=Paper=
{{Paper
|id=Vol-2748/Paper35
|storemode=property
|title=Artificial Intelligence and Cyber Security: Protecting and Maintaining Industry 4.0 Power Networks
|pdfUrl=https://ceur-ws.org/Vol-2748/IAM2020_paper_35.pdf
|volume=Vol-2748
|authors=Sahli Nabil,Benmohammed Mohamed,Hugues Bersini,El-Bay Bourennane
}}
==Artificial Intelligence and Cyber Security: Protecting and Maintaining Industry 4.0 Power Networks==
Artificial Intelligence and Cyber Security: Protecting and Maintaining Industry 4.0 Power Networks Sahli Nabila, Benmohammed Mohamedb ,Hugues Bersinic and El-Bay Bourennaned a SADEG- RDE SONELGAZ, Algeria & LIRE Laboratory Constantine 2 University, Algeria nabil.sahli@etu-univ-amu.fr and sahli.nabil@rde.sadeg.dz b LIRE Laboratory Constantine 2 University, Algeria mohamed.benmohammed@univ-constantine2.dz c IRIDIA Laboratory ULB University, Bruxelles, Belgium hugues.bersini@ulb.ac.be d LE2I Laboratory UBFC University, Dijon, France ebourenn@u-bourgogne.fr Abstract This survey paper describes a literature review of machine learning and deep learning (DL) methods for AI cyber security applications. A short tutorial-style description of each artificial intelligence and data meaning method are provided, including deep learning, restricted Boltzmann machines, Feed forward deep neural network, recurrent neural network, deep belief network, deep auto-encoder, deep migration learning, self-taught Learning and replicator neural network. Then we discuss how each of the DL methods is used for security applications for SCADA systems and smart grids. We conclude that artificial intelligence in cyber Security challenges to adopt DL. Keywords Cyber Security ; machine Learning ; AI secure bloc ; Smart Grid security. IAM’20: The 3rd Conference on Informatics and Applied Mathematics, October 21–22, 2020, LabSTIC Guelma University Algeria. 2020 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). CEUR Workshop Proceedings (CEUR-WS.org) 1. Introduction Critical National Infrastructures (CNIs) such as ports, water and gas distributors, hospitals, energy providers are becoming the main targets of cyber-attacks. (Supervisory Control and Data Acquisitions -SCADA) or Industrial Control Systems (ICS) in general are the core systems that CNIs rely on in order to manage their production. The Algerian industrial group SONELGAZ relies on its research and development and its capacity to innovate to ensure its public service missions in an ever more efficient way by inventing the electrical network as well as the security and maintenance solutions of tomorrow, it will be more “Smart”, more digital, more automatic and more interactive, serving customers, players in the electricity market and the development of smart cities. The research and innovation program contributes to the digital transformation of the company and to the proactive support of the energy transition to renewable energies. Mainly composed of applied research activities, experimental development and supplemented by an “Open Innovation” device to establish collaborations with promising research and innovation startup companies, the research and development program is enriched by experiments carried out in demonstrators and on real equipment. The electricity transmission or distribution system operator must always seek the best balance between investment and maintenance policies for electrical works, component performance, level of network automation and optimization of tools. “SCADA” driving experience. The SONELGAZ group is also investing in research to have innovative or communicating components, develop the automation of electrical networks and modernize driving tools (information system and SCADA). The objective is in particular to increase the observability and piloting capacities from the driving rooms for better management of electrical constraints, in advance and in real time. Figure 1: Cybersecurity AI for Industry 4.0 Smart Grids [1] We review the cyber security IA for industry 4.0 smart systems that use deep learning approaches. We present the smart grid security for electricity transport and distribution. We analyze seven deep learning approaches according to two models, namely, deep discriminative models and (generative/unsupervised) models. The deep discriminative models include three approaches: -Recurrent neural networks, (ii) deep neural networks, and (iii) convolutional neural networks. -The generative/unsupervised models include four approaches: (i) deep auto encoders, (ii) restricted Boltzmann machine, and (iii) deep Boltzmann machines, and (iv) deep belief networks. The Mediterranean electric loop is an example of interconnected smart electricity networks. With exchanges between SCADA systems (international emergency alarms). A Mediterranean market for the marketing of electricity is developing as well as energy support between countries to avoid "Blackouts", as presented in Figure 2. Figure 2: Interconnected electrical networks for marketing and energy security needs [2] 2. Similar work In the literature, there are different related studies that deal with machine learning techniques for industry 4.0 cyber security; we categorize the studies based on the following criteria: • Deep learning approaches: it specifies if the study was focused on Deep learning approaches for industry 4.0 smart systems cyber security [3]. • Machine learning approaches: it indicates whether the study considered machine-learning approaches for industry 4.0 smart systems cyber security [4, 5]. • Evaluation of deep learning approaches: it indicates whether the study evaluates deep learning approaches for industry 4.0 smart systems cyber security [6]. • Evaluation of machine learning approaches: it indicates whether the study evaluates machine- learning approaches for industry 4.0 smart systems cyber security [7]. Study Year DL ML and DM EDL EML Buczak et al. [8] 2015 No Yes No No Milenkoski et al. [9] 2015 No Partial No Partial Folino et al. [10] 2016 No Yes No No Zarpelao et al. [11] 2017 No Partial No No Aburomman and Reaz 2017 No Yes No Partial [12] Xin et al. [13] 2018 Yes Partial No No Ring et al. [14] 2019 No No No No Loukas et al. [15] 2019 No No No No Costa et al. [16] 2019 No No No No Par- Chaabouni et al. [17] 2019 Yes No Partial tial Berman et al. [18] 2019 Yes Partial No No Mahdavifar et al. [19] 2019 Yes Partial No No Sultana et al. [20] 2019 No Yes No No Our Study 2020 Yes Partial Yes Partial ML and DM: Machine learning (ML) and data mining (DM) approaches; DL: Deep learning approaches; EDL: Evaluation of deep learning approaches; EML: Evaluation of machine learning approaches. 3. The motivations of our research work 3.1. Drones for the maintenance of overhead electrical networks Drones, associated with increasingly efficient optical sensors, can facilitate the maintenance of aerial electrical works. To punctually inspect electrical works that are difficult to access from the ground and improve the diagnosis on the state of the components (concept of the remote eye). The ultimate goal would be to be able to use them for line visits over long distances: detection of defective equipment, inventory of vegetation near the works to prioritize pruning. In line with its contribution to the work of the Council for Civil drones presented in Figure 3, steered by the Directorate General of Civil Aviation, the SONELGAZ group will launch several experiments. One of them aims to carry out a vegetation survey by photogrammetry. The group is also involved in a consortium on the design of a LIDAR type sensor, which can be integrated into drones for operations over long distances; also manage all the components of the intelligent electrical network in a centralized and cyber secure manner. Figure 3: Drone for electrical grid maintenance 3.2. Project for the modernization of remote control systems (SCADA) The project (Intelligence Control-Command Driving) aims to modernize the SONELGAZ group's Remote-control systems, by exploiting existing business objects and new Smart objects in an industrial and evolutionary way, all along the chain, from the Agency of Conduct to the (MV / LV) public distribution stations via the source stations. This is reflected in the development of an interoperable system (standard 61850) allowing centralized and cyber secure management of all the Smart objects that can be deployed on the network (Management System): remote administration, remote configuration and supervision. The work has advanced significantly with in particular the specification of the local Management System of (HTB / HTA) stations (PCCN) and the prototyping of the new digital and cyber-secure device and of exchange of information in operation with producers connected in HTA. 3.3. Objects connected to the operation of the electricity network For the SONELGAZ group, the development of communicating objects and low-cost communication networks suggests potential contributions for the operation of the distribution network as presented in Figure 4. In collaboration with the ecosystem of startups, SONELGAZ plans to experiment with various emerging objects in order to continue to improve the quality of service for network users. It is a question of quickly testing the potential value of different objects for the businesses of the SONELGAZ group, and in case of demonstrated value, of planning their integration on a large scale. He also developed a secure tool to manage these objects and associated data, and make them available to the professions concerned. Also an integrated CRMS for the management of its clientele and the entire commercial chain. 6 Figure 4: Monitoring of electricity smart grids by wireless sensors at SONELGAZ. 3.4. Cyber security of energy information systems in Algeria With the increase in data exchanges between the various Information Systems, the control of cybersecurity issues becomes more and more critical, in particular for remote control and SCADA systems, hitherto very closed, even then that the number of cyber-attacks recorded on industrial is growing exponentially, in particular in the field of electric and gas energy. As part of the project (Intelligence Control-Command Driving), a (PoC - Proof of Concept) of the cyber-secure tele-driving channel was carried out. The Management System for Connected Objects has been the subject of specific considerations in terms of the engineering of connected objects and the processes for monitoring operational exchanges between these same objects. 3.5. Big Data processing for massive data management (SCADA and contact center) The SOBELGAZ group has developed an IT infrastructure based on a Big Data architecture to perform more sophisticated and faster data processing. These capacities are in particular tested for the massive processing of metering data in the field of flow reconstruction, at the service of the various Balance Managers. In addition, the SONELGAZ group is strengthening its role as a data operator by making consumption data available to the general public via its Open Data portal, and by developing an API (Application Programming Interface) platform with a view to expose data to customers (invoices, complaints, connection requests, etc.) market players while ensuring their protection, also setting up contact centers "call centers" with the toll-free call number for real-time management of customer relations as well as the collection of a large mass of data which requires cyber security solutions based on artificial intelligence, to deal with future cyber-attacks which will also be based on artificial intelligence. 3.6. Facilitate the integration of electric vehicles and the emergence of Smart Cities The SONELGAZ group must indeed prepare to support the development of smart cities or districts, positive energy territories, positive energy buildings and local energy communities. The SONELGAZ group is also widely involved in actions to accommodate charging facilities, conditions necessary for the development of the electric vehicle (EV) they are planned at the East-West motorway primarily in Algeria. The challenges are for the SONELGAZ group to optimize the volume of investments to strengthen the electricity network, to control the impact of charging infrastructure on the quality of the electricity supplied and to facilitate the implementation of new business models. “Business models” introduced by the development of electric vehicles (roaming and other mobility services). Cybersecurity based on artificial intelligence and at the center of interest for the integration of electric vehicles and the emergence of smart cities. One of the SONELGAZ group’s smart management of electric vehicle charging has developed algorithms for smart charging management. These algorithms make it possible to control the power calls linked to EV charging and to consume outside carbon production peaks, while satisfying the driving needs of the next day. 4. The art state The research and development theme aims to enable the SONELGAZ group to facilitate developments in the electrical system and to contribute to the energy transition to renewable energies, which involves preparing for developments in the profession of the distributor and transporter of electrical energy to the management of the smart electricity networks of tomorrow and the management of the data operator mission for the benefit of external actors. The future model of industrial 4.0's electrical networks is presented in Figure 5. Industry 4.0 components are cyber physical systems, internet of things, smart factory, web services, smart product, machine-to-machine, big data, Cloud, robots and smart embedded systems. Industry 4.0 model implemented in Critical infrastructure, supervision and control of electricity smart grid, oil and gas transport and distribution networks. Industry 4.0 design principles technologies we used are synthetized in Figure 6. Figure 5: Industry 4.0 model. Figure 6: Industry 4.0 design principles technologies From Industry 4.0 to Energy 4.0, industry in general has recognized that we are at the beginning of a revolution that is fundamentally changing the way we live, work, and relate to one another, energy has been key to all industrial revolution so far, the energy industry may not have fully realized how much the current industrial revolution will be transforming the energy industry. At a time, when the energy industry is struggling with the Energy wend. At a time, when other industries are already in the process of realizing what potential and what risk are associated with Industry 4.0 (big data, artificial intelligence, cyber security attacks, semantic and ontologies, cloud and IoT). The integration of intermittent renewable energies, the development of active demand management, electric vehicles and decentralized storage require an evolution in the role of the distributor. The SONELGAZ group carries out R&D actions to facilitate the transformations of the electrical system, the development of markets and the integration of producers on the distribution network, while maintaining the quality of supply and the cyber security of the functioning of the smart grid in the context of industry 4.0. 5. Our proposed energy 4.0 and business model Digitization of the energy industry will be a key driver of future change; the energy industry will have to look to the IT and telecommunications industry and other advanced industries for technical, commercial and legal experience. Energy lawyers will need to better understand legal problems and solutions those other industries can offer. No need to reinvent the wheel, but have to make wheel work in a heavy duty, high speed scenario, with many quick turns, in often uncharted territory, as presented in Figure 7. Figure 7: Our proposed energy 4.0 and business models for industry 4.0 at SONELGAZ. 6.The curent situation of cyber security The current cyber security domain of systems presents a missing link, which is the use of artificial intelligence, as dynamic self-learning methods to respond to new threats, and this following the future use of hackers. Techniques based on artificial intelligence for their attacks on industry 4.0 systems. The weak link in cyber security chain for industry 4.0 presented in Figure 8. Figure 8: The weak link in cyber security chain for industry 4.0. (Intrusion detection systems - IDS) [2], is part of the second defense line of a system. IDS can be deployed along with other security measures, such as access control, authentication mechanisms and encryption techniques in order to better secure the systems against cyber-attacks. Using patterns of benign traffic or normal behavior or specific rules that describe a specific attack, IDSs can distinguish between normal and malicious actions [3]. 7. Artificial intelligence evolution and our choices for secure industry 4.0 The evolution of artificial intelligence is summed up in Figure 9. We propose in our works the use of deep learning to secure smart systems and communications in the industry 4.0 control systems as smart grid used in the electricity transport and distribution industry in SONELGAZ group. Figure 9: Artificial intelligence evolution and definitions [21]. Also known as deep learning is a sub-domain of machine learning, which involves the processing by computers of large amounts of data using artificial neural networks whose structure mimics that of the human brain. Whenever new information is integrated, the existing connections between neurons are susceptible to modification and extension, which has the effect of allowing the system to learn things without human intervention, independently, while improving the quality of its decision-making and forecasting. Our secure Deep learning model for SCADA systems secure bloc detail is presented in Figure 10. Figure 10: Deep learning layers and mechanism proposed for AI secure bloc. 8 Our theory contributions Our contributions in this work are presented below composed the AI secure bloc: • We review the future Firewall that use deep learning approaches, we named Firewall AI. • We review the intrusion detection systems that use deep learning approaches in IDS AI. • We review the future antivirus that use deep learning approaches, we named antivirus AI. • We analyze seven deep learning approaches according to two models, namely, deep discriminative models and (generative/unsupervised) models. The deep discriminative models include three approaches: (i) Recurrent neural networks, (ii) deep neural networks, and (iii) convolutional neural networks. The generative/unsupervised models include four approaches: (i) deep auto encoders, (ii) restricted Boltzmann machine, and (iii) deep Boltzmann machines, and (iv) deep belief networks. • We compare the performance of deep learning approaches with four machine learning approaches, namely, Naive Bayes, Artificial neural network, Support Vector Machine, and Random forests. We proposed the future electricity secure AI model proposed for industry 4.0 as presented in Figure 11 and Figure 12. Figure 11: Future secure AI electricity (MDE- Model Driven Engeneering) model proposed. Cyber-attacks using the Internet. Machine learning (ML) and artificial intelligence techniques have been widely used to constitute an intelligent and efficient Intrusion Detection System dedicated to ICS. Generally develop and train their ML-based security system using network traces obtained from publicly available datasets. Due to malware evolution and changes in the attack strategies, these datasets fail to protect the system from new types of attacks, and consequently, the benchmark datasets should be updated periodically. Figure 12: Deep learning approaches used for industry 4.0-cyber security IA proposed Deep learning approaches we used for industry 4.0 cyber security IA are (FFDNN: Feed forward deep neural network); (CNN: Convolutional neural network); (DNN: Deep neural network); (RNN: Recurrent neural network); (DBN: Deep belief net- work); (RBM: Restricted Boltzmann machine); (DA: Deep auto-encoder); (DML: Deep migration learning); (STL: Self-Taught Learning) and (ReNN: Replicator Neural Network). 9 Conclusion This paper presents the deployment of a SCADA system at SONELGAZ group Algeria in the context of interconnected Mediterranean smart grids, for cybersecurity research and investigates the feasibility of using ML algorithms to detect cyber-attacks in real time. The SONELGAZ SCADA was built using equipment deployed in real industrial settings. Sophisticated attacks were conducted on to develop a better understanding of the attacks and their consequences in SCADA and smart grid environments. We conducted a comparative study of deep learning approaches for cyber security AI, we used for secure AI industry 4.0 smart systems, namely, deep discriminative models and (generative/unsupervised models. Specifically, we analyzed seven deep learning approaches, including recurrent neural networks, deep neural networks, restricted Boltzmann machine, deep belief networks, convolutional neural networks, deep Boltzmann machines, and deep auto encoders. Acknowledgments Thanks to IRIDIA ULB Belgium university, LE2I UBFC university France and LIRE Constantine 2 university Algeria that assisted in the research and the preparation of the work with SONELGAZ group Algeria. References [1] L.A. Maglaras, K.-H. Kim, H. Janicke, M.A. Ferrag, S. Rallis, P. Fragkou, et al:.Cyber security of critical infrastructures ICT Express, 4 (1), pp. 42-45, (2018). [2] A. Ahmim, M. Derdour, M.A. Ferrag: An intrusion detection system based on combining probability predictions of a tree of classifiers Int. J. Commun. Syst., 31 (9, pp. 35-47, (2018). [3] A. Ahmim, L. Maglaras, M.A. Ferrag, M. Derdour, H. Janicke: A novel hierarchical intrusion detection system based on decision tree and rules-based models 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), IEEE, pp. 228-233, (2019). https://ieeexplore.ieee.org/abstract/document/8804816/ [4] Z. Dewa, L.A. Maglaras: Data mining and intrusion detection systems, Int. J. Adv. Comput. Sci. Appl., 7 (1) ,pp. 62-71, (2016). [5] B. Stewart, L. Rosa, L.A. Maglaras, T.J. Cruz, M.A. Ferrag, P. Simões, et al: A novel intrusion detection mechanism for scada systems which automatically adapts to network topology changes. EAI Endorsed Trans. Ind. Netw. Intell. Syst., 4 (10), p. 4, (2017). [6] I. Sharafaldin, A.H. Lashkari, A.A. GhorbaniToward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSP, pp. 108-116, (2018). [7] M.A. Ferrag, L. Maglaras, H. Janicke, R. Smith: Deep learning techniques for cyber security intrusion detection: a detailed analysis 6th International Symposium for ICS & SCADA Cyber Security Research (ICS-CSR 2019), Athens, 10–12 September, (2019). [8] A.L. Buczak, E. Guven: A survey of data mining and machine learning methods for cyber security intrusion detection IEEE Commun. Surv. Tut, 18 (2), pp. 1153-1176, (2015). [9] A. Milenkoski, M. Vieira, S. Kounev, A. Avritzer: Payne Evaluating computer intrusion detection systems: a survey of common practices ACM Comput. Surv, 48 (1) (2015), p. 12, (2015). [10] G. Folino, P. SabatinoEnsemble based collaborative and distributed intrusion detection systems: a survey J. Netw. Comput. Appl., 66, pp. 1-16, (2016). [11] B.B. Zarpelao, R.S. Miani, C.T. Kawakani, S.C. de Alvarenga: A survey of intrusion detection in internet of things J. Netw. Comput. Appl., 84, pp. 25-37, (2017). [12] A.A. Aburomman, M.B.I. ReazA survey of intrusion detection systems based on ensemble and hybrid classifiers Comput. Security, 65, pp. 135-152, (2017). [13] Y. Xin, L. Kong, Z. Liu, Y. Chen, Y. Li, H. Zhu, et al.Machine learning and deep learning methods for cybersecurity IEEE Access, 6 , pp. 35365-35381, (2018). [14] M. Ring, S. Wunderlich, D. Scheuring, D. Landes, A. HothoA survey of network-based intrusion detection data sets Comput. Security, (2019). [15] G. Loukas, E. Karapistoli, E. Panaousis, P. Sarigiannidis, A. Bezemskij, T. VuongA taxonomy and survey of cyber-physical intrusion detection approaches for vehicles Ad Hoc Netw., 84 , pp. 124-147, (2019). [16] K.A. da Costa, J.P. Papa, C.O. Lisboa, R. Munoz, V.H.C. de AlbuquerqueInternet of things: a survey on machine learning-based intrusion detection approaches Comput. Netw., 151 (2019), pp. 147-157, (2019). [17] N. Chaabouni, M. Mosbah, A. Zemmari, C. Sauvignac, P. Faruki: Network intrusion detec- tion for IoT security based on learning techniques IEEE Commun. Survey. Tut, (2019). [18] D.S. Berman, A.L. Buczak, J.S. Chavis, C.L. Corbett: A survey of deep learning methods for cyber security. Information, 10 (4), p. 122, (2019). [19] S. Mahdavifar, A.A. GhorbaniApplication of deep learning to cybersecurity: a survey Neuro computing, (2019). [20] N. Sultana, N. Chilamkurti, W. Peng, R. AlhadadSurvey on SDN based network intrusion detection system using machine learning approaches Peer-to-Peer Netw. Appl., 12 (2), pp. 493-501, (2019). [21] T.Salman, D.Bhamare, A.Erbad, R.Jain, M.Samaka. Machine learning for anomaly detec- tion and categorization in multi-cloud environments. In Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, New York, NY, USA, 26–28 June, (2017).