Beiträge

Präsentationen auf der FPS2021 und der ICITST-2021

Im Dezember 2021 haben zwei unserer projektpartner an weiteren Konferenzen teilgenommen. Kollegen von ISEP präsentierten am 9. Dezember in Paris auf dem 14th International Symposium on Foundations & Practice of Security die Publikation “Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection”. In der gleichen Woche präsentierten unsere Kollegen von VTT auf der 16th International Conference for Internet Technology and Secured Transactions einen “Review on Cybersecurity Threats Related to Cyber Ranges“.

Die Tagungsbände werden hier verlinkt, sobald sie veröffentlicht sind.


Titel: Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection

Autoren: João Vitorino, Rui Andrade, Isabel Praça, Orlando Sousa and Eva Maia

Zusammenfassung: The digital transformation faces tremendous security challenges. In particular, the growing number of cyber-attacks targeting Internet of Things (IoT) systems restates the need for a reliable detection of malicious network activity. This paper presents a comparative analysis of supervised, unsupervised and reinforcement learning techniques on nine malware captures of the IoT-23 dataset, considering both binary and multi-class classification scenarios. The developed models consisted of Support Vector Machine (SVM), Extreme Gradient Boosting (XGBoost), Light Gradient Boosting Machine (LightGBM), Isolation Forest (iForest), Local Outlier Factor (LOF) and a Deep Reinforcement Learning (DRL) model based on a Double Deep Q-Network (DDQN), adapted to the intrusion detection context. The best performance was achieved by LightGBM, closely fol- lowed by SVM. Nonetheless, iForest displayed good results against unknown at- tacks and the DRL model demonstrated the possible benefits of employing this methodology to continuously improve the detection. Overall, the obtained results indicate that the analyzed techniques are well suited for IoT intrusion detection.


Titel: Review on Cybersecurity Threats Related to Cyber Ranges

Autoren: Sami Noponen, Juha Pärssinen and Jarno Salonen

Zusammenfassung: Cyber ranges are often used to enhance the cybersecurity posture of a company by training relevant skills. These environments are traditionally used to host exercises that simulate cybersecurity scenarios, improve the cybersecurity skills of employees and enhance the security of networks and processes. By using digital twins, it is possible to organise cyber range trainings also to the critical infrastructure sector. However, in the aforementioned sector it is important to consider the cybersecurity of these environments themselves as they often may handle company-specific confidential information. This study presents several cybersecurity related threats and challenges that cyber ranges may face during different phases of use. Cyber threats may be exposed to the actual systems that the ranges are meant to protect if these issues are not taken into consideration and mitigated. Malicious attackers may use the information in the cyber range to learn the weaknesses in the actual system. We approach the subject by reviewing the relevant literature, which is currently very limited especially when looking at the cybersecurity issues of cyber ranges. We divide the subject into the different phases of cyber range development and use, and also discuss relevant cloud security issues. Finally, we present actions to mitigate the identified cybersecurity threats and issues in cyber ranges when using them for training and awareness activities. 

Management of Cyber Security Threats in the Factories of the Future Supply Chains

Abstract

Today there are numerous Factories of the Future initiatives delivering different Industry 4.0 applications to manufacturing industry supply chains. However, in the future, Factory of the Future is not going to be a simple manufacturing asset, nor a sum of isolated assets. Instead, it will comprise a network of factories, which is considered in a System of Systems approach. The current challenge is to propose novel architectures, technologies and methodologies to optimize the level of efficiency and security of this System of Systems in a context where every step towards digitization exposes the manufacturing process to a widening array of cyber threats. This paper discusses about the management of cyber threats in System of Systems operations and supply chains. The next generation System of Systems are using different technologies with the combination of human aspects from workers, managers, entrepreneurs and decision makers. In addition, economically there are limitations on how much to invest on different technologies and human aspects. In addition, monetary and financial flows are under the burden of cyber risks. This study will therefore embrace the technical, economic and human dimensions at once. This study is based on a European-wide multi-national research project, the aim of which is to define – through different use-cases – the preventive and reactive capabilities to address cyber and physical threats and safety concerns in System of Systems. The study indicates different cyber challenges related to the future manufacturing business and operational models, with a special attention on “as-a-service” business model. The paper also indicates initial managerial and practical views on the management of cyber threats in future business models.

Access to Document

OSCM_2019_paper_29

Authors

Jukka Hemilä (VTT), Markku Mikkola (VTT), Jarno Salonen (VTT)

Conference

9th International Conference on Operations and Supply Chain Management, OSCM 2019 – RMIT University, Ho Chi Minh City, Vietnam
Duration: 15 Dec 2019 → 18 Dec 2019
Conference number: 9

ISBN (Electronic)

978-602-7060-47-0

Cite this

Hemilä, J., Mikkola, M., & Salonen, J. (2019).
Management of Cyber Security Threats in the Factories of the Future Supply Chains. In Proceedings of the 9th International Conference on Operations and Supply Chain Management, Vietnam, 2019 Vietnam.