Skip to main content

A New Proposal for Detection and Location of Cyberattacks in Industrial Processes

  • Conference paper
  • First Online:
Progress in Artificial Intelligence and Pattern Recognition (IWAIPR 2023)

Abstract

In the Industry 4.0 paradigm, the cybersecurity is a key aim to obtain high levels of performance of the industries based on the use of the IoT technology and the Big Data analysis. To achieve this objective, the cyberphysical industrial plants must be equipped with cybersecurity systems for early detection and location of cyberattacks. This paper presents a robust approach of an industrial cybersecurity system by using non-standard Pythagorean membership grades. The proposed scheme was validated using the Two-Tanks benchmark with excellent results. The proposal was compared with other computational intelligence tools recently presented in the scientific literature, and the results showed the best performance of the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alanazi, M., Mahmood, A., Morshed, M.: Scada vulnerabilities and attacks: a review of the state of the art and open issues. Comput. Secur. 125, 1–29 (2023)

    Article  Google Scholar 

  2. Alladi, T., Chamola, V., Zeadally, S.: Industrial control systems: cyberattack trends and countermeasures. Comput. Commun. 155, 1–8 (2020)

    Article  Google Scholar 

  3. Atanassov, K.: On Intuitionistic Fuzzy Sets Theory. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-29127-2

    Book  Google Scholar 

  4. Bashendy, M., Tantawy, A., Erradi, A.: Intrusion response systems for cyber-physical systems: a comprehensive survey. Comput. Secur. 124, 1–27 (2023)

    Article  Google Scholar 

  5. Bernal de Lázaro, J., Cruz Corona, C., Silva Neto, A., Llanes-Santiago, O.: Criteria for optimizing kernel methods in fault monitoring process: a survey. ISA Trans. 127, 259–272 (2022)

    Google Scholar 

  6. Li, Y., Yang, G., He, H., Jiao, L., Shang, R.: A study of large-scale data clustering based on fuzzy clustering. Soft Comput. 20, 3231–3242 (2016)

    Article  Google Scholar 

  7. Quevedo, J., Sánchez, H., Rotondo, D., Escobet, T., Puig, V.: A two-tank benchmark for detection and isolation of cyber-attacks. IFAC Paper OnLIne 51, 770–775 (2018)

    Article  Google Scholar 

  8. Rodríguez-Ramos, A., Bernal-de Lázaro, J., Prieto-Moreno, A., Silva Neto, A., Llanes-Santiago, O.: An approach to robust fault diagnosis in mechanical systems using computational intelligence. J. Intell. Manuf. 30, 1601–1615 (2019)

    Google Scholar 

  9. Rodríguez-Ramos, A., Silva-Neto, A.J., Llanes-Santiago, O.: An approach to fault diagnosis with online detection of novel faults using fuzzy clustering tools. Expert Syst. Appl. 113, 200–212 (2018)

    Article  Google Scholar 

  10. Yager, R.R.: Pythagorean membership grades in multicriteria decision making. IEEE Trans. Fuzzy Syst. 22, 958–965 (2014)

    Article  Google Scholar 

  11. Yager, R.R.: Properties and applications of Pythagorean fuzzy sets. In: Angelov, P., Sotirov, S. (eds.) Imprecision and Uncertainty in Information Representation and Processing. SFSC, vol. 332, pp. 119–136. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-26302-1_9

    Chapter  Google Scholar 

  12. Zhou, J., Chen, L., Chen, C.P., Zhang, Y., Li, H.: Fuzzy clustering with the entropy of attribute weights. Neurocomputing 198, 125–134 (2016)

    Article  Google Scholar 

Download references

Acknowledgements

The authors acknowledge the financial support provided by FAPERJ, Fundacão Carlos Chagas Filho de Amparo à Pesquisa do Estado do Rio de Janeiro; CNPq, Consehlo Nacional de Desenvolvimento Científico e Tecnológico; CAPES, Coordenação de Aperfeiçoamento de Pessoal de Nível Superior, research supporting agencies from Brazil and the project PN223LH004-23 from the Science and Technology National Program in Automation, Robotic and Artificial Intelligence (ARIA) of the Ministry of Science, Technology and Environment (CITMA) of Cuba.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Orestes Llanes-Santiago .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rodríguez-Ramos, A., Irigoyen, E., da Silva Neto, A.J., Llanes-Santiago, O. (2024). A New Proposal for Detection and Location of Cyberattacks in Industrial Processes. In: Hernández Heredia, Y., Milián Núñez, V., Ruiz Shulcloper, J. (eds) Progress in Artificial Intelligence and Pattern Recognition. IWAIPR 2023. Lecture Notes in Computer Science, vol 14335. Springer, Cham. https://doi.org/10.1007/978-3-031-49552-6_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-49552-6_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-49551-9

  • Online ISBN: 978-3-031-49552-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics