Skip to main content
Erschienen in: Neural Computing and Applications 23/2020

21.07.2020 | S.I. : Emerging applications of Deep Learning and Spiking ANN

Anomaly detection via blockchained deep learning smart contracts in industry 4.0

verfasst von: Konstantinos Demertzis, Lazaros Iliadis, Nikos Tziritas, Panagiotis Kikiras

Erschienen in: Neural Computing and Applications | Ausgabe 23/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The complexity of threats in the ever-changing environment of modern industry is constantly increasing. At the same time, traditional security systems fail to detect serious threats of increasing depth and duration. Therefore, alternative, intelligent solutions should be used to detect anomalies in the operating parameters of the infrastructures concerned, while ensuring the anonymity and confidentiality of industrial information. Blockchain is an encrypted, distributed archiving system designed to allow for the creation of real-time log files that are unequivocally linked. This ensures the security and transparency of transactions. This research presents, for the first time in the literature, an innovative Blockchain Security Architecture that aims to ensure network communication between traded Industrial Internet of Things devices, following the Industry 4.0 standard and based on Deep Learning Smart Contracts. The proposed smart contracts are implementing (via computer programming) a bilateral traffic control agreement to detect anomalies based on a trained Deep Autoencoder Neural Network. This architecture enables the creation of a secure distributed platform that can control and complete associated transactions in critical infrastructure networks, without the intervention of a single central authority. It is a novel approach that fuses artificial intelligence in the Blockchain, not as a supportive framework that enhances the capabilities of the network, but as an active structural element, indispensable and necessary for its completion.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bassi L (2017) Industry 4.0: hope, hype or revolution? In: 2017 IEEE 3rd international forum on research and technologies for society and industry (RTSI), Modena, 2017, pp 1–6 Bassi L (2017) Industry 4.0: hope, hype or revolution? In: 2017 IEEE 3rd international forum on research and technologies for society and industry (RTSI), Modena, 2017, pp 1–6
2.
Zurück zum Zitat Lee J, Bagheri B, Kao H-A (2015) A cyber-physical systems architecture for industry 4.0-based manufacturing systems, vol 3, 2015, pp 18–23 Lee J, Bagheri B, Kao H-A (2015) A cyber-physical systems architecture for industry 4.0-based manufacturing systems, vol 3, 2015, pp 18–23
3.
Zurück zum Zitat Gilchrist A (2016) Industry 4.0: the industrial internet of things, Publisher: A press, Release Date: June 2016, ISBN: 9781484220474 Gilchrist A (2016) Industry 4.0: the industrial internet of things, Publisher: A press, Release Date: June 2016, ISBN: 9781484220474
4.
Zurück zum Zitat Xu LD, Xu EL, Li L (2018) Industry 4.0: state of the art and future trends. Int J Prod Res 56(8):2941–2962CrossRef Xu LD, Xu EL, Li L (2018) Industry 4.0: state of the art and future trends. Int J Prod Res 56(8):2941–2962CrossRef
5.
Zurück zum Zitat Zhou K, Liu T, Zhou L (2015) Industry 4.0: towards future industrial opportunities and challenges. In: 2015 12th international conference on fuzzy systems and knowledge discovery (FSKD), Zhangjiajie, 2015, pp 2147–2152 Zhou K, Liu T, Zhou L (2015) Industry 4.0: towards future industrial opportunities and challenges. In: 2015 12th international conference on fuzzy systems and knowledge discovery (FSKD), Zhangjiajie, 2015, pp 2147–2152
6.
Zurück zum Zitat El Hamdi S, Abouabdellah A, Oudani M (2019) Industry 4.0: fundamentals and main challenges. In: 2019 international colloquium on logistics and supply chain management (LOGISTIQUA), Montreuil—Paris, France, 2019, pp 1–5 El Hamdi S, Abouabdellah A, Oudani M (2019) Industry 4.0: fundamentals and main challenges. In: 2019 international colloquium on logistics and supply chain management (LOGISTIQUA), Montreuil—Paris, France, 2019, pp 1–5
7.
Zurück zum Zitat Culot G, Fattori F, Podrecca M, Sartor M (2019) Addressing industry 4.0 cybersecurity challenges. IEEE Eng Manag Rev 47(3):79–86CrossRef Culot G, Fattori F, Podrecca M, Sartor M (2019) Addressing industry 4.0 cybersecurity challenges. IEEE Eng Manag Rev 47(3):79–86CrossRef
8.
Zurück zum Zitat Sklyar V, Kharchenko V (2019) ENISA documents in cybersecurity assurance for industry 4.0: IIoT threats and attacks scenarios. In: 2019 10th IEEE international conference on intelligent data acquisition and advanced computing systems: technology and applications (IDAACS), Metz, France, 2019, pp 1046–1049 Sklyar V, Kharchenko V (2019) ENISA documents in cybersecurity assurance for industry 4.0: IIoT threats and attacks scenarios. In: 2019 10th IEEE international conference on intelligent data acquisition and advanced computing systems: technology and applications (IDAACS), Metz, France, 2019, pp 1046–1049
9.
Zurück zum Zitat Meneghello F, Calore M, Zucchetto D, Polese M, Zanella A (2019) IoT: Internet of Threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet Things J 6(5):8182–8201CrossRef Meneghello F, Calore M, Zucchetto D, Polese M, Zanella A (2019) IoT: Internet of Threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet Things J 6(5):8182–8201CrossRef
10.
Zurück zum Zitat Sample C, Schaffer K (2013) An overview of anomaly detection. IT Prof 15(1):8–11CrossRef Sample C, Schaffer K (2013) An overview of anomaly detection. IT Prof 15(1):8–11CrossRef
11.
Zurück zum Zitat Dixit M, Tiwari A, Pathak H, Astya R (2018) An overview of deep learning architectures, libraries and its applications areas. In: 2018 international conference on advances in computing, communication control and networking (ICACCCN), Greater Noida (UP), India, 2018, pp 293–297 Dixit M, Tiwari A, Pathak H, Astya R (2018) An overview of deep learning architectures, libraries and its applications areas. In: 2018 international conference on advances in computing, communication control and networking (ICACCCN), Greater Noida (UP), India, 2018, pp 293–297
12.
Zurück zum Zitat Chen CLP (2015) Deep learning for pattern learning and recognition. In: 2015 IEEE 10th jubilee international symposium on applied computational intelligence and informatics, Timisoara, 2015, pp 17–17 Chen CLP (2015) Deep learning for pattern learning and recognition. In: 2015 IEEE 10th jubilee international symposium on applied computational intelligence and informatics, Timisoara, 2015, pp 17–17
14.
Zurück zum Zitat Chatterjee R, Chatterjee R (2017) An overview of the emerging technology: blockchain. In: 2017 3rd international conference on computational intelligence and networks (CINE), Odisha, 2017, pp 126–127 Chatterjee R, Chatterjee R (2017) An overview of the emerging technology: blockchain. In: 2017 3rd international conference on computational intelligence and networks (CINE), Odisha, 2017, pp 126–127
15.
Zurück zum Zitat Mermer GB, Zeydan E, Arslan SS (2018) An overview of blockchain technologies: principles, opportunities and challenges. In: 2018 26th signal processing and communications applications conference (SIU), Izmir, 2018, pp 1–4 Mermer GB, Zeydan E, Arslan SS (2018) An overview of blockchain technologies: principles, opportunities and challenges. In: 2018 26th signal processing and communications applications conference (SIU), Izmir, 2018, pp 1–4
16.
Zurück zum Zitat Zhao S, Li S, Yao Y (2019) Blockchain enabled industrial internet of things technology. IEEE Trans Comput Soc Syst 6(6):1442–1453CrossRef Zhao S, Li S, Yao Y (2019) Blockchain enabled industrial internet of things technology. IEEE Trans Comput Soc Syst 6(6):1442–1453CrossRef
17.
Zurück zum Zitat Wang S, Ouyang L, Yuan Y, Ni X, Han X, Wang F (2019) Blockchain-enabled smart contracts: architecture, applications, and future trends. IEEE Trans Syst Man Cybern Syst 49(11):2266–2277CrossRef Wang S, Ouyang L, Yuan Y, Ni X, Han X, Wang F (2019) Blockchain-enabled smart contracts: architecture, applications, and future trends. IEEE Trans Syst Man Cybern Syst 49(11):2266–2277CrossRef
18.
Zurück zum Zitat Mohanta BK, Panda SS, Jena D (2018) An overview of smart contract and use cases in blockchain technology. In: 2018 9th international conference on computing, communication and networking technologies (ICCCNT), Bangalore, 2018, pp 1–4 Mohanta BK, Panda SS, Jena D (2018) An overview of smart contract and use cases in blockchain technology. In: 2018 9th international conference on computing, communication and networking technologies (ICCCNT), Bangalore, 2018, pp 1–4
19.
Zurück zum Zitat Abbas QE, Sung-Bong J (2019) A survey of blockchain and its applications. In: 2019 international conference on artificial intelligence in information and communication (ICAIIC), Okinawa, Japan, 2019, pp 001–003 Abbas QE, Sung-Bong J (2019) A survey of blockchain and its applications. In: 2019 international conference on artificial intelligence in information and communication (ICAIIC), Okinawa, Japan, 2019, pp 001–003
20.
Zurück zum Zitat Andersen MP, Kolb J, Chen K, Fierro G, Culler DE, Popa RA (2017) WAVE: a decentralized authorization system for IoT via blockchain smart contracts. Technical report no. UCB/EECS-2017-234, Dec 29, 2017 Andersen MP, Kolb J, Chen K, Fierro G, Culler DE, Popa RA (2017) WAVE: a decentralized authorization system for IoT via blockchain smart contracts. Technical report no. UCB/EECS-2017-234, Dec 29, 2017
21.
Zurück zum Zitat Schmidhuber Jürgen (2015) Deep learning in neural networks: an overview. Neural Netw 61:85–117CrossRef Schmidhuber Jürgen (2015) Deep learning in neural networks: an overview. Neural Netw 61:85–117CrossRef
23.
Zurück zum Zitat Zou H, Hastie T (2005) Regularization and variable selection via the elastic net. J R Stat Soc Ser B (Stat Methodol) 67(2):301–320MathSciNetCrossRef Zou H, Hastie T (2005) Regularization and variable selection via the elastic net. J R Stat Soc Ser B (Stat Methodol) 67(2):301–320MathSciNetCrossRef
24.
Zurück zum Zitat Chen Z, Yeo CK, Lee BS, Lau CT (2018) Autoencoder-based network anomaly detection. In: 2018 wireless telecommunications symposium (WTS), Phoenix, AZ, 2018, pp 1–5 Chen Z, Yeo CK, Lee BS, Lau CT (2018) Autoencoder-based network anomaly detection. In: 2018 wireless telecommunications symposium (WTS), Phoenix, AZ, 2018, pp 1–5
25.
Zurück zum Zitat Fernández-Saúco IA, Acosta-Mendoza N, Gago-Alonso A, García-Reyes EB (2019) Computing anomaly score threshold with autoencoders pipeline. In: Vera-Rodriguez R, Fierrez J, Morales A (eds) Progress in pattern recognition, image analysis, computer vision, and applications. CIARP 2018. Lecture notes in computer science, vol 11401. Springer, Cham Fernández-Saúco IA, Acosta-Mendoza N, Gago-Alonso A, García-Reyes EB (2019) Computing anomaly score threshold with autoencoders pipeline. In: Vera-Rodriguez R, Fierrez J, Morales A (eds) Progress in pattern recognition, image analysis, computer vision, and applications. CIARP 2018. Lecture notes in computer science, vol 11401. Springer, Cham
26.
Zurück zum Zitat Falco G, Caldera C, Shrobe H (2018) IIoT cybersecurity risk modeling for SCADA Systems. IEEE Internet Things J 5(6):4486–4495CrossRef Falco G, Caldera C, Shrobe H (2018) IIoT cybersecurity risk modeling for SCADA Systems. IEEE Internet Things J 5(6):4486–4495CrossRef
27.
Zurück zum Zitat Al-Dalky R, Abduljaleel O, Salah K, Otrok H, Al-Qutayri M (2014) A modbus traffic generator for evaluating the security of SCADA systems. In: 2014 9th international symposium on communication systems, networks & digital sign (CSNDSP), Manchester, 2014, pp 809–814 Al-Dalky R, Abduljaleel O, Salah K, Otrok H, Al-Qutayri M (2014) A modbus traffic generator for evaluating the security of SCADA systems. In: 2014 9th international symposium on communication systems, networks & digital sign (CSNDSP), Manchester, 2014, pp 809–814
28.
Zurück zum Zitat Fachkha C (2019) Cyber threat investigation of SCADA modbus activities. In: 2019 10th IFIP international conference on new technologies, mobility and security (NTMS), CANARY ISLANDS, Spain, 2019, pp 1–7 Fachkha C (2019) Cyber threat investigation of SCADA modbus activities. In: 2019 10th IFIP international conference on new technologies, mobility and security (NTMS), CANARY ISLANDS, Spain, 2019, pp 1–7
29.
Zurück zum Zitat Grooby S, Dargahi T, Dehghantanha A (2019) Protecting IoT and ICS platforms against advanced persistent threat actors: analysis of APT1, silent chollima and molerats. In: Dehghantanha A, Choo KK (eds) Handbook of big data and IoT security. Springer, Cham Grooby S, Dargahi T, Dehghantanha A (2019) Protecting IoT and ICS platforms against advanced persistent threat actors: analysis of APT1, silent chollima and molerats. In: Dehghantanha A, Choo KK (eds) Handbook of big data and IoT security. Springer, Cham
32.
Zurück zum Zitat Pan S, Morris T, Adhikari U (2015) A specification-based intrusion detection framework for cyber-physical environment in electric power system. Int J Netw Secur 17(2):174–188 Pan S, Morris T, Adhikari U (2015) A specification-based intrusion detection framework for cyber-physical environment in electric power system. Int J Netw Secur 17(2):174–188
33.
Zurück zum Zitat Beaver J, Borges R, Buckner M, Morris T, Adhikari U, Pan S (2014) Machine learning for power system disturbance and cyber-attack discrimination. In: Proceedings of the 7th international symposium on resilient control systems, Aug 19–21, 2014, Denver, CO, USA Beaver J, Borges R, Buckner M, Morris T, Adhikari U, Pan S (2014) Machine learning for power system disturbance and cyber-attack discrimination. In: Proceedings of the 7th international symposium on resilient control systems, Aug 19–21, 2014, Denver, CO, USA
34.
Zurück zum Zitat Wenzhu S, Wenting H, Zufeng X, Jianping C (2019) Overview of one-class classification. In: 2019 IEEE 4th international conference on signal and image processing (ICSIP), Wuxi, China, 2019, pp 6–10 Wenzhu S, Wenting H, Zufeng X, Jianping C (2019) Overview of one-class classification. In: 2019 IEEE 4th international conference on signal and image processing (ICSIP), Wuxi, China, 2019, pp 6–10
35.
Zurück zum Zitat Zhang Shichao, Zhang Chengqi, Yang Qiang (2003) Data preparation for data mining. Appl Artif Intell 17(5–6):375–381CrossRef Zhang Shichao, Zhang Chengqi, Yang Qiang (2003) Data preparation for data mining. Appl Artif Intell 17(5–6):375–381CrossRef
36.
Zurück zum Zitat Mao J, Jain AK, Duin PW (2000) Statistical pattern recognition: a review. IEEE Trans Pattern Anal Mach Intell 22(1):4–37CrossRef Mao J, Jain AK, Duin PW (2000) Statistical pattern recognition: a review. IEEE Trans Pattern Anal Mach Intell 22(1):4–37CrossRef
38.
Zurück zum Zitat Demertzis K, Kikiras P, Tziritas N, Sanchez SL, Iliadis L (2018) The next generation cognitive security operations center: network flow forensics using cybersecurity intelligence. Big Data Cogn Comput 2:35CrossRef Demertzis K, Kikiras P, Tziritas N, Sanchez SL, Iliadis L (2018) The next generation cognitive security operations center: network flow forensics using cybersecurity intelligence. Big Data Cogn Comput 2:35CrossRef
39.
Zurück zum Zitat Demertzis K, Tziritas N, Kikiras P, Sanchez SL, Iliadis L (2019) The next generation cognitive security operations center: adaptive analytic lambda architecture for efficient defense against adversarial attacks. Big Data Cogn Comput 3:6CrossRef Demertzis K, Tziritas N, Kikiras P, Sanchez SL, Iliadis L (2019) The next generation cognitive security operations center: adaptive analytic lambda architecture for efficient defense against adversarial attacks. Big Data Cogn Comput 3:6CrossRef
40.
Zurück zum Zitat Demertzis K, Iliadis L, Kikiras P, Tziritas N (2019) Cyber-typhon: an online multi-task anomaly detection framework. In: MacIntyre J, Maglogiannis I, Iliadis L, Pimenidis E (eds) Artificial intelligence applications and innovations. AIAI 2019. IFIP advances in information and communication technology, vol 559. Springer, Cham Demertzis K, Iliadis L, Kikiras P, Tziritas N (2019) Cyber-typhon: an online multi-task anomaly detection framework. In: MacIntyre J, Maglogiannis I, Iliadis L, Pimenidis E (eds) Artificial intelligence applications and innovations. AIAI 2019. IFIP advances in information and communication technology, vol 559. Springer, Cham
41.
Zurück zum Zitat Korda N, Szorenyi B, Li S (2016) Distributed clustering of linear bandits in peer to peer networks. In: ICML’16: proceedings of the 33rd international conference on international conference on machine learning, vol 48, June 2016, pp 1301–1309 Korda N, Szorenyi B, Li S (2016) Distributed clustering of linear bandits in peer to peer networks. In: ICML’16: proceedings of the 33rd international conference on international conference on machine learning, vol 48, June 2016, pp 1301–1309
42.
Zurück zum Zitat Li S, Karatzoglou A, Gentile C (2016) Collaborative filtering bandits. In: Proceedings of the 39th international ACM SIGIR conference on research and development in information retrieval (SIGIR’16). Association for Computing Machinery, New York, NY, USA, pp 539–548. https://doi.org/10.1145/2911451.2911548 Li S, Karatzoglou A, Gentile C (2016) Collaborative filtering bandits. In: Proceedings of the 39th international ACM SIGIR conference on research and development in information retrieval (SIGIR’16). Association for Computing Machinery, New York, NY, USA, pp 539–548. https://​doi.​org/​10.​1145/​2911451.​2911548
43.
Zurück zum Zitat Hao F, Park D-S, Li S, Lee HM (2016) Mining λ-maximal cliques from a fuzzy graph. Sustainability 8:553CrossRef Hao F, Park D-S, Li S, Lee HM (2016) Mining λ-maximal cliques from a fuzzy graph. Sustainability 8:553CrossRef
44.
Zurück zum Zitat Gentile C, Li S, Zappella G (2014) Online clustering of bandits. In: Proceedings of the 31st international conference on international conference on machine learning, vol 32 (ICML’14). JMLR.org, II–757–II–765 Gentile C, Li S, Zappella G (2014) Online clustering of bandits. In: Proceedings of the 31st international conference on international conference on machine learning, vol 32 (ICML’14). JMLR.org, II–757–II–765
Metadaten
Titel
Anomaly detection via blockchained deep learning smart contracts in industry 4.0
verfasst von
Konstantinos Demertzis
Lazaros Iliadis
Nikos Tziritas
Panagiotis Kikiras
Publikationsdatum
21.07.2020
Verlag
Springer London
Erschienen in
Neural Computing and Applications / Ausgabe 23/2020
Print ISSN: 0941-0643
Elektronische ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-020-05189-8

Weitere Artikel der Ausgabe 23/2020

Neural Computing and Applications 23/2020 Zur Ausgabe

S.I. : Emerging applications of Deep Learning and Spiking ANN

Building an efficient OCR system for historical documents with little training data

S.I. : Emerging applications of Deep Learning and Spiking ANN

Online meta-learning firewall to prevent phishing attacks