Securing Industrial Control Systems
Securing Industrial Control Systems
Review
Securing Industrial Control Systems: Components, Cyber
Threats, and Machine Learning-Driven Defense Strategies
Mary Nankya 1, *,† , Robin Chataut 2,† and Robert Akl 3,†
Abstract: Industrial Control Systems (ICS), which include Supervisory Control and Data Acquisition
(SCADA) systems, Distributed Control Systems (DCS), and Programmable Logic Controllers (PLC),
play a crucial role in managing and regulating industrial processes. However, ensuring the security
of these systems is of utmost importance due to the potentially severe consequences of cyber attacks.
This article presents an overview of ICS security, covering its components, protocols, industrial
applications, and performance aspects. It also highlights the typical threats and vulnerabilities faced
by these systems. Moreover, the article identifies key factors that influence the design decisions
concerning control, communication, reliability, and redundancy properties of ICS, as these are critical
in determining the security needs of the system. The article outlines existing security countermea-
sures, including network segmentation, access control, patch management, and security monitoring.
Furthermore, the article explores the integration of machine learning techniques to enhance the
cybersecurity of ICS. Machine learning offers several advantages, such as anomaly detection, threat
intelligence analysis, and predictive maintenance. However, combining machine learning with other
security measures is essential to establish a comprehensive defense strategy for ICS. The article
Citation: Nankya, M.; Chataut, R.;
also addresses the challenges associated with existing measures and provides recommendations for
Akl, R. Securing Industrial Control
improving ICS security. This paper becomes a valuable reference for researchers aiming to make
Systems: Components, Cyber
meaningful contributions within the constantly evolving ICS domain by providing an in-depth
Threats, and Machine
examination of the present state, challenges, and potential future advancements.
Learning-Driven Defense Strategies.
Sensors 2023, 23, 8840. https://
doi.org/10.3390/s23218840
Keywords: cyber defense; industrial control systems; SCADA; anomaly detection; cyber threats;
vulnerabilities; attacks; artificial intelligence; security
Academic Editors: Joaquin
Garcia-Alfaro and Pantaleone
Nespoli
challenge, as integrating Industrial Control Systems with external networks, such as the
internet, expands the attack surface, making them more susceptible to cyber threats without
proper security measures [4]. Over the past decade, cyber attacks on Industrial Control
Systems have notably increased due to their heightened vulnerability to off-site attacks.
Previously, these systems operated in isolated environments, relying heavily on human
intervention. However, the growing inter-connectivity has exposed them to potential risks
from remote adversaries. Consequently, ensuring robust security measures has become
paramount to safeguarding ICSs from cyber threats [5].
An overview of an ICS contains several control loops, remote diagnostics, maintenance
tools, and human interfaces built on layered network architectures using various network
protocols. A summary of the basic components and process of an ICS is shown in Figure 1.
Corporate
Human-Machine Remote Diagnostic &
Network
Interface Maintenance
A Data
Controller Internet
Historian
Manipulated
Controlled
Variables
Variables
Actuators
Sensors
Controlled
Process
Process Inputs Process Outputs
Disturbances
attacks. It also grants or denies access to computers within the network to the outside
world.
In the forthcoming part of this article, Section 2 provides a more in-depth review
of the ICS technologies. Section 3 outlines the system design considerations that help to
determine the security needs of the ICS system. In Section 4, we present some popular
examples of ICS cyber attack incidents that have occurred in the past. Section 5 discusses
the vulnerability of ICS. Section 6 offers an in-depth review of ICS communication protocols
for cyber vulnerabilities. We further delve into a comprehensive review of the existing
measures to strengthen the cybersecurity of ICSs in Section 7. In Section 8, we explore how
machine learning has been integrated to strengthen the cyber defense for ICS. In Section 9,
we discuss the challenges of machine learning approaches and mechanisms for defending
ICS. Section 10 presents a list of recommendations and the future direction of our research.
Finally, we conclude our study in Section 11 where we summarize the key fundamental
research explorations, emphasizing the future direction of our work.
SCADA
Wired Wireless
• Supervisory control: Supervisory control serves as the fundamental role of the HMI.
HMI software serves as an interface responsible for overseeing industrial processes.
On the other hand, a master terminal unit (MTU) functions as a central supervisory
controller that communicates with lower field devices, such as RTUs, through the
ICS network;
• Data acquisition: Data can be acquired from two primary sources in the context of
SCADA system as PLCs and Remote Telemetry Units (RTUs). Both the PLCs and RTUs
interface directly with actuators and sensors in the field. RTUs are specifically designed
to interface with sensors and collect telemetry data, which they then transmit to a
primary system for further action. On the other hand, PLCs interface with the actuators
to maintain and control industrial processes based on the telemetry data collected by
the RTUs [13]. PLCs and RTUs act as physical interfaces between SCADA systems and
field devices. However, their communication with the SCADA system differs. RTUs
are well-suited for wide geographical areas due to their use of wireless communication
methods. In contrast, PLCs are more tailored to local control applications [14];
• Data storage: The majority of SCADA systems employ a Structured Query Language
(SQL) database for storing data with timestamps. A historian is a fully integrated
SCADA software that collects real-time data from various SCADA devices and stores
them in a database, such as mySQL;
• Data exchange: Communication protocols are used to exchange data between SCADA
components.
SCADA architecture
This section describes the four generations of SCADA architecture in detail and
summarizes the security strengths and vulnerabilities of each.
(a) First generation-Monolithic: The first generation of SCADA systems was developed
when networks were not yet in existence. These early systems were not designed
to connect with other systems, and communication was typically limited to Wide
Area Networks (WANs) interacting with remote terminal units (RTUs) [15]. It de-
fines application in remote areas within a factory where the conditions are unsafe,
and physical access is restricted [16]. In the early-generation systems, redundancy
was achieved by deploying two mainframe systems with identical configurations.
One was designated as the primary and the other as the backup. These two systems
Sensors 2023, 23, 8840 5 of 42
were connected at the bus level. The standby system’s main role was to act as a mon-
itoring entity for the primary system and would smoothly take over if it detected
any indications of failure. Consequently, the standby system usually operated in an
idle state, performing minimal to no processing tasks until a fail-over event became
necessary [17]. Figure 3 shows a typical first-generation SCADA architecture.
SCADA Master
Wide Area
Network Wide Area
Network
Wide Area
Network
RTU
RTU
RTU
(b) Distributed SCADA system: Control functions were distributed across multiple
systems during second generation [18]. Distributing the individual functions of the
SCADA system across multiple systems resulted in a collective processing power
that exceeded what could have been achieved with a single processor [19]. Dur-
ing the 1980s, SCADA systems harnessed the widespread adoption of proprietary
local area networks(LAN) and more compact yet potent computers. This facilitated
enhanced sharing of operational data not only within the plant but also at broader
levels. These individual stations were used to share real-time information and
command processing for performing control tasks to trip the alarm levels of possible
problems. Only the developers cared about the SCADA security [20]. Figure 4 below
shows the Distributed SCADA architecture [21].
SCADA 4
RTU 2
(c) Internet of Things (IoT): IoT introduces a distinct approach to SCADA systems,
substituting the requirement for PLCs with an emphasis on data modeling and
advanced algorithms. This transition signifies a departure from the traditional
reliance on mainframes or server in a facility, as data goes to cloud-based servers
Sensors 2023, 23, 8840 6 of 42
for sharing and storage [22]. IoT SCADA systems are flexible and easy to maintain
and integrate. IoT brought several other advantages to SCADA, such as ease of
use, flexibility, availability, cost efficiency, big data processing, and scalability [23].
Figure 5 below shows the IoT SCADA architecture.
Cloud
SCADA Master
Remote Accessing
Remote Accessing System
System
Mobile Phone
Tablet
PC
PC
Laptop
Laptop
(d) Networked SCADA Architecture: During the third generation, the monitoring
process heavily relied on the involvement of PLCs. They were integrated into the
SCADA system, providing efficient and reliable data acquisition and control capabil-
ities. This integration of PLCs enhanced the overall functionality and responsiveness
of the SCADA system, enabling real-time monitoring and control of industrial pro-
cesses across a distributed network. The third-generation SCADA architecture thus
facilitated greater flexibility, scalability, and accessibility, making it more adaptable
to modern industrial demands [24]. It can connect to the internet and third-party pe-
ripherals. Additionally, this architecture enhanced the performance level of SCADA
by allowing several servers to run in parallel to handle several tasks [25]. Figure 6
below shows the description of the Networked SCADA architecture.
SCADA Master
Wide Area
Network
Communication Server
RTU
RTU RTU
Operator Stations
Servers
Controllers
variables, control parameters, and alarms, which are essential for retrieving the current
operating status [31];
• A process control unit: This control center acts as the brain of all process control by
performing all the computation process algorithms and running all logical expressions.
The control module takes an input variable that will be controlled, calculates it, and the
results are compared with the set point, which is the value expected of the process.
If the calculation results differ from the set point, the value must be manipulated and
the results sent to the actuator [31]. This controller, which relies on microprocessor
technology, is specifically engineered for automatic and compound loop control;
• A communication system: This system facilitates the transfer of data from one station
to another, a crucial function in distributed control systems. The network protocols
employed encompass Ethernet, Profibus, and DeviceNet;
• Smart devices: These refer to intelligent devices or bus technologies employed to
substitute older I/O systems.
This version of the Ethernet protocol-based PLCs has several limitations despite its
data sharing capability. These PLCs lacked standardization, leading to compatibility issues
between devices from different manufacturers. They also present with data handling,
processing, and storage limitations for more advanced applications. PLCs have become
an integral part of the broader industrial landscape, especially within the frameworks of
Industry 4.0 and the Industrial Internet of Things (IoT). A team of researchers proposed
an IoT-PLC version that possesses regulatory control features, incorporates fog comput-
ing capabilities for tasks such as data filtering, field data storage, and supports various
wireless interfaces that can be managed autonomously [36]. Their incorporation into these
paradigms is of utmost importance and have solved the earlier mentioned limitations
with the below capabilities, hence resulting into robust and secure solutions for modern
industrial automation, as seen below [37].
• Enhanced Automation and Smart Manufacturing: PLCs contribute to the automation
and intelligent control of industrial processes, aligning perfectly with the objectives of
Industry 4.0 and industrial IoT, which aim to create smart and interconnected factories;
• Optimizing Resource Utilization: PLCs, as part of ICS, contribute to optimizing
resource utilization, reducing energy consumption, and minimizing waste, which are
central to sustainable and eco-friendly manufacturing practices;
• Data-Driven Decision Making: In Industry 4.0 and industrial IoT, data is a valuable
asset. PLCs’ connectivity enables them to generate and share data, which is the
foundation for data-driven decision-making, predictive maintenance, and process op-
timization.
Power Supply
Input
Signals Out Put
Signals
Processor
Programmable Devices
• Power Supply Unit: The power requirements are contingent upon the particular type
of PLC employed in the application. This unit converts AC to DC voltage suitable
for PLC. This unit comprises short-circuit protection switches at all levels, control
transformers, switching power supply, and other components [38];
• Processor or CPU: This component includes a microprocessor, system memory, serial
communication ports, and a LAN connection. A power supply may also be included
in specific cases to deliver the necessary power to the CPU;
• Input/Out modules: Input and output modules serve as the connection points be-
tween the control environment’s field devices (comprising both input and output
Sensors 2023, 23, 8840 10 of 42
equipment) and the processor. The input devices encompass sensors, push buttons,
limit switches, and similar items, while the output devices consist of motors, relays,
solenoid valves, and the like. I/O devices can be broadly categorized into two groups:
discrete or digital modules and analog modules;
• Programmable devices: As seen in Figure 8 above, Programming tools are utilized to
load the specific program into the CPU’s memory. We can develop our program using
a widely recognized and user-friendly language called ladder logic.
this situation could have led to damage to the facility, system disruptions, or even potential
loss of life if the SIS had failed to carry out the safe shutdown procedures [48,49].
Threat Description
Control systems can face disruptions when the flow of information is deliberately delayed or
blocked, resulting in the unavailability of networks to control system operators. This can
Denial of control action
manifest as bottlenecks in information transfer or as a denial of service, particularly when
related to IT-resident services such as DNS
Unauthorized modifications to programmed instructions in PLCs, RTUs, DCS, or SCADA
controllers, along with alterations to alarm thresholds or unauthorized commands issued to
control equipment, have the potential to lead to various adverse outcomes. These
Unauthorized reprogramming
consequences may include equipment damage if operational tolerances are exceeded,
of control devices
premature shutdown of processes (such as the untimely shutdown of transmission lines),
triggering environmental incidents, or even the disabling of control equipment
The transmission of false information to control system operators can serve two main
Spoofed System Status Information purposes: to conceal unauthorized changes or to instigate improper actions by system
operators
Control Logic Manipulation Control system software or configuration settings modified, producing unpredictable results
Safety systems operation are manipulated so that they either (1) do not operate when
Safety Systems Modified
needed or (2) perform incorrect control actions that damage the ICS
Malware on Control Systems Malicious software (e.g., virus, worm, Trojan horse) introduced into the system
(d) Inadequate collection of event data history: Investigative analysis relies on the
gathering and preservation of an ample amount of data. In the absence of thorough
and precise data collection, determining the cause of a security incident may become
exceedingly difficult or even impossible [57]. Security incidents have the potential
to go undetected, leading to additional harm and disruption. Consistent security
monitoring is equally crucial for identifying issues related to security controls, such
as misconfigurations and malfunctions.
policies and procedures. Departures from these guidelines can considerably increase
vulnerabilities in ICS.
(i) Insufficient access controls implemented: Access controls should align with how
the organization assigns responsibilities and privileges to its personnel. Poorly
defined access controls can grant an ICS user too many privileges or restrict them
excessively.
(j) The absence of configuration management for hardware, firmware, and software
can give rise to significant challenges: The organization may lack visibility into its
inventory, the versions in use, their locations, or their patch status, resulting in an
inconsistent and ineffective security posture. To safeguard an ICS against inade-
quate or improper modifications at all stages, including before, during, and after
system implementation, it is essential to establish a structured process for controlling
changes to hardware, firmware, software, and documentation. Failing to institute
configuration change management procedures can introduce security oversights,
vulnerabilities, and risks. To comprehensively secure an ICS, maintaining an accu-
rate inventory of system assets and their current configurations is imperative [58].
These processes are essential for the implementation of business continuity and
disaster recovery plans.
(k) Improper data linking: Data storage systems within ICS can be connected to non-ICS
data sources. One such example is database links, which facilitate the automatic
replication of data from one database to others. However, incorrect configuration of
data linkage can introduce vulnerabilities, potentially enabling unauthorized access
to or manipulation of data.
(l) Malware protection deployed without thorough testing: If malware protection
software is deployed without adequate testing, it has the potential to disrupt the
normal operation of the ICS and hinder the system’s ability to carry out essential
control actions [59].
(m) Denial of service (DoS): ICS software might be prone to DoS attacks, leading to the
obstruction of authorized access to a system resource or the disruption of system
operations and functions [60,61].
(n) Lack of installed intrusion detection/prevention software: Incidents can result
in system availability and integrity loss, data capture, modification, and deletion,
and incorrect execution of control commands. IDS/IPS software may stop or prevent
various types of attacks, including DoS attacks, and also identify attacked internal
hosts, such as those infected with worms. IDS/IPS software must be tested before
deployment to determine that it does not compromise the normal operation of the
ICS.
(o) Lack of log maintenance: In the absence of accurate logs, pinpointing the cause of a
security incident can become a challenging task.
(p) Unauthorized personnel have physical access to equipment: Limited physical access
to ICS equipment should be exclusively granted to essential personnel, while consid-
ering safety prerequisites such as emergency shutdowns or restarts. Inappropriate
access to ICS equipment can result in any of the following consequences:
• Theft of data and hardware;
• Physical harm or destruction of data and hardware;
• Unauthorized alterations to the operational environment (e.g., data connections,
unauthorized utilization of removable media, addition/removal of resources);
• Disconnection of physical data links;
• Untraceable interception of data (including keystroke and other input logging).
(q) Radio frequency, electromagnetic pulse (EMP), static discharge, brownouts,
and voltage spikes: Control systems hardware is susceptible to various threats,
including radio frequency interference,EMP, static discharges, brownouts, and volt-
age spikes [62]. The consequences can vary from temporary disruption of command
Sensors 2023, 23, 8840 16 of 42
IEC-60870-5-104
DNP3
WAN
RTU
Firewall Firewall
HMI
Modbus
Switch
PMU IEC
61400
IEC 61850
Switch
IED RTU
(a) Distributed Network Protocol 3(DNP3): DNP3 is an application layer protocol with
a multi-tier structure, primarily utilized in smart grid applications [66]. DNP3 is an
internationally recognized standard created to ensure dependable data transmission
and support functionalities for ICS. DNP3 incorporates the Enhanced Performance
Architecture (EPA), a streamlined version derived from the OSI reference model,
offering significant workload reduction. DNP3 typically operates over the Trans-
mission Control Protocol (TCP) and is assigned to port 20000. It adheres to a
client–server model, involving two distinct entities: the master, which performs
client functions, and the slave or outstation, which carries out server functions.
The primary purpose of the slave or outstation is to respond to requests initiated
by the master [67]. In this model, the master is empowered to supervise, regulate,
and collect data from slaves, thereby facilitating comprehensive control over the
production processes [68]. It is divided into three layers, namely:
• The Data Link layer: It is responsible for sending and receiving frames and
contains header information such as source DNP3 address and destination
Sensors 2023, 23, 8840 18 of 42
DNP3 address. At the same time, it is also responsible for calculating errors
through Cyclic Redundancy Check (CRC) and checking the link’s status;
• The Transport layer: The main purpose for this layer lies in the fragmentation
of large packets received by the Application layer, while its header contains
the information required to reassemble the fragments;
• The Application layer: This layer creates the message to be communicated;
however, this layer’s header differs depending on whether the message creator
is a master or a slave, as the latter’s header contains the Internal Indications
field to better describe the node’s status.
(b) Modbus: The Modbus protocol, initially created in 1979 by the American com-
pany Gould-Modicon, is an openly available communication standard designed
for enabling the communication of programmable logic controllers. With Modbus,
a master device can efficiently exchange data with multiple slave devices. While
theoretically, every node on the network can transmit messages, it is most com-
mon for communication to be instigated by the master device [69]. The Modbus
protocol has become the most widespread protocol for communication between
control devices and industrial automation. The Modbus was developed especially
for industrial applications, public domain, and with no royalties charged, easy to
use and maintain, while enabling Bit and word communication between devices
of different manufacturers without restrictions [70]. The protocol adopts a unique
protocol data unit (PDU) different from ordinary architectures. The Modbus map-
ping on a particular bus can bring in extra fields to the application data unit (ADU).
Figure 10 below illustrates the concrete format of the general message frame of a
Modbus.
ADU
PDU
They are three primary variations of the Modbus protocol, as seen below:
(a) Modbus RTU: Modbus RTU is a widely used communication protocol in
industrial automation and control systems. It is part of the Modbus family
of protocols and is designed for serial communication over RS-232 or RS-
485 interfaces. Modbus RTU is known for its simplicity and efficiency in
transmitting data between devices such as PLCs, HMIs, sensors, and other
industrial equipment [71].
Key features and characteristics of Modbus RTU include:
• Modbus RTU uses serial communication, which is well-suited for in-
dustrial environments. It can be transmitted over RS-232 or RS-485,
allowing for long-distance communication and noise immunity;
• Modbus RTU follows a master–slave architecture, where a master device
(e.g., a PLC or HMI) initiates requests, and slave devices (e.g., sensors
or actuators) respond to those requests. This architecture enables cen-
tralized control and data acquisition;
• Communication in Modbus RTU is based on frames or packets. Each
frame includes a start bit, address, function code, data, and error-
checking (CRC or LRC). The structure is designed for simplicity and
ease of implementation;
Sensors 2023, 23, 8840 19 of 42
distinct message types: data, header, configuration, and command. In the typi-
cal transmission process, these messages are converted into frames, and the PMU
exclusively transmits data frames to other devices.
(g) Message Queuing Telemetry Transport(MQTT): MQTT is a lightweight publish-
subscribe messaging protocol designed for low-bandwidth, high-latency, or un-
reliable networks [80]. It is widely used in IoT applications for real-time data
communication between devices and systems [81]. MQTT’s lightweight nature
makes it suitable for resource-constrained devices. MQTT can be vulnerable to
eavesdropping, man-in-the-middle attacks, and unauthorized access if not prop-
erly secured. Robust security mechanisms, and security considerations are often
implemented at the application level, which include using TLS/SSL for encryption
and username/password authentication. The Figure 11 below illustrates the MQTT
protocol design.
Application
MQTT Broker
Actor Node
Sensor Node
(h) Open Platform Communications (OPC): OPC is a set of standards for industrial
communication, and it plays a crucial role in Industry 4.0, which focuses on the
automation and digitization of manufacturing processes [82]. OPC enables the
interoperability of devices, equipment, and systems in industrial environments. It
includes various specifications, such as OPC Data Access (DA) and OPC Unified
Architecture (UA). Some of the common threats include data interception, unau-
thorized access, and denial-of-service attacks. OPC UA, in particular, has robust
security features, including authentication, encryption, and authorization, making
it suitable for secure industrial communication [83]. Figure 12 below illustrates the
general OPC protocol design.
Sensors 2023, 23, 8840 22 of 42
Data Acquisation
PLC DCS SCADA OPC-Client
Process Data
Driver
Actuators Sensors
Process
Network
OPC-Client
OPC-Client
OPC-Client
RISK MANAGEMENT
AND CYBERSECURITY
GOVERNANCE
ICS NETWORK
HOST SECURITY
ARCHITECTURE
SECURITY MONITORING
• Maintain ICS asset inventory of all hardware, software, and supporting infrastructure
technologies, which makes it possible to establish a list of the company’s critical assets
and processes. The impact analysis is carried out by examining the consequences on
each of the security objectives: availability, integrity, and confidentiality [93];
• Develop cybersecurity policies, procedures, training, and educational materials that
apply to the organization’s ICS available on Cybersecurity and Infrastructure Security
Agency [94];
• Organizations should embrace adaptive cybersecurity measures for critical infras-
tructure by evolving policies beyond mere tools for enforcing predefined security
requirements. These policies should become adaptive entities capable of responding
and evolving in the face of emerging threats and attacks [95];
• Develop and practice incident response procedures that join IT and OT response
processes.
Zone Access
Point
Zone A Zone B
FireWall
• Design a network topology for ICS that incorporates multiple layers, prioritizing the
most crucial communications within the most secure and dependable layer [97];
• The cost of a total system failure can be catastrophic in ICS. The use of true data diodes
utilize proprietary software to control data flow and allow one-way network traffic to
be handled properly [98]. Data diodes and unidirectional gateways are engineered to
block reverse communications at the physical layer, often employing a single fiber-
optic connection represented by a single fiber strand. The ”transmit” component
typically does not incorporate “receive” circuitry, while the “receive” component lacks
“transmit” capabilities. This configuration guarantees absolute physical layer security
but sacrifices bidirectional communication [99];
• Establish demilitarized zones (DMZs) to configure a physical and logical subnet-
work that serves as an intermediary for connected security devices, preventing direct
exposure [100].
Sensors 2023, 23, 8840 25 of 42
those applications that have been explicitly approved and listed in a designated
whitelist [115];
• Harden field devices, including tablets and smartphones;
• Replace out-of-date software and hardware devices.;
• After conducting thorough testing to confirm that it will not disrupt ICS operations,
disable unused ports and services on ICS devices;
• Implement and test system backups and recovery processes;
• Configure encryption and security for ICS protocols.
Anomaly Detection
This approach entails training a machine learning model on a dataset that represents
normal behavior, enabling it to identify deviations or anomalies effectively [120]. It can
help detect abnormal activities, such as network intrusions, system misuse, or suspicious
user behavior [121]. The correct detection of unusual events empowers the decision maker
to act on the system to correctly avoid, correct, or react to the associated situations [122].
The strength of different machine learning anomaly detection techniques can vary depend-
ing on the specific use case, dataset, and goals of the anomaly detection task. Table 3 shows
some common machine learning anomaly detection techniques and their strengths.
Effective in Non-
High- Tunable Robust to Feature Ease of In- Feature
Technique Linearity Scalability References
Dimensional Margin Noisy Data Importance terpretation Learning
Handling
Spaces
Support
Vector X X X [123]
Machines
Random X X X X [124]
Forest
Neural X X X X [125]
Networks
Gradient X X X [126]
Boosting
Autoencoders X X X [127]
Isolation X X X X [128]
Forest
Density-
based X X X [129]
Clustering
Local Outlier X X X [130]
Factor
Gaussian
Mixture X X [131]
Models
The above mentioned machine learning techniques for anomaly detection are powerful
tools for identifying outliers and unusual patterns in data, but they come with limitations
Sensors 2023, 23, 8840 27 of 42
and challenges. Table 4 highlights some common limitations of different machine learning
anomaly detection techniques.
datasets. This can lead to biased models and poorer performance in detecting rare
cyber threats [185];
• Adversarial Attacks: Adversaries can attempt to manipulate ML models by crafting
adversarial examples, which are carefully designed inputs to cause misclassification.
Adversarial attacks can reduce the reliability and robustness of ML-based cyberse-
curity solutions [186]. As per findings from certain researchers, it is possible for an
adversary to target the training process directly. If the adversary manages to intro-
duce their own data samples or manipulate the training data in some way, they can
effectively manipulate the model, leading to erroneous associations between input
characteristics and categories (referred to as “false learning”) or undermining the
trustworthiness of the labeling, ultimately resulting in a reduction in the accuracy of
the model. In both scenarios, tampering with the training process undermines the
model’s reliability and weakens its ability to withstand adversarial inputs;
• Logic manipulation: In this instance, a malicious actor targets the machine learning
model by manipulating the model’s logic in order to interfere with the learning out-
comes. This is regarded as one of the most significant threats to the machine learning
process [187]. A single machine learning model may not be universally suitable for
all tasks across different scenarios that require attention. Typically, a specific machine
learning model is trained for a particular problem or, at best, can be adapted for a
similar task. Furthermore, Cyber-Physical Systems (CPS) exhibit considerable diver-
sity, making it challenging to apply a single machine learning model comprehensively.
Therefore, a range of models and diverse datasets are essential to create system-wide
solutions [188];
• Machine learning models impose stringent demands regarding the dimensions, con-
figurations, and formats of input data: Despite the vast amounts of data that Cyber-
Physical Systems (CPS) collect, there is no assurance of data quality, particularly as the
lifespan of newly introduced IoT hardware may remain unverified. To prepare input
data for machine learning, it must undergo transformation from its raw state into a
specific data format. This transformation process can result in substantial computa-
tional expenses. Alternatively, machine learning systems must possess the capability
to inherently manage and adapt to the raw data and associated noise.
• Automation and Response: Artificial Intelligence can automate the response to certain
security incidents. For example, AI-driven security orchestration can isolate compro-
mised systems, block malicious traffic, and initiate incident response processes;
• Collaborative Threat Intelligence: Artificial Intelligence can facilitate the sharing of
threat intelligence among organizations, enabling them to collectively defend against
emerging threats that target ICS environments;
• Robustness Testing and Simulation: AI can assist in simulating potential attack scenar-
ios to identify vulnerabilities and weaknesses in ICS systems, helping organizations
proactively strengthen their security posture;
• Continuous Monitoring and Updating: Cyber threats evolve, so it is crucial to contin-
uously monitor the system’s performance and update the machine learning models
accordingly. Regularly retraining the models with new data and adapting to emerging
attack patterns is necessary.
11. Conclusions
This article has comprehensively examined the intricate facets of ICS security. Its
primary goal has been to provide novel insights and foster the growth of knowledge
within the ICS security domain. Throughout the article, considerable attention has been
dedicated to the exploration of the fundamental elements influencing decision-making
in ICS design. A broad spectrum of established security measures has been meticulously
evaluated, alongside an in-depth analysis of the integration of cutting-edge methodologies
such as machine learning to fortify security measures. The holistic approach taken within
the article ensures a profound comprehension of the complexities inherent to ICS security,
thereby proposing the integration of machine learning, particularly in the context of training
models for diverse tasks, as a potential solution to address a myriad of security scenarios.
Additionally, it analyses the necessity of incorporating cybersecurity considerations right
from the outset of ICS development. Regular retraining of machine learning models with
up-to-date data to effectively adapt to evolving attack patterns has been recommended
in this article. The article’s emphasis on both the identification of challenges and the
formulation of practical recommendations not only communicates the current findings but
also lays a solid foundation for future research endeavors and improvements in the realm
of ICS security.
The insights presented in this article serve to advance the field of ICS security and pro-
vide valuable guidance for enhancing the security of critical infrastructure. By considering
the recommended strategies we shall continue the research and support organizations to
better protect their ICS environments against evolving cyber threats and contribute to the
overall resilience and reliability of Industrial systems.
Furthermore, it is essential for future research to maintain a dynamic approach to
ICS security. The landscape of threats is in a constant state of flux, with adversaries
continuously refining their tactics. Consequently, upcoming investigations should priori-
tize the development of adaptable security strategies capable of responding to emerging
threats. This entails the establishment of self-learning security systems with the ability
to dynamically adjust their defensive mechanisms, making effective use of artificial in-
telligence and machine learning for real-time threat intelligence and preemptive threat
mitigation. Additionally, fostering interdisciplinary cooperation between experts in cy-
bersecurity, control systems engineering, and data science is crucial for crafting holistic
security solutions that encompass both the technical and operational dimensions. In an
era marked by the proliferation of digitalization and increased connectivity in industrial
contexts, proactively outmaneuvering adversaries and preemptively countering nascent
risks holds paramount importance in preserving the integrity of critical infrastructure and
upholding the dependability of industrial systems.
Author Contributions: The authors declare that they have equally contributed to the paper. All
authors read and approved the final manuscript.
Sensors 2023, 23, 8840 34 of 42
Abbreviations
The following abbreviations are used in this manuscript:
References
1. Industrial Control System. Definition. Available online: https://www.trendmicro.com/vinfo/us/security/definition/industrial-
control-system (accessed on 24 May 2023).
2. Industrial Control System (ICS): Functional Components and Uses. 10 June 2019. Available online: https://study.com/academy/
lesson/industrial-control-system-ics-functional-components-uses.html (accessed on 25 May 2023).
3. Santhi, A.R.; Muthuswamy, P. Industry 5.0 or industry 4.0S? Introduction to industry 4.0 and a peek into the prospective industry
5.0 technologies. Int. J. Interact. Des. Manuf. 2023, 17, 947–979. https://doi.org/10.1007/s12008-023-01217-8.
4. Tariq, U.; Ahmed, I.; Bashir, A.K.; Shaukat, K. A Critical Cybersecurity Analysis and Future Research Directions for the Internet
of Things: A Comprehensive Review. Sensors 2023, 23, 4117. https://doi.org/10.3390/s23084117.
5. 2022 the State of Operational Technology and Cybersecurity. Global Leader of Cybersecurity Solutions and Services. Available
online: https://www.fortinet.com/resources-campaign/secure-ot/2022-the-state-of-operational-technology-and-cybersecurity
(accessed on 27 May 2023).
6. Types of Industrial Control Systems. Available online: https://www.thomasnet.com/articles/instruments-controls/types-of-
industrial-control-systems/ (accessed on 24 May 2023).
7. Industrial Control Systems (ICS) Market Size by 2030. Available online: https://www.coherentmarketinsights.com/market-
insight/industrial-control-systems-ics-market-5587 (accessed on 24 May 2023).
8. Sverko, M.; Grbac, T.G.; Mikuc, M. SCADA Systems With Focus on Continuous Manufacturing and Steel Industry: A Survey on Archi-
tectures, Standards, Challenges and Industry 5.0. IEEE Access 2022, 10, 109395–109430. https://doi.org/10.1109/access.2022.3211288.
9. Agarwal, T. SCADA System: Architecture, Components, Types and Its Applications. ElProCus, 7 January 2021. Available online:
https://www.elprocus.com/scada-system-architecture-its-working/ (accessed on 29 May 2023).
10. Loshin, P. What Is SCADA (Supervisory Control and Data Acquisition)? WhatIs.com, 16 December 2021. Available online:
https://www.techtarget.com/whatis/definition/SCADA-supervisory-control-and-data-acquisition (accessed on 29 May 2023).
Sensors 2023, 23, 8840 35 of 42
11. Abusaq, M.J.; Zohdy, M.A. Analyzing the Impact of Security Characteristics on Industrial Control Systems. In Proceedings of the
2022 8th International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, India, 25–26
March 2022; pp. 635–641. https://doi.org/10.1109/ICACCS54159.2022.9785285.
12. S.M. SCADA Application in Manufacturing Industries and Power Generation. Instrumentation and Control Engineering, 11 March
2023. Available online: https://automationforum.co/applications-of-scada/ (accessed on 3 June 2023).
13. Pathak, A. An introduction to supervisory control and Data Acquisition (SCADA) for Beginners. Geekflare, 16 January 2023.
Available online: https://geekflare.com/scada-for-beginners/ (accessed on 29 May 2023).
14. Alanazi, M.; Mahmood, A.; Chowdhury, M.J.M. SCADA vulnerabilities and attacks: A review of the state-of-the-art and open
issues. Comput. Secur. 2023, 125, 103028. https://doi.org/10.1016/j.cose.2022.103028
15. Jeffries, M. Industrial Control Systems: The Four Generations of SCADA Architectures. Available online: https://www.
maderelectricinc.com/blog/industrial-control-systems-the-four-genertions-of-scada-architectures (accessed on 29 May 2023).
16. Nagda, V.; Ojha, C.; Attada, S. Types of SCADA System Architecture. Instrumentation Tools, 18 April 2023. Available online:
https://instrumentationtools.com/scada-system-architecture/ (accessed on 29 May 2023).
17. SCADA Architectures: Monolithic System. SCADA ARCHITECTURES: MONOLITHIC SYSTEM. Available online: https:
//powersystemsloss.blogspot.com/2012/01/scada-architectures-monolithic-system.html (accessed on 29 May 2023).
18. Admin. SCADA System Architecture, Types and Applications. WatElectronics.com, 9 May 2022. Available online: https:
//www.watelectronics.com/scada-system-architecture-types-applications/ (accessed on 29 May 2023).
19. Yadav, G.; Paul, K. Architecture and Security of SCADA Systems: A Review. Int. J. Crit. Infrastruct. Prot. 2021, 34, 100433.
https://doi.org/10.1016/j.ijcip.2021.100433.
20. Zhu, B.; Joseph, A.; Sastry, S. A Taxonomy of Cyber Attacks on SCADA Systems. In Proceedings of the 2011 International
Conference on Internet of Things and 4th International Conference, Dalian, China, 19–22 October 2011.
21. Björkman, G.; Sommestad, T.; Ekstedt, M.; Hadeli, H.; Liu, K.; Chenine, M. SCADA System Architectures. 2010. Available online:
https://api.semanticscholar.org/CorpusID:109456860 (accessed on 29 May 2023).
22. Balsom, P. Understanding a Monolithic SCADA System. High Tide, 19 January 2023. Available online: https://htt.io/
understanding-a-monolithic-scada-system/ (accessed on 29 May 2023).
23. Sajid, A.; Abbas, H.; Saleem, K. Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future
Challenges. IEEE Access 2016, 4, 1375–1384. https://doi.org/10.1109/access.2016.2549047.
24. Bindhumadhava, B.S.; Senthil, Kumar, R.K.; Kalluri, R.; Pidikiti, D.S. SCADA Communication Protocols: Vulnerabilities, Attacks
and Possible Mitigations. Csi Trans. Ict 2013, 1, 135–141.
25. Pliatsios, D.; Sarigiannidis, P.; Lagkas, T.; Sarigiannidis, A.G. A Survey on SCADA Systems: Secure Protocols, Incidents, Threats
and Tactics. IEEE Commun. Surv. Tutorials 2020, 22, 1942–1976. https://doi.org/10.1109/comst.2020.2987688.
26. Sivaranjith. Function and Components of DCS. Instrumentation and Control Engineering. Available online: https:
//automationforum.co/function-and-components-of-dcs/ (accessed on 3 June 2023).
27. Vogel-Heuser, B.; Feldmann, S.; Werner, T.; Diedrich, C. Modeling network architecture and time behavior of Distributed Control
Systems in industrial plant automation. In Proceedings of the IECON 2011—37th Annual Conference of the IEEE Industrial Elec-
tronics Society, Melbourne, VIC, Australia, 7–10 November 2011; pp. 2232–2237. https://doi.org/10.1109/IECON.2011.6119656.
28. Distributed Control System. Available online: http://kazanets.narod.ru/files/DCS.pdf (accessed on 3 June 2023).
29. Scribd. What Is Distributed Control System (DCS)—DCS (Distributed Control Systems)—Industrial Automation, PLC Pro-
gramming, SCADA and PID Control System PDF. Scribd. Available online: https://www.scribd.com/ (accessed on 3 June
2023).
30. Gillis, A.S. What Is a DCS? I Definition from TechTarget. WhatIs.com, 27 January 2023. Available online: https://www.techtarget.
com/whatis/definition/distributed-control-system (accessed on 6 June 2023).
31. Hexa. What Is a DCS System and What Is It for? HEXA Ingenieros, 18 September 2020. Available online: https://hexaingenieros.
com/what-is-a-dcs-system-and-what-is-it-for/?lang=en (accessed on 3 June 2023).
32. Sehr, M.A.; Lohstroh, M.; Weber, M.; Ugalde, I.; Witte, M.; Neidig, J.; Hoeme, S.; Niknami, M.; Lee, E.A. Programmable Logic
Controllers in the Context of Industry 4.0. IEEE Trans. Ind. Inform. 2020, 17, 3523–3533. https://doi.org/10.1109/tii.2020.3007764.
33. PLCs Programmable Logic Controllers—A Complete Guide. Available online: https://uk.rs-online.com/web/content/
discovery/ideas-and-advice/plcs-programmable-logic-controllers-guide (accessed on 7 June 2023).
34. Programmable Logic Controller|MachineMfg. MachineMfg. Available online: https://www.machinemfg.com/programmable-
logic-controller/ (accessed on 7 June 2023).
35. Hajda, J.; Jakuszewski, R.; Ogonowski, S. Security challenges in Industry 4.0 PLC Systems. Appl. Sci. 2021, 11, 9785.
https://doi.org/10.3390/app11219785.
36. Mellado, J.; Núñez, F. Design of an IoT-PLC: A containerized programmable logical controller for the industry 4.0. J. Ind. Inf.
Integr. 2021, 25, 100250. https://doi.org/10.1016/j.jii.2021.100250.
37. Folgado, F.J.; González, I.; Calderón, A.J. Data acquisition and monitoring system framed in Industrial Internet of Things for PEM
hydrogen generators. Internet Things 2023, 22, 100795. https://doi.org/10.1016/j.iot.2023.100795.
38. Yu, F.A.Y.; Fu, S.B.H.; Qiu, T.C.T.; Wang, F.D.Z. Control System Design of Spacecraft Mechanical Ground Support Equip-
ment Automatic Storage System. In Proceedings of the 2018 IEEE 8th Annual International Conference on CYBER
Sensors 2023, 23, 8840 36 of 42
Technology in Automation, Control, and Intelligent Systems (CYBER), Tianjin, China, 19–23 July 2018; pp. 977–981.
https://doi.org/10.1109/CYBER.2018.8688140.
39. Guide to Industrial Control Systems (ICS) Security—NIST. NIST. Available online: https://nvlpubs.nist.gov/nistpubs/
SpecialPublications/NIST.SP.800-82r2.pdf (accessed on 10 June 2023).
40. Cybersecurity and Infrastructure Security Agency (CISA). Securing Industrial Control Systems: CISA. Available online:
https://www.cisa.gov/resources-tools/resources/securing-industrial-control-systems#:~:text=The%20Cybersecurity%20
and%20Infrastructure%20Security,manage%20national%2Dlevel%20ICS%20risk (accessed on 12 June 2023).
41. Protecting Operational Technology Environments. Available online: https://www.blackberry.com/us/en/solutions/operational-
technology (accessed on 27 May 2023).
42. Ahmed, I., Obermeier, S., Naedele, M., and Richard, G.G. . SCADA Systems: Challenges for Forensic Investigators. Computer
2022, 45, 44–51. https://api.semanticscholar.org/CorpusID:11743854.
43. Shareef, T. 9 Times Hackers Targeted Cyberattacks on Industrial Facilities. MUO, 15 January 2022. Available online: https:
//www.makeuseof.com/cyberattacks-on-industry-hackers/ (accessed on 28 May 2023).
44. Schwartz, M.J.; Ross, R. Ukrainian Power Grid: Hacked. Bank Information Security. Available online: https://www.
bankinfosecurity.com/ukrainian-power-grid-hacked-a-8779 (accessed on 28 May 2023).
45. Hemsley, K.E.; Fisher, D.R.E. History of Industrial Control System Cyber Incidents (Technical Report)|OSTI.GOV. 31 December
2018. Available online: https://www.osti.gov/servlets/purl/1505628 (accessed on 28 May 2023).
46. 2022 ICS/OT Cybersecurity Year in Review Report. Available online: https://hub.dragos.com/ics-cybersecurity-year-in-review-
2022 (accessed on 28 May 2023).
47. The Attack on Colonial Pipeline: What We’ve Learned and What We’ve Done over the Past Two Years: CISA. Cybersecurity and
Infrastructure Security Agency CISA, 22 May 2023. Available online: https://www.cisa.gov/news-events/news/attack-colonial-
pipeline-what-weve-learned-what-weve-done-over-past-two-years (accessed on 28 May 2023).
48. Corp, C.T. China-Linked Threat Group Targets Taiwan Critical Infrastructure, Smokescreen Ransomware. Medium, 10 June 2022.
Available online: https://medium.com/cycraft/china-linked-threat-group-targets-taiwan-critical-infrastructure-smokescreen-
ransomware-c2a155aa53d5 (accessed on 28 May 2023).
49. Hardcastle, J.L. Triton Malware Still a Threat. FBI Warns, 28 March 2022. Available online: https://www.theregister.com (accessed
on 28 May 2023).
50. The San Francisco Public Transit Ransomware Attack: What We’ve Learned. Available online: https://www.cyberpolicy.com/
cybersecurity-education/the-san-francisco-public-transit-ransomware-attack-what-weve-learned (accessed on 28 May 2023).
51. You, Y.; Lee, J.; Oh, J.; Lee, K. A Review of Cyber Security Controls from An ICS Perspective. In Proceedings of the 2018
International Conference on Platform Technology and Service (PlatCon), Jeju, Republic of Korea, 29–31 January 2018; pp. 1–6.
https://doi.org/10.1109/PlatCon.2018.8472757.
52. Threat Models and Risk Assessments: Security IP. Synopsys. Available online: https://www.synopsys.com/designware-ip/
technical-bulletin/using-threat-models-2017q4.html (accessed on 12 June 2023).
53. Flaus, J.-M. Vulnerabilities of ICS. In Cybersecurity of Industrial Systems; Wiley: Hoboken, NJ, USA, 2019; pp. 121–139.
https://doi.org/10.1002/9781119644538.ch5.
54. Fluchs, S.; Tasten, E.; Mertens, M.; Horch, A.; Drath, R.; Fay, A. Security by Design Integration Mechanisms for Industrial
Control Systems. In Proceedings of the IECON 2022—48th Annual Conference of the IEEE Industrial Electronics Society, Brussels,
Belgium, 18–21 October 2022; pp. 1–6. https://doi.org/10.1109/IECON49645.2022.9968406.
55. Tuptuk, N.; Hailes, S. Security of smart manufacturing systems. J. Manuf. Syst. 2018, 47, 93–106. https://doi.org/10.1016/j.jmsy.
2018.04.007.
56. Yang, J.; Zhou, C.; Tian, Y.-C.; Yang, S.-H. A Software-Defined Security Approach for Securing Field Zones in Industrial Control
Systems. IEEE Access 2019, 7, 87002–87016. https://doi.org/10.1109/access.2019.2924800.
57. Chauhan, P.S.; Kshetri, N. 2021 State of the Practice in Data Privacy and Security. Computer 2021, 54, 125–132. https://doi.org/10
.1109/mc.2021.3083916.
58. Tenable®. The Challenges of Securing Industrial Control Systems from Cyberattacks. 31 January 2020. Available online:
https://www.tenable.com/blog/the-challenges-of-securing-industrial-control-systems-from-cyberattacks (accessed on 8 August
2023).
59. Aslan, O.; Samet, R. A Comprehensive Review on Malware Detection Approaches. IEEE Access 2020, 8, 6249–6271.
https://doi.org/10.1109/access.2019.2963724.
60. Long, M.; Wu, C.-H.; Hung, J. Denial of Service Attacks on Network-Based Control Systems: Impact and Mitigation. IEEE Trans.
Ind. Inform. 2005, 1, 85–96. https://doi.org/10.1109/tii.2005.844422.
61. Ylmaz, E.N.; Ciylan, B.; Gonen, S.; Sindiren, E.; Karacayilmaz, G. Cyber security in industrial control systems: Analysis of DoS
attacks against PLCs and the insider effect. In Proceedings of the 2018 6th International Istanbul Smart Grids and Cities Congress
and Fair (ICSG), Istanbul, Turkey, 25–26 April 2018; pp. 81–85. https://doi.org/10.1109/SGCF.2018.8408947.
62. Electromagnetic Pulse (EMP)—Washington State Department of Health. Available online: https://doh.wa.gov/sites/default/
files/legacy/Documents/Pubs/320-090_elecpuls_fs.pdf (accessed on 12 August 2023).
63. Why Do Attackers Target Industrial Control Systems?—Informazioni Sulla Sicurezza. Available online: https://www.trendmicro.
com/vinfo/it/security/news/cyber-attacks/why-do-attackers-target-industrial-control-systems (accessed on 12 August 2023).
Sensors 2023, 23, 8840 37 of 42
64. Alicea, M.; Alsmadi, I. Misconfiguration in Firewalls and Network Access Controls: Literature Review. Futur. Internet 2021, 13,
283. https://doi.org/10.3390/fi13110283.
65. Xu, Y.; Yang, Y.; Li, T.; Ju, J.; Wang, Q. Review on cyber vulnerabilities of communication protocols in industrial control systems.
In Proceedings of the 2017 IEEE Conference on Energy Internet and Energy System Integration (EI2), Beijing, China, 26–28
November 2017; pp. 1–6. https://doi.org/10.1109/EI2.2017.8245509.
66. de Toledo, T.R.; Torrisi, N.M. Encrypted dnp3 traffic classification using supervised machine learning algorithms. Mach. Learn.
Knowl. Extr. 2019, 1, 384–399.
67. Song, E.Y.; FitzPatrick, G.J.; Lee, K.B.; Griffor, E. A Methodology for Modeling Interoperability of Smart Sensors in Smart Grids.
IEEE Trans. Smart Grid 2021, 13, 555–563. https://doi.org/10.1109/tsg.2021.3124490.
68. Kelli, V.; Radoglou-Grammatikis, P.; Sesis, A.; Lagkas, T.; Fountoukidis, E.; Kafetzakis, E.; Giannoulakis, I.; Sarigiannidis,
P. Attacking and Defending DNP3 ICS/SCADA Systems. In Proceedings of the 2022 18th International Conference on Dis-
tributed Computing in Sensor Systems (DCOSS), Marina del Rey, Los Angeles, CA, USA, 30 May–1 June 2022; pp. 183–190.
https://doi.org/10.1109/DCOSS54816.2022.00041.
69. NANOTEC. Modbus RTU. Available online: https://us.nanotec.com/knowledge-base-article/modbus-rtu-motors-controllers
(accessed on 18 October 2023).
70. Alfacompbrasil. Home. Alfacomp Automação Industrial. Available online: https://alfacomp.net/en/2020/12/17/modbus-
protocol-learn-more-about-the-most-used-communication-protocol-in-industrial-automation/ (accessed on 9 June 2023).
71. Găitan, V.G.; Zagan, I. Experimental implementation and performance evaluation of an IoT Access Gateway for the Modbus
Extension. Sensors 2021, 21, 246. https://doi.org/10.3390/s21010246.
72. Nagda, V. Modbus ASCII Communication Protocol explained. Inst Tools. Available online: https://instrumentationtools.com/
modbus-ascii-communication-protocol-explained/ (accessed on 18 October 2023).
73. Yi, F.; Zhang, L.; Yang, S.; Zhao, D. A Security-Enhanced Modbus TCP Protocol and Authorized Access Mechanism. In
Proceedings of the 2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC), Shenzhen, China, 9–11 October
2021; pp. 61–67. https://doi.org/10.1109/DSC53577.2021.00016.
74. Martins, T.; Oliveira, S.V.G. Enhanced Modbus/TCP Security Protocol: Authentication and Authorization Functions Supported.
Sensors 2022, 22, 8024. https://doi.org/10.3390/s22208024.
75. Rai, P.; Mishra, A.; Lal, A. Smart Grid and IEC 61850. In Proceedings of the 2021 International Conference on Intelligent
Technologies (CONIT), Hubli, India, 25–27 June 2021; pp. 1–6. https://doi.org/10.1109/CONIT51480.2021.9498555.
76. Pruthvi, P.; Bhuvaneswari, H.B.; Sudheendran, L. Analysis of utility communication protocol IEC 61850 for substation automation
systems. In Proceedings of the National Conference on Challenges in Research and Technology in the Coming Decades (CRT
2013), Ujire, India, 27–28 September 2013; pp. 1–8. https://doi.org/10.1049/cp.201.
77. de Mattos, D.P.; Magalhaes, L.C.S.; Muchaluat-Saade, D.C.; Z., S.A.A.; Soares, L.F.; Delfino, A.; Uchoa, L.; Fetnandes, N.C.;
Lopes, Y.; Moares, I.; et al. IEC 61850 Packet Generator for Testing Substation Communication. In Proceedings of the 2019
IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC), Macao, China, 1–4 December 2019; pp. 1–5.
https://doi.org/10.1109/APPEEC45492.2019.8994338.
78. GE Grid Solutions. An Overview for Users. GE Grid Solutions. Available online: https://www.gegridsolutions.com/multilin/
journals/issues/spring09/iec61850.pdf. (accessed on 12 June 2023).
79. Seo, M.J.; Kim, T.O.; Lee, H.H. Implementation of web services based on IEC 61400-25 for wind power plants. In Proceedings of
the 2009 ICCAS-SICE, Fukuoka, Japan, 18–21 August 2009; pp. 2082–2086.
80. Patel, C.; Doshi, N. A novel MQTT security framework in generic IoT model. Procedia Comput. Sci. 2020, 171, 1399–1408.
https://doi.org/10.1016/j.procs.2020.04.150.
81. Mishra, B.; Kertesz, A. The Use of MQTT in M2M and IoT Systems: A Survey. IEEE Access 2020, 8, 201071–201086.
https://doi.org/10.1109/access.2020.3035849.
82. Panda, S.K.; Majumder, M.; Wisniewski, L.; Jasperneite, J. Real-time Industrial Communication by using OPC UA Field
Level Communication. In Proceedings of the 2020 25th IEEE International Conference on Emerging Technologies and Factory
Automation (ETFA), Vienna, Austria, 8–11 September 2020; pp. 1143–1146. https://doi.org/10.1109/ETFA46521.2020.9211998.
83. Shin, D.-H.; Kim, G.-Y.; Euom, I.-C. Vulnerabilities of the Open Platform Communication Unified Architecture Protocol in
Industrial Internet of Things Operation. Sensors 2022, 22, 6575. https://doi.org/10.3390/s22176575.
84. The Federal Register. Request Access. Available online: https://www.federalregister.gov/documents/2022/11/30/2022-25941/
enhancing-surface-cyber-risk-management (accessed on 1 July 2023).
85. Kelli, V.; Radoglou-Grammatikis, P.; Lagkas, T.; Markakis, E.K.; Sarigiannidis, P. Risk Analysis of DNP3 Attacks. In Proceedings
of the 2022 IEEE International Conference on Cyber Security and Resilience (CSR), Rhodes, Greece, 27–29 July 2022; pp. 351–356.
https://doi.org/10.1109/CSR54599.2022.9850291.
86. Chang, H.-C.; Lin, C.-Y.; Liao, D.-J.; Koo, T.-M. The Modbus Protocol Vulnerability Test in Industrial Control Systems. In
Proceedings of the 2020 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC),
Chongqing, China, 29–30 October 2020; pp. 375–378. https://doi.org/10.1109/CyberC49757.2020.00070.
87. Hareesh, R.; Kalluri, R.; Mahendra, L.; Kumar, R.K.S.; Bindhumadhava, B.S. Passive security monitoring for IEC-60870-5-104
based SCADA systems. Int. J. Ind. Control Syst. Secur. 2020, 3, 90–99. https://doi.org/10.20533/ijicss.9781.9083.20346.2020.0010.
Sensors 2023, 23, 8840 38 of 42
88. Reda, H.T.; Ray, B.; Peidaee, P.; Anwar, A.; Mahmood, A.; Kalam, A.; Islam, N. Vulnerability and Impact Analysis of the IEC
61850 GOOSE Protocol in the Smart Grid. Sensors 2021, 21, 1554. https://doi.org/10.3390/s21041554.
89. Liu, N.; Zhang, J.; Liu, W. A security mechanism of Web Services-based communication for wind power plants. In Proceedings of
the 2008 IEEE Power and Energy Society General Meeting–Conversion and Delivery of Electrical Energy in the 21st Century,
Pittsburgh, PA, USA, 20–24 July 2008; pp. 1–7. https://doi.org/10.1109/PES.2008.4596199.
90. Khan, R.; McLaughlin, K.; Laverty, D.; Sezer, S. Analysis of IEEE C37.118 and IEC 61850-90-5 synchrophasor communication
frameworks. In Proceedings of the 2016 IEEE Power and Energy Society General Meeting (PESGM), Boston, MA, USA, 17–21 July
2016; pp. 1–5. https://doi.org/10.1109/PESGM.2016.7741343.
91. Stouffer, K.; Pillitteri, V.; Lightman, S.; Abrams, M.; Hahn, A. Guide to Industrial Control Systems (ICS) Security, 2015. Available
online: https://doi.org/10.6028/nist.sp.800-82r2 (accessed on 12 August 2023).
92. CISA. Cybersecurity Best Practices for Industrial Control Systems. CISA. Available online: https://www.cisa.gov/ (accessed on
11 June 2023).
93. Flaus, J.-M. Risk Assessment Methods. In Cybersecurity of Industrial Systems; Wiley: Hoboken, NJ, USA, 2019, pp. 213–247.
https://doi.org/10.1002/9781119644538.ch9.
94. CISA. ICS Training Available through CISA. CISA. Cybersecurity and Infrastructure Security Agency CISA. Available online:
https://www.cisa.gov/ics-training-available-through-cisa (accessed on 21 June 2023).
95. Samanis, E.; Gardiner, J.; Rashid, A. Adaptive Cyber Security for Critical Infrastructure. In Proceedings of the 2022
ACM/IEEE 13th International Conference on Cyber-Physical Systems (ICCPS), Milano, Italy, 4–6 May 2022; pp. 304–305.
https://doi.org/10.1109/ICCPS54341.2022.00043.
96. Kim, A. SANS Institute. 1 May 2023. Available online: https://www.sans.org/white-papers/36327/ (accessed on 26 June 2023).
97. Staff, E. ICS Control System Security—Instrumentation Tools. Inst Tools, 3 August 2020. Available online: https:
//instrumentationtools.com/ics-control-system-security/ (accessed on 27 June 2023).
98. How Unidirectional Networks Are Used in Industrial Control Systems—OPSWAT. OPSWAT. Available online: https://www.
opswat.com/blog/how-unidirectional-networks-are-used-industrial-control-systems (accessed on 28 June 2023).
99. Knapp, E.D.; Langill, J.T. Chapter 10 - Implementing Security and Access Controls. In Industrial Network Security (Sec-
ond Edition); Knapp, E.D., Langill, J.T., Eds.; Syngress: Boston, MA, USA, 2015; pp. 283–322. ISBN: 978-0-12-420114-9.
https://doi.org/10.1016/B978-0-12-420114-9.00010-1.
100. Makrakis, G.M.; Kolias, C.; Kambourakis, G.; Rieger, C.; Benjamin, J. Industrial and Critical Infrastructure Security: Technical
Analysis of Real-Life Security Incidents. IEEE Access 2021, 9, 165295–165325. https://doi.org/10.1109/access.2021.3133348.
101. Gaudet, N.; Sahu, A.; Goulart, A.E.; Rogers, E.; Davis, K. Firewall Configuration and Path Analysis for SmartGrid Networks. In
Proceedings of the 2020 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR),
Stevenson, WA, USA, 14 May 2020; pp. 1–6. Available online: https://doi.org/10.1109/CQR47547.2020.9101400 (accessed on 2
July 2023).
102. Cveticanin, N. What Is Geo-Blocking and How Can You Bypass It? DataProt, 14 May 2023. Available online: https://dataprot.
net/articles/what-is-geo-blocking/ (accessed on 2 July 2023).
103. The Risk of Industrial Control System Programmable Logic Controller.... Available online: https://ieeexplore.ieee.org/document/
9359077 (accessed on 6 June 2023).
104. The Virtual Economy Technology Radar: L’atelier. Home. L’atelier. Available online: https://atelier.net/ve-tech-radar/tech-
radar/geoblocking-and-filtering (accessed on 2 July 2023).
105. Next Generation Jump Servers for Industrial Control Systems—SCADAHACKER. SCADAHACKER. Available online: https:
//scadahacker.com/library/ (accessed on 2 July 2023).
106. Bartman, T.; Carson, K. Securing Communications for SCADA and Critical INDUSTRIAL systems. In Proceedings of the 2016
69th Annual Conference for Protective Relay Engineers (CPRE), College Station, TX, USA, 4–7 April 2016; pp. 1–10. Available
online: https://doi.org/10.1109/CPRE.2016.7914914 (accessed on 3 July 2023).
107. Sandaruwan, G.P.H.; Ranaweera, P.S.; Oleshchuk, V.A. PLC security and critical infrastructure protection. In Proceedings of the
2013 IEEE 8th International Conference on Industrial and Information Systems (ICIInfS), Peradeniya, Sri Lanka, 17–20 December
2013; pp. 81–85. https://doi.org/10.10.1109/ICIInfS.2013.6731959.
108. Kozik, R.; Choraś, M. Current cyber security threats and challenges in critical infrastructures protection. In Proceedings of the
2013 Second International Conference on Informatics and Applications (ICIA), Lodz, Poland, 23–25 September 2013; pp. 93–97.
https://doi.org/10.1109/ICoIA.2013.6650236.
109. Cruz, T.; Barrigas, J.; Proenca, J.; Graziano, A.; Panzieri, S.; Lev, L.; Simoes, P. Improving network security monitoring for
industrial control systems. In Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management
(IM), Ottawa, ON, Canada, 11–15 May 2015; pp. 878–881. https://doi.org/10.1109/INM.2015.7140399.
110. Mantere, M.; Uusitalo, I.; Sailio, M.; Noponen, S. Challenges of Machine Learning Based Monitoring for Industrial Control System
Networks. In Proceedings of the 2012 26th International Conference on Advanced Information Networking and Applications
Workshops (WAINA), Fukuoka, Japan, 26–29 March 2012; pp. 968–972. https://doi.org/10.1109/WAINA.2012.135.
111. Singh, V.K.; Callupe, S.P.; Govindarasu, M. Testbed-based Evaluation of SIEM Tool for Cyber Kill Chain Model in Power Grid
SCADA System. In Proceedings of the 2019 North American Power Symposium (NAPS), Wichita, KS, USA, 13–15 October 2019;
pp. 1–6. https://doi.org/10.1109/NAPS46351.2019.9000344.
Sensors 2023, 23, 8840 39 of 42
112. Henriques J.; Caldeira F.; Cruz T.; Simões, P. A forensics and compliance auditing framework for Critical Infrastructure Protection.
Int. J. Crit. Infrastruct. Prot. 2023, 42, 100613. https://doi.org/10.1016/j.ijcip.2023.100613.
113. Ting, V.; Chou, H.-Y.; Wang, J.-H. Securing Manufacturing through Patch Management for IoT Devices. In Proceedings of the 2023
IEEE 3rd International Conference on Electronic Communications, Internet of Things and Big Data (ICEIB), Taichung, Taiwan,
19–21 April 2023; pp. 479–482. https://doi.org/10.1109/ICEIB57887.2023.10170074.
114. Yadav, G.; Gauravaram, P.; Jindal, A.K.; Paul, K. SmartPatch: A Patch Prioritization Framework. Comput. Ind. 2022, 137, 103595.
https://doi.org/10.1016/j.compind.2021.103595.
115. Obermeier, S.; Schierholz, R.; Hristova, A. Securing industrial automation and control systems using application whitelisting. In
Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA), Barcelona, Spain, 6–19 September 2014;
pp. 1–4. https://doi.org/10.1109/ETFA.2014.7005242.
116. IBM. What Is Machine Learning? Available online: https://www.ibm.com/topics/machine-learning (accessed on 10 July 2023).
117. Ahsan, M.; Nygard, K.E.; Gomes, R.; Chowdhury, M.; Rifat, N.; Connolly, J.F. Cybersecurity threats and their mitigation
approaches using Machine Learning—A Review. J. Cybersecur. Priv. 2022, 2, 527–555. https://doi.org/10.3390/jcp2030027.
118. Sudhakar, M.; Kaliyamurthie, K. Machine Learning Algorithms and Approaches used in Cybersecurity. In Proceedings of
the 2022 IEEE 3rd Global Conference for Advancement in Technology (GCAT), Bangalore, India, 7–9 October 2022; pp. 1–5.
https://doi.org/10.1109/GCAT55367.2022.9971847.
119. Xin, Y.; Kong, L.; Liu, Z.; Chen, Y.; Li, Y.; Zhu, H.; Gao, M.; Hou, H.; Wang, C. Machine Learning and Deep Learning Methods for
Cybersecurity. IEEE Access 2018, 6, 35365–35381. https://doi.org/10.1109/ACCESS.2018.2836950.
120. Anomaly Detection for Industrial Control Systems. Available online: https://dione.lib.unipi.gr/xmlui/bitstream/handle/unipi/
11673/Kapogianni_1616.pdf?sequence=1 (accessed on 14 July 2023).
121. Ha, D.T.; Hoang, N.V.; Du, N.H.; Huong, T.T.; Tran, K.P. Explainable Anomaly Detection for Industrial Control System Cybersecu-
rity. IFAC-PapersOnLine 2022, 55, 1183–1188. https://doi.org/10.1016/j.ifacol.2022.09.550.
122. Martí, L.; Sanchez-Pi, N.; López, J.M.M.; Garcia, A.C.B. On the combination of support vector machines and segmen-
tation algorithms for anomaly detection: A petroleum industry comparative study. J. Appl. Log. 2017, 24, 71–84.
https://doi.org/10.1016/j.jal.2016.11.015.
123. Yokkampon, U.; Chumkamon, S.; Mowshowitz, A.; Fujisawa, R.; Hayashi, E. Anomaly Detection Using Support Vector Machines
for Time Series Data. J. Robot. Netw. Artif. Life 2021, 8, 41–46. https://doi.org/10.2991/jrnal.k.210521.010.
124. Aslam, N.; Khan, I.U.; Alansari, A.; Alrammah, M.; Alghwairy, A.; Alqahtani, R.; Alqahtani, R.; Almushikes, M.; AL Hashim, M.
Anomaly Detection Using Explainable Random Forest for the Prediction of Undesirable Events in Oil Wells. Appl. Comput. Intell.
Soft Comput. 2022, 2022, 1–14. https://doi.org/10.1155/2022/1558381.
125. Alnafessah, A.; Casale, G. A Neural-Network Driven Methodology for Anomaly Detection in Apache Spark. In Proceedings of
the 2018 11th International Conference on the Quality of Information and Communications Technology (QUATIC), Coimbra,
Portugal, 4–7 September 2018; pp. 201–209. https://doi.org/10.1109/QUATIC.2018.00038.
126. Sengan, S.; V, S.; V, I.; Velayutham, P.; Ravi, L.; R., L. Detection of False Data Cyber-Attacks for the Assessment of Security in
Smart Grid Using Deep Learning. Comput. Electr. Eng. 2021, 93. https://doi.org/10.1016/j.compeleceng.2021.107211.
127. Nolle, T.; Luettgen, S.; Seeliger, A.; Mühlhäuser, M. Analyzing business process anomalies using autoencoders. Mach. Learn. 2018,
107, 1875–1893. https://doi.org/10.1007/s10994-018-5702-8.
128. Gao, R.; Zhang, T.; Sun, S.; Liu, Z. Research and improvement of isolation forest in detection of local anomaly points. J. Physics
Conf. Ser. 2019, 1237, 052023. https://doi.org/10.1088/1742-6596/1237/5/052023.
129. Bansal, M.; Sharma, D. Density-based structural embedding for anomaly detection in dynamic networks. Neurocomputing 2022,
500, 724–740. https://doi.org/10.1016/j.neucom.2022.05.109.
130. Goldstein, M.; Uchida, S. A Comparative Evaluation of Unsupervised Anomaly Detection Algorithms for Multivariate Data.
PLoS ONE 2016, 11, e0152173–e0152173. https://doi.org/10.1371/journal.pone.0152173.
131. Scrucca, L. Entropy-based anomaly detection for Gaussian mixture modeling. Algorithms 2023, 16, 195. https://doi.org/10.3390/
a16040195.
132. Adams, H.; Farnell, E.; Story, B. Support Vector Machines and Radon’s theorem. arXiv 2022, arXiv.2011.00617.
133. Primartha, R.; Tama, B.A. Anomaly detection using Random Forest: A performance revisited. In Proceedings of the 2017
International Conference on Data and Software Engineering (ICoDSE), Palembang, Indonesia, 1–2 November 2017; pp. 50–55.
https://doi.org/10.1109/icodse.2017.8285847.
134. Alnafessah, A.; Casale, G. Artificial neural networks based techniques for anomaly detection in Apache Spark. Clust. Comput.
2019, 23, 1345–1360. https://doi.org/10.1007/s10586-019-02998-y.
135. Douiba, M.; Benkirane, S.; Guezzaz, A.; Azrour, M. Anomaly detection model based on gradient boosting and decision tree for
IoT environments security. J. Reliab. Intell. Environ. 2022. https://doi.org/10.1007/s40860-022-00184-3.
136. Maleki, S.; Maleki, S.; Jennings, N.R. Unsupervised anomaly detection with LSTM autoencoders using statistical data-filtering.
Appl. Soft Comput. 2021, 108, 107443. https://doi.org/10.1016/j.asoc.2021.107443.
137. Yamanishi, K.; Takeuchi, J. Discovering Outlier Filtering Rules from Unlabeled Data: Combining a Supervised Learner with an
Unsupervised Learner. 2001. Available online: https://api.semanticscholar.org/CorpusID:10897169 (accessed on 14 July 2023).
138. Faroughi, A.; Javidan, R. CANF: Clustering and anomaly detection method using nearest and farthest neighbor. Futur. Gener.
Comput. Syst. 2018, 89, 166–177. https://doi.org/10.1016/j.future.2018.06.031.
Sensors 2023, 23, 8840 40 of 42
139. Boukerche, A.; Zheng, L.; Alfandi, O. Outlier Detection: Methods, Models, and Classification. ACM Comput. Surv. 2020, 53, 1–37.
https://doi.org/10.1145/3381028.
140. Oluwasegun, A.; Jung, J.-C. A multivariate Gaussian mixture model for anomaly detection in transient current signature of
control element drive mechanism. Nucl. Eng. Des. 2023, 402, 112098. https://doi.org/10.1016/j.nucengdes.2022.112098.
141. Bernieri, G.; Conti, M.; Turrin, F. Evaluation of Machine Learning Algorithms for Anomaly Detection in Industrial Networks. In
Proceedings of the 2019 IEEE International Symposium on Measurements and Networking (M and N), Catania, Italy, 8–10 July
2019; pp. 1–6. https://doi.org/10.1109/IWMN.2019.8805036.
142. Abdallah, E.E.; Eleisah, W.; Otoom, A.F. Intrusion Detection Systems using Supervised Machine Learning Techniques: A survey.
Procedia Comput. Sci. 2022, 201, 205–212. https://doi.org/10.1016/j.procs.2022.03.029.
143. Mohammadi, M.; Rashid, T.A.; Karim, S.H.; Aldalwie, A.H.M.; Tho, Q.T.; Bidaki, M.; Rahmani, A.M.; Hosseinzadeh, M. A
comprehensive survey and taxonomy of the SVM-based intrusion detection systems. J. Netw. Comput. Appl. 2021, 178, 102983.
https://doi.org/10.1016/j.jnca.2021.102983.
144. Terai, A.; Abe, S.; Kojima, S.; Takano, Y.; Koshijima, I. Cyber-Attack Detection for Industrial Control System Monitoring with
Support Vector Machine Based on Communication Profile. In Proceedings of the 2017 IEEE European Symposium on Security and
Privacy Workshops (EuroS and PW), Paris, France, 26–28 April 2017; pp. 132–138. https://doi.org/10.1109/EuroSPW.2017.62.
145. Keogh, E.; Lonardi, S.; Chiu, B.C. Finding surprising patterns in a time series database in linear time and space. In Pro-
ceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 23–26 July 2002.
https://doi.org/10.1145/775047.775128
146. Sanchez-Pi, N.; Martí, L.; Molina, J.M.; Garcia, A.C.B. High-level information fusion for risk and accidents prevention in pervasive
oil industry environments. In Communications in Computer and Information Science; Springer: Cham, Switzerland, 2014; pp. 202–213.
https://doi.org/10.1007/978-3-319-07767-3_19.
147. Martí, L.; Sanchez-Pi, N.; Molina, J.M.; Garcia, A.C.B. Anomaly detection based on sensor data in petroleum industry applications.
Sensors 2015, 15, 2774–2797. https://doi.org/10.3390/s150202774.
148. Shang, W.; Cui, J.; Song, C.; Zhao, J.; Zeng, P. Research on Industrial Control Anomaly Detection Based on FCM and SVM. In
Proceedings of the 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/
12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), New York, NY, USA, 1–3
August 2018; pp. 218–222. https://doi.org/10.1109/TrustCom/BigDataSE.2018.00042.
149. Anton, S.D.D.; Sinha, S.; Schotten, H.D. Anomaly-based Intrusion Detection in Industrial Data with SVM and Random Forests. In
Proceedings of the 2019 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split,
Croatia, 19–21 September 2019; pp. 1–6. https://doi.org/10.23919/SOFTCOM.2019.8903672.
150. Alabugin, S.K.; Sokolov, A.N. Applying of Recurrent Neural Networks for Industrial Processes Anomaly Detection. In Pro-
ceedings of the 2021 Ural Symposium on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT),
Yekaterinburg, Russia, 13–14 May 2021, pp. 0467–0470. https://doi.org/10.1109/USBEREIT51232.2021.9455060.
151. Sinha, A.; Taylor, M.; Srirama, N.; Manikas, T.; Larson, E.C.; Thornton, M.A. Industrial Control System Anomaly Detection Using
Convolutional Neural Network Consensus. In Proceedings of the 2021 IEEE Conference on Control Technology and Applications
(CCTA), San Diego, CA, USA, 9–11 August 2021; pp. 693–700. https://doi.org/10.1109/CCTA48906.2021.9659110.
152. Lin, X.; Zhang, X.; Xu, X. Efficient Classification of Hot Spots and Hub Protein Interfaces by Recursive Feature Elimination and
Gradient Boosting. IEEE/ACM Trans. Comput. Biol. Bioinform. 2020, 17, 1525–1534. https://doi.org/10.1109/tcbb.2019.2931717.
153. Yang, T.; Chen, L.; Wang, J.; Cui, Z.; Qi, J. Anomaly detection of dust removal system through gradient boosting decision
tree algorithm. In Proceedings of the 2021 International Conference on Communications, Information System and Computer
Engineering (CISCE), Xiamen, China, 28–30 July 2021. https://doi.org/10.1109/cisce52179.2021.9445934.
154. Ochiai, H.; Hossain, D.; Chirupphapa, P.; Kadobayashi, Y.; Esaki, H. Modbus/RS-485 Attack Detection on Communication Signals
with Machine Learning. IEEE Commun. Mag. 2023, 61, 43–49. https://doi.org/10.1109/mcom.002.2200553.
155. Louk, M.H.L.; Tama, B.A. Revisiting Gradient Boosting-Based Approaches for Learning Imbalanced Data: A Case of Anomaly
Detection on Power Grids. Big Data Cogn. Comput. 2022, 6, 41. https://doi.org/10.3390/bdcc6020041.
156. Upadhyay, D.; Manero, J.; Zaman, M.; Sampalli, S. Gradient Boosting Feature Selection With Machine Learning Classifiers for Intru-
sion Detection on Power Grids. IEEE Trans. Netw. Serv. Manag. 2020, 18, 1104–1116. https://doi.org/10.1109/tnsm.2020.3032618.
157. Wang, W.; Harrou, F.; Bouyeddou, B.; Senouci, S.-M.; Sun, Y. Cyber-attacks detection in industrial systems using artificial
intelligence-driven methods. Int. J. Crit. Infrastruct. Prot. 2022, 38, 100542. https://doi.org/10.1016/j.ijcip.2022.100542.
158. Maggipinto, M.; Beghi, A.; Susto, G.A. A Deep Convolutional Autoencoder-Based Approach for Anomaly Detection With
Industrial, Non-Images, 2-Dimensional Data: A Semiconductor Manufacturing Case Study. IEEE Trans. Autom. Sci. Eng. 2022, 19,
1477–1490. https://doi.org/10.1109/tase.2022.3141186.
159. Wang, W.; Wang, Z.; Zhou, Z.; Deng, H.; Zhao, W.; Wang, C.; Guo, Y. Anomaly detection of industrial control systems based on
transfer learning. Tsinghua Sci. Technol. 2021, 26, 821–832. https://doi.org/10.26599/tst.2020.9010041.
160. Pyatnisky, I.A.; Sokolov, A.N. Assessment of the Applicability of Autoencoders in the Problem of Detecting Anomalies in the
Work of Industrial Control Systems. In Proceedings of the 2020 Global Smart Industry Conference (GloSIC), Chelyabinsk, Russia,
17–19 November 2020; pp. 234–239. https://doi.org/10.1109/GloSIC50886.2020.9267864.
Sensors 2023, 23, 8840 41 of 42
161. Potluri, S.; Diedrich, C. Deep Learning based Efficient Anomaly Detection for Securing Process Control Systems against Injection
Attacks. In Proceedings of the 2019 IEEE 15th International Conference on Automation Science and Engineering (CASE),
Vancouver, BC, Canada, 22–26 August 2019; pp. 854–860. https://doi.org/10.1109/COASE.2019.8843140.
162. Doraswamy, B.; Krishna, K.L. A Deep Learning Approach for Anomaly Detection in Industrial Control Systems. In Proceedings of
the 2022 International Conference on Augmented Intelligence and Sustainable Systems (ICAISS), Trichy, India, 24–26 November
2022; pp. 442–448. https://doi.org/10.1109/ICAISS551.
163. Galka, L.; Karczmarek, P.; Tokovarov, M. Isolation Forest Based on Minimal Spanning Tree. IEEE Access 2022, 10, 74175–74186.
https://doi.org/10.1109/access.2022.3190505.
164. Reliability, August 2016 a Density-Based Clustering Method for.... Available online: https://rs.ieee.org/images/files/techact/
Reliability/2016-08/2016-08-a03.pdf (accessed on 13 July 2023).
165. Alghushairy, O.; Alsini, R.; Soule, T.; Ma, X. A Review of Local Outlier Factor Algorithms for Outlier Detection in Big Data
Streams. Big Data Cogn. Comput. 2020, 5, 1. https://doi.org/10.3390/bdcc5010001.
166. Xu, Z.; Kakde, D.; Chaudhuri, A. Automatic Hyperparameter Tuning Method for Local Outlier Factor, with Applications to
Anomaly Detection. In Proceedings of the 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA,
9–12 December 2019; pp. 4201–4207. https://doi.org/10.1109/BigData47090.2019.9006151.
167. Amine, M.A.; Batton-Hubert, M.; Casoetto, N. One Class Support Subsequence Machine: Abnormal TimeSeries Subsequences
Detection Using One-Class SVM. Available online: https://doi.org/10.21203/rs.3.rs-2378527/v2 (accessed on 14 July 2023).
168. Yu, B.; Zhang, Y.; Xie, W.; Zuo, W.; Zhao, Y.; Wei, Y. A Network Traffic Anomaly Detection Method Based on Gaussian Mixture
Model. Electronics 2023, 12, 1397. https://doi.org/10.3390/electronics12061397.
169. Pinto, A.; Herrera, L.-C.; Donoso, Y.; Gutierrez, J.A. Survey on Intrusion Detection Systems Based on Machine Learning Techniques
for the Protection of Critical Infrastructure. Sensors 2023, 23, 2415. https://doi.org/10.3390/s23052415.
170. A Survey of Intrusion Detection on Industrial Control Systems. Available online: https://journals.sagepub.com/doi/full/10.117
7/1550147718794615 (accessed on 3 August 2023).
171. Shaukat, K.; Luo, S.; Varadharajan, V.; Hameed, I.A.; Xu, M. A Survey on Machine Learning Techniques for Cyber Security in the
Last Decade. IEEE Access 2020, 8, 222310–222354. https://doi.org/10.1109/access.2020.3041951.
172. Zhu, N.; Zhu, C.; Zhou, L.; Zhu, Y.; Zhang, X. Optimization of the Random Forest Hyperparameters for Power In-
dustrial Control Systems Intrusion Detection Using an Improved Grid Search Algorithm. Appl. Sci. 2022, 12, 10456.
https://doi.org/10.3390/app122010456.
173. Brownlee, J. Feature Importance and Feature Selection with XGBoost in Python. MachineLearningMastery.com, 27 August 2020.
Available online: https://machinelearningmastery.com/feature-importance (accessed on 15 July 2023).
174. Song, Y.; Hyun, S.; Cheong, Y.-G. Analysis of autoencoders for network intrusion detection. Sensors 2021, 21, 4294.
https://doi.org/10.3390/s21134294.
175. Meidan, Y.; Bohadana, M.; Mathov, Y.; Mirsky, Y.; Shabtai, A.; Breitenbacher, D.; Elovici, Y. N-BaIoT—Network-Based Detection of IoT
Botnet Attacks Using Deep Autoencoders. IEEE Pervasive Comput. 2018, 17, 12–22. https://doi.org/10.1109/MPRV.2018.03367731.
176. K, D. Anomaly Detection Using Isolation Forest in Python. Paperspace Blog, 9 April 2021. Available online: https://blog.
paperspace.com/anomaly-detection-isolation-forest/ (accessed on 29 May 2023).
177. Monshizadeh, M.; Khatri, V.; Kantola, R.; Yan, Z. A deep density based and self-determining clustering approach to label
unknown traffic. J. Netw. Comput. Appl. 2022, 207, 103513. https://doi.org/10.1016/j.jnca.2022.103513.
178. Foley, M.; Hicks, C.; Highnam, K.; Mavroudis, V. Autonomous Network Defence Using Reinforcement Learning. In Proceedings
of the 2022 ACM on Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May–3 June 2022.
https://doi.org/10.1145/3488932.3527286.
179. Alavizadeh, H.; Alavizadeh, H.; Jang-Jaccard, J. Deep Q-Learning Based Reinforcement Learning Approach for Network Intrusion
Detection. Computers 2022, 11, 41. https://doi.org/10.3390/computers11030041.
180. Hsu, Y.-F.; Matsuoka, M. A Deep Reinforcement Learning Approach for Anomaly Network Intrusion Detection System. In
Proceedings of the 2020 IEEE 9th International Conference on Cloud Networking (CloudNet), Virtual, 4–11 November 2020; pp.
1–6. https://doi.org/10.1109/CloudNet51028.2020.9335796.
181. Ahmed, K.I.; Tahir, M.; Habaebi, M.H.; Lau, S.L.; Ahad, A. Machine Learning for Authentication and Authorization in IoT:
Taxonomy, Challenges and Future Research Direction. Sensors 2021, 21, 5122. https://doi.org/10.3390/s21155122.
182. Susto, G.A.; Schirru, A.; Pampuri, S.; McLoone, S.; Beghi, A. Machine Learning for Predictive Maintenance: A Multiple Classifier
Approach. IEEE Trans. Ind. Inform. 2014, 11, 812–820. https://doi.org/10.1109/tii.2014.2349359.
183. Cremer, F.; Sheehan, B.; Fortmann, M.; Kia, A.N.; Mullins, M.; Murphy, F.; Materne, S. Cyber risk and cybersecurity: A systematic
review of data availability. Geneva Pap. Risk Insur.-Issues Pr. 2022, 47, 698–736. https://doi.org/10.1057/s41288-022-00266-6.
184. Ai, ML, and DL Effects on Cybersecurity. Zenarmor. Available online: https://www.zenarmor.com/docs/network-security-
tutorials/what-is-ai-ml-and-dl-effects-on-cybersecurity (accessed on 29 May 2023).
185. Wang, H.; Singhal, A.; Liu, P. Tackling imbalanced data in cybersecurity with transfer learning: A case with ROP payload
detection. Cybersecurity 2023, 6, 1–15. https://doi.org/10.1186/s42400-022-00135-8.
186. Lin, J.; Dang, L.; Rahouti, M.; Xiong, K. ML Attack Models: Adversarial Attacks and Data Poisoning Attacks. arXiv 2021,
arXiv.2112.02797.
Sensors 2023, 23, 8840 42 of 42
187. Ding, D.; Han, Q.-L.; Xiang, Y.; Ge, X.; Zhang, X.-M. A survey on security control and attack detection for industrial cyber-physical
systems. Neurocomputing 2018, 275, 1674–1683. https://doi.org/10.1016/j.neucom.2017.10.009.
188. Goodfellow, I.M. Making Machine Learning Robust against Adversarial Inputs. ACM, 1 July 2018. Available online: https:
//cacm.acm.org/magazines/2018/7/229030-making-machine-learning-robust-against-adversarial-inputs/fulltext (accessed on
May 23, 2023).
189. Liang, F.; Hatcher, W.G.; Liao, W.; Gao, W.; Yu, W. Machine Learning for Security and the Internet of Things: The Good, the Bad,
and the Ugly. IEEE Access 2019, 7, 158126–158147. https://doi.org/10.1109/access.2019.2948912.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.