Developing a Cybersecurity Immune System for Industry 4.0

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Cyber immune systems try to mimic the adaptive immune system of humans and animals because of their capability to detect and fend off new, unseen pathogens. Today's current cybersecurity systems provide an effective defense mechanism against known cyber-attacks but are not so good when it comes to defending against unknown attacks. This book describes the possible development and organization of self-healing computing based on cyber immunity techniques and aimed at working in the new realm of Industry 4.0. Industry 4.0 is the trend towards automation and data exchange in manufacturing technologies and processes which include cyber-physical systems (CPS), the internet of things (IoT), industrial internet of things (IIOT), cloud computing, cognitive computing and artificial intelligence. The book describes the author's research and development of cyber-immunity systems that will prevent the destruction of critical information infrastructure by future unknown cyber-attacks and thus avoid the significant or catastrophic consequences of such attacks. The book is designed for undergraduate and post-graduate students, for engineers in related fields as well as managers of corporate and state structures, chief information officers (CIO), chief information security officers (CISO), architects, and research engineers in the field of cybersecurity. This book contains four chapters Cyber Immunity Concept of the Industry 4.0; Mathematical Framework for Immune Protection of Industry 4.0; Trends and prospects of the development of Immune Protection of Industry 4.0; From detecting cyber-attacks to self-healing Industry 4.0

Author(s): Sergei Petrenko;
Publisher: CRC Press (Unlimited)
Year: 2020

Language: English
Commentary: (True EPUB)
Pages: 398

Preface
Acknowledgments
List of Figures
List of Tables
List of Abbreviations
Glossary
Introduction
1 Cyber Immunity Concept of the Industry 4.0
1.1 Cybersecurity Threat Landscape
1.2 Geography of the Cyber-Attacks
1.3 Biological Metaphor for Cyber Immunity of Industry 4.0
1.4 Prerequisites for the Creation of Cyber Immunity of Industry 4.0
1.5 An Even Older Immune Defense Organization
1.6 Place of the Immune System of Protection
1.7 Development of the Concept of Cyber Immunity of Industry 4.0
2 Mathematical Framework for Immune Protection of Industry 4.0
2.1 Known Mathematical Basis of Immune Protection
2.2 Known Immune Response Models
2.3 First Immune Response Software Systems
2.4 Problem of the “Digital Bombs” Neutralization
2.5 Program Faults Detection Method
2.6 Introducing a Passport System for Programs
2.7 “Digital Bombs” Neutralization Method
2.8 Basic Definitions of Cyber Resilience
2.9 Mathematical Formulation of the Cyber Resilience Control Problem
3 Trends and Prospects of the Development of Immune Protection of Industry 4.0
3.1 Artificial Immune Networks
3.2 Immunocomputing
3.3 Hybrid Intelligent Protection System
3.4 Detection of Anomalies Based on Dimensions
3.5 Innovative Methods for Detecting Anomalies
3.6 Data Processing Model on the Example of Oracle Solution
3.7 Control of the Platform Semantic Correctness
4 From the Detection of Cyber-Attacks to Self-Healing Industry 4.0
4.1 Classification of Methods for Detecting Cyber-Attacks and Anomalies
4.2 Evaluation of the Known Methods for Detecting Cyber-Attacks and Anomalies
4.3 Innovative Immune Response Method
4.4 Immune Response Method Implementation
4.5 Development of Immune Response Method
4.6 Intellectual Cyber Resilience Orchestration
4.7 The Semantic Correctness Control
4.8 Organization of Self-Healing Computing
4.9 New Scientific and Practical Results
Conclusion
References
Index
About the Author