of the intelligent station, enabling comprehensive measurement and control capabilities for the entire station.
(f)
IEC 61400-25: This protocol is specially designed to communicate the wind farm supervisory system and is an extension of the IEC 61850 standard in wind power generation. The basic purpose of this protocol is to provide network communication standards between the wind farm supervisory system and other subsystems and to realize the equipment’s interoperability with different manufacturers. IEC 61400-25 interface uses MMS and web service for remote supervisory control at wind power plants [79].
(g)
IEEE C37.118: In substations, this protocol is commonly used to establish synchronization and define the standards for data transmission formats. It outlines four distinct message types: data, header, configuration, and command. In the typical transmission process, these messages are converted into frames, and the PMU exclusively transmits data frames to other devices.
(h)
Message Queuing Telemetry Transport(MQTT): MQTT is a lightweight publish-subscribe messaging protocol designed for low-bandwidth, high-latency, or unreliable networks [80]. It is widely used in IoT applications for real-time data communication between devices and systems [81]. MQTT’s lightweight nature makes it suitable for resource-constrained devices. MQTT can be vulnerable to eavesdropping, man-in-the-middle attacks, and unauthorized access if not properly secured. Robust security mechanisms, and security considerations are often implemented at the application level, which include using TLS/SSL for encryption and username/password authentication. The Figure 11 below illustrates the MQTT protocol design.
(i)
Open Platform Communications (OPC): OPC is a set of standards for industrial communication, and it plays a crucial role in Industry 4.0, which focuses on the automation and digitization of manufacturing processes [82]. OPC enables the interoperability of devices, equipment, and systems in industrial environments. It includes various specifications, such as OPC Data Access (DA) and OPC Unified Architecture (UA). Some of the common threats include data interception, unauthorized access, and denial-of-service attacks. OPC UA, in particular, has robust security features, including authentication, encryption, and authorization, making it suitable for secure industrial communication [83]. Figure 12 below illustrates the general OPC protocol design.

Cybersecurity Issues Related to the Discussed Protocols

Given that the ICS integrates both cyber and physical subsystems, it possesses inherent vulnerabilities that render the system susceptible to attacks from both internal and external sources [84]. Every form of threat can have catastrophic consequences for power systems. It’s widely acknowledged that cybersecurity typically involves aspects such as authentication, authorization, encryption, confidentiality, integrity, and availability.
  • Confidentiality: Unauthorized individuals can exploit this vulnerability to access confidential information about the ICS for illicit purposes;
  • Availability: In the event of availability loss, the system could forfeit its capacity to maintain control, resulting in substantial economic losses;
  • Integrity: When a missing or corrupted data packet is received, it renders the entire transmission process ineffective, causing significant disruptions to normal operations;
  • Authorization and Authentication: Malicious actors may exploit this vulnerability by manipulating the function code to send arbitrary data to others, ostensibly under the guise of seeking constructive feedback. Prominent protocols lack authentication mechanisms for verifying identity, making it easy for unauthorized parties to obtain privileges and forge protocol packets.
The known vulnerabilities in protocols are examined, and the corresponding weaknesses are identified and documented accordingly; see Table 2 below.

7. Existing Measures to Strengthen the Cybersecurity of Industrial Control Systems

The Industrial Control system should not only be able to deal with known attacks but also be resilient against any possible evasion tactics [39]. With the increasing number of incidents reported to the ICS-Cyber Emergency Response Team (CERT), including those that go unreported or undetected, there is increasing frequency and complexity in our adversaries. Securing ICSs against the modern threat requires well-planned and well-implemented strategies that will provide network defense teams with a very effective way to detect, counter, and expel an adversary, preserving the critical process and business continuity of industrial control systems [91]. In this section, we study the strategic countermeasures against cyber attacks for industrial control systems in detail, as shown in Figure 13 below.

7.1. Risk Management and Cybersecurity Governance

  • Identify threats to the organization, which generally includes the steps of inventorying system elements, defining metrics (how to measure the level of risk), and the threats are taken into account;
  • Maintain ICS asset inventory of all hardware, software, and supporting infrastructure technologies, which makes it possible to establish a list of the company’s critical assets and processes. The impact analysis is carried out by examining the consequences on each of the security objectives: availability, integrity, and confidentiality [92];
  • Develop cybersecurity policies, procedures, training, and educational materials that apply to the organization’s ICS available on Cybersecurity and Infrastructure Security Agency [93];
  • Organizations should embrace adaptive cybersecurity measures for critical infrastructure by evolving policies beyond mere tools for enforcing predefined security requirements. These policies should become adaptive entities capable of responding and evolving in the face of emerging threats and attacks [94];
  • Develop and practice incident response procedures that join IT and OT response processes.

7.2. ICS Network Architecture

  • Implement network segmentation whenever feasible, categorizing systems into network zones according to their roles, significance to the business, risk profiles, or other criteria established by the organization. To accomplish this, employ a filtering device like a packet filtering or stateful inspection firewall at the entry point of each zone. Ensure that each zone adheres to a clearly defined baseline, consistently applied to all systems within that specific zone [95]. A network zone should always have one entry point, as depicted in Figure 14 below;
  • Design a network topology for ICS that incorporates multiple layers, prioritizing the most crucial communications within the most secure and dependable layer [96];
  • The cost of a total system failure can be catastrophic in ICS. The use of true data diodes utilize proprietary software to control data flow and allow one-way network traffic to be handled properly [97]. Data diodes and unidirectional gateways are engineered to block reverse communications at the physical layer, often employing a single fiber-optic connection represented by a single fiber strand. The ”transmit” component typically does not incorporate “receive” circuitry, while the “receive” component lacks “transmit” capabilities. This configuration guarantees absolute physical layer security but sacrifices bidirectional communication [98];
  • Establish demilitarized zones (DMZs) to configure a physical and logical subnetwork that serves as an intermediary for connected security devices, preventing direct exposure [99].

7.3. ICS Network Perimeter Security

  • Configure firewalls to control traffic between the ICS and corporate IT networks. Firewalls are network devices created to monitor and inspect incoming and outgoing traffic. They provide a layer of defense between networks. A set of rules, or access control lists (ACLs), can be established to allow or block certain packets between those networks [100];
  • Utilize IP geo-blocking that enables blocking outgoing and incoming network connections based on a geographic location [101]. This technology relies on devices’ IP addresses and other identifying factors. IP filtering is sometimes used as a security tool to protect from certain types of hackers [102,103];
  • Use jump servers as a central authorization location between ICS network security zones. These measures aid in achieving network isolation between segments with varying security levels. Jump servers are sometimes used in conjunction with additional security tools such as firewalls and Intrusion Detection Systems (IDS) to create an exceptionally secure environment in alignment with the Defense-In-Depth concept [104];
  • Prohibit remote and ongoing vendor or employee access to the control network, including the use of backdoor passwords and maintenance accounts. Manufacturers should disclose in written documentation if they employ any such accounts [105];
  • Catalog and monitor all remote connections to the network. While playing important roles in the ICS context, PLCs and RTUs lack adequate security mechanisms to overcome buffer overflow exploits or man-in-the-middle and a wider array of other cyber attacks [106,107]. The author’s suggested Shadow Security Unit (SSU) is connected in parallel to RTU/PLCs, allowing it to capture and decode the SCADA protocol data flow. It then correlates this data with the status of the physical I/O modules that communicate with sensors and actuators in the field. This makes it feasible to establish a redundant security-checking mechanism that adopts a “black box” approach when assessing the behavior of the monitored devices [108].

7.4. Security Monitoring

  • Measuring the baseline of normal operations and network traffic for ICS researchers have proposed a method using machine learning combined with passive monitoring and a priori knowledge of protocols used. It is important that no measuring device or monitoring system interferes with the ICS environment under scrutiny [109];
  • Configure Intrusion Detection Systems (IDS) to create alarms for any ICS network traffic outside normal operations;
  • Track and monitor audit trails on critical areas of ICS. Set up a Security Information and Event Management system (SIEM) to gather pertinent data from various origins, detect variances from established norms, and execute suitable responses [110];
  • Establish a SIEM system to oversee, analyze, and correlate event logs throughout the ICS network for the detection of intrusion attempts [111].

7.5. Host Security

  • Promote a culture of patching and vulnerability management. Patch management reduces cybersecurity risks and ensures production availability [112]. Smart prioritization is a method for sequencing patches in a complex, interconnected network, consisting of three fundamental steps. It seamlessly integrates principles from system modeling, risk assessment, and game theory. Smart prioritization makes use of existing knowledge, insights, and previous experiences related to system dynamics to identify an efficient and exceptionally effective defensive strategy [113];
  • Test all patches in off-line test environments before implementation;
  • Implement application whitelisting on human–machine interfaces. Application whitelisting is a security technique that enhances security by allowing systems to run only those applications that have been explicitly approved and listed in a designated whitelist [114];
  • Harden field devices, including tablets and smartphones;
  • Replace out-of-date software and hardware devices;
  • After conducting thorough testing to confirm that it will not disrupt ICS operations, disable unused ports and services on ICS devices;
  • Implement and test system backups and recovery processes;
  • Configure encryption and security for ICS protocols.

8. Machine Learning Integration in Defending ICS from Cyber Attacks

Machine learning, a branch of artificial intelligence (AI) and computer science, centers on utilizing data and algorithms to mimic the learning process of humans, with the aim of progressively enhancing its accuracy [115]. Applying machine learning in cybersecurity makes the malware detection process more actionable, scalable, and effective than traditional approaches, which require human intervention [116]. Machine learning revolves around the creation of new patterns and the management of these patterns through algorithms. It can offer real-time detection of active threats, thereby aiding cybersecurity teams in proactively preventing security breaches [117]. Machine learning has a substantial impact on cybersecurity, as it facilitates a range of techniques for the detection and mitigation of cyber threats [118]. This section discusses the most common machine learning approaches used in strengthening the cybersecurity for industrial control systems.

Anomaly Detection

This approach entails training a machine learning model on a dataset that represents normal behavior, enabling it to identify deviations or anomalies effectively [119]. It can help detect abnormal activities, such as network intrusions, system misuse, or suspicious user behavior [120]. The correct detection of unusual events empowers the decision maker to act on the system to correctly avoid, correct, or react to the associated situations [121].
The strength of different machine learning anomaly detection techniques can vary depending on the specific use case, dataset, and goals of the anomaly detection task. Table 3 shows some common machine learning anomaly detection techniques and their strengths.
The above mentioned machine learning techniques for anomaly detection are powerful tools for identifying outliers and unusual patterns in data, but they come with limitations and challenges. Table 4 highlights some common limitations of different machine learning anomaly detection techniques.
(a)
Supervised machine learning-based anomaly detection approaches: Supervised machine learning-based anomaly detection approaches can be applied to strengthen the cybersecurity of ICS [140]. It involves training a model on labeled data to classify normal and abnormal behavior in the system. Here are a few common approaches [141]:
  • Support Vector Machines (SVM): SVM is a widely employed supervised learning algorithm for tasks involving classification [142]. In anomaly detection, SVM can be trained on labeled data, where normal behavior is labeled as one class and anomalies as another [143]. SVM tries to find a hyperplane that maximally separates the two classes. According to researchers, data in this domain is referred to as industrial sensor data because it is recorded using different sensors and collected for analysis. It has a temporal aspect, and time series analysis is also used in works such as Ref. [144], according to research conducted on the Petroleum industry, which is one of such real-world application scenarios. In particular, heavy extraction machines for pumping and generation operations such as turbo-machines are intensively monitored by hundreds of sensors each that send measurements with a high frequency for damage prevention. To deal with this and with the lack of labeled data for training and validation of models in some scenarios [145,146], an approach describing a combination of a fast and high-quality segmentation algorithm with a one-class support vector machine for efficient anomaly detection in turbomachines was suggested. Another researcher employed a technique that merges unsupervised fuzzy C-means clustering (FCM) with a supervised support vector machine (SVM) to compute the distance between communication data within industrial control networks and the cluster center. The support vector machine then categorizes data segments that meet specific threshold criteria. Experimental findings demonstrate that, in comparison to the conventional intrusion detection approach, this method can notably decrease the training duration and enhance classification accuracy, all without prior knowledge of class labels [147];
  • Random Forest: Random Forest is an ensemble learning technique that amalgamates numerous decision trees. In anomaly detection, each decision tree is trained on labeled data, and the final decision is made based on the majority vote of the trees. Random Forest can handle high-dimensional data and is effective at identifying anomalies. Random Forests are collections of Decision Trees, binary classifiers consisting of one root node, several internal split nodes, and leaf nodes that are used to classify events [148];
  • Neural Networks: Neural networks, such as feed-forward networks or recurrent neural networks (RNNs), can also be used for supervised anomaly detection. These models are trained using labeled data and have the capability to grasp intricate patterns and relationships within the data [149].
    RNNs are useful with ICS data. The employment of parallel multi-view neural networks to identify anomalies within an industrial control system has been studied recently. These networks achieve this by forecasting operational states. Integrating this predictive ability into the system enables semi-supervised monitoring of system operations, ensuring that the real-time system state aligns with a predefined region within the state space forecast earlier by the neural networks. Additionally, in cases where the two predictive models disagree in their assessment of the system’s state (leading to a lack of consensus), it is probable that the system’s operation has been compromised. This divergence could be attributed to issues such as faulty equipment, communication errors, or other sources of malfunction. To obtain distinct perspectives on the system, one of the predictive models is trained to analyze the data flow from system control packets, while the other model is trained to examine gyrometric signals collected from physical sensors within the control system [150];
  • Gradient Boosting: Gradient Boosting is an ensemble learning approach that blends several weak learners, such as decision trees, to construct a robust predictive model [151]. It iteratively builds models, focusing on the instances that previous models misclassified. Gradient Boosting algorithms like XGBoost or LightGBM have been successful in various anomaly detection tasks [152,153,154]. While the majority of machine learning methods concentrate on optimizing hyperparameters to enhance detection rates, alternative research suggests an approach that prioritizes the identification of the most promising dataset features. This approach employs Gradient Boosting Feature Selection (GBFS) to select these features before implementing the classification algorithm. This combination enhances not just the detection rate but also accelerates execution speed. GBFS employs the Weighted Feature Importance (WFI) extraction method to simplify classifier complexity. After identifying the most promising features from the power grid dataset using a GBFS module, it accesses a range of machine learning techniques based on decision trees [155,156];
  • Deep Learning Autoencoders: Autoencoders are neural network structures that acquire the ability to encode input data into a reduced-dimensional representation and subsequently decode it to reconstruct the original input. By training an autoencoder on a large dataset of normal behavior, it learns to reconstruct the normal data accurately [157]. Anomalies can then be detected by measuring the reconstruction error, where higher errors indicate anomalies. Deep Learning has demonstrated remarkable efficacy in autonomously acquiring valuable representations of intricate data [158]. Autoencoders excel at identifying the most challenging and nonlinear dependencies within the data, making them particularly adept at achieving high-quality anomaly detection [159]. In certain scenarios, autoencoders demand fewer computing resources. Some researchers have devised an intrusion detection system for recognizing various injection attacks, employing deep learning algorithms like stacked autoencoders and deep belief networks that are customized for this purpose [160]. A group of researchers endeavored to create an intrusion detection system reliant on deep learning. This system can swiftly detect intrusions and other undesirable activities that may disrupt networking systems. It leverages the One Hot encoder for preprocessing and the Autoencoder for feature extraction [161].
(b)
Unsupervised machine learning-based anomaly detection approaches: These play a crucial role in enhancing the cybersecurity of ICS by identifying abnormal behavior or potential cyber threats without needing labeled data. Here are some common unsupervised anomaly detection approaches used in ICS:
  • Isolation Forest: Isolation Forest is a tree-based algorithm that isolates anomalies by recursively partitioning data until each data point is isolated in its tree leaf. Anomalies are identified as instances that require fewer partitions to isolate. The algorithm can be categorized into two main stages: Forest construction and element evaluation. During the creation of individual trees, the sample element set is divided. More precisely, nodes for isolating trees are created by randomly selecting an attribute and its associated partition. Conversely, the evaluation function focuses on navigating the analyzed element through these trees [162];
  • Density-Based Clustering (like DBSCAN): Density-based clustering methods group data points based on their density. In ICS, these methods can help identify clusters of normal behavior and consider isolated points as anomalies [119]. This approach is based on the assumption that data from healthy states tend to cluster in high-density regions, while data from faulty states are typically found in low-density regions. By delineating the boundaries of these regions, it becomes possible to identify data points corresponding to anomalous states. The method involves assessing the density values for both healthy and faulty machinery. The rate at which the density changes from healthy to faulty is determined as a fault threshold. This method can be particularly useful in scenarios where obtaining faulty data is arduous or expensive [163];
  • Local Outlier Factor (LOF): LOF calculates the density of data points with respect to their neighbors. In ICS, LOF can identify points with significantly lower density as anomalies [164]. LOF aims to forecast the imminent faults of an appliance in the IoT system, whose predictive performance greatly depends on the selection of its hyperparameters. Hyperparameter tuning for unsupervised machine learning models such as LOF in IoT systems presents a significant challenge due to the potential existence of previously unseen anomalies in incoming data, which were not part of the training set. A novel heuristic approach for hyperparameter tuning in LOF explicitly accounts for the likelihood of encountering new types of anomalies has been studied. Utilizing this novel approach to tune the LOF model resulted in robust predictive performance, as demonstrated in both simulation experiments and real-world data applications [165];
  • One-Class Support Vector Machine (OCSVM): One-Class SVM is designed for novelty detection and can be used in ICS to learn the boundaries of normal behavior and classify instances. OCSVM can train anomaly detection model with only one class of samples. Furthermore, OCSVM can build a more accurate model and has robustness for noise samples. OCSVM has been proven to be an effective machine learning method for intrusion detection in industrial control systems [166];
  • Gaussian Mixture Models: GMM assumes that data points are generated from a mixture of several Gaussian distributions. Anomalies can be detected as instances with low probabilities under the fitted GMM. In their study, certain researchers employed a statistical traffic analysis approach that relies on the Gaussian mixture model. This method was utilized to discern the presence of anomalies, such as man-in-the-middle attacks, within a communication process by analyzing the timing of traffic communication. In modern network environments, the usual communication process tends to demonstrate a significant level of stability during normal conditions, resulting in the convergence of its communication timings to a relatively consistent range of values. Nevertheless, if there is a departure in the time elapsed for traffic generated by a particular communication compared to the pattern observed in historical data, it is a reasonable indication that anomalies, like potential man-in-the-middle attacks, might be occurring in this process [167].
(c)
Intrusion Detection Systems (IDS): Machine learning, when integrated into IDSs, has yielded favorable outcomes by leveraging various learning approaches, encompassing supervised, unsupervised, and reinforcement learning [168,169]. Machine Learning as a part of IDSs has had positive results by using different kinds of learning, including supervised, unsupervised, and reinforcement learning [170].
  • Random Forest (RF): In response to these challenges, a power industrial control system intrusion detection model based on Random Forest was introduced. Additionally, the same study introduced an enhanced grid search algorithm (IGSA) designed to optimize the hyperparameters of the RF intrusion detection model, thus enhancing its efficiency and effectiveness. The proposed IGSA significantly accelerates computation speed, reducing it from O(nm) to O(n × m). Following the hyperparameter optimization process, the suggested model was evaluated using a publicly available power industrial control system dataset. The experimental findings illustrate that our approach attains outstanding detection performance, achieving an impressive accuracy rate of 98%. Moreover, it surpasses comparable efforts within the same category [171]. The ensemble Gradient Boosting algorithm is an ensemble learning method based on a combination of additive models (weak learners), which can gradually learn from the previous misclassifications to create a stronger learning model [172]. This algorithm has been enhanced with a feature selection process, which elevates its overall performance by extracting the most pertinent features from the input data;
  • Unsupervised Learning: Unsupervised learning does not necessitate labeled data and proves beneficial when obtaining labeled data is scarce or challenging. Common unsupervised learning algorithms for IDS in ICS include:
    Autoencoders: Autoencoders are neural network architectures that learn to reconstruct the input data. They can be used for anomaly detection by identifying instances with high reconstruction error [173]. These autoencoder-based methods have been applied to build NIDS in IoT environments recently. Some researchers used deep autoencoders to detect IoT botnet attacks. Their proposed model comprised an ensemble of autoencoders, with each autoencoder trained to recognize the normal network behaviors of a specific IoT device and flag any unusual traffic stemming from that device. This model was assessed on a testbed network containing nine commercial IoT devices that had been compromised by the Mirai and BASHLITE botnets. The model showcased exceptional performance, achieving a true positive rate of 100% while keeping the false positive rate at just 7% [174];
    Isolation Forest: The Isolation Forest algorithm is rooted in the Decision Tree algorithm. It identifies outliers by randomly selecting a feature from the available feature set and then randomly choosing a split value within the range of that feature’s maximum and minimum values. This random partitioning of features leads to shorter paths in trees for anomalous data points, effectively distinguishing them from the majority of the data [175];
    Density-Based Clustering: The hypothesis is that if two packets belong to the same attack type, they are more likely to fall into the same cluster when any clustering algorithm is applied with any hyperparameters. In other words, when several clustering algorithms are applied, the more two samples fall into the same cluster, the more likely they belong to the same attack type [176].
  • Semi-Supervised Learning: Semi-supervised Learning combines labeled and unlabeled data during training. This can be useful in scenarios where obtaining labeled data is costly or time-consuming:
    Reinforcement Learning: Reinforcement learning can be used in IDS for dynamic decision-making in response to evolving cyber threats. However, it might be less commonly used due to the need for careful tuning and potential risks in real-world environments [177]. A team of researchers introduced an innovative approach to network intrusion detection, merging Q-learning-based reinforcement learning with a deep feed-forward neural network technique for the purpose of network intrusion detection [178]. The proposed Deep Q-Learning (DQL) model offers a persistent self-learning ability within a network environment. It employs an automated trial-and-error approach to identify various types of network intrusions and consistently improve its detection capabilities;
    Deep Learning: Deep learning models, including recurrent neural networks (RNNs) and convolutional neural networks (CNNs), can be utilized in IDS to capture intricate patterns and temporal dependencies within ICS data [179].
  • Secure Authentication and Authorization: Machine learning can enhance authentication and authorization processes, making it more difficult for attackers to bypass access controls. Reinforcement learning methods, like Q-learning, can be utilized for IoT device authentication and the identification of jamming and malware attacks. These techniques acquire knowledge from the environment, whether on the cloud or high-computational edge devices, without relying on a pre-established training dataset [180];
  • Leveraging Machine Learning for Predictive Maintenance in ICS: A group of researchers introduced a Predictive Maintenance approach that enables the adoption of dynamic decision rules for maintenance management, even in scenarios involving high-dimensional and censored data challenges. This is accomplished by training multiple classification modules with varying prediction horizons, offering diverse performance trade-offs concerning the frequency of unforeseen failures and unused equipment lifespan. Subsequently, this information is integrated into an operational cost-driven maintenance decision system to minimize anticipated expenses. The efficacy of this methodology is showcased through both a simulated illustration and a benchmark maintenance problem in semiconductor manufacturing [181].

9. Challenges of Machine Learning Approaches and Mechanisms for Defending ICS

ML methods have demonstrated significant potential in improving cybersecurity but encounter various challenges. Some of the key challenges of using machine learning in cybersecurity include:
  • Data Quality and Quantity: ML models require large amounts of high-quality, labeled data for training. In cybersecurity, obtaining such data can be difficult due to the scarcity of certain types of cyber attack data or the potential risks associated with using real-world attack data [182]. Another challenge in ML-based systems is the dependency on data labeling. Large datasets with labeled data are necessary for ML-based systems, which are challenging and expensive to gather [183];
  • Imbalanced Data: In cybersecurity, the number of normal instances (benign data) often outweighs the number of malicious instances (attack data), resulting in imbalanced datasets. This can lead to biased models and poorer performance in detecting rare cyber threats [184];
  • Adversarial Attacks: Adversaries can attempt to manipulate ML models by crafting adversarial examples, which are carefully designed inputs to cause misclassification. Adversarial attacks can reduce the reliability and robustness of ML-based cybersecurity solutions [185]. As per findings from certain researchers, it is possible for an adversary to target the training process directly. If the adversary manages to introduce their own data samples or manipulate the training data in some way, they can effectively manipulate the model, leading to erroneous associations between input characteristics and categories (referred to as “false learning”) or undermining the trustworthiness of the labeling, ultimately resulting in a reduction in the accuracy of the model. In both scenarios, tampering with the training process undermines the model’s reliability and weakens its ability to withstand adversarial inputs;
  • Logic manipulation: In this instance, a malicious actor targets the machine learning model by manipulating the model’s logic in order to interfere with the learning outcomes. This is regarded as one of the most significant threats to the machine learning process [186]. A single machine learning model may not be universally suitable for all tasks across different scenarios that require attention. Typically, a specific machine learning model is trained for a particular problem or, at best, can be adapted for a similar task. Furthermore, Cyber-Physical Systems (CPS) exhibit considerable diversity, making it challenging to apply a single machine learning model comprehensively. Therefore, a range of models and diverse datasets are essential to create system-wide solutions [187];
  • Machine learning models impose stringent demands regarding the dimensions, configurations, and formats of input data: Despite the vast amounts of data that Cyber-Physical Systems (CPS) collect, there is no assurance of data quality, particularly as the lifespan of newly introduced IoT hardware may remain unverified. To prepare input data for machine learning, it must undergo transformation from its raw state into a specific data format. This transformation process can result in substantial computational expenses. Alternatively, machine learning systems must possess the capability to inherently manage and adapt to the raw data and associated noise.

10. Recommendations and Future Research Direction

  • Threat Modeling and Risk Assessments: Conduct thorough threat modeling and risk assessments to identify critical assets, vulnerabilities, and potential attack vectors. Use this information to prioritize security measures based on risk levels [188]. Since attackers are able to monitor non-encrypted traffic to gain information about the system, machine learning approaches that can integrate threat modeling, risk assessment, and automatic traffic encryption will be a great resource for strengthening the cyber defense of industrial control systems;
  • Security-by-Design: Incorporate cybersecurity considerations from the early stages of ICS development and implementation. Security-by-design principles can help minimize vulnerabilities and reduce the cost of retroactively implementing security measures;
  • Remote Continuous Monitoring and Incident Response: Implement real-time monitoring of ICS networks and establish efficient incident response plans to quickly detect and mitigate cyber threats with less human intervention;
  • Intelligent Hardware Security: Develop and adopt hardware security measures, such as secure boot, cryptographic processors, and physical tamper detection, to enhance the overall security posture of ICS components;
  • Develop diverse machine learning models: Machine learning models should be trained to manage diverse tasks to make it possible to address more than one security situation. Machine learning models trained for a specific problem, or can at most be retrained to another similar task;
  • Automation and Response: Artificial Intelligence can automate the response to certain security incidents. For example, AI-driven security orchestration can isolate compromised systems, block malicious traffic, and initiate incident response processes;
  • Collaborative Threat Intelligence: Artificial Intelligence can facilitate the sharing of threat intelligence among organizations, enabling them to collectively defend against emerging threats that target ICS environments;
  • Robustness Testing and Simulation: AI can assist in simulating potential attack scenarios to identify vulnerabilities and weaknesses in ICS systems, helping organizations proactively strengthen their security posture;
  • Continuous Monitoring and Updating: Cyber threats evolve, so it is crucial to continuously monitor the system’s performance and update the machine learning models accordingly. Regularly retraining the models with new data and adapting to emerging attack patterns is necessary.

11. Conclusions

This article has comprehensively examined the intricate facets of ICS security. Its primary goal has been to provide novel insights and foster the growth of knowledge within the ICS security domain. Throughout the article, considerable attention has been dedicated to the exploration of the fundamental elements influencing decision-making in ICS design. A broad spectrum of established security measures has been meticulously evaluated, alongside an in-depth analysis of the integration of cutting-edge methodologies such as machine learning to fortify security measures. The holistic approach taken within the article ensures a profound comprehension of the complexities inherent to ICS security, thereby proposing the integration of machine learning, particularly in the context of training models for diverse tasks, as a potential solution to address a myriad of security scenarios. Additionally, it analyses the necessity of incorporating cybersecurity considerations right from the outset of ICS development. Regular retraining of machine learning models with up-to-date data to effectively adapt to evolving attack patterns has been recommended in this article. The article’s emphasis on both the identification of challenges and the formulation of practical recommendations not only communicates the current findings but also lays a solid foundation for future research endeavors and improvements in the realm of ICS security.
The insights presented in this article serve to advance the field of ICS security and provide valuable guidance for enhancing the security of critical infrastructure. By considering the recommended strategies we shall continue the research and support organizations to better protect their ICS environments against evolving cyber threats and contribute to the overall resilience and reliability of Industrial systems.
Furthermore, it is essential for future research to maintain a dynamic approach to ICS security. The landscape of threats is in a constant state of flux, with adversaries continuously refining their tactics. Consequently, upcoming investigations should prioritize the development of adaptable security strategies capable of responding to emerging threats. This entails the establishment of self-learning security systems with the ability to dynamically adjust their defensive mechanisms, making effective use of artificial intelligence and machine learning for real-time threat intelligence and preemptive threat mitigation. Additionally, fostering interdisciplinary cooperation between experts in cybersecurity, control systems engineering, and data science is crucial for crafting holistic security solutions that encompass both the technical and operational dimensions. In an era marked by the proliferation of digitalization and increased connectivity in industrial contexts, proactively outmaneuvering adversaries and preemptively countering nascent risks holds paramount importance in preserving the integrity of critical infrastructure and upholding the dependability of industrial systems.

Author Contributions

The authors declare that they have equally contributed to the paper. All authors read and approved the final manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

We want to thank the authors of the literature cited in this paper for contributing useful ideas to this study.

Conflicts of Interest

The authors declare no conflict of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.

Abbreviations

The following abbreviations are used in this manuscript:
IOTInternet of Things
ICSIndustrial Control System
CPSCyber Physical System
DCSDistributed Control system
SCADASupervisory Control and Data Acquisition
PLCProgrammable Logic Controllers
RTURemote Telemetry Units
WANWide Area Networks
HMIHuman-machine interface
IDSIntrusion Detection System
IEDElectromagnetic Device
DNP3Distributed Network Protocol 3
OSOperating System
LANLocal Area Network
EMPElectromagnetic Pulse
ASDUApplication Service Data Unit
MMQTTMessage Queuing Telemetry Transport
OPCOpen Platform Communications

References

  1. Industrial Control System. Definition. Available online: https://www.trendmicro.com/vinfo/us/security/definition/industrial-control-system (accessed on 24 May 2023).
  2. Industrial Control System (ICS): Functional Components and Uses. 10 June 2019. Available online: https://study.com/academy/lesson/industrial-control-system-ics-functional-components-uses.html (accessed on 25 May 2023).
  3. Santhi, A.R.; Muthuswamy, P. Industry 5.0 or industry 4.0S? Introduction to industry 4.0 and a peek into the prospective industry 5.0 technologies. Int. J. Interact. Des. Manuf. 2023, 17, 947–979. [Google Scholar] [CrossRef]
  4. Tariq, U.; Ahmed, I.; Bashir, A.K.; Shaukat, K. A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review. Sensors 2023, 23, 4117. [Google Scholar] [CrossRef] [PubMed]
  5. 2022 the State of Operational Technology and Cybersecurity. Global Leader of Cybersecurity Solutions and Services. Available online: https://www.fortinet.com/resources-campaign/secure-ot/2022-the-state-of-operational-technology-and-cybersecurity (accessed on 27 May 2023).
  6. Types of Industrial Control Systems. Available online: https://www.thomasnet.com/articles/instruments-controls/types-of-industrial-control-systems/ (accessed on 24 May 2023).
  7. Industrial Control Systems (ICS) Market Size by 2030. Available online: https://www.coherentmarketinsights.com/market-insight/industrial-control-systems-ics-market-5587 (accessed on 24 May 2023).
  8. Sverko, M.; Grbac, T.G.; Mikuc, M. SCADA Systems With Focus on Continuous Manufacturing and Steel Industry: A Survey on Architectures, Standards, Challenges and Industry 5.0. IEEE Access 2022, 10, 109395–109430. [Google Scholar] [CrossRef]
  9. Agarwal, T. SCADA System: Architecture, Components, Types and Its Applications. ElProCus. 7 January 2021. Available online: https://www.elprocus.com/scada-system-architecture-its-working/ (accessed on 29 May 2023).
  10. Loshin, P. What Is SCADA (Supervisory Control and Data Acquisition)? WhatIs.com. 16 December 2021. Available online: https://www.techtarget.com/whatis/definition/SCADA-supervisory-control-and-data-acquisition (accessed on 29 May 2023).
  11. Abusaq, M.J.; Zohdy, M.A. Analyzing the Impact of Security Characteristics on Industrial Control Systems. In Proceedings of the 2022 8th International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, India, 25–26 March 2022; pp. 635–641. [Google Scholar] [CrossRef]
  12. S.M. SCADA Application in Manufacturing Industries and Power Generation. Instrumentation and Control Engineering. 11 March 2023. Available online: https://automationforum.co/applications-of-scada/ (accessed on 3 June 2023).
  13. Pathak, A. An introduction to supervisory control and Data Acquisition (SCADA) for Beginners. Geekflare. 16 January 2023. Available online: https://geekflare.com/scada-for-beginners/ (accessed on 29 May 2023).
  14. Alanazi, M.; Mahmood, A.; Chowdhury, M.J.M. SCADA vulnerabilities and attacks: A review of the state-of-the-art and open issues. Comput. Secur. 2023, 125, 103028. [Google Scholar] [CrossRef]
  15. Jeffries, M. Industrial Control Systems: The Four Generations of SCADA Architectures. Available online: https://www.maderelectricinc.com/blog/industrial-control-systems-the-four-genertions-of-scada-architectures (accessed on 29 May 2023).
  16. Nagda, V.; Ojha, C.; Attada, S. Types of SCADA System Architecture. Instrumentation Tools. 18 April 2023. Available online: https://instrumentationtools.com/scada-system-architecture/ (accessed on 29 May 2023).
  17. SCADA Architectures: Monolithic System. SCADA ARCHITECTURES: MONOLITHIC SYSTEM. Available online: https://powersystemsloss.blogspot.com/2012/01/scada-architectures-monolithic-system.html (accessed on 29 May 2023).
  18. Admin. SCADA System Architecture, Types and Applications. WatElectronics.com. 9 May 2022. Available online: https://www.watelectronics.com/scada-system-architecture-types-applications/ (accessed on 29 May 2023).
  19. Yadav, G.; Paul, K. Architecture and Security of SCADA Systems: A Review. Int. J. Crit. Infrastruct. Prot. 2021, 34, 100433. [Google Scholar] [CrossRef]
  20. Zhu, B.; Joseph, A.; Sastry, S. A Taxonomy of Cyber Attacks on SCADA Systems. In Proceedings of the 2011 International Conference on Internet of Things and 4th International Conference, Dalian, China, 19–22 October 2011. [Google Scholar]
  21. Björkman, G.; Sommestad, T.; Ekstedt, M.; Hadeli, H.; Liu, K.; Chenine, M. SCADA System Architectures. 2010. Available online: https://api.semanticscholar.org/CorpusID:109456860 (accessed on 29 May 2023).
  22. Balsom, P. Understanding a Monolithic SCADA System. High Tide. 19 January 2023. Available online: https://htt.io/understanding-a-monolithic-scada-system/ (accessed on 29 May 2023).
  23. Sajid, A.; Abbas, H.; Saleem, K. Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges. IEEE Access 2016, 4, 1375–1384. [Google Scholar] [CrossRef]
  24. Bindhumadhava, B.S.; Kumar, R.S.; Kalluri, R.; Pidikiti, D.S. SCADA Communication Protocols: Vulnerabilities, Attacks and Possible Mitigations. Csi Trans. Ict 2013, 1, 135–141. [Google Scholar]
  25. Pliatsios, D.; Sarigiannidis, P.; Lagkas, T.; Sarigiannidis, A.G. A Survey on SCADA Systems: Secure Protocols, Incidents, Threats and Tactics. IEEE Commun. Surv. Tutorials 2020, 22, 1942–1976. [Google Scholar] [CrossRef]
  26. Sivaranjith. Function and Components of DCS. Instrumentation and Control Engineering. Available online: https://automationforum.co/function-and-components-of-dcs/ (accessed on 3 June 2023).
  27. Vogel-Heuser, B.; Feldmann, S.; Werner, T.; Diedrich, C. Modeling network architecture and time behavior of Distributed Control Systems in industrial plant automation. In Proceedings of the IECON 2011—37th Annual Conference of the IEEE Industrial Electronics Society, Melbourne, VIC, Australia, 7–10 November 2011; pp. 2232–2237. [Google Scholar] [CrossRef]
  28. Distributed Control System. Available online: http://kazanets.narod.ru/files/DCS.pdf (accessed on 3 June 2023).
  29. Scribd. What Is Distributed Control System (DCS)—DCS (Distributed Control Systems)—Industrial Automation, PLC Programming, SCADA and PID Control System PDF. Scribd. Available online: https://www.scribd.com/ (accessed on 3 June 2023).
  30. Gillis, A.S. What Is a DCS? I Definition from TechTarget. WhatIs.com. 27 January 2023. Available online: https://www.techtarget.com/whatis/definition/distributed-control-system (accessed on 6 June 2023).
  31. Hexa. What Is a DCS System and What Is It for? HEXA Ingenieros. 18 September 2020. Available online: https://hexaingenieros.com/what-is-a-dcs-system-and-what-is-it-for/?lang=en (accessed on 3 June 2023).
  32. Sehr, M.A.; Lohstroh, M.; Weber, M.; Ugalde, I.; Witte, M.; Neidig, J.; Hoeme, S.; Niknami, M.; Lee, E.A. Programmable Logic Controllers in the Context of Industry 4.0. IEEE Trans. Ind. Inform. 2020, 17, 3523–3533. [Google Scholar] [CrossRef]
  33. PLCs Programmable Logic Controllers—A Complete Guide. Available online: https://uk.rs-online.com/web/content/discovery/ideas-and-advice/plcs-programmable-logic-controllers-guide (accessed on 7 June 2023).
  34. Programmable Logic Controller|MachineMfg. MachineMfg. Available online: https://www.machinemfg.com/programmable-logic-controller/ (accessed on 7 June 2023).
  35. Hajda, J.; Jakuszewski, R.; Ogonowski, S. Security challenges in Industry 4.0 PLC Systems. Appl. Sci. 2021, 11, 9785. [Google Scholar] [CrossRef]
  36. Mellado, J.; Núñez, F. Design of an IoT-PLC: A containerized programmable logical controller for the industry 4.0. J. Ind. Inf. Integr. 2021, 25, 100250. [Google Scholar] [CrossRef]
  37. Folgado, F.J.; González, I.; Calderón, A.J. Data acquisition and monitoring system framed in Industrial Internet of Things for PEM hydrogen generators. Internet Things 2023, 22, 100795. [Google Scholar] [CrossRef]
  38. Yu, F.A.Y.; Fu, S.B.H.; Qiu, T.C.T.; Wang, F.D.Z. Control System Design of Spacecraft Mechanical Ground Support Equipment Automatic Storage System. In Proceedings of the 2018 IEEE 8th Annual International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER), Tianjin, China, 19–23 July 2018; pp. 977–981. [Google Scholar] [CrossRef]
  39. Guide to Industrial Control Systems (ICS) Security—NIST. NIST. Available online: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r2.pdf (accessed on 10 June 2023).
  40. Cybersecurity and Infrastructure Security Agency (CISA). Securing Industrial Control Systems: CISA. Available online: https://www.cisa.gov/resources-tools/resources/securing-industrial-control-systems#:~:text=The%20Cybersecurity%20and%20Infrastructure%20Security,manage%20national%2Dlevel%20ICS%20risk (accessed on 12 June 2023).
  41. Protecting Operational Technology Environments. Available online: https://www.blackberry.com/us/en/solutions/operational-technology (accessed on 27 May 2023).
  42. Ahmed, I.; Obermeier, S.; Naedele, M.; Richard, G.G. SCADA Systems: Challenges for Forensic Investigators. Computer 2022, 45, 44–51. [Google Scholar] [CrossRef]
  43. Shareef, T. 9 Times Hackers Targeted Cyberattacks on Industrial Facilities. MUO. 15 January 2022. Available online: https://www.makeuseof.com/cyberattacks-on-industry-hackers/ (accessed on 28 May 2023).
  44. Schwartz, M.J.; Ross, R. Ukrainian Power Grid: Hacked. Bank Information Security. Available online: https://www.bankinfosecurity.com/ukrainian-power-grid-hacked-a-8779 (accessed on 28 May 2023).
  45. Hemsley, K.E.; Fisher, D.R.E. History of Industrial Control System Cyber Incidents (Technical Report)|OSTI.GOV. 31 December 2018. Available online: https://www.osti.gov/servlets/purl/1505628 (accessed on 28 May 2023).
  46. 2022 ICS/OT Cybersecurity Year in Review Report. Available online: https://hub.dragos.com/ics-cybersecurity-year-in-review-2022 (accessed on 28 May 2023).
  47. The Attack on Colonial Pipeline: What We’ve Learned and What We’ve Done over the Past Two Years: CISA. Cybersecurity and Infrastructure Security Agency CISA. 22 May 2023. Available online: https://www.cisa.gov/news-events/news/attack-colonial-pipeline-what-weve-learned-what-weve-done-over-past-two-years (accessed on 28 May 2023).
  48. Corp, C.T. China-Linked Threat Group Targets Taiwan Critical Infrastructure, Smokescreen Ransomware. Medium. 10 June 2022. Available online: https://medium.com/cycraft/china-linked-threat-group-targets-taiwan-critical-infrastructure-smokescreen-ransomware-c2a155aa53d5 (accessed on 28 May 2023).
  49. Hardcastle, J.L. Triton Malware Still a Threat. FBI Warns. 28 March 2022. Available online: https://www.theregister.com (accessed on 28 May 2023).
  50. The San Francisco Public Transit Ransomware Attack: What We’ve Learned. Available online: https://www.cyberpolicy.com/cybersecurity-education/the-san-francisco-public-transit-ransomware-attack-what-weve-learned (accessed on 28 May 2023).
  51. You, Y.; Lee, J.; Oh, J.; Lee, K. A Review of Cyber Security Controls from An ICS Perspective. In Proceedings of the 2018 International Conference on Platform Technology and Service (PlatCon), Jeju, Republic of Korea, 29–31 January 2018; pp. 1–6. [Google Scholar] [CrossRef]
  52. Threat Models and Risk Assessments: Security IP. Synopsys. Available online: https://www.synopsys.com/designware-ip/technical-bulletin/using-threat-models-2017q4.html (accessed on 12 June 2023).
  53. Flaus, J.-M. Vulnerabilities of ICS. In Cybersecurity of Industrial Systems; Wiley: Hoboken, NJ, USA, 2019; pp. 121–139. [Google Scholar] [CrossRef]
  54. Fluchs, S.; Tasten, E.; Mertens, M.; Horch, A.; Drath, R.; Fay, A. Security by Design Integration Mechanisms for Industrial Control Systems. In Proceedings of the IECON 2022—48th Annual Conference of the IEEE Industrial Electronics Society, Brussels, Belgium, 18–21 October 2022; pp. 1–6. [Google Scholar] [CrossRef]
  55. Tuptuk, N.; Hailes, S. Security of smart manufacturing systems. J. Manuf. Syst. 2018, 47, 93–106. [Google Scholar] [CrossRef]
  56. Yang, J.; Zhou, C.; Tian, Y.-C.; Yang, S.-H. A Software-Defined Security Approach for Securing Field Zones in Industrial Control Systems. IEEE Access 2019, 7, 87002–87016. [Google Scholar] [CrossRef]
  57. Chauhan, P.S.; Kshetri, N. 2021 State of the Practice in Data Privacy and Security. Computer 2021, 54, 125–132. [Google Scholar] [CrossRef]
  58. Tenable®. The Challenges of Securing Industrial Control Systems from Cyberattacks. 31 January 2020. Available online: https://www.tenable.com/blog/the-challenges-of-securing-industrial-control-systems-from-cyberattacks (accessed on 8 August 2023).
  59. Aslan, O.; Samet, R. A Comprehensive Review on Malware Detection Approaches. IEEE Access 2020, 8, 6249–6271. [Google Scholar] [CrossRef]
  60. Long, M.; Wu, C.-H.; Hung, J. Denial of Service Attacks on Network-Based Control Systems: Impact and Mitigation. IEEE Trans. Ind. Inform. 2005, 1, 85–96. [Google Scholar] [CrossRef]
  61. Ylmaz, E.N.; Ciylan, B.; Gonen, S.; Sindiren, E.; Karacayilmaz, G. Cyber security in industrial control systems: Analysis of DoS attacks against PLCs and the insider effect. In Proceedings of the 2018 6th International Istanbul Smart Grids and Cities Congress and Fair (ICSG), Istanbul, Turkey, 25–26 April 2018; pp. 81–85. [Google Scholar] [CrossRef]
  62. Electromagnetic Pulse (EMP)—Washington State Department of Health. Available online: https://doh.wa.gov/sites/default/files/legacy/Documents/Pubs/320-090_elecpuls_fs.pdf (accessed on 12 August 2023).
  63. Why Do Attackers Target Industrial Control Systems?—Informazioni Sulla Sicurezza. Available online: https://www.trendmicro.com/vinfo/it/security/news/cyber-attacks/why-do-attackers-target-industrial-control-systems (accessed on 12 August 2023).
  64. Alicea, M.; Alsmadi, I. Misconfiguration in Firewalls and Network Access Controls: Literature Review. Futur. Internet 2021, 13, 283. [Google Scholar] [CrossRef]
  65. Xu, Y.; Yang, Y.; Li, T.; Ju, J.; Wang, Q. Review on cyber vulnerabilities of communication protocols in industrial control systems. In Proceedings of the 2017 IEEE Conference on Energy Internet and Energy System Integration (EI2), Beijing, China, 26–28 November 2017; pp. 1–6. [Google Scholar] [CrossRef]
  66. de Toledo, T.R.; Torrisi, N.M. Encrypted dnp3 traffic classification using supervised machine learning algorithms. Mach. Learn. Knowl. Extr. 2019, 1, 384–399. [Google Scholar] [CrossRef]
  67. Song, E.Y.; FitzPatrick, G.J.; Lee, K.B.; Griffor, E. A Methodology for Modeling Interoperability of Smart Sensors in Smart Grids. IEEE Trans. Smart Grid 2021, 13, 555–563. [Google Scholar] [CrossRef]
  68. Kelli, V.; Radoglou-Grammatikis, P.; Sesis, A.; Lagkas, T.; Fountoukidis, E.; Kafetzakis, E.; Giannoulakis, I.; Sarigiannidis, P. Attacking and Defending DNP3 ICS/SCADA Systems. In Proceedings of the 2022 18th International Conference on Distributed Computing in Sensor Systems (DCOSS), Marina del Rey, Los Angeles, CA, USA, 30 May–1 June 2022; pp. 183–190. [Google Scholar] [CrossRef]
  69. NANOTEC. Modbus RTU. Available online: https://us.nanotec.com/knowledge-base-article/modbus-rtu-motors-controllers (accessed on 18 October 2023).
  70. Alfacompbrasil. Home. Alfacomp Automação Industrial. Available online: https://alfacomp.net/en/2020/12/17/modbus-protocol-learn-more-about-the-most-used-communication-protocol-in-industrial-automation/ (accessed on 9 June 2023).
  71. Găitan, V.G.; Zagan, I. Experimental implementation and performance evaluation of an IoT Access Gateway for the Modbus Extension. Sensors 2021, 21, 246. [Google Scholar] [CrossRef] [PubMed]
  72. Nagda, V. Modbus ASCII Communication Protocol explained. Inst Tools. Available online: https://instrumentationtools.com/modbus-ascii-communication-protocol-explained/ (accessed on 18 October 2023).
  73. Yi, F.; Zhang, L.; Yang, S.; Zhao, D. A Security-Enhanced Modbus TCP Protocol and Authorized Access Mechanism. In Proceedings of the 2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC), Shenzhen, China, 9–11 October 2021; pp. 61–67. [Google Scholar] [CrossRef]
  74. Martins, T.; Oliveira, S.V.G. Enhanced Modbus/TCP Security Protocol: Authentication and Authorization Functions Supported. Sensors 2022, 22, 8024. [Google Scholar] [CrossRef]
  75. Rai, P.; Mishra, A.; Lal, A. Smart Grid and IEC 61850. In Proceedings of the 2021 International Conference on Intelligent Technologies (CONIT), Hubli, India, 25–27 June 2021; pp. 1–6. [Google Scholar] [CrossRef]
  76. Pruthvi, P.; Bhuvaneswari, H.B.; Sudheendran, L. Analysis of utility communication protocol IEC 61850 for substation automation systems. In Proceedings of the National Conference on Challenges in Research and Technology in the Coming Decades (CRT 2013), Ujire, India, 27–28 September 2013; pp. 1–8. [Google Scholar] [CrossRef]
  77. de Mattos, D.P.; Soares, A.A.Z.; Soares, L.F.; Delfino, A.; Uchôa, L.; Fetnandes, N.C.; Lopes, Y.; Moares, I.; Albuquerque, C.; Magalhães, L.C.; et al. IEC 61850 Packet Generator for Testing Substation Communication. In Proceedings of the 2019 IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC), Macao, China, 1–4 December 2019; pp. 1–5. [Google Scholar] [CrossRef]
  78. GE Grid Solutions. An Overview for Users. GE Grid Solutions. Available online: https://www.gegridsolutions.com/multilin/journals/issues/spring09/iec61850.pdf (accessed on 12 June 2023).
  79. Seo, M.J.; Kim, T.O.; Lee, H.H. Implementation of web services based on IEC 61400-25 for wind power plants. In Proceedings of the 2009 ICCAS-SICE, Fukuoka, Japan, 18–21 August 2009; pp. 2082–2086. [Google Scholar]
  80. Patel, C.; Doshi, N. A novel MQTT security framework in generic IoT model. Procedia Comput. Sci. 2020, 171, 1399–1408. [Google Scholar] [CrossRef]
  81. Mishra, B.; Kertesz, A. The Use of MQTT in M2M and IoT Systems: A Survey. IEEE Access 2020, 8, 201071–201086. [Google Scholar] [CrossRef]
  82. Panda, S.K.; Majumder, M.; Wisniewski, L.; Jasperneite, J. Real-time Industrial Communication by using OPC UA Field Level Communication. In Proceedings of the 2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Vienna, Austria, 8–11 September 2020; pp. 1143–1146. [Google Scholar] [CrossRef]
  83. Shin, D.-H.; Kim, G.-Y.; Euom, I.-C. Vulnerabilities of the Open Platform Communication Unified Architecture Protocol in Industrial Internet of Things Operation. Sensors 2022, 22, 6575. [Google Scholar] [CrossRef] [PubMed]
  84. The Federal Register. Enhancing Surface Cyber Risk Management. Available online: https://www.federalregister.gov/documents/2022/11/30/2022-25941/enhancing-surface-cyber-risk-management (accessed on 1 July 2023).
  85. Kelli, V.; Radoglou-Grammatikis, P.; Lagkas, T.; Markakis, E.K.; Sarigiannidis, P. Risk Analysis of DNP3 Attacks. In Proceedings of the 2022 IEEE International Conference on Cyber Security and Resilience (CSR), Rhodes, Greece, 27–29 July 2022; pp. 351–356. [Google Scholar] [CrossRef]
  86. Chang, H.-C.; Lin, C.-Y.; Liao, D.-J.; Koo, T.-M. The Modbus Protocol Vulnerability Test in Industrial Control Systems. In Proceedings of the 2020 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Chongqing, China, 29–30 October 2020; pp. 375–378. [Google Scholar] [CrossRef]
  87. Hareesh, R.; Kalluri, R.; Mahendra, L.; Kumar, R.K.S.; Bindhumadhava, B.S. Passive security monitoring for IEC-60870-5-104 based SCADA systems. Int. J. Ind. Control Syst. Secur. 2020, 3, 90–99. [Google Scholar] [CrossRef]
  88. Reda, H.T.; Ray, B.; Peidaee, P.; Anwar, A.; Mahmood, A.; Kalam, A.; Islam, N. Vulnerability and Impact Analysis of the IEC 61850 GOOSE Protocol in the Smart Grid. Sensors 2021, 21, 1554. [Google Scholar] [CrossRef]
  89. Liu, N.; Zhang, J.; Liu, W. A security mechanism of Web Services-based communication for wind power plants. In Proceedings of the 2008 IEEE Power and Energy Society General Meeting–Conversion and Delivery of Electrical Energy in the 21st Century, Pittsburgh, PA, USA, 20–24 July 2008; pp. 1–7. [Google Scholar] [CrossRef]
  90. Khan, R.; McLaughlin, K.; Laverty, D.; Sezer, S. Analysis of IEEE C37.118 and IEC 61850-90-5 synchrophasor communication frameworks. In Proceedings of the 2016 IEEE Power and Energy Society General Meeting (PESGM), Boston, MA, USA, 17–21 July 2016; pp. 1–5. [Google Scholar] [CrossRef]
  91. CISA. Cybersecurity Best Practices for Industrial Control Systems. CISA. Available online: https://www.cisa.gov/ (accessed on 11 June 2023).
  92. Flaus, J.-M. Risk Assessment Methods. In Cybersecurity of Industrial Systems; Wiley: Hoboken, NJ, USA, 2019; pp. 213–247. [Google Scholar] [CrossRef]
  93. CISA. Training Available through CISA. CISA. Cybersecurity and Infrastructure Security Agency CISA. Available online: https://www.cisa.gov/ics-training-available-through-cisa (accessed on 21 June 2023).
  94. Samanis, E.; Gardiner, J.; Rashid, A. Adaptive Cyber Security for Critical Infrastructure. In Proceedings of the 2022 ACM/IEEE 13th International Conference on Cyber-Physical Systems (ICCPS), Milano, Italy, 4–6 May 2022; pp. 304–305. [Google Scholar] [CrossRef]
  95. Kim, A.; SANS Institute. Secure Architecture for Industrial Control Systems. 1 May 2023. Available online: https://www.sans.org/white-papers/36327/ (accessed on 26 June 2023).
  96. Staff, E. CS Control System Security—Instrumentation Tools. Inst Tools. 3 August 2020. Available online: https://instrumentationtools.com/ics-control-system-security/ (accessed on 27 June 2023).
  97. How Unidirectional Networks Are Used in Industrial Control Systems—OPSWAT. OPSWAT. Available online: https://www.opswat.com/blog/how-unidirectional-networks-are-used-industrial-control-systems (accessed on 28 June 2023).
  98. Knapp, E.D.; Langill, J.T. Chapter 10—Implementing Security and Access Controls. In Industrial Network Security (Second Edition); Knapp, E.D., Langill, J.T., Eds.; Syngress: Boston, MA, USA, 2015; pp. 283–322. ISBN 978-0-12-420114-9. [Google Scholar] [CrossRef]
  99. Makrakis, G.M.; Kolias, C.; Kambourakis, G.; Rieger, C.; Benjamin, J. Industrial and Critical Infrastructure Security: Technical Analysis of Real-Life Security Incidents. IEEE Access 2021, 9, 165295–165325. [Google Scholar] [CrossRef]
  100. Gaudet, N.; Sahu, A.; Goulart, A.E.; Rogers, E.; Davis, K. Firewall Configuration and Path Analysis for SmartGrid Networks. In Proceedings of the 2020 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR), Stevenson, WA, USA, 14 May 2020; pp. 1–6. [Google Scholar] [CrossRef]
  101. Cveticanin, N. What Is Geo-Blocking and How Can You Bypass It? DataProt. 14 May 2023. Available online: https://dataprot.net/articles/what-is-geo-blocking/ (accessed on 2 July 2023).
  102. The Risk of Industrial Control System Programmable Logic Controller. Available online: https://ieeexplore.ieee.org/document/9359077 (accessed on 6 June 2023).
  103. The Virtual Economy Technology Radar: L’atelier. Home. L’atelier. Available online: https://atelier.net/ve-tech-radar/tech-radar/geoblocking-and-filtering (accessed on 2 July 2023).
  104. Next Generation Jump Servers for Industrial Control Systems—SCADAHACKER. SCADAHACKER. Available online: https://scadahacker.com/library/ (accessed on 2 July 2023).
  105. Bartman, T.; Carson, K. Securing Communications for SCADA and Critical INDUSTRIAL systems. In Proceedings of the 2016 69th Annual Conference for Protective Relay Engineers (CPRE), College Station, TX, USA, 4–7 April 2016; pp. 1–10. Available online: https://ieeexplore.ieee.org/document/7914914 (accessed on 3 July 2023). [CrossRef]
  106. Sandaruwan, G.P.H.; Ranaweera, P.S.; Oleshchuk, V.A. PLC security and critical infrastructure protection. In Proceedings of the 2013 IEEE 8th International Conference on Industrial and Information Systems (ICIInfS), Peradeniya, Sri Lanka, 17–20 December 2013; pp. 81–85. Available online: https://scadahacker.com/library/ (accessed on 2 July 2023). [CrossRef]
  107. Kozik, R.; Choraś, M. Current cyber security threats and challenges in critical infrastructures protection. In Proceedings of the 2013 Second International Conference on Informatics and Applications (ICIA), Lodz, Poland, 23–25 September 2013; pp. 93–97. [Google Scholar] [CrossRef]
  108. Cruz, T.; Barrigas, J.; Proenca, J.; Graziano, A.; Panzieri, S.; Lev, L.; Simoes, P. Improving network security monitoring for industrial control systems. In Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), Ottawa, ON, Canada, 11–15 May 2015; pp. 878–881. [Google Scholar] [CrossRef]
  109. Mantere, M.; Uusitalo, I.; Sailio, M.; Noponen, S. Challenges of Machine Learning Based Monitoring for Industrial Control System Networks. In Proceedings of the 2012 26th International Conference on Advanced Information Networking and Applications Workshops (WAINA), Fukuoka, Japan, 26–29 March 2012; pp. 968–972. [Google Scholar] [CrossRef]
  110. Singh, V.K.; Callupe, S.P.; Govindarasu, M. Testbed-based Evaluation of SIEM Tool for Cyber Kill Chain Model in Power Grid SCADA System. In Proceedings of the 2019 North American Power Symposium (NAPS), Wichita, KS, USA, 13–15 October 2019; pp. 1–6. [Google Scholar] [CrossRef]
  111. Henriques, J.; Caldeira, F.; Cruz, T.; Simões, P. A forensics and compliance auditing framework for Critical Infrastructure Protection. Int. J. Crit. Infrastruct. Prot. 2023, 42, 100613. [Google Scholar] [CrossRef]
  112. Ting, V.; Chou, H.-Y.; Wang, J.-H. Securing Manufacturing through Patch Management for IoT Devices. In Proceedings of the 2023 IEEE 3rd International Conference on Electronic Communications, Internet of Things and Big Data (ICEIB), Taichung, Taiwan, 19–21 April 2023; pp. 479–482. [Google Scholar] [CrossRef]
  113. Yadav, G.; Gauravaram, P.; Jindal, A.K.; Paul, K. SmartPatch: A Patch Prioritization Framework. Comput. Ind. 2022, 137, 103595. [Google Scholar] [CrossRef]
  114. Obermeier, S.; Schierholz, R.; Hristova, A. Securing industrial automation and control systems using application whitelisting. In Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA), Barcelona, Spain, 6–19 September 2014; pp. 1–4. [Google Scholar] [CrossRef]
  115. IBM. What Is Machine Learning? Available online: https://www.ibm.com/topics/machine-learning (accessed on 10 July 2023).
  116. Ahsan, M.; Nygard, K.E.; Gomes, R.; Chowdhury, M.; Rifat, N.; Connolly, J.F. Cybersecurity threats and their mitigation approaches using Machine Learning—A Review. J. Cybersecur. Priv. 2022, 2, 527–555. [Google Scholar] [CrossRef]
  117. Sudhakar, M.; Kaliyamurthie, K. Machine Learning Algorithms and Approaches used in Cybersecurity. In Proceedings of the 2022 IEEE 3rd Global Conference for Advancement in Technology (GCAT), Bangalore, India, 7–9 October 2022; pp. 1–5. [Google Scholar] [CrossRef]
  118. Xin, Y.; Kong, L.; Liu, Z.; Chen, Y.; Li, Y.; Zhu, H.; Gao, M.; Hou, H.; Wang, C. Machine Learning and Deep Learning Methods for Cybersecurity. IEEE Access 2018, 6, 35365–35381. [Google Scholar] [CrossRef]
  119. Anomaly Detection for Industrial Control Systems. Available online: https://dione.lib.unipi.gr/xmlui/bitstream/handle/unipi/11673/Kapogianni_1616.pdf?sequence=1 (accessed on 14 July 2023).
  120. Ha, D.T.; Hoang, N.V.; Du, N.H.; Huong, T.T.; Tran, K.P. Explainable Anomaly Detection for Industrial Control System Cybersecurity. IFAC-PapersOnLine 2022, 55, 1183–1188. [Google Scholar] [CrossRef]
  121. Martí, L.; Sanchez-Pi, N.; López, J.M.M.; Garcia, A.C.B. On the combination of support vector machines and segmentation algorithms for anomaly detection: A petroleum industry comparative study. J. Appl. Log. 2017, 24, 71–84. [Google Scholar] [CrossRef]
  122. Yokkampon, U.; Chumkamon, S.; Mowshowitz, A.; Fujisawa, R.; Hayashi, E. Anomaly Detection Using Support Vector Machines for Time Series Data. J. Robot. Netw. Artif. Life 2021, 8, 41–46. [Google Scholar] [CrossRef]
  123. Aslam, N.; Khan, I.U.; Alansari, A.; Alrammah, M.; Alghwairy, A.; Alqahtani, R.; Alqahtani, R.; Almushikes, M.; AL Hashim, M. Anomaly Detection Using Explainable Random Forest for the Prediction of Undesirable Events in Oil Wells. Appl. Comput. Intell. Soft Comput. 2022, 2022, 1–14. [Google Scholar] [CrossRef]
  124. Alnafessah, A.; Casale, G. A Neural-Network Driven Methodology for Anomaly Detection in Apache Spark. In Proceedings of the 2018 11th International Conference on the Quality of Information and Communications Technology (QUATIC), Coimbra, Portugal, 4–7 September 2018; pp. 201–209. [Google Scholar] [CrossRef]
  125. Sengan, S.; Subramaniyaswamy, V.; Indragandhi, V.; Velayutham, P.; Ravi, L. Detection of False Data Cyber-Attacks for the Assessment of Security in Smart Grid Using Deep Learning. Comput. Electr. Eng. 2021, 93. [Google Scholar] [CrossRef]
  126. Nolle, T.; Luettgen, S.; Seeliger, A.; Mühlhäuser, M. Analyzing business process anomalies using autoencoders. Mach. Learn. 2018, 107, 1875–1893. [Google Scholar] [CrossRef]
  127. Gao, R.; Zhang, T.; Sun, S.; Liu, Z. Research and improvement of isolation forest in detection of local anomaly points. J. Phys. Conf. Ser. 2019, 1237, 052023. [Google Scholar] [CrossRef]
  128. Bansal, M.; Sharma, D. Density-based structural embedding for anomaly detection in dynamic networks. Neurocomputing 2022, 500, 724–740. [Google Scholar] [CrossRef]
  129. Goldstein, M.; Uchida, S. A Comparative Evaluation of Unsupervised Anomaly Detection Algorithms for Multivariate Data. PLoS ONE 2016, 11, e0152173. [Google Scholar] [CrossRef] [PubMed]
  130. Scrucca, L. Entropy-based anomaly detection for Gaussian mixture modeling. Algorithms 2023, 16, 195. [Google Scholar] [CrossRef]
  131. Adams, H.; Farnell, E.; Story, B. Support Vector Machines and Radon’s theorem. arXiv 2022, arXiv:2011.00617. [Google Scholar]
  132. Primartha, R.; Tama, B.A. Anomaly detection using Random Forest: A performance revisited. In Proceedings of the 2017 International Conference on Data and Software Engineering (ICoDSE), Palembang, Indonesia, 1–2 November 2017; pp. 50–55. [Google Scholar] [CrossRef]
  133. Alnafessah, A.; Casale, G. Artificial neural networks based techniques for anomaly detection in Apache Spark. Clust. Comput. 2019, 23, 1345–1360. [Google Scholar] [CrossRef]
  134. Douiba, M.; Benkirane, S.; Guezzaz, A.; Azrour, M. Anomaly detection model based on gradient boosting and decision tree for IoT environments security. J. Reliab. Intell. Environ. 2022. [Google Scholar] [CrossRef]
  135. Maleki, S.; Maleki, S.; Jennings, N.R. Unsupervised anomaly detection with LSTM autoencoders using statistical data-filtering. Appl. Soft Comput. 2021, 108, 107443. [Google Scholar] [CrossRef]
  136. Yamanishi, K.; Takeuchi, J. Discovering Outlier Filtering Rules from Unlabeled Data: Combining a Supervised Learner with an Unsupervised Learner. 2001. Available online: https://api.semanticscholar.org/CorpusID:10897169 (accessed on 14 July 2023).
  137. Faroughi, A.; Javidan, R. CANF: Clustering and anomaly detection method using nearest and farthest neighbor. Futur. Gener. Comput. Syst. 2018, 89, 166–177. [Google Scholar] [CrossRef]
  138. Boukerche, A.; Zheng, L.; Alfandi, O. Outlier Detection: Methods, Models, and Classification. ACM Comput. Surv. 2020, 53, 1–37. [Google Scholar] [CrossRef]
  139. Oluwasegun, A.; Jung, J.-C. A multivariate Gaussian mixture model for anomaly detection in transient current signature of control element drive mechanism. Nucl. Eng. Des. 2023, 402, 112098. [Google Scholar] [CrossRef]
  140. Bernieri, G.; Conti, M.; Turrin, F. Evaluation of Machine Learning Algorithms for Anomaly Detection in Industrial Networks. In Proceedings of the 2019 IEEE International Symposium on Measurements and Networking (M and N), Catania, Italy, 8–10 July 2019; pp. 1–6. [Google Scholar] [CrossRef]
  141. Abdallah, E.E.; Eleisah, W.; Otoom, A.F. Intrusion Detection Systems using Supervised Machine Learning Techniques: A survey. Procedia Comput. Sci. 2022, 201, 205–212. [Google Scholar] [CrossRef]
  142. Mohammadi, M.; Rashid, T.A.; Karim, S.H.; Aldalwie, A.H.M.; Tho, Q.T.; Bidaki, M.; Rahmani, A.M.; Hosseinzadeh, M. A comprehensive survey and taxonomy of the SVM-based intrusion detection systems. J. Netw. Comput. Appl. 2021, 178, 102983. [Google Scholar] [CrossRef]
  143. Terai, A.; Abe, S.; Kojima, S.; Takano, Y.; Koshijima, I. Cyber-Attack Detection for Industrial Control System Monitoring with Support Vector Machine Based on Communication Profile. In Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS and PW), Paris, France, 26–28 April 2017; pp. 132–138. [Google Scholar] [CrossRef]
  144. Keogh, E.; Lonardi, S.; Chiu, B.C. Finding surprising patterns in a time series database in linear time and space. In Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 23–26 July 2002. [Google Scholar] [CrossRef]
  145. Sanchez-Pi, N.; Martí, L.; Molina, J.M.; Garcia, A.C.B. High-level information fusion for risk and accidents prevention in pervasive oil industry environments. In Communications in Computer and Information Science; Springer: Cham, Switzerland, 2014; pp. 202–213. [Google Scholar] [CrossRef]
  146. Martí, L.; Sanchez-Pi, N.; Molina, J.M.; Garcia, A.C.B. Anomaly detection based on sensor data in petroleum industry applications. Sensors 2015, 15, 2774–2797. [Google Scholar] [CrossRef]
  147. Shang, W.; Cui, J.; Song, C.; Zhao, J.; Zeng, P. Research on Industrial Control Anomaly Detection Based on FCM and SVM. In Proceedings of the 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), New York, NY, USA, 1–3 August 2018; pp. 218–222. [Google Scholar] [CrossRef]
  148. Anton, S.D.D.; Sinha, S.; Schotten, H.D. Anomaly-based Intrusion Detection in Industrial Data with SVM and Random Forests. In Proceedings of the 2019 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia, 19–21 September 2019; pp. 1–6. [Google Scholar] [CrossRef]
  149. Alabugin, S.K.; Sokolov, A.N. Applying of Recurrent Neural Networks for Industrial Processes Anomaly Detection. In Proceedings of the 2021 Ural Symposium on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT), Yekaterinburg, Russia, 13–14 May 2021; pp. 0467–0470. [Google Scholar] [CrossRef]
  150. Sinha, A.; Taylor, M.; Srirama, N.; Manikas, T.; Larson, E.C.; Thornton, M.A. Industrial Control System Anomaly Detection Using Convolutional Neural Network Consensus. In Proceedings of the 2021 IEEE Conference on Control Technology and Applications (CCTA), San Diego, CA, USA, 9–11 August 2021; pp. 693–700. [Google Scholar] [CrossRef]
  151. Lin, X.; Zhang, X.; Xu, X. Efficient Classification of Hot Spots and Hub Protein Interfaces by Recursive Feature Elimination and Gradient Boosting. IEEE/ACM Trans. Comput. Biol. Bioinform. 2020, 17, 1525–1534. [Google Scholar] [CrossRef]
  152. Yang, T.; Chen, L.; Wang, J.; Cui, Z.; Qi, J. Anomaly detection of dust removal system through gradient boosting decision tree algorithm. In Proceedings of the 2021 International Conference on Communications, Information System and Computer Engineering (CISCE), Xiamen, China, 28–30 July 2021. [Google Scholar] [CrossRef]
  153. Ochiai, H.; Hossain, D.; Chirupphapa, P.; Kadobayashi, Y.; Esaki, H. Modbus/RS-485 Attack Detection on Communication Signals with Machine Learning. IEEE Commun. Mag. 2023, 61, 43–49. [Google Scholar] [CrossRef]
  154. Louk, M.H.L.; Tama, B.A. Revisiting Gradient Boosting-Based Approaches for Learning Imbalanced Data: A Case of Anomaly Detection on Power Grids. Big Data Cogn. Comput. 2022, 6, 41. [Google Scholar] [CrossRef]
  155. Upadhyay, D.; Manero, J.; Zaman, M.; Sampalli, S. Gradient Boosting Feature Selection With Machine Learning Classifiers for Intrusion Detection on Power Grids. IEEE Trans. Netw. Serv. Manag. 2020, 18, 1104–1116. [Google Scholar] [CrossRef]
  156. Wang, W.; Harrou, F.; Bouyeddou, B.; Senouci, S.-M.; Sun, Y. Cyber-attacks detection in industrial systems using artificial intelligence-driven methods. Int. J. Crit. Infrastruct. Prot. 2022, 38, 100542. [Google Scholar] [CrossRef]
  157. Maggipinto, M.; Beghi, A.; Susto, G.A. A Deep Convolutional Autoencoder-Based Approach for Anomaly Detection With Industrial, Non-Images, 2-Dimensional Data: A Semiconductor Manufacturing Case Study. IEEE Trans. Autom. Sci. Eng. 2022, 19, 1477–1490. [Google Scholar] [CrossRef]
  158. Wang, W.; Wang, Z.; Zhou, Z.; Deng, H.; Zhao, W.; Wang, C.; Guo, Y. Anomaly detection of industrial control systems based on transfer learning. Tsinghua Sci. Technol. 2021, 26, 821–832. [Google Scholar] [CrossRef]
  159. Pyatnisky, I.A.; Sokolov, A.N. Assessment of the Applicability of Autoencoders in the Problem of Detecting Anomalies in the Work of Industrial Control Systems. In Proceedings of the 2020 Global Smart Industry Conference (GloSIC), Chelyabinsk, Russia, 17–19 November 2020; pp. 234–239. [Google Scholar] [CrossRef]
  160. Potluri, S.; Diedrich, C. Deep Learning based Efficient Anomaly Detection for Securing Process Control Systems against Injection Attacks. In Proceedings of the 2019 IEEE 15th International Conference on Automation Science and Engineering (CASE), Vancouver, BC, Canada, 22–26 August 2019; pp. 854–860. [Google Scholar] [CrossRef]
  161. Doraswamy, B.; Krishna, K.L. A Deep Learning Approach for Anomaly Detection in Industrial Control Systems. In Proceedings of the 2022 International Conference on Augmented Intelligence and Sustainable Systems (ICAISS), Trichy, India, 24–26 November 2022; pp. 442–448. [Google Scholar] [CrossRef]
  162. Galka, L.; Karczmarek, P.; Tokovarov, M. Isolation Forest Based on Minimal Spanning Tree. IEEE Access 2022, 10, 74175–74186. [Google Scholar] [CrossRef]
  163. Reliability, August 2016 a Density-Based Clustering Method for…. Available online: https://rs.ieee.org/images/files/techact/Reliability/2016-08/2016-08-a03.pdf (accessed on 13 July 2023).
  164. Alghushairy, O.; Alsini, R.; Soule, T.; Ma, X. A Review of Local Outlier Factor Algorithms for Outlier Detection in Big Data Streams. Big Data Cogn. Comput. 2020, 5, 1. [Google Scholar] [CrossRef]
  165. Xu, Z.; Kakde, D.; Chaudhuri, A. Automatic Hyperparameter Tuning Method for Local Outlier Factor, with Applications to Anomaly Detection. In Proceedings of the 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, 9–12 December 2019; pp. 4201–4207. [Google Scholar] [CrossRef]
  166. Amine, M.A.; Batton-Hubert, M.; Casoetto, N. One Class Support Subsequence Machine: Abnormal Time Series Subsequences Detection Using One-Class SVM. Available online: https://www.researchsquare.com/article/rs-2378527/v2 (accessed on 14 July 2023).
  167. Yu, B.; Zhang, Y.; Xie, W.; Zuo, W.; Zhao, Y.; Wei, Y. A Network Traffic Anomaly Detection Method Based on Gaussian Mixture Model. Electronics 2023, 12, 1397. [Google Scholar] [CrossRef]
  168. Pinto, A.; Herrera, L.-C.; Donoso, Y.; Gutierrez, J.A. Survey on Intrusion Detection Systems Based on Machine Learning Techniques for the Protection of Critical Infrastructure. Sensors 2023, 23, 2415. [Google Scholar] [CrossRef] [PubMed]
  169. A Survey of Intrusion Detection on Industrial Control Systems. Available online: https://journals.sagepub.com/doi/full/10.1177/1550147718794615 (accessed on 3 August 2023).
  170. Shaukat, K.; Luo, S.; Varadharajan, V.; Hameed, I.A.; Xu, M. A Survey on Machine Learning Techniques for Cyber Security in the Last Decade. IEEE Access 2020, 8, 222310–222354. [Google Scholar] [CrossRef]
  171. Zhu, N.; Zhu, C.; Zhou, L.; Zhu, Y.; Zhang, X. Optimization of the Random Forest Hyperparameters for Power Industrial Control Systems Intrusion Detection Using an Improved Grid Search Algorithm. Appl. Sci. 2022, 12, 10456. [Google Scholar] [CrossRef]
  172. Brownlee, J. Feature Importance and Feature Selection with XGBoost in Python. MachineLearningMastery.com. 27 August 2020. Available online: https://machinelearningmastery.com/feature-importance (accessed on 15 July 2023).
  173. Song, Y.; Hyun, S.; Cheong, Y.-G. Analysis of autoencoders for network intrusion detection. Sensors 2021, 21, 4294. [Google Scholar] [CrossRef]
  174. Meidan, Y.; Bohadana, M.; Mathov, Y.; Mirsky, Y.; Shabtai, A.; Breitenbacher, D.; Elovici, Y. N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders. IEEE Pervasive Comput. 2018, 17, 12–22. [Google Scholar] [CrossRef]
  175. Dhiraj, K. Anomaly Detection Using Isolation Forest in Python. Paperspace Blog. 9 April 2021. Available online: https://blog.paperspace.com/anomaly-detection-isolation-forest/ (accessed on 29 May 2023).
  176. Monshizadeh, M.; Khatri, V.; Kantola, R.; Yan, Z. A deep density based and self-determining clustering approach to label unknown traffic. J. Netw. Comput. Appl. 2022, 207, 103513. [Google Scholar] [CrossRef]
  177. Foley, M.; Hicks, C.; Highnam, K.; Mavroudis, V. Autonomous Network Defence Using Reinforcement Learning. In Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May–3 June 2022. [Google Scholar] [CrossRef]
  178. Alavizadeh, H.; Alavizadeh, H.; Jang-Jaccard, J. Deep Q-Learning Based Reinforcement Learning Approach for Network Intrusion Detection. Computers 2022, 11, 41. [Google Scholar] [CrossRef]
  179. Hsu, Y.-F.; Matsuoka, M. A Deep Reinforcement Learning Approach for Anomaly Network Intrusion Detection System. In Proceedings of the 2020 IEEE 9th International Conference on Cloud Networking (CloudNet), Virtual, 4–11 November 2020; pp. 1–6. [Google Scholar] [CrossRef]
  180. Ahmed, K.I.; Tahir, M.; Habaebi, M.H.; Lau, S.L.; Ahad, A. Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction. Sensors 2021, 21, 5122. [Google Scholar] [CrossRef] [PubMed]
  181. Susto, G.A.; Schirru, A.; Pampuri, S.; McLoone, S.; Beghi, A. Machine Learning for Predictive Maintenance: A Multiple Classifier Approach. IEEE Trans. Ind. Inform. 2014, 11, 812–820. [Google Scholar] [CrossRef]
  182. Cremer, F.; Sheehan, B.; Fortmann, M.; Kia, A.N.; Mullins, M.; Murphy, F.; Materne, S. Cyber risk and cybersecurity: A systematic review of data availability. Geneva Pap. Risk Insur.-Issues Pr. 2022, 47, 698–736. [Google Scholar] [CrossRef] [PubMed]
  183. Ai, ML, and DL Effects on Cybersecurity. Zenarmor. Available online: https://www.zenarmor.com/docs/network-security-tutorials/what-is-ai-ml-and-dl-effects-on-cybersecurity (accessed on 29 May 2023).
  184. Wang, H.; Singhal, A.; Liu, P. Tackling imbalanced data in cybersecurity with transfer learning: A case with ROP payload detection. Cybersecurity 2023, 6, 1–15. [Google Scholar] [CrossRef]
  185. Lin, J.; Dang, L.; Rahouti, M.; Xiong, K. ML Attack Models: Adversarial Attacks and Data Poisoning Attacks. arXiv 2021, arXiv:2112.02797. [Google Scholar]
  186. Ding, D.; Han, Q.-L.; Xiang, Y.; Ge, X.; Zhang, X.-M. A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing 2018, 275, 1674–1683. [Google Scholar] [CrossRef]
  187. Goodfellow, I.M. Making Machine Learning Robust against Adversarial Inputs. ACM. 1 July 2018. Available online: https://cacm.acm.org/magazines/2018/7/229030-making-machine-learning-robust-against-adversarial-inputs/fulltext (accessed on 23 May 2023).
  188. Liang, F.; Hatcher, W.G.; Liao, W.; Gao, W.; Yu, W. Machine Learning for Security and the Internet of Things: The Good, the Bad, and the Ugly. IEEE Access 2019, 7, 158126–158147. [Google Scholar] [CrossRef]
Figure 1. The basic components and operation of an Industrial Control System.
Figure 1. The basic components and operation of an Industrial Control System.
Sensors 23 08840 g001
Figure 2. SCADA components.
Figure 2. SCADA components.
Sensors 23 08840 g002
Figure 3. Monolithic SCADA system.
Figure 3. Monolithic SCADA system.
Sensors 23 08840 g003
Figure 4. Distributed SCADA system.
Figure 4. Distributed SCADA system.
Sensors 23 08840 g004
Figure 5. Internet of Things (IoT) SCADA system.
Figure 5. Internet of Things (IoT) SCADA system.
Sensors 23 08840 g005
Figure 6. Networked SCADA architecture.
Figure 6. Networked SCADA architecture.
Sensors 23 08840 g006
Figure 7. A distributed control system.
Figure 7. A distributed control system.
Sensors 23 08840 g007
Figure 8. Components of a PLC system.
Figure 8. Components of a PLC system.
Sensors 23 08840 g008
Figure 9. Vulnerabilities of industrial protocols under an application scenario.
Figure 9. Vulnerabilities of industrial protocols under an application scenario.
Sensors 23 08840 g009
Figure 10. General Modbus framework.
Figure 10. General Modbus framework.
Sensors 23 08840 g010
Figure 11. MQTT protocol design.
Figure 11. MQTT protocol design.
Sensors 23 08840 g011
Figure 12. OPC protocol design.
Figure 12. OPC protocol design.
Sensors 23 08840 g012
Figure 13. Countermeasure for defending ICSs.
Figure 13. Countermeasure for defending ICSs.
Sensors 23 08840 g013
Figure 14. Network segmentation or zoning.
Figure 14. Network segmentation or zoning.
Sensors 23 08840 g014
Table 1. Potential ICS threat event.
Table 1. Potential ICS threat event.
ThreatDescription
Denial of control actionControl systems can face disruptions when the flow of information is deliberately delayed or blocked, resulting in the unavailability of networks to control system operators. This can manifest as bottlenecks in information transfer or as a denial of service, particularly when related to IT-resident services such as DNS
Unauthorized reprogramming
of control devices
Unauthorized modifications to programmed instructions in PLCs, RTUs, DCS, or SCADA controllers, along with alterations to alarm thresholds or unauthorized commands issued to control equipment, have the potential to lead to various adverse outcomes. These consequences may include equipment damage if operational tolerances are exceeded, premature shutdown of processes (such as the untimely shutdown of transmission lines), triggering environmental incidents, or even the disabling of control equipment
Spoofed System Status InformationThe transmission of false information to control system operators can serve two main purposes: to conceal unauthorized changes or to instigate improper actions by system operators
Control Logic ManipulationControl system software or configuration settings modified, producing unpredictable results
Safety Systems ModifiedSafety systems operation are manipulated so that they either (1) do not operate when needed or (2) perform incorrect control actions that damage the ICS
Malware on Control SystemsMalicious software (e.g., virus, worm, Trojan horse) introduced into the system
Table 2. Vulnerabilities of the proposed protocols.
Table 2. Vulnerabilities of the proposed protocols.
ProtocolLack of IntegrityLack of ConfidentialityLack of AvailabilityLack of AuthenticationLack of AuthorizationLack of EncryptionReference
DNP3 [85]
Modbus [86]
IEC 60870-5-104 [87]
IEC 61850 [88]
IEC 61400-25 [89]
IEEE C37.118 [90]
Table 3. Strength of different machine learning techniques for anomaly detection.
Table 3. Strength of different machine learning techniques for anomaly detection.
TechniqueEffective in High-Dimensional SpacesNon-Linearity HandlingTunable MarginRobust to Noisy DataFeature ImportanceScalabilityEase of InterpretationFeature LearningReferences
Support Vector Machines [122]
Random Forest [123]
Neural Networks [124]
Gradient Boosting [125]
Autoencoders [126]
Isolation Forest [127]
Density-based Clustering [128]
Local Outlier Factor [129]
Gaussian Mixture Models [130]
Table 4. Limitations of different machine learning techniques for anomaly detection.
Table 4. Limitations of different machine learning techniques for anomaly detection.
TechniqueComputationally
Expensive
Not ScalableLack of InterpretabilityLimited Multiclass Anomaly DetectionLack of InterpretabilityDifficulty with Multimodal DataLimited for Time-Series DataDifficulty with Highly Imbalanced DataReferences
Support Vector Machines [131]
Random Forest [132]
Neural Networks [133]
Gradient Boosting [134]
Autoencoders [135]
Isolation Forest [136]
Density-based Clustering [137]
Local Outlier Factor [138]
Gaussian Mixture Models [139]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Nankya, M.; Chataut, R.; Akl, R. Securing Industrial Control Systems: Components, Cyber Threats, and Machine Learning-Driven Defense Strategies. Sensors 2023, 23, 8840. https://doi.org/10.3390/s23218840

AMA Style

Nankya M, Chataut R, Akl R. Securing Industrial Control Systems: Components, Cyber Threats, and Machine Learning-Driven Defense Strategies. Sensors. 2023; 23(21):8840. https://doi.org/10.3390/s23218840

Chicago/Turabian Style

Nankya, Mary, Robin Chataut, and Robert Akl. 2023. "Securing Industrial Control Systems: Components, Cyber Threats, and Machine Learning-Driven Defense Strategies" Sensors 23, no. 21: 8840. https://doi.org/10.3390/s23218840

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop