https://www.iotworldtoday.com/wp-content/themes/ioti_child/assets/images/logo/IoTWorldToday-mobile-logo.png
  • Home
  • News
    • Back
    • Roundups
  • Strategy
  • Special Reports
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Podcasts
    • Strategic Partners
    • Latest videos
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Editorial Submissions
  • Events
Iot World Today
  • NEWSLETTER
  • Home
  • News
    • Back
    • Roundups
  • Strategy
  • Special Reports
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Podcasts
    • Strategic Partners
    • Latest videos
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Editorial Submissions
  • Events
  • newsletter
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Connected Health Care
  • Retail
  • AI
  • Metaverse
  • Development
  • Security
ioti.com

IIoT/Manufacturing


Getty Images

ICS Security

It’s Early for Artificial Intelligence in ICS Cybersecurity

AI may have significant potential for ICS cybersecurity, but at present, industrial companies looking to deploy the technology should proceed with caution.
  • Written by Brian Buntz
  • 14th March 2019

A virtual assistant developed by Google made waves when it debuted last year because it sounded indistinguishable from a human when phoning a restaurant to make a reservation. “Hi, I’d like to reserve a table for Wednesday, the seventh,” beamed the polite-sounding male voice in the Google Duplex demo. “For seven people?” asked a woman on the other end of the line, apparently misunderstanding. “It’s for four people,” retorted the virtual assistant, prefacing that statement with a natural-sounding “um.”

The example of Google Duplex serves as a microcosm for the current state of AI. Now available in 43 U.S. states for Google Pixel phone users, the Duplex system is at once impressive, but also calls to mind technological limitations. While Duplex may sound eerily like a human, its skillset is rather limited to rather routine interactions. By contrast, IBM’s Project Debater is more fluent in the abstract. It can give skilled human debaters a run for their money in terms of formulating arguments, but it presents its case in a flat robotic-sounding voice. Both the Duplex and Project Debater examples also call to mind the regularity with which the most-successful AI is the product of behemoth tech companies with massive budgets and data sets with armies of employees. And even then, top-tier companies are warning of the technology to potentially misfire. “AI algorithms may be flawed,” reads part of a recent Microsoft regulatory filing. “Datasets may be insufficient or contain biased information. Inappropriate or controversial data practices […] could impair the acceptance of AI solutions.”

[Internet of Things World is where industrial enterprises find IoT innovation. Book your conference pass and save $350, get a free expo pass, or see the IIoT speakers at the event.]

The generic marketing pitch for AI, however, is that the technology is a potential panacea for modern business problems — capable of helping enterprise and industrial companies make sense of mountains of data (including from IIoT devices) while also helping them boost the security of industrial control systems. “Industrial analytics, applied to machine data for operational insights, is as an engine driving the convergence of OT and IT, and ultimately value creation for the Fourth Industrial Revolution,” reads part of the intro from the Industrial Internet of Things Analytics Framework from the Industrial Internet Consortium.

When asked about the potential of AI for ICS cybersecurity, cybersecurity expert Jason Haward-Grau, CISO for PAS Global said “robotic process automation is probably far more interesting, from an AI perspective, than AI is in security,” referring to the business process automation technology that can reduce the need for human involvement in tasks such as procurement.

Yet the vendor landscape is thick with companies who have an AI offering for nearly any imaginable problem. “If you asked anybody: ‘Have you got AI?’ they’ll always say ‘yes.’” Haward-Grau said. “But define what it is. Ask the question: ‘If AI is the answer, what is the question?’ Because you are better off starting asking: ‘What does my business need?’”

The threat level is significant in ICS cybersecurity. A total of 49 percent of 321 industrial respondents suffered at least one attack annually, according to 2018 Kaspersky research. The actual figure could be higher, Haward-Grau said, because the aforementioned figure represents attacks organizations are willing to admit have happened.

At present, the term AI is used in a myriad of ways and definitions of the term can seem philosophical because it remains difficult to understand in concrete terms what intelligence is. “From an engineering point of view, it is difficult to define ‘smart,’” said technology writer Jaron Lanier in a 2016 debate on AI. “If you don’t define a baseline that is measurable, you are off in fantasy land.” He also added that: “A lot of the systems we call ‘smart’ systems are kind of derailed from the empirical process.”

One proposed use case for AI systems, or to be more precise, machine learning, is its use for detecting malware or anomalies on a network. If you have a baseline of how the network should operate and have sound machine learning algorithms and sufficient data access, the technology can be powerful in quickly detecting network threats and, over time, potentially reducing the number of false alarms for potentially suspicious code or network behavior. Given the fact that the broader cybersecurity industry is wrestling with a considerable shortage of talented workers, that’s a big promise.

But in order for it to succeed, the machine learning system needs to have access to relevant data. If the business is doing something that the AI system isn’t aware of, you can have problems — in the form of false alarms. Or perhaps the supervised learning system designed to investigate software code was trained on bad data, leading the algorithm to potentially deem malware as normal. In addition, adversaries could also modify a security vendor’s software to pass off malware as normal code. Another possibility, mentioned in a Technology Review article, is that attackers simply figure out the features the machine learning model is using to identify malware, and remove them from their own malicious code.

In an industrial context, it can be difficult to weave in data from equipment that is not IT-network-oriented or that don’t use the IT TCP/IP protocol. “How does AI work on a 25-year-old control bus?” asked Haward-Grau.

To provide an example of the potential difficulty in launching a wide-scale IoT project in an industrial environment, Haward-Grau gives the example of a refinery, which has 500 traditional IT devices such as physical workstations, HMIs, servers and switches. “It’s manageable. It’s like a small office. I could put network tracking around it,” he said. But then when the head of security asks the refinery how many OT endpoints it has, the answer is 28,500. While one of the advantages of AI, in general, is its potential to make sense of massive volumes of varied data, generated at a brisk velocity, in reality, it is still challenging to make sense of complex, historically siloed data. “The challenge isn’t the number” of endpoints, Haward-Grau said. “It is the challenge of having 20 different vendors. Let’s say I have equipment from ABB, Schneider Electric, Siemens, Yokogawa, Philips, GE and Honeywell,” he said. “They’re all different, they will talk differently. So how are you going to translate all those different things for a start and then answer the question: ‘What does good look like?’” Haward-Grau asked.

Add to that the shift in stance in cybersecurity from the assumption that it’s only a matter of time before companies get breached to the assumption that your firm has already been breached, the complexity of understanding what good network behavior looks like becomes more daunting. A 2018 study backed by IBM found that it takes enterprise companies an average of 197 days to identify a breach. That is bad news for organizations that are potentially compromised that are looking to train machine learning models on complex networking topologies.

All this is not to say that AI doesn’t have considerable potential for ICS cybersecurity, it’s just that the industrial companies looking to deploy the technology should start with defined use cases with initially limited data complexity. As the E. F. Schumacher once wrote, “Any intelligent fool can make things bigger, more complex, and more violent. It takes a touch of genius — and a lot of courage to move in the opposite direction.”

Tags: Artificial intelligence/machine learning IT/OT integration AI IIoT/Manufacturing Features

Related Content


  • IoT Products
    IoT Product Roundup: Cisco, Telit, Draganfly and More
    All the latest Internet of Things products
  • Nala Robotics’ restaurant-as-a-service platform offering; Pizzaiola
    Fully Autonomous Pizzeria Helps Restaurants Tackle Labor Shortages 
    The AI, voice-controlled pizza maker can also cook burgers, pasta, chicken wings and prepare salad
  • Image shows welding robots at a car factory
    Nvidia, Ready Robotics Partner to Accelerate Industrial Automation
    The collaboration comes a year after they first announced their partnership
  • Hannover Messe 2022: The Role of 5G in the Industrial Landscape
    Increased demand for security, supply chain visibility and greater connection for worker safety are some of the trends behind 5G's uptake

Leave a comment Cancel reply

-or-

Log in with your IoT World Today account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Latest News

  • Partnership to Globally Expand Robotics Solutions
  • Researchers Use Robotic Prey to Track Predator Behavior
  • IoT Deals and Partnerships Roundup: Sony, Emnify, Nexxiot and more
  • Wimbledon 2022: AI Operations Inside the Control Room 

Roundups

View all

IoT Product Roundup: Canonical, InfluxData, Wiliot and More

23rd June 2022

IoT Product Roundup: Cisco, Telit, Draganfly and More

9th June 2022

IoT Deals, Partnerships Roundup: Google, Arm, Senet and More

26th May 2022

White Papers

View all

The Role of Manufacturing Technology in Continuous Improvement Ebook

6th April 2022

IIoT Platform Trends for Manufacturing in 2022

6th April 2022

Latest Videos

View all
Image shows Unilever's Alberto Prado at AI Summit 2022 in London

AI Summit 2022: Unilever’s Alberto Prado

Prado talks about how Unilever is using AI to accelerate the speed of new discoveries and gives them access to more breakthrough innovation

Image Shows John Lewis' Barry Panai at AI Summit London 2022

AI Summit 2022: John Lewis’ Barry Panayi on AI in Retail

Panayi talks about data and AI in retail and how individuals and the technology can work together

E-books

View all

How Remote Access Helps Enterprises Improve IT Service and Employee Satisfaction

12th January 2022

An Integrated Approach to IoT Security

6th November 2020

Webinars

View all

Rethinking the Database in the IoT Era

18th May 2022

Jumpstarting Industrial IoT solutions with an edge data management platform

12th May 2022

AI led Digital Transformation of Manufacturing: Time is NOW

9th December 2021

Special Reports

View all

Omdia’s Smart Home Market Dynamics Report

7th January 2022

Cybersecurity Protection Increasingly Depends on Machine Learning

28th October 2020

IoT Security Best Practices for Industry and Enterprise

20th October 2020

Twitter

IoTWorldToday, IoTWorldSeries

AI Summit 2022: Unilever’s Alberto Prado dlvr.it/STMpRN https://t.co/1dyLREr8N6

5th July 2022
IoTWorldToday, IoTWorldSeries

Seoul Robotics Expands 3D Perception Platform across South America dlvr.it/STMhSV https://t.co/a10l3Eb2Kn

5th July 2022
IoTWorldToday, IoTWorldSeries

Microsoft Extends Secured-Core Program to IoT Devices dlvr.it/STMg4k https://t.co/laBPF5VjC4

5th July 2022
IoTWorldToday, IoTWorldSeries

Spot the Robot Dog Helps Police Ahead of Boston’s Fourth of July Celebration dlvr.it/STKWjb https://t.co/LdRg7a2xqU

4th July 2022
IoTWorldToday, IoTWorldSeries

Another 59,000 @Teslas being recalled over a software glitch affecting the vehicle’s Emergency Call safety system… twitter.com/i/web/status/1…

4th July 2022
IoTWorldToday, IoTWorldSeries

Join us in the premier #tech destination of #Austin this November 2-3 for our next #IoT event. Connect and collabo… twitter.com/i/web/status/1…

4th July 2022
IoTWorldToday, IoTWorldSeries

SoftBank, May Mobility Team on Autonomous Driving dlvr.it/STJrW0 https://t.co/mOYoBsgs14

4th July 2022
IoTWorldToday, IoTWorldSeries

Firefly-Inspired Robots Enable Motion Tracking, Communication dlvr.it/STJn0H https://t.co/ksRSzYcR4z

4th July 2022

Newsletter

Sign up for IoT World Today newsletters: vertical industry coverage on Tuesdays and horizontal tech coverage on Thursdays.

Special Reports

Our Special Reports take an in-depth look at key topics within the IoT space. Download our latest reports.

Business Resources

Find the latest white papers and other resources from selected vendors.

Media Kit and Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • IoT World Series
  • Channel Futures
  • RISC-V
  • Dark Reading
  • ITPro Today
  • Web Hosting Talk

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Login/Register

FOLLOW IoT World Today ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2022 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X