Skip to main content

Abstract

The Industrial Internet of Things (IIoT) brings the ubiquitous connectivity of the Internet of Things (IoT) to industrial processes, optimizing manufacturing and civil infrastructures with assorted “smart” technologies. This ubiquitous connectivity to industrial processes has increased the attack surface available to threat actors, with increasingly frequent cyber attacks on physical infrastructure resulting in significant economic and life safety consequences, due to service interruptions in power grids, oil distribution pipelines, etc. The difference between IoT and IIoT is largely one of degree, with the consequence of service interruptions to IoT (ie home automation) typically limited to mild inconvenience, while interruptions to IIoT environments (ie power grids) have more significant economic and life safety consequences. The field of Intrusion Detection Systems / Intrusion Prevention Systems (IDS/IPS) has traditionally focused on cyber components rather than physical components, which has resulted in threat detection capabilities in IIoT environments lagging behind their non-industrial counterparts, leading to increasingly frequent attacks by threat actors against critical infrastructure. This paper reviews the current state of IDS/IPS capabilities in industrial environments and compares the maturity and effectiveness to the more established IDS/IPS capabilities of non-industrial Information Technology (IT) networks. As a new contribution, this paper also identifies gaps in the existing research in the field, and maps selected challenges to potential solutions and/or opportunities for further research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kagermann, H., Wahlster, W., Helbig, J.: Securing the future of german manufacturing industry: recommendations for implementing the strategic initiative industrie 4.0. Final Report of the Industrie 4.0 Working Group, Acatech— National Academy of Science and Engineering, p. 678 (2013)

    Google Scholar 

  2. Al-Hawawreh, M., Sitnikova, E.: Developing a security testbed for industrial internet of things. IEEE Internet Things J. 8(7), 5558–5573 (2021). https://doi.org/10.1109/JIOT.2020.3032093

    Article  Google Scholar 

  3. Wolf, M., Serpanos, D.: Safe and Secure Cyber-Physical Systems and Internet-of-Things Systems. Springer International Publishing, Cham (2020). https://doi.org/10.1007/978-3-030-25808-5

    Book  Google Scholar 

  4. Huang, L., Zhu, Q.: A dynamic games approach to proactive defense strategies against advanced persistent threats in cyber-physical systems. Comput. Secur. 89, 101660 (2020). https://doi.org/10.1016/j.cose.2019.101660

    Article  Google Scholar 

  5. Seng, S., Garcia-Alfaro, J., Laarouchi, Y.: Why anomaly-based intrusion detection systems have not yet conquered the industrial market? In: Foundations and Practice of Security: 14th International Symposium, FPS 2021, Paris, France, December 7–10, pp. 341–354 (2021). https://doi.org/10.1007/978-3-031-08147-7_23

  6. Khraisat, A., Alazab, A.: A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges. Cybersecur 4, 18 (2021). https://doi.org/10.1186/s42400-021-00077-7

    Article  Google Scholar 

  7. Vasan, D., Alazab, M., Venkatraman, S., Akram, J., Qin, Z.: MTHAEL: cross-architecture IoT malware detection based on neural network advanced ensemble learning. IEEE Trans. Comput. 69(11), 1654–1667 (2020). https://doi.org/10.1109/TC.2020.3015584

    Article  Google Scholar 

  8. Abid, A., Jemili, F., Korbaa, O.: Distributed architecture of an intrusion detection system in industrial control systems. In: ICCCI 2022: Communications in Computer and Information Science, vol. 1653. Springer, Cham (2022).https://doi.org/10.1007/978-3-031-16210-7_39

  9. Bai, Y., Park, J., Tehranipoor, M.: Real-time instruction-level verification of remote IoT/CPS devices via side channels. Discov. Internet Things 2, 1 (2022). https://doi.org/10.1007/s43926-022-00021-2

  10. Chavez, A., et al.: Hybrid intrusion detection system design for distributed energy resource systems. IEEE CyberPELS (CyberPELS) Knoxville, TN, USA 2019, 1–6 (2019). https://doi.org/10.1109/CyberPELS.2019.8925064

    Article  Google Scholar 

  11. Haoran, Gu., et al.: DEIDS: a novel intrusion detection system for industrial control systems. Neural Comput. Appl. 34(12), 9793–9811 (2022). https://doi.org/10.1007/s00521-022-06965-4

    Article  Google Scholar 

  12. Rakas, S.V.B., Stojanovic, M.D., Markovic-Petrovic, J.D.: A review of research work on network-based SCADA intrusion detection systems. IEEE Access 8, 93083–93108 (2020). https://doi.org/10.1109/ACCESS.2020.2994961

    Article  Google Scholar 

  13. Ravikumar, G., Singh, A., Babu, J.R., Moataz, A., Govindarasu, M.: D-IDS for cyber-physical DER modbus system - architecture, modeling, testbed-based evaluation. In: 2020 Resilience Week (RWS), Salt Lake City, ID, USA, Oct. 2020, pp. 153–159 (2020). https://doi.org/10.1109/RWS50334.2020.9241259

  14. Hwang, C., Lee, T.: E-SFD: explainable sensor fault detection in the ICS anomaly detection system. IEEE Access 9, 140470–140486 (2021). https://doi.org/10.1109/ACCESS.2021.3119573

    Article  Google Scholar 

  15. Ashibani, Y., Mahmoud, Q.H.: Cyber physical systems security: analysis, challenges and solutions. Comput. Secur. 68, 81–97 (2017). https://doi.org/10.1016/j.cose.2017.04.005

    Article  Google Scholar 

  16. Yaacoub, J.-P.A., Salman, O., Noura, H.N., Kaaniche, N., Chehab, A., Malli, M.: Cyber-physical systems security: limitations, issues and future trends. Microprocess. Microsyst. 77, 103201 (2020). https://doi.org/10.1016/j.micpro.2020.103201

    Article  Google Scholar 

  17. Qassim, Q.S., Jamil, N., Mahdi, M.N., Abdul Rahim, A.A.: Towards SCADA threat intelligence based on intrusion detection systems - a short review. In: 2020 8th International Conference on Information Technology and Multimedia (ICIMU), Selangor, Malaysia, Aug. 2020, pp. 144–149 (2020). https://doi.org/10.1109/ICIMU49871.2020.9243337

  18. Kandasamy, K., Srinivas, S., Achuthan, K., Rangan, V.P.: IoT cyber risk: a holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking process. EURASIP J. Info. Secur. 2020(1), 1–18 (2020). https://doi.org/10.1186/s13635-020-00111-0

    Article  Google Scholar 

  19. Darabseh, A., Freris, N.M.: A software-defined architecture for control of IoT cyberphysical systems. Cluster Comput. 22(4), 1107–1122 (2019). https://doi.org/10.1007/s10586-018-02889-8

    Article  Google Scholar 

  20. Kabore, R., Kouassi, A., N’goran, R., Asseu, O., Kermarrec, Y., Lenca, P.: Review of anomaly detection systems in industrial control systems using deep feature learning approach. ENG 13(01), 30–44 (2021). https://doi.org/10.4236/eng.2021.131003

    Article  Google Scholar 

  21. Sgueglia, A., Di Sorbo, A., Visaggio, C.A., Canfora, G.: A systematic literature review of IoT time series anomaly detection solutions. Futur. Gener. Comput. Syst. 134, 170–186 (2022). https://doi.org/10.1016/j.future.2022.04.005

    Article  Google Scholar 

  22. Bartusiak, R.D., et al.: Open Process Automation: a standards-based, open, secure, interoperable process control architecture. Control. Eng. Pract. 121, 105034 (2022). https://doi.org/10.1016/j.conengprac.2021.105034

    Article  Google Scholar 

Download references

Acknowledgement

This research has been funded by the SUDOE Interreg Program -grant INUNDATIO-, by the Spanish Ministry of Economics and Industry, grant PID2020-112726RB-I00, by the Spanish Research Agency (AEI, Spain) under grant agreement RED2018–102312-T (IA-Biomed), and by the Ministry of Science and Innovation under CERVERA Excellence Network project CER-20211003 (IBERUS) and Missions Science and Innovation project MIG-20211008 (INMERBOT). Also, by Principado de Asturias, grant SV-PA-21-AYUD/2021/50994.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nicholas Jeffrey .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jeffrey, N., Tan, Q., Villar, J.R. (2023). Intrusion Detection and Prevention in Industrial Internet of Things: A Study. In: García Bringas, P., et al. International Joint Conference 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) 14th International Conference on EUropean Transnational Education (ICEUTE 2023). CISIS ICEUTE 2023 2023. Lecture Notes in Networks and Systems, vol 748. Springer, Cham. https://doi.org/10.1007/978-3-031-42519-6_4

Download citation

Publish with us

Policies and ethics