Industrial and Systems Engineering
Articles Information
Industrial and Systems Engineering, Vol.1, No.1, Sep. 2016, Pub. Date: Aug. 25, 2016
Big Data Analytics and Cybersecurity for Advanced Manufacturing
Pages: 27-36 Views: 4530 Downloads: 5457
Authors
[01] Lidong Wang, Department of Engineering Technology, Mississippi Valley State University, Itta Bena, Mississippi, USA.
[02] Cheryl Ann Alexander, Technology and Healthcare Solutions, Inc., Itta Bena, Mississippi, USA.
Abstract
Many advanced manufacturing systems are based on industrial control systems (ICSs). Manufacturing systems are being facilitated by Internet of Things (IoT), cyber-physical systems (CPSs), and cloud platforms; however, the security risks due to these advanced technologies and platforms are increasing greatly. Cybersecurity in manufacturing is not the same as general IT security. There are many challenges in cybersecurity for advanced manufacturing. Big Data analytics is a powerful tool for analyzing complicated data with high volume, high variety, and high velocity, etc. It has the potential to improve cybersecurity in advanced manufacturing. This paper presents the progress of cybersecurity in IT, ICSs, CPSs and advanced manufacturing. Challenges in these areas are also discussed.
Keywords
Big Data Analytics, Advanced Manufacturing, Cybersecurity, Industry 4.0, Additive Manufacturing (AM), Cyber-Physical System (CPS), Internet of Things (IoT), Cloud Computing, Industrial Control System (ICS)
References
[01] M. J. Hutchins, R. Bhinge, M. K. Micali, S. L. Robinson, J. W. Sutherland, D. Dornfeld (2015). Framework for Identifying Cybersecurity Risks in Manufacturing. Procedia Manufacturing, 1, 47–63.
[02] Honeywell (2011). Cyber Security in Manufacturing & Production, Whitepaper, Honeywell International Inc., August 2011.
[03] J. L. Thames (2014). Chapter: Distributed, Collaborative, and Automated Cybersecurity Infrastructures for Cloud-based Design and Manufacturing Systems. Cloud-Based Design and Manufacturing (CBDM): A Service-Oriented Product Development Paradigm for the 21st Century, Springer International Publishing, 17 June 2014, 207-229.
[04] M. Fabro, T. Nelson (2007). Control Systems Cyber Security: Defense-in-Depth Strategies. Idaho National Laboratory (INL), Technical Report: INL/CON-07-12804, USA, October 2007.
[05] Ponemon (2013). Big Data Analytics in Cyber Defense. Ponemon Institute Research Report.
[06] A. Ballard (2014). Network & Security Services, Lecture, Rockwell Automation.
[07] B. Haan (2015). Cybersecurity Trends 2015, Whitepaper, TÜV Rheinland i-sec GmbH.
[08] NDIA (2014). Cybersecurity for Advanced Manufacturing, White Paper, prepared by National Defense Industrial Association’s Manufacturing Division and Cyber Division, May 5, 2014.
[09] S. J. Hutchison (2013). Cybersecurity: Defending the New Battlefield, Defense AT&L, November–December 2013, 34-39.
[10] G. Zhao (2011). Wireless Sensor Networks for Industrial Process Monitoring and Control: A Survey. Network Protocols and Algorithms, 3(1), 46-63.
[11] J. Sen (2009). A Survey on Wireless Sensor Network Security. International Journal of Communication Networks and Information Security, 1(2), 55-78.
[12] Y. Wang, G. Attebury, and B. Ramamurthy (2006). A Survey of Security Issues in Wireless Sensor Networks. IEEE Communications Surveys and Tutorials, 8(2), 2-23.
[13] V. N. Inukollu1, S. Arsi1 and S. R. Ravuri (2014). Security Issues Associated with Big Data in Cloud Computing. International Journal of Network Security & Its Applications (IJNSA), 6(3), 45-56.
[14] S. Karnouskos (2015). Industrial Agents Cybersecurity, Chapter 6, in Industrial Agents: Emerging Applications of Software Agents in Industry, Elsevier, 109-120.
[15] T. Long, J. McGill (2014). Securing manufacturing networks and data from cyber attacks, Lecture, Cisco.
[16] M. B. Salem (2012). Security Challenges and Requirements for Control Systems in the Semiconductor Manufacturing Sector. NIST Workshop on Cyber-Security for Cyber-physical Devices, April 23rd, 2012.
[17] K. Stouffer, S. Lightman, V. Pillitteri, M. Abrams, A. Hahn (2014). Guide to Industrial Control Systems (ICS) Security. NIST Special Publication 800-82, National Institute of Standards and Technology, Gaithersburg, MD, USA, May 2014.
[18] R. Candell, D. M. Anand, and K. Stouffer (2014). A Cybersecurity Testbed for Industrial Control Systems. 2014 Process Control and Safety Symposium, Houston, TX, October 6-9, 2014.
[19] D. Kuipers, M. Fabro (2006). Control Systems Cyber Security: Defense in Depth Strategies. Idaho National Laboratory (INL), Technical Report: INL/EXT-06-11478, USA, May 2006.
[20] V. Gunes, S. Peter, T. Givargis, and F. Vahid (2014). A Survey on Concepts, Applications, and Challenges in Cyber-Physical Systems. KSII Transactions on Internet and Information Systems, 8(12), 4242--4268.
[21] A. A. C´ardenas, S. Amin, B. Sinopoli, A. Giani, A. Perrig, S. Sastry (2009). Challenges for Securing Cyber Physical Systems. Workshop on Future Directions in Cyber-physical Systems Security, DHS, July 2009.
[22] H. Brauser, F. Hammermeister, G. Schmidt, C. Krohn (2015). Cyber-security: managing threat scenarios in manufacturing companies. Technical Report, Roland Berger Strategy Consultants, Germany, March 2015.
[23] B. Barnes, G. Wilcox (2009). Manufacturing & IT Network Convergence. Lecture, Cisco.
[24] D.-Z. Wu, D. W. Rosen and D. Schaefer (2014). Cloud-Based Design and Manufacturing: Status and Promise, Springer International Publishing, Switzerland.
[25] L. D. Sturm, C. B. Williams, J. A. Camelio, J. White, R. Parker (2014). Cyber-physical vunerabilities in additive manufacturing systems. Technical Report, Virginia Polytechnic Institute and State University, 2014.
[26] J. D. Villasenor (2011). Ensuring Hardware Cybersecurity. Issues in Technology Innovation, Number 9, The Center for Technology Innovation, Washington, DC, USA, May 2011, 1-9.
[27] J. Suffolk (2013). Cyber Security Perspectives: Making cyber security a part of a company’s DNA -A set of integrated processes, policies and standards. Technical Report, 2013 Huawei Technology Co., Ltd.
[28] C. Paulsen (2015). Reports on Computer Systems Technology. Proceedings of the Cybersecurity for Direct Digital Manufacturing (DDM) Symposium, National Institute of Standards and Technology, Gaithersburg, MD, USA, April 2015, pp. iii-v.
[29] S. Zimmerman, D. Glavach (2015). Applying and Assessing Cybersecurity Controls for Direct Digital Manufacturing Systems. Proceedings of the Cybersecurity for Direct Digital Manufacturing (DDM) Symposium, National Institute of Standards and Technology, Gaithersburg, MD, USA, April 2015, 51-54.
[30] M. F. McGrath (2015). Cybersecurity for Advanced Manufacturing – Securing the Digital Thread. Proceedings of the Cybersecurity for Direct Digital Manufacturing (DDM) Symposium, National Institute of Standards and Technology, Gaithersburg, MD, USA, April 2015, 65-66.
[31] S. S. Shipp, N. Gupta, B. Lal, J. A. Scott, C. L. Weber, M. S. Finnin, M. Blake, S. Newsome, S. Thomas (2012). Emerging Global Trends in Advanced Manufacturing. IDA Paper P-4603, Institute for Defense Analyses, Virginia, USA, March 2012.
[32] N. Virvilis, O. Serrano, L. Dandurand (2014). Big Data Analytics for Sophisticated Attack Detection. Isaca Journal, 3, 1-5.
[33] C. Perera, R. Ranjan, L. Wang, S. U. Khan, A. Y. Zomaya (2015). Big Data Privacy in the Internet of Things Era. IT Professional, May/June 2015, 32-39.
[34] L. Wang, M. Törngren and M. Onori (2015). Current Status and Advancement of Cyber-Physical Systems in Manufacturing. Procedia Manufacturing, Journal of Manufacturing Systems, 37, 517–527.
600 ATLANTIC AVE, BOSTON,
MA 02210, USA
+001-6179630233
AIS is an academia-oriented and non-commercial institute aiming at providing users with a way to quickly and easily get the academic and scientific information.
Copyright © 2014 - American Institute of Science except certain content provided by third parties.