Cyber
Cyber
Supervisors:
Professor Jouni Isoaho
Dr. Ali Farooq
The originality of this thesis has been checked in accordance with the University of Turku quality assurance
system using the Turnitin Originality Check service.
Acknowledgements
I am proud to thank my supervisors Professor Jouni Isoaho and Dr. Ali Farooq
both from the University of Turku for their guidance in accomplishing this thesis
and all my friends for their moral support throughout this work. I would like
also to send my best regards to the EIT Digital master school organization to
provide such an incredible atmosphere for the master students who are willing
to study the masters in two different European countries as entry and exit year
studies. I want to thank ResilTech company based in Italy to offer me such a
precious internship position. I want to thank Dr. Francesco Brancati to be my
industrial supervisor at ResilTech during my internship. I want to thank
Professor Adam Nagy from the Eötvös Loránd University (ELTE) in Hungary
also to be my entry year thesis supervisor and reviewer. Professor Seppo
Virtanen from the university of Turku was a great motivator with his
encouragement and moral support.
UNIVERSITY OF TURKU
Faculty of Technology, Department of Computing
Ali sharif: Threat modelling with UML for cybersecurity risk management in
OT-IT integrated infrastructures
Key Words: Cyber security, Intrusion detection system, UML, SysML, Support vector machine,
principal component analysis, OT-IT
Contents
1 Introduction 1
1.2 Background… … … … … … … … … … … … … … … … … 3
5 Conclusion 71
73
References
List of Tables
Table 1: Common Threats in the System of OT-IT…………………………………….…..…... 14
Table 2: Table 2. Risk management steps in the System of OT- IT…………….…………….. 15
List of Figures
Figure 1: Integrate XML, UML and Java with the EMF framework………………………… 39
Figure 12. Part a) Before PCA is applied Part b) After PCA application…………………… 58
Today, we are witnessing the expansion of the presence of computers in all aspects
of our lives. Increasing the number of Internet users considering people’s
familiarity with programs to have access to computer networks, and increasing
the information available on the servers of organizations, the need to increase the
security of computer networks has become crucial. Computer devices contain
valuable information and resources, which must be protected against attackers. In
recent years, we have seen many attacks on computer devices, as an example In
May 2021, a cyberattack on the Colonial Pipeline, the largest fuel pipeline in the
US disrupted fuel deliveries in twelve states for several days [1] and as other
example we could mention other SolarWinds, a major US information technology
firm, was the subject of a cyberattacks in early 2020, hackers secretly broke into
Texas-based SolarWind's systems and added malicious code into the company's
software system. The system, called "Orion," is widely used by companies to
manage IT resources [2].
Maintaining the security of devices and their information is one of the biggest
challenges for technology managers and even end users. Using of network
security technologies can reduce this risk to some extent [3]. Various security
devices such as firewalls, IDS and IPS have been built to detect cyber-attacks. The
mentioned two examples of cyber-attacks are in a close relation with OT-IT
integrated environments cyber threats and in this thesis, I took the OT-IT
combined infrastructures as the target system to implement an intrusion detection
system which is capable of intercepting and detecting some of the major threats
which is being used by the malicious attackers as an objective of this work. The
proposed system which is built on a cybersecurity threat detecting model based
on a common threats database will offer a tool for the information security staff of
OT-IT companies to stay one step ahead of possible attacks.
1.1 PROBMEM STATEMENT 2
The issue of network security is one of the topics that have been more or less
discussed for a long time and its importance has been proven to everyone today.
Therefore, every day, new security mechanisms and solutions are presented to the
security community for use in the world of the Internet. It is interesting that none
of these mechanisms can claim that it can completely prevent any sabotage and
intrusion. Meanwhile, due to the influence of the Internet in all jobs and
organizations, and the Internet of Things, which is growing rapidly, the importance
of security in it has become clearer. Therefore, the issue of Internet security and IoT
security especially in OT-IT integrated environments is one of the hot topics in the
comprehensive security of the world, and providing new security solutions in the
country can be very useful.
Risk management is always on the side of planning to deal with possible future
events. Securing organizations and investments against risks and losses requires
the formation of an intellectual and practical system, through which policy-making
against risks is integrated [4]. Based on Cybersecurity risk management, the system
supervisor should be able to identify existing problems, define and obtain
structural analysis of them, and by collecting relevant and classified information,
provide the most appropriate methods of risk reduction. The term maturity in risk
management approaches the state of perfection or evolution or readiness, as well
as the path to perfection, growth and development [5]. In this thesis, I will discuss
the roles and position of risk management and the steps that will be presented to
manage these Cybersecurity risks, and at the end, and at the final chapters I will be
proposing a model-based Cybersecurity risk management solution and implement
a portion of it with focusing on Intrusion Detection Systems over OT-IT solutions.
1.2 BACKGROUND 3
1.2 Background
Cyber security is at the root of technologies, processes and practices designed to
protect networks. Computers, programs and data against attacks, damage and
unauthorized access [6] these types of incidents make your performance more
vulnerable to external attacks and hackers [4]. Without the right security strategy,
irreparable things can happen. Attackers know how to find and exploit
vulnerabilities, opening up gaps that cause huge systems to collapse [7]. Any expert
hacker can bypass any simple defense [9]. As a company expands, cybersecurity
becomes more difficult. For example, the attack level and the consequences of a large
company is much severe than Small and medium-sized enterprises (SMEs) [10]. In
a connected world, everyone benefits from advanced cyber applications. At the
individual level, cyberattacks can take everything from identity theft, extortion
efforts, and the loss of important information such as family photos. Everyone
depends on critical infrastructure such as power plants, hospitals and financial
services companies. Providing this and other organizations is essential to
maintaining the functioning of society [11].
The optimized value index is obtained by multiplying the risk factor by the usual
value index. This index facilitates effective senior management decisions by
clarifying the advantages and disadvantages of each idea [14]. In fact, risk is an
unknown circumstance or event that, if it occurs, has a positive or negative effect on
at least one of the project objectives. Value is the ratio of work to cost. Value can be
increased by improving performance or reducing costs. Value studies provide good
opportunities to reduce the cost of longevity, improve quality, reduce
manufacturing time, extend longevity, and sometimes a combination of these.
Managing security risks in an integrated OT-IT system is difficult and costly. In fact,
if a new vulnerability or a new virus is identified, these results can be very costly. In
addition [12], organizations need a systematic security risk management approach
to provide a rapid and appropriate response to security incidents and to protect their
assets. In addition, enterprise or individual users expect information systems to be
secure, able to anticipate their risks, and their strategies to reduce those risks. Secure
organizational information management has led to the development of better
criteria for understanding the status of an organization's security attitude. On the
other hand, risk management is one of the basic components of an organizational
risk management process. It is based on security criteria for managing security risks
[15]. The Information Technology (IT) merged with Operational Technology (OT)
industry has developed greatly during the
1.2 BACKGROUND 5
second half of the last century. The core of IT industry has also become much closer
and more integrated with the OT industry. This technology is available and largely
integrated with modern society. A software solution can reduce costs, speed up and
facilitate the security management process. The output of this thesis is to provide a
model-based system for cyber security risk management in OT-IT infrastructure. I
intend to provide an intrusion detection system to detect attacks and prevent
information from being compromised. In the first chapter, the problem, goals and
outputs of the research are stated. The second chapter deals with the basic concepts
of cyber security, cyber security in small and medium organizations and the cyber
security risk management framework. In the third chapter, threat modeling
methods, system modeling languages (UML, SysML) are discussed. Chapter 4 also
includes the proposed framework, implementation and evaluation.
2 CYBERSECURITY RISK MANAGEMENT 6
Application security
Information security
Network Security
Accident recovery / business continuity planning
Operational security
End user training [14]
2 CYBERSECURITY RISK MANAGEMENT 7
People who commit cyber-attacks generally fall into one or more of the following
categories: criminals who commit crimes such as extortion for the purpose of
making money, spies who seek to obtain information used by the government, or
identity [20]. Private individuals, national fighters who have increased their ability
to carry out cyber-attacks in support of their country, hackers who carry out cyber-
attacks for non-financial and non-monetary reasons, and terrorists who act as a
governmental or non-governmental welfare agent. Government-sponsored attacks.
ICT systems are very complex and attackers are constantly proving vulnerabilities
that occur in many places [9].
2.1 CYBERSECURITY IN OT-IT SMEs 8
Valuable data: Hackers know that even small companies have useful data, such as
personal medical information, credit card information, bank account information,
or proprietary business information. Cybercriminals will certainly benefit from
using or selling this information.
Liquidity: In the first place, hackers carry out cyber-attacks for personal gain. Some
attacks are also intended to cause damage, but usually the motive is money.
2.1 CYBERSECURITY IN OT-IT SMEs 9
Small businesses usually have more liquidity than large organizations and
companies. Large organizations and companies have a dedicated team to deal with
cyber-attacks. In many small businesses, the task of protecting the network against
cyber-attacks is performed by an employee, which is likely to be one of the tasks of
protecting the network against cyber-attacks. This makes small businesses
vulnerable to hacker attack. This is a very important position that 100% of the time
should be devoted to repelling an attack.
To have a security strategy, let's first have a clear vision of the current threats:
Therefore, our experts believe that small and medium-sized businesses will benefit
the most by using a single solution that meets all the security needs of small
businesses. Smart business platforms, for example, that also have insight and
intelligence, help small business owners better protect their assets and manage their
business and employees using modern science. These systems provide you with
very easy and convenient facilities that in case of cancellation, the trade will be
provided automatically and the delivery of goods and services will be done safely
through video verification. The systems also provide customer experience data on
details such as customer activity, busy areas and sales queues.
Small and medium-sized businesses usually have to achieve great success with
limited resources. When it comes to physical security, the choice of technology,
such as CCTV, is often made with limited financial resources. In the end, many
instead of preparing a strategic plan to upgrade their security system as a coherent
solution, choose different solutions for access control and video surveillance, which
may eventually be due to their basic security needs. Do not cover savings. This can
put small businesses at greater risk, such as cyber-attacks. Because just one
unprotected device is enough to endanger your entire system and businesses to put
your entire system at risk.
Another important point is that small business owners think that because they do
not have a billion-dollar deal, cybercriminals will not bother to attack their
networks. However, statistics show that small and medium-sized business owners
are actually more at risk of hacking, cyber-attacks, and even building theft. This can
put their businesses at serious risk. Small and medium-sized businesses tend to
choose products over the system, and as a result often face problems integrating
security systems. They are more likely to buy security systems piecemeal,
sometimes without looking at a coherent whole and with a much more detailed
look.
2.1.1 ASSETS OF OT-IT IN SMEs 12
Small and medium-sized businesses also face challenges such as limited budgets,
shortages of in-house human resources and IT and administrative resources. That's
why these businesses are far more vulnerable to cybersecurity and less protected.
Also, the small business market has been severely disrupted during the Corona
epidemic, making it even more challenging to take advantage of new security
industry technologies.
1. Firewall
Firewalls observe network traffic and connection attempts and decide to allow them
or not within the computer or networks. Although firewalls are useful, they have
their limitations. Hackers have found out ways to deceive firewalls to allow faulty
data and software. This means a program can bypass a firewall without issues.
Regardless of these problems, firewalls are useful in detecting and preventing
harmful attacks on business entities.
2. Antiviruses
If you do not have much experience in cybersecurity, you might think firewalls and
antiviruses are the same, but this is not true. Having both of these elements is
crucially vital to having a safe system.
2.1.1 ASSETS OF OT-IT IN SMEs 13
Antiviruses usually warn about viruses and malware and can have extra services
like scanning emails for bad attachments or links. Modern antiviruses o things like
quarantine and eliminate prospective threats. There is a wide array of antiviruses
available and determining an appropriate antivirus for your organization is easy.
3. PKI services
Many people associate PKI with SSL and TLS, password protection programs, server
communications, HTTPS, and the lock sign in the browsers. While SSI is important
in general websites and internal networks, PKI can solve some issues with
cybersecurity and play important roles in the safety of an organization.
As cyber-attacks and hacks have become more complicated their techniques and
software have also become stronger. Organizations need to invest in stronger
methods for protection. Today, just having a system that reacts to threats is not
enough and attacks need to be identified before they cause issues. Cybersecurity has
changed course from investing in technologies that try to prevent attacks to systems
that detect security weaknesses and quickly respond to them. Addressing an
ongoing attack In an IT network is much more destructive than preventing it from
spreading.
2.1.2 CYBERSECURITY ATTACKS IN OT-IT SYSTEMS 14
Threat concern
• Buffer overflow
Improper validation of input to • Code injection
systems • XSS attacks
• Redirect data
• Weakness or lack of access level control
• Perform various operations without
Permissions, access levels and having access level
controls • Activation of communication networks of
control systems
• Inadequate configuration security
The following table 2 summarizes each step of the system creation cycle, and the steps
required to implement risk management at each step:
Risk management is always on the side of planning to deal with possible future
events. Securing organizations and investments against risks and losses requires
the formation of an intellectual and practical system by which risk-based policies
are integrated. On this basis, the system should identify existing problems, define
and obtain structural analysis of them, and by collecting relevant and classified
information, provide the most appropriate methods of risk prevention, control and
financing. According to the cases, the term maturity in risk management
approaches means the state of perfection or evolution or readiness, as well as the
path to perfection, growth and development. In this research, we discuss the roles
and position of risk management and the steps that will be taken to manage these
risks, and at the end, we take a look at the estimated costs and risk analysis.
Entering the information age and the wide and deep entanglement of various
aspects of human societies from economics and business to politics and social
relations with information technology and also providing services and mass
distribution of knowledge and information in the context of the World Wide Web
and its transformation The great bridge to the most important bridge of individuals,
organizations and governments, has been the beginning of the creation of a new
chapter in human civilization, a chapter in which information is the most
fundamental component and the most vital element. Hence, new threats with a
very different nature from the past, with increasing intensity and increasing
complexity, attack the shaky foundations of the technical, human and
organizational infrastructures of information and communication technology, with
the aim of bringing the basic components to their knees. Considers information
security, which includes confidentiality, accessibility and integrity. From this
perspective, it is not far from the truth if we consider information security as one of
the biggest challenges facing humans.
2.2 RISK MANAGEMENT CONCEPTS 17
Thus, the art of risk analysis and its management knowledge are very important
for the dynamic and leading organizations of the present era that operate in a
competitive and challenging environment. Information technology is one of the
most important and vital sources of maintaining and creating a competitive
advantage for companies and organizations. This is crucial in terms of information
security and thus maintaining a competitive advantage, and is the only way that
either leads to security and continued presence in the market or leads to destruction
and elimination by competitors. Some of the most important reasons for the
importance and position of risk analysis and management in information security
are:
• Information security is complex and costly, and the resources available to the
organization are limited, and therefore, by conducting a comprehensive and
accurate risk analysis of the organization's limited and scarce resources in the way
of proper protection of valuable information assets and capital is spent and wasted.
Resources will be blocked.
• The beginning of the failure of many information security schemes is the wrong
protection of the right things or the right protection of the wrong things. Simply
put, the plan fails because its designers did not bother to identify the organization's
valuable assets and strategic information assets and acted on the organization's
missions and goals without any knowledge or awareness of the threats and
consequences of their occurrence.
• To design and implement cyber security solutions.
Therefore, proper understanding and identification of existing risks and the ability
to use the data obtained from risk assessment and analysis can lead to the
following:
• Effective and efficient design based on facts and deep knowledge of valuable
capital and assets
2.2 RISK MANAGEMENT CONCEPTS 18
• Intensity of the effect and consequence of threats on the goals and policies of the
organization
• Select appropriate and cost-effective tools and procedures to contain and reduce
threats
• Select appropriate risk management strategies such as accepting, avoiding,
reducing or transferring risk
The perception of risk management presents the need for risk awareness in society
and economic institutions. Only in the light of such awareness can the risk
management system be organized and used in the community and all related
institutions. Risk management tasks can be performed and managed according to
the size and scope of each organization, by an organizational unit and under the
supervision of the relevant manager called the risk manager.
To identify the types of risks that each organization is exposed to, we can search in
specific ways among the resources within the organization and outside it. From the
perspective of Resource risk management within the organization is everything
that exists in any organization and can be exploited. After recognizing the risks of
each organization, it is necessary to examine the impact of each loss on the entire
organization, and this requires determining what is the probability of each loss
occurring, and secondly, what amounts if it occurs. And how these amounts will
affect the financial structure of the organization. In other words, the actions of the
first stage (identification of risks) provide a set of data (raw information) about the
risks that threaten the organization, and the next step provides the obtained weaves
(raw data), Based on the foundation of the risk management system in the
organization, they are classified and processed, which leads to the processing of
measured, valid and prioritized information.
2.2 RISK MANAGEMENT CONCEPTS 19
• Risk identification
• Identify and define needs
• Risk structure analysis
• Collection and classification of information
• Develop a strategy for dealing with risks
• Monitoring and follow-up
All activities related to the information security risk management process start from
this step, which includes two steps:
• Risk analysis
• Risk assessment
Risk assessment is a process that helps to determine the importance of this risk for
the organization, which is calculated by comparing the estimated risk, the output
of the previous stage and the organization's risk criteria. In fact, in order to
understand how an organization views the results of risk calculation and analysis,
we must first determine what criteria or criteria are available for accepting or
rejecting risk.
In this step, the organization must determine what strategy and program it has to
deal with unacceptable risks. The most important output of this section is the Risk
Management Plan (RTP). In this plan, the organization, while prioritizing the risks,
describes each of its measures to deal with the risks.
In this step, the most focus is on controlling and following up on risk management
plans. So, at first glance, you need to make sure that the planned actions are in line
with the set schedule. Also, the degree of risk reduction should be monitored based
on initial expectations. Thus, the status of RTP projects should be frequently
reviewed and monitored for timing, impact, quality, and optimality, and corrective
action taken if necessary. These actions can include changes in how plans are
implemented, review of risk scenarios, allocation of new resources, and the like.
A project view of risk management is not correct as a process that has a starting
point and an end point; the cyclical nature of this process indicates that it is not a
one-step process and its characteristics are constantly improving. In other words,
the necessary steps in the risk management process should be repeated at regular
intervals and the results and experiences gained in each stage, in the role of input
and feedback, the new stage should be used.
• Prevention
Plan for preventive measures to reduce the likelihood and prevent the occurrence
of risks.
2.2 RISK MANAGEMENT CONCEPTS 22
For risks that have a lower priority and also, in cases where corrective actions do
not have the desired effects, the absorption of negative effects and dealing with
them should be foreseen in the plan. The risk management plan and plan should
be set in such a way that the priority and urgency of the risks are considered. Also,
in order to allocate resources and implement the necessary measures to deal with
risks, the budget, schedule and planning of other projects for risk management
should be considered.
The risk management plan must be very precise and planned, and the following
important factors must be considered in its implementation.
• Proportionality to risks
It does not make sense to have a lot of resources and time to deal with | Assign risks
that have a lower priority or are less likely to occur. Because this issue leads to
neglect of more important risks and not paying enough attention to important and
effective risks can be very dangerous. As a result, planning and allocating resources
to risks should be commensurate with prioritizing project risks and project size and
importance.
2.3 RISK MANAGEMENT FRAMEWORKS 23
• Cost-oriented
Excessive spending to deal with risks can be challenging for the whole project.
Therefore, in the project risk management plan, special attention should be paid to
the issue of cost Be realistic management.
• Be realistic
Developing theoretical and non-practical plans not only wastes time and resources,
but may also divert the plan from its original path and create more problems even
compared to lack of planning. Achieving a realistic plan requires paying close
attention to limitations and assumptions.
• Scheduling
It is clear that in any plan, there must be a specific schedule and, in its
implementation, one must be committed to the desired schedule.
• Project Manager
In large projects, the risk management plan must have a specific manager to be able
to follow the plan process and ensure its proper implementation. Also, important
risks must have a specific manager to take overall responsibility for risk
management, project risk identification and response.
• Prioritize the risk in order to determine the amount of work that needs to be done
for each risk and the resources required.
• Determining constraints is very important in preparing a risk management plan
and the effects of these constraints on others. The most important limitations in the
project risk management plan are:
o the budget
o Resources
o Time limit in implementing the risk management plan)
o Changes (changes that are not possible due to various reasons).
The results of the study identified and evaluated the risks of organizational
information security. Therefore, in order to reduce and control them, it seems
necessary to provide management solutions based on risk and value management.
On the other hand, risks that are less important than other risks for the organization
in question, require less attention and time and money. Considering that the
combination of risk and value engineering, in addition to reducing the time required
for pre-study and risk and value analysis separately, will save more and money,
organizations can use the risks introduced in this thesis work to strengthen
information security systems for managers in information security risk
management. In this way, the parts of the organization that need more attention,
time and money are identified. The main emphasis of the risk management group is
on the initial costs of information security, i.e., the costs of equipment and
manpower.
2.3 RISK MANAGEMENT FRAMEWORKS 26
While value engineering always examines the cost to the organization. Therefore,
the combined use of these two methods in the project expands the scope of the
employer in choosing the appropriate option. Given that the most important part of
an organization's security is strengthening and preventing damage, because often
any correction after the deterioration of information security in the organization
cannot be very fruitful and effective, pay attention to risk management, risks the
high and costs they impose on the organization, which in many cases can
significantly reduce vulnerabilities or minimize the consequences of a threat.
Entering the information age and the wide and deep entanglement of various
aspects of human societies from economics and business to politics and social
relations with information technology and also providing services and mass
distribution of knowledge and information in the context of the World Wide Web
and its transformation The great bridge to the most important bridge between
individuals, organizations and governments, has been the beginning of the creation
of a new chapter in human civilization, a chapter in which information is the most
fundamental component and the most vital element.
Hence, new threats with a very different nature from the past, with increasing
intensity and increasing complexity, attack the shaky foundations of the technical,
human and organizational infrastructures of information and communication
technology.
2.3 RISK MANAGEMENT FRAMEWORKS 27
With the aim of bringing only the fundamental components to their knees.
Considers information security, which includes confidentiality, accessibility and
integrity. From this perspective, it is not far from the truth if we consider information
security as one of the biggest challenges facing humans. Thus, the art of risk analysis
and its management knowledge are very important for the dynamic and leading
organizations of the present era that operate in a competitive and challenging
environment. Information technology is one of the most important and vital sources
of maintaining and creating a competitive advantage for companies and
organizations. This is crucial in terms of information security and thus maintaining
a competitive advantage, and is the only way that either leads to security and
continued presence in the market or leads to the destruction and elimination by
competitors. Information security is complex and costly, and the resources available
to the organization are limited, and therefore, by conducting a comprehensive and
accurate risk analysis of the organization's limited and scarce resources in the
direction of proper protection of valuable assets and information is spent and
wasted Resources will be blocked.
Therefore, proper understanding and identification of existing risks and the ability
to use the data obtained from risk assessment and analysis can lead to the following:
• Effective and efficient design based on facts and deep knowledge of valuable
capital and assets
• Intensity of the effect and consequence of threats on the goals and policies of the
organization
• Choose the right and cost-effective tools and procedures to contain and reduce
threats
• Select appropriate risk management strategies such as accepting, avoiding,
reducing or transferring risk
2.4 SYASTEM ARCHITECTURE 28
Principles of risk management (RM) work has several different elements that are
primarily noteworthy:
In fact, the main part of the risk management process goes back to these threats and
how they are likely to occur, to do so formulas and terms have been developed
under the heading "RM". The effect of potential threats is to clarify some of the
principles of risk management to clarify this:
o Property
Threat In simple terms, any potential presence that causes adverse effects and
compromises the security of our organizational information resources, whether
human or machine, is protection to control and reduce the risk associated with a
particular threat or group of threats.
o Vulnerability
Represents the percentage value of the loss of a particular asset due to a threat, such
as the effect of losing some hardware or catastrophically losing all computing
resources.
o Estimated frequency
Represents the estimate that a threat is expected to occur and the range of this value
never exceeds (100) and is usually considered based on the probability of the event
and the number of people in creating the error that occurs and the damage is very
small.
o Risk analysis
Network elements
Security elements:
• User diagram
• Class diagram
• Sequential diagram
• Collaboration diagram
• Mode diagram
• Activity diagram
3.1 SYSTEM MODELLING LANGUAGES (UML AND SYSML) 33
• Deployment diagram
• Object diagram
• Component diagram
So far, we have said that UML is a modeling language for describing features and
documenting the implementation of a software system being developed graphically.
Features of UML language help to understand, design and maintain software
information of the application developer.
UML chart
The UML language process is such that the behavior and structure of the system are
represented by UML diagrams. Therefore, it can be concluded that when a
programmer or developer wants to work on a software project, he can view a set of
objects in the UML language using the types of UML diagrams, the types of
3.1 SYSTEM MODELLING LANGUAGES (UML AND SYSML) 34
which we will refer to below. Slow analysis. In general, UML diagrams have the
following two views on the model and description of the system
1- Structural diagram
Class diagram: Class diagram in UML as one of the most widely used UML
diagrams when building a system, it is responsible for depicting the object-oriented
nature of the program under production or development.
Object diagram: To build a prototype project, the object diagram depicts the
relationship between objects and shows a static view.
2- Behavioral diagram
Use case diagram: In fact, shows an overview of the system and specific goals,
dependencies and capabilities are modeled.
3.1 SYSTEM MODELLING LANGUAGES (UML AND SYSML) 35
Sequence diagram: As a subset of the interaction diagram, it shows the sequence and
sequence of the flow of messages from one object to another, and because the
interaction between the components is important in execution and implementation,
the sequence diagram is very useful.
State diagram: Different modes of an object can be viewed by mode diagrams and
depicting the object life cycle for software developers.
In particular, this language has been developed to describe, analyze, and validate
complex systems in which a system may consist of different components such as
hardware, software, or procedures. Since designing a complex system accounts for
about eighty percent of the cost and time of a balanced life cycle, modeling based on
the rules of a coherent language can be a good way to keep design principles in place
while making changes.
While SysML is a format and part of UML, it also removes some UML elements. The
extension introduced for SysML is limited to stereotypes and several new diagrams,
stereotypes can be defined in any UML tool, no special tools are required for SysML.
Only new charts need special support; But these concerns are only at the chart level
and not at the model. Nevertheless, SysML modeling tools can naturally support
better language and performance. The figure shows the relationship between UML
and SySML. It is clear from the figure that SySML has borrowed a great deal of UML
structure.
Four thematic contexts are defined for SysML modeling. Structure, Behavior,
Parametric, and Requirements, this classification is provided by the Object
Management Group (OMG), which has produced specifications for SysML. The
SysML modeling language includes different perspectives on a system, which are
known as the four pillars of this modeling language. The first pillar refers to the
requirements of a system and includes all its functional and non-functional
requirements.
The second pillar provides the structure of the system taking into account all the
different subsystems and connections. The third pillar considers the behavior of the
system and includes the creation of functional activities, scenarios and different
modes of the system. The last pillar includes detailed features, rules and physical
constraints on the system.
A) Structural diagrams
Any basic unit used in the system. It is called a block and is the central element in
SysML, which can be hardware or software, the block represents any of the higher
levels of the system, subsystem or component of the system or even the
environment. Blocks not only have structural features between system blocks and
are:
3.1 SYSTEM MODELLING LANGUAGES (UML AND SYSML) 38
• Block Definition Diagram: The core of SySML diagrams is that it shows the
structural hierarchy of the system and system components and provides a static
view of the system.
• Internal block diagram: Describes the internal structure of each block in the
system and provides a design view.
• Closed diagram: Used to organize the model and express its structure, and
provides a model management perspective.
B) Behavioral diagrams
Indicates system requirements, their hierarchy, and the relationships that meet or
review those requirements. These relationships allow requirements to be related to
each other, as well as to system design models and test cases. Requirements
diagrams act as a bridge between system models and common requirements
management tools, providing a good view of requirements.
3.2 EMF AS A MODELLING ENVIRONMENT 39
EMF is a powerful framework and tool to build Java applications based on simple
definitions of models. This tool actually integrates Java, XML and UML
technologies. Figure 1 illustrates this alliance. In other words, if you have one of the
three models, you can automatically generate the other models using the tools and
features of the EMF framework. The model can be defined using a UML modeling
tool or an XML schema or even by describing notes on Java interfaces. The
programmer simply writes a subset of the model-related abstract relationships, and
the rest of the code is generated automatically. Figure 1 simply shows the type of
integration of XML, UML and Java with the EMF framework
Figure 1: Integrate XML, UML and Java with the EMF framework
3.2 EMF AS A MODELLING ENVIRONMENT 40
EMF is simply a set of plugins that can be used to model a data model and generate
another code or output based on that model. EMF distinguishes between meta-
model and model. The meta-model expresses the structure, while the model is an
example of the meta-model.
The model used in EMF to display models is called Ecore. Ecore itself is an EMF
model and therefore its own meta-model. A simple model view of Ecore can be seen
in Figure (2). Figure 2 shows the elements required for model definition and meta-
modeling with Ecore. As you can see, four Ecore classes are required to display the
model:
• EClass is used to display a modeled class that has a name, zero or more
attributes, and zero or more references.
• EAttribute is used to display a modeled attribute. Attributes have a name and a
type.
• EReference is used to display one side of a 14-class association that has a name,
a Boolean flag to indicate its inclusion, and a reference type (destination) that is
another class.
• EDataType is used to display an attribute type. The data type can be a primitive
type like int or float or an object type like java.util.Date[24]. It should be noted
that Ecore is a small and simplified subset of complete UML, in other words, its
class diagram. For example, full UML also supports modeling the behavior of an
application.
3.3 CASE STUDY 41
One of the most important challenges in networks is network security. In this study,
we were looking for a solution to maintain network security. One way to maintain
network security is through intrusion detection systems. In this thesis, I provide
network security by providing a penetration detection system using support vector
machine (one of the machine learning methods). The aim of this study is to thesis
security by providing a high-performance intrusion detection system. Here, the
Figure 3 depicts the proposed model based on an OT-IT integrated system joint
with the case study and the final results.
Our path:
• Gather information by studying the available documents.
• Study and knowledge of the concepts of risk process management and search in
the literature on cyber process management systems and extract all requirements
and demands.
• Study and knowledge of architectural concepts and search in the literature on risk
management architecture and its study.
• Provide a secure model for cyber process management systems in industrial and
information environments.
Figure 4 shows the relations and the connection path of the elements of an accepted
cybersecurity risk management approach based on OT-IT systems.
User Attacker
Goals
introduce Actor
- KP I Imposed to
- Security - Skill
- Organisational - Motivation
- Location
Controls
- Security
- Organisation
needs
control P olicy
Risks
Assests
link
Compliance - Type
program - Cryticality
- Security objectives
assesses - Impact
Types
introduce
Influenced by
mitigate
Threats
And
Attack Scenario Vulnerabilities
generate
- Likelihood - Impact
- Impact - Type
- Weight score
Figure 4. An Integrated Cyber Security Risk Management Approach for OT-IT integrated systems
3.4 CYBERSECURITY THREAT MODELLING 43
In this work, using Eclipse Papyrus, the diagrams required to design the intrusion
detection system have been drawn. Figure 5 shows Use Case Diagram, Figure 6
shows Sequence Diagram and Figure 7 shows Activity Diagram.
4 A model-based framework
implementation
Industrial revolutions have created a platform in which industrial activities can be
carried out automatically by machines, which we have witnessed four industrial
revolutions to date. The first industrial revolution with the advent of steam engines
and automation took place in the late eighteenth century. Mass production was the
second industrial revolution that took shape in the early twentieth century, using
electric power. Then, in the mid-1970s, the Third Industrial Revolution was formed
with the aim of further supporting automated production based on electronics and
information technology. In recent years, with the increase of research in the field of
IoT and physical cyber systems, industries, governments and societies have noticed
the tendency towards the fourth industrial revolution.
Research also shows that only 16% of companies are prepared to meet the challenges
of cybersecurity. But when it comes to cyber security, there is also the added concern
that it is possible to attack without geographical restrictions and from anywhere in
the world. Therefore, organizations will face a wide range of cyber-attacks.
Summarizing the above, we will be aware of the need for security checks in
intelligent manufacturing systems. However, due to the wide range of security
issues in the mentioned technologies, in this article, we have tried to review the
research related to the use of artificial intelligence in cyber security and in particular
in physical cyber systems related to intelligent production.
Accordingly, we will first describe our research method in the second section. Then,
in the third section, we will describe the role of cyber security in the two technical
and managerial areas related to the Fourth Industrial Revolution. After that, in the
fourth section, we will briefly introduce some artificial intelligence methods used in
cyber security. Then, in the fifth section, we will examine the effects of artificial
intelligence on attacks and countermeasures in cyber security. In the sixth section,
by summarizing the issues raised, we introduce the benefits and challenges that
artificial intelligence creates in cybersecurity and can affect the performance of
intelligent manufacturing systems. Finally, in this chapter, we will provide
suggestions for further research into the development of artificial intelligence in
cybersecurity related to intelligent manufacturing systems.
• Learning algorithms
• Supervised learning
This type of learning requires a learning process with big, precise data that is pre-
determined. These types of algorithms are usually used as classification or
regression mechanisms.
• Unsupervised learning
• Reinforcement learning
Machine learning (ML) is one of the branches of artificial intelligence in which they
try to empower systems by learning and improving the machine without using
explicit programs. Machine learning involves the mathematical sciences that carry
out the process of extracting information, discovering patterns, and inferring data.
Machine learning algorithms include various types that can be classified into three
general categories mentioned in learning algorithms. Standard machine learning
algorithms in the field of cyber security, Decision Trees (DT), Support vector
machines (SVM), Bayesian K-Nearest Neighbor (KNN), Random Forest (RF), and
Principal Component Analysis (PCA).
4 A MODEL-BASED THREAT IMPLEMENTATION 49
What is clear today is that many cyber attackers use artificial intelligence and
machine learning to improve and reinforce cyber-attacks. Of course, with the
development of the use of artificial intelligence in the field of cyber and attention to
this field in establishing security, tools based on artificial intelligence that can play
a role in this field, have been considered. In this section, we try to introduce some of
these cases.
4 A MODEL-BASED THREAT IMPLEMENTATION 50
Malware boost: Malware is a term for malicious software such as virus, worm, trojan
horse, botnet, etc. The use of artificial intelligence has made the new generation of
malware more sophisticated, smarter, and faster, as well as more difficult to detect.
Since artificial intelligence is also used in defense strategies, which will be explained
below) Attackers are always looking for tools that allow them to infiltrate artificial
intelligence systems. Here, too, attackers act in three general ways:
Conflicting inputs: In this method, the attacker designs inputs to prevent the
artificial intelligence defense system from detecting the attack.
Poisoning training data: In this type of attack, the attacker tries to modify the
machine learning training data based on the algorithm used, in a way that
significantly reduces the ability of the system to detect the attack.
4 A MODEL-BASED THREAT IMPLEMENTATION 51
Model extraction: In this method, the attacker uses reverse engineering techniques
to try to identify the machine learning algorithm used to detect detected behaviors
that deployed systems seek to avoid those behaviors to avoid those behaviors. This
chapter describes the proposed method based on support vector machine method.
First, preprocessing is applied to the data set and the data that has no effect on the
result is deleted. Then, the backup vector machine algorithm is applied to the data
set and the intrusion or non-intrusion status is determined.
Dataset: Due to the high volume of data, the training database, which contains 10%
of the records, is used. This database contains 494021 communication records.
Which includes all four types of attacks listed.
These four categories of attacks include 22 types of attacks and one normal mode.
In addition to this database, there is also a test database that contains 311029 records
that represent 37 types of attacks and a normal state. As a result, 15 attacks have
more training than a database. Figure 9 is the dispersion of attacks in our database
and as we can observe there is approximately around 300.000 Smurf attacks
occurred:
Figure 10 represents the percentage of the discussed attacked whish are existing in
our database, for instance, the famous Smurf attack which is exactly equal to
280.790 count is about to fill the 56.84 percentage of our proportion.
Figures 9 and 10 show the distribution of attacks in the database. As can be clearly
seen, the highest number of records related to smurf attack is from the category of
denial of service attacks and the lowest rate of attack related to spy attack is from
the category of access attacks. Due to the low rate of some attacks compared to other
attacks in the database, their scatter percentage is zero. A full description of the
features used in the database can be seen in the table below.
Among the proposed attributes, 2 attributes (num_outbound_cmds, is_host_login)
always have a constant value of zero in all records.
4.1 FRAMEWORK ARCHITECTURE 54
To select the necessary attributes, the selection rules are set according to the
evaluation criteria as follows:
7- The degree of accuracy decreases, the positive error rate increases the attribute
is essential.
Feature extraction using PCA: The method of principal component analysis was
first proposed in 1901 by Carl Pearson, which is one of the most important and basic
topics in chemometrics and is one of the non-regulatory classification methods.
Principal Component Analysis (PCA) is one of the simplest multivariate analysis
methods used. The goals are:
D) Analyze the structure of samples and variables and classify and identify
variables
Due to the fact that multidimensional space is often difficult to understand, and
also due to technical problems when it comes to high-dimensional problems, it is
possible to create a matrix in order to organize such data, in which samples are
rows and variables are columns. Be it. The data of such a matrix is called
multivariate data. The analysis of the main components, through the linear
combination of the main variables, leads to a reduction in the number of variables.
In order to better understand the data, chemists display it graphically, which can
display data from one dimension to three dimensions, but if the dimensions (the
number of variables measured for each sample exceeds three dimensions), It is not
possible to graphically display them, in which case the variables must be reduced
to three main components or less.
4.2 IMPLEMENTATION 56
4.2 IMPLEMENTATION
In order to better understand the issue, we first consider the reduction of two
variables to one, assuming that only one dimension can be observed. One solution
is to image points from two-dimensional space to one-dimensional space, which
under such conditions is very important for the line on which the points are
depicted. Figure 10 shows two sets of data in two-dimensional space, group one
marked with blue rhombuses, and group two with red squares. The data images on
the red line have destroyed the information in the original data. For example, the
images do not show that the main data are two groups, but the images of the data
points on the green line separate the examples of groups one and two well.
According to this figure, a good direction to visualize the main data is the axis on
which the data is most scattered. This line is called the first major component, or
PC1 - which represents the largest variance in the data and contains more
information from the data. The point images of the original data from the two-
dimensional space on the PC1 axis are called point points on the PC1.
4.2 IMPLEMENTATION 57
Figure 11. The depiction of primary data from two-dimensional space to one-dimensional space remains in the green line of
information with imagery, but in the red line of information with imagery is lost.
PCA is a method of multivariate analysis that creates and selects a smaller number
of new variables called principal components from the linear composition of the
main variables, so that some less important information is removed. The first basic
component extracted contains the largest amount of data scatter in the entire data
set. The second extracted component also has two important features, first, that this
component has the highest variance of data, which is not described by the first
component, and second, that it is perpendicular to the first component.
4.2 IMPLEMENTATION 58
Figure 12 shows this. According to the figure, part (a) is before the application of
the PCA technique, which shows that the data information is evenly distributed on
the X and Y axes, but part (b) shows that after the application of PC1 PCA accounts
for the largest share of data variance
Figure 12. Part a) Before PCA is applied, the data are evenly distributed on the X and Y axes in two-dimensional space. Part
b) After PCA application, most of the data are distributed on PC1 line
• Separator hyperplane
Hyperplane is basically a term that covers space above three dimensions. In one-
dimensional hyperplane space there is only one point, in two-dimensional space
there is one line, and in three-dimensional space there is one page, and in space
more than three dimensions we have hyperplane. But for convenience, we call all
these levels a hyperplane.
Consider Figure 4, in this figure in the ALL and AML classes we have two-
dimensional space with the all-related area at the bottom of the figure and the
AML at the top of the figure. There are also dots of color near the ALL class, the
class of which is not specified and needs to be classified. These two classes can be
separated by a line, which we see in Figure 13 are based on this, the task of the
unknown point will also be determined. This point is part of the ALL class.
Now we see the same separation of two classes in one and three-dimensional space
in the following figures. In Figure 15a, since the data has only one dimension, two
classes can be separated by a point, and in Figure 15b, where the data has three
dimensions, two classes can be separated by a page.
So far, we know that the purpose of the backup vector machine is to separate the
two classes ALL and AML in two-dimensional space with one line. There are many
lines that do this. Figure 16 shows a view of these lines and Figure 17 represents the
support vectors selective lines which is used to make an observable difference of
the classes.
The question is, which of these lines is better than the other separating lines? The
SVM algorithm selects the line in the middle as the separator cloud. In other words,
it selects the line that has the maximum distance from each of the classes.
If we consider the distance between hyper plane and the nearest instructional
vectors of the classes as the margin, the SVM selects the midline hyperplane with
the maximum margin. Selecting this particular hyperplane maximizes the ability to
accurately predict the class for unclassified instances.
In the figure, in addition to the hyperplane with the maximum margin, you see
points called support vector. The training data closest to the separator hyperplane
is called the support vector. In fact, the SVM detects the pattern between two classes
by finding a decision level that maximizes the distance to the nearest points in the
training set called the support vectors.
• Soft margins
Until now, it has been assumed that data sets with a straight line could be split into
two completely separate parts, which in fact may not be the case. In fact, many real
datasets cannot be easily separated, but rather have a distribution such as Figure
18, where the dataset contains an error.
In this case, we want the support vector machine to be able to deal with data errors
and allow the training data to be, to a certain extent, allowed to be in the wrong
class, on the wrong side of the separator hyperplane. To manage such cases, it is
necessary to make changes to the support vector machine by adding a soft border
feature. This feature allows multiple data points to pass through the separator
hyperplane and be on the wrong side, without affecting the final result. Figure 19
shows the soft margin solution.
The sample with the error is now incorrectly classified. Of course, the point here is
that we do not want SVM to allow too many of these misclassifications to occur. It
is therefore necessary to specify a parameter to control the maximum number of
permissible errors and the maximum allowable distance for accepting classification
errors. The value of this parameter is determined by the user according to the
application.
4.2 IMPLEMENTATION 64
(𝑊𝑊 ∗ 𝑋𝑋− ) + 𝑏𝑏 = −1
Given the equation of the last relation, obtaining M with the help of b and W is a
simple task.
�𝑊𝑊 ∗ �𝑋𝑋− + (𝜆𝜆 ∗ 𝑤𝑤)�� + 𝑏𝑏 = 1 𝑡𝑡ℎ𝑒𝑒𝑒𝑒 (𝑤𝑤 ∗ 𝑥𝑥− ) + 𝑏𝑏 + �(𝜆𝜆 ∗ 𝑤𝑤) ∗ 𝑊𝑊� = +1
2
−1 + 𝑏𝑏 + 𝑏𝑏 + �(𝜆𝜆 ∗ 𝑤𝑤) ∗ 𝑊𝑊� = +1 𝑇𝑇ℎ𝑒𝑒𝑒𝑒 𝜆𝜆 =
𝑤𝑤 ∗ 𝑊𝑊
2 ∗ √𝑤𝑤 ∗ 𝑊𝑊 2 2
𝑀𝑀 = |𝑋𝑋+ + 𝑋𝑋− | = |𝜆𝜆 ∗ 𝑤𝑤| = 𝜆𝜆 ∗ |𝑤𝑤| = �𝜆𝜆 ∗ √𝑤𝑤 ∗ 𝑊𝑊� = = =
(𝑤𝑤 ∗ 𝑊𝑊) (𝑤𝑤 ∗ 𝑊𝑊) |𝑤𝑤|
The method obtains the Lagrange coefficients w, b and a in such a way that L (w
,b, a) is minimized.
1
𝐿𝐿(𝑤𝑤, 𝑏𝑏, 𝑎𝑎) = |𝑤𝑤 ∗ 𝑊𝑊| − (� 𝛼𝛼 ∗ [𝑌𝑌 ∗ �(𝑊𝑊 ∗ 𝑋𝑋) + 𝑏𝑏� − 1])
2
• Kernel functions
All of these topics were related to linear classification, but if the input data is
nonlinear, the input vectors must be moved to a higher attribute space. Figure 21
shows a conversion of a nonlinear to linear separator.
So, one of the important factors in an SVM machine is the kernel function. Although
several kernel functions have been proposed by researchers, the following basic
kernel functions are used in most SVM machines.
𝑑𝑑
Polynomial functions: 𝐾𝐾�𝑋𝑋𝐼𝐼 , 𝑋𝑋𝐽𝐽 � = �𝜆𝜆 ∗ �𝑋𝑋𝑖𝑖′ , 𝑋𝑋𝑗𝑗 � + 𝑟𝑟� , 𝜆𝜆 > 0
(RBF) Radial Basis Functions: �𝑋𝑋𝐼𝐼 , 𝑋𝑋𝐽𝐽 � = exp�−𝜆𝜆 ∥ 𝑋𝑋𝑖𝑖 − 𝑋𝑋𝑗𝑗 ∥2 � , 𝜆𝜆 > 0
∥𝑋𝑋𝑖𝑖 −𝑋𝑋𝑗𝑗 ∥2
Gaussin Radial Basis functions: 𝐾𝐾�𝑋𝑋𝐼𝐼 , 𝑋𝑋𝐽𝐽 � = exp �− 2𝜎𝜎 2
�
Where λ, r and d are the kernel parameters and λ is a variable that plays an
important role in the SVM learning machine. After describing the proposed method,
which was based on the support vector machine, the proposed method is tested and
verified in this chapter. First, the specifications of the computer system with which
the simulation has been done are discussed, then the data set is described, then the
implementation is described, and finally the evaluation is performed.
4.3 TESTING AND VERIFICATION 67
CPU: Core i7
Ram: 8G
GPU: 2 GB
Dataset presentation
This database has 5 different types of data, including 4 types of attacks and a series
of normal data. Of course, the 4 types of attacks themselves include a subset of
different types of attacks. Ten percent of the database itself is about five hundred
thousand data, which is a large number that is not usually used in detection systems
of all this data. Because each of these data records has 41 different properties. If we
want to use this whole ten percent database, then intrusion detection system
training takes a long time. One of the tasks done in this project is to select a suitable
set of this database, so that it is not too large and includes different types of attacks
and in appropriate numbers.
4.3 TESTING AND VERIFICATION 68
1- The first category includes the main attributes of a connection, which include the
basic attributes of the TCP connection. Connection time, type of connection, type of
network service is in this category.
2- The second category is the content attributes in a connection, such as
unsuccessful communication attempts.
3- The third category is the host attributes that test the communications established
in the last 2 seconds that have the same destination as the current connection and
calculate statistics related to the behavior of the protocol, service, etc.
4- The fourth category, similar features of the same service, inspects last-second
communications that have the same service as the current connection.
In the first part, the codes related to reading and uploading the database are done
in MATLAB environment and the information is read from the database and
converted into an understandable format of MATLAB environment and finally
stored in a file. Inside this file, the code related to the attacks is defined as follows:
The code for DOS attack is number 1 and U2R (user to root) attack is number 2, R2L
attack is number 3, PROB attack is number 4, and finally the non-attack status or
NORMAL is specified with number 5.
So far, the output shows the number of attacks. The inputs are the same number of
features multiplied by the total number of samples, which is equal to the number
41 * 494021.
2) Number of features: 41
70% of the data is selected for training and 30% for testing. After execution, the
number of training data is 345814 and the number of test data is 148207. Attacks are
also categorized from 1 to 5. Categorized by SVM. Finally, the Confusion function
or the function of emptiness and confusion is used to correctly diagnose the results.
For this section, I have first divided the data into two categories of training and
testing, of which 70% of the data is intended for training. Then trained the desired
model using the dataset parameters. The comparison of the proposed algorithm in
terms of detection rate, accuracy and false alarm rate parameters with existing
algorithms is presented.
4.3 TESTING AND VERIFICATION 70
The various criteria used for this purpose, performance evaluation and
experimental results are observed, which are obtained as follows:
1- False Positive (FP): Equivalent to each IDS alert time when an attack did not
occur
2- False negative (FN): means the IDS failed to detect a real attack
3- True Positive (TP): Equivalent to a real attack that triggers IDS to generate an
alert
4- True Negative (TN): Equivalent to a situation in which no attack occurs and no
warning is generated [25]
𝑇𝑇𝑇𝑇 + 𝑇𝑇𝑇𝑇
𝐴𝐴𝐴𝐴𝐴𝐴𝐴𝐴𝐴𝐴𝐴𝐴𝐴𝐴𝐴𝐴 =
𝑇𝑇𝑇𝑇 + 𝑇𝑇𝑇𝑇 + 𝐹𝐹𝐹𝐹 + 𝐹𝐹𝐹𝐹
𝑇𝑇𝑇𝑇
𝑃𝑃𝑃𝑃𝑃𝑃𝑃𝑃𝑃𝑃𝑃𝑃𝑃𝑃𝑃𝑃𝑃𝑃 =
𝑇𝑇𝑇𝑇 + 𝐹𝐹𝐹𝐹
𝑇𝑇𝑇𝑇
𝑅𝑅𝑅𝑅𝑅𝑅𝑅𝑅𝑅𝑅𝑅𝑅 =
𝑇𝑇𝑇𝑇 + 𝐹𝐹𝐹𝐹
2 ∗ (𝑅𝑅𝑅𝑅𝑅𝑅𝑅𝑅𝑅𝑅𝑅𝑅 ∗ 𝑃𝑃𝑃𝑃𝑃𝑃𝑃𝑃𝑃𝑃𝑃𝑃𝑃𝑃𝑃𝑃𝑃𝑃)
𝐹𝐹1 𝑆𝑆𝑆𝑆𝑆𝑆𝑆𝑆𝑆𝑆 =
(𝑅𝑅𝑅𝑅𝑅𝑅𝑅𝑅𝑅𝑅𝑅𝑅 + 𝑃𝑃𝑃𝑃𝑃𝑃𝑃𝑃𝑃𝑃𝑃𝑃𝑃𝑃𝑃𝑃𝑃𝑃)
Conclusion
There are strong incentives to address cybersecurity risk management in OT-IT
combined environments. The use of new technologies in connected networks, the
pressure of innovation and desire to reduce costs, forces companies to consider the
security aspects. Security is one of the major challenges in networks, both wired and
wireless networks. This work is to provide a system that can enhance network
security. Cyber-attackers are increasingly designing more sophisticated methods to
attack industrial OT-IT combined systems which as vastly used in industrial
environments. In this thesis, I tried to present a solution to identify and distinguish
a wide range of methods and algorithms in such a way that if the attackers try to the
security mechanisms, the system will identify and minimize the damage caused by
the attack.
Intrusion detection systems nowadays are one of the critical and vital solutions to
provide s secure network of computers. The goal of this thesis as demonstrated
especially in chapters 3 and 4 is a network security software solution based on a
proposed model over OT-IT to observe and detect common intrusions using
support vector machine based on machine learning technique. The aim of this study
is to provide security by providing a UML and SysML model-based intrusion
detection solution. The model presented in this thesis is meant to eliminate the
attack or reduce its effect for OT-IT systems. OT-IT combined environment like
industrial systems are often developed based on operational and business
requirements and little attention is paid to the potential security effects in them as
described in this work.
5 CONCLUSION 72
References
[1] B. Admin. “10 High Profile Cyber Attacks in 2021.” cybermagazine.com.
https://cybermagazine.com/top10/10-high-profile-cyber-attacks-2021 (accessed:
Apr. 22, 2021).
[12] M. Jouini and L.B. Rabai, “Comparative Study of Information Security Risk
Assessment Models for Cloud Computing systems.” Procedia Computer Science,
Volume 83, 2016, Pages 1084-1089,
ISSN 1877-0509, https://doi.org/10.1016/j.procs.2016.04.227.
(https://www.sciencedirect.com/science/article/pii/S1877050916302605)
[18] I. Saif. “Cyber risk in an Internet of Things world Flashpoint edition 4: More
data, more opportunity, more risk.” DELOITTE.COM. Available:
https://www2.deloitte.com/us/en/pages/technology-media-and-
telecommunications/articles/cyber-risk-in-an-internet-of-things-world-emerging-
trends.html.(Accessed: April 09, 2022).
[19] D. Watson and A. Jones. “IT Infrastructure, Digital Forensics Processing and
Procedures.” Chapter 7 -, Syngress, 2013, Pages 233-312, ISBN 9781597497428,
https://doi.org/10.1016/B978-1-59749-742-8.00007-8.
(https://www.sciencedirect.com/science/article/pii/B9781597497428000078).