J. JOHNSI ABISHA et al, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.5, May- 2024, pg. 116-129
Available Online at www.ijcsmc.com
International Journal of Computer Science and Mobile Computing
A Monthly Journal of Computer Science and Information Technology
ISSN 2320–088X
IMPACT FACTOR: 7.056
IJCSMC, Vol. 13, Issue. 5, May 2024, pg.116 – 129
CYBER SECURITY FOR
CHEMICAL PLANT USING
ARTIFICIAL INTELLIGENCE
1
1
J. JOHNSI ABISHA; 2Dr. M. JANAKI
M.Phil Scholar, PG Department of Computer Science, Dr. Umayal Ramanathan College for Women,
Karaikudi, Tamilnadu, India
2
Associate Professor, PG Department of Computer Science, Dr. Umayal Ramanathan College for
Women, Karaikudi, Tamilnadu, India
DOI: https://doi.org/10.47760/ijcsmc.2024.v13i05.012
Abstract: The adding number of cyber-attacks on diligence demands immediate attention for
furnishing further secure mechanisms to guard diligence and minimize pitfalls. An administrative
control and data accession (SCADA) system employing the distributed networks of detectors and
selectors that interact with the physical terrain is vulnerable to attacks that target the interface
between the cyber and physical subsystems. These cyber-attacks are generally vicious conduct
that beget uninvited results in the cyber physical world, for illustration, the Stuxnet( 2010) attack
that targeted Iran's nuclear centrifuges. An attack that hijacks the detectors in an attempt to give
false readings to the regulator can be used to dissemble normal system operation for the control
system, while the bushwhacker can commandeer the selectors to shoot the system beyond its
safety range. AI result can identify shadow data, cover for abnormalities in data access and alert
cybersecurity professional about implicit pitfalls by anyone penetrating the data or sensitive
information. This proposes a process- apprehensive approach with the use of steady equations
grounded on the physical and chemical parcels of the process and a Multiple Security sphere
Nondeducibility (MSDND) frame to descry when a detector signal is being virulently
manipulated. A system without any MSDND secure information flows between the AI and cyber
observers has smaller sins that can be exploited.
Keywords: Cyber security, Artificial intelligent, Machine Learning, Deep Learning, Multiple
security sphere nondeducibility (MSDND).
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden
116
J. JOHNSI ABISHA et al, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.5, May- 2024, pg. 116-129
1. Introduction
Our adding dependence on technology and web- grounded communication has opened
the door for cyber security pitfalls, and the chemical and manufacturing sectors are high targets.
Successful attacks on chemical and other manufacturing installations and systems can disrupt
services and operations and jeopardize entire populations. With the growing number and
complication of cyber-attacks, securing access to sensitive information and dangerous substances
has no way been more important or necessary.
A chemical factory is generally an artificial process factory that manufactures or
processes chemicals on a large scale. Such a factory has an input of a given set of raw
accoutrements and performs operations (responses) on them to produce a asked chemical affair
along with some residual labors. These shops use technical outfit, units and technology in the
manufacturing process. Ample quantum of attention is concentrated on safety and functional
trust ability along with information confidentiality, integrity and vacuity. Due to a vast and
extensively spread structure, there's a possibility of security breach either by a meddler or a
bigwig. Physical security is an inversely important as cyber security for these architectures.
Imagine a meddler hacking into the system and changing critical parameters like temperature or
pressure in the functional units or indeed changing the raw material rates etc. The damage could
be disastrous.
1.1 The major security breach of chemical assiduity
• Factory Sabotage/ arrestment
• Intellectual Property Theft
• Physical Hazard/ Material slip
• Overpressure/ Expansion/ Explosion
• Exposures/ Health Issues from Releases beyond Factory Limits
The National Institute of norms and Technology in its Public Working Group in CPS (NIST)
cites major security enterprises of a chemical factory as Process Safety and outfit Safety. These
can be maintained by high trust ability and security and only cyber-physical security can give the
necessary protection against attacks on the control processes. While the NIST document
abatements sequestration as a concern due to a lack of tête-à-tête identifiable information, one
can fantasize confidentiality of the factual processes as desirable. The biggest trouble to CPS is
from the targeted attacks where the bushwhackers have a deep knowledge of the targeted
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden
117
J. JOHNSI ABISHA et al, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.5, May- 2024, pg. 116-129
regulator and colorful processes controlled by it. Bushwhackers can take advantage of
vulnerabilities in CPS to take control of the system. With physical instantiations in the real
world, attacks on CPSs can beget dislocation to physical services or produce a public disaster.
1.2 Cyber physical system
A first generation of exploration on securing CPSs concentrated on the IT structure
stationed around artificial processes; it was observed that in numerous cases applicable network
security measures were lacking putting the processes at threat. The dominant suggestion was to
acclimatize state- of- the- art network security results similar as cryptographic protocols,
intrusion discovery systems, and firewalls to the artificial operation sphere. These defenses
primarily deal with attacks on the IT structure. This exploration assumes a bushwhacker like
stuxnet that can manipulate selectors to beget impact on the process and hides real process
measures from the control room and/ or the process driver. We probe styles for relating those
readings that have been manipulated. Specifically, we consider attacks generating credible
artificial values, that's the values may live in the lower and upper threshold of the process and
presenting that data to the driver to deceive her about the true state of a process. Still, these can
have an impact on the system in the long term compromising the effectiveness of the product or
the process.
As a cyber physical system requires a tight coupling between the physical and cyber
controlling factors, it’s pivotal to insure that the system is secure for all the cyber and physical
processes. Thus, guarding the CPSs’ against cyber-attacks is of consummate significance.
Traditional security styles can be applied to cover a CPS against cyber pitfalls or pitfalls assessed
by vicious interposers. Still, due to the unique characteristics and complexity of a CPS,
traditional security models and approaches aren't sufficient enough to address the security
challenges of a CPS. In order to identify the loopholes in the system, a reciprocal approach was
proposed further than thirty times ago to track and regulate the information flows of the system
to help secret data from oohing to unauthorized parties. This work was the origin of the
proposition used in this paper. Information inflow security in CPS can lead to particularly
complex security partitions.
1.3 Artificial intelligence
Cyber-attacks vary their styles and attack strategies to increase their attack capability
with a focus on the operation of AI technologies. The vicious use of AI has changed the script of
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden
118
J. JOHNSI ABISHA et al, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.5, May- 2024, pg. 116-129
implicit pitfalls in the cyber terrain. Manufacturing bias connected to a network, through the
Internet, offer a lesser face for cyberattacks. Bushwhackers exploit the attack intelligence to
enhance the reach of their conduct. They exclude the geographic boundaries of their targets and
minimize the substantiation of their vicious conditioning.
2. Literature review
The lack of good tools for CPS security is addressed in part by the introduction of a new
model, Multiple Security Domains Nondeducibility over an Event System, or MSDND(ES). The
drive-by-wire automobile is studied to show how MSDND(ES) is applied to a system that
traditional security models do not describe well.The issue of human trust in inherently vulnerable
CPS with embedded cyber monitors, is also explored. A Stuxnet type attack on a CPS is
examined using both MSDND(ES) and Belief, Information acquisition, and Trust (BIT) logic to
provide a clear and precise method to discuss issues of trust and belief in monitors and electronic
reports. To show these techniques, the electrical smart grid as envisioned by the Future
Renewable Electric Energy Delivery and Management Systems Center (FREEDM) project is
also modeled [1]. The vigorous expansion of renewable energy as a substitute for fossil energy is
the predominant route of action to achieve worldwide carbon neutrality. However, clean energy
supplies in multi-energy building districts are still at the preliminary stages for energy paradigm
transitions. In particular, technologies and methodologies for large-scale renewable energy
integrations are still not sufficiently sophisticated, in terms of intelligent control management [2].
With population increases and a vital need for energy, energy systems play an important
and decisive role in all of the sectors of society. To accelerate the process and improve the
methods of responding to this increase in energy demand, the use of models and algorithms
based on artificial intelligence has become common and mandatory. In the present study, a
comprehensive and detailed study has been conducted on the methods and applications of
Machine Learning (ML) and Deep Learning (DL), which are the newest and most practical
models based on Artificial Intelligence (AI) for use in energy systems [3]. Cybersecurity is one
of the main challenges faced by companies in the context of the Industrial Internet of Things
(IIoT), in which a number of smart devices associated with machines, computers and people are
networked and communicate with each other. In this connected industrial scenario, personnel
need to be aware of cybersecurity issues in order to prevent or minimise the occurrence of
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden
119
J. JOHNSI ABISHA et al, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.5, May- 2024, pg. 116-129
cybersecurity incidents and corporate data breaches, and thus to make companies resilient to
cyber-attacks. In addition, the recent increase in smart working [4].
Recent developments in manufacturing processes and automation have led to the new
industrial revolution termed “Industry 4.0”. Industry 4.0 can be considered as a broad domain
which includes: data management, manufacturing competitiveness, production processes and
efficiency. The term Industry 4.0 includes a variety of key enabling technologies [5].
Security threats are becoming an increasing concern for chemical sites and related
infrastructures where relevant quantities of hazardous materials are processed, stored or
transported. In the present study, security related events that affected chemical and process sites,
and related infrastructures, were investigated. The aim of the study is to frame a clear picture of
the threats affecting the chemical and process industry, and to issue lessons learnt from past
events [6]. The United States (US) is foremost in the world in chemicals production and exports
with an estimated 16% of total global chemical shipments. Encompassing an evergrowing global
market as well as a substantial domestic market, the chemical industry is one of the US’s largest
manufacturing industries. With a nationally based population of over 10,000 firms that produce
in excess of 70,000 products, the US chemical industry had sales of $769.4 billion and directly
employed more than 784,000 workers, with additional indirect employment by industry suppliers
of more than 2.7 million during 2012[7].
Traditionally, the operational safety of chemical processes has been addressed through
process design considerations and through a hierarchical, independent design of control and
safety systems. By developing safety systems including alarms, emergency shutdown, and
further emergency response systems to be activated when control systems fail to operate
chemical processes in a normal operating region [8]. Cyber Security for Chemical Plants” by
Maurizio Martellini, Stephanie Meulenbelt and Krzysztof Paturej provides a technical analysis of
possible cyber-attacks towards critical infrastructures in chemical industry and chemical safety.
The paper analyses attacks and possible countermeasures such as those aimed at sabotage, those
exploit the SCADA systems like Stuxnet, and those aimed at espionage, such as Flame [9].
The digital transition in the process industry is characterized by a high level of
automation and an increasing connection with external networks, which makes facilities
vulnerable to cybers-threats. A cyber-attack, beside economic and reputational damages, can
potentially trigger major events (e.g. releases of hazardous materials, fires, explosions) with
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden
120
J. JOHNSI ABISHA et al, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.5, May- 2024, pg. 116-129
severe consequences on workers, population, and the environment [10]. Awareness is building
on how managers should be involved in Industry 4.0 cybersecurity. This awareness and concern
derives from heavy dependence of integrated information systems and technology for Industry
4.0. Manufacturing companies rely on data to run their operations. The Internet of Things is
exponentially increasing the number of entry points for organizations to defend from nefarious
actors [11].
Industrial Control System (ICS) is a general term that includes supervisory control & data
acquisition (SCADA) systems, distributed control systems (DCS), and other control system
configurations such as programmable logic controllers (PLC). ICSs are often found in the
industrial sectors and critical infrastructures, such as nuclear and thermal plants, water treatment
facilities, power generation, heavy industries, and distribution systems[12].
The global development industries progress towards meeting the ever evolving
contemporary and future demands. This transformative evolution introduced phenomena such as
Industry 4.0 and 5.0 which are facilitated by both information and operational technologies:
collaborative robotics, IoT, AI. Their integration into a hyper-connected system facilitates the
production of goods and services. In addition, these industries are characterized by automation,
as well as by unmatched levels of data exchange throughout the value chain [13].
Modern society is living in an age of paradigm changes. In part, these changes have been
driven by new technologies, which provide high performance computing capabilities that enable
the creation of complex Artificial Intelligence systems. Those developments are allowing the
emergence of new Cyber Systems where the continuously generated data is utilized to build
Artificial Intelligence models used to perform specialized tasks within the system [14]. The
chemical manufacturing industries are at the forefront of innovation, exploring novel
technologies through “smart manufacturing” and “industrial modernization” using computational
approaches to cater to increasing market demands and stringent regulations [15].
The versatility of Artificial Intelligence (AI) in process systems is not restricted to
modelling and control only, but also as estimators to estimate the unmeasured parameters as an
alternative to the conventional observers and hardware sensors. [16]. Artificial intelligence (AI)
contributes to the recent developments in Industry 4.0. Industries are focusing on improving
product consistency, productivity and reducing operating costs, and they want to achieve this
with the collaborative partnership between robotics and people. In smart industries,
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden
121
J. JOHNSI ABISHA et al, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.5, May- 2024, pg. 116-129
hyperconnected manufacturing processes depend on different machines that interact using AI
automation systems by capturing and interpreting all data types. Smart platforms of automation
can play a decisive role in transforming modern production [17].
3. Proposed Methodology
A distinction has been made between bedded systems that use electronic and physical
factors developed independently by experts in their separate disciplines, and true cyber-physical
systems where moxie in both disciplines must be combined to advance the state of the art. The
chemical assiduity spends a huge quantum of coffers to insure the safety of its labor force,
guests, and girding community. The increase in cyber-attacks on chemical shops demands to
device new cyber-physical security measures and fabrics. For illustration, during summer 2011,
cyber-attack named Nitro' caused several casualties among targeted companies. Some of them
are part of the defense sector and maturity of them belong to the chemical assiduity. These
companies are spread around the world, from the United States to the United Kingdom and
through Asia. The malware which was used, labeled with the name PoisonIvy', had the clear
intention to steal information. Another attack was the stuxnet attack that targeted Iran's nuclear
centrifuges.
3.1 Benefits of AI in Chemical Industry
The Chemical Sector is subject to a wide range of pitfalls stemming from cyber pitfalls
and hazards. Sophisticated cyber actors and nation- countries exploit vulnerabilities to steal
information and disrupt, destroy, or hang the delivery of essential services. As information
technology (IT) becomes decreasingly integrated with physical structure operations, there's
increased threat for wide- scale or high- consequence events. Issues that present advanced
cybersecurity threat for the Chemical Sector include advanced patient trouble( APT) attacks,
pall- grounded services, distributed denial of service( DDoS) attacks, artificial control systems
(ICSs), increased connectivity and disruptive digital technology, the Internet of effects( IoT),
malware, and ransomware. Feting and mollifying these issues could help to limit cyber
intrusions.
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden
122
J. JOHNSI ABISHA et al, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.5, May- 2024, pg. 116-129
Asset
optimization
towards zero
waste strategy
Minimized
energy
consumption
Streamlined
production
processes and
scheduling
Zero accident
culture with
visual inspection
and predictive
maintenance
Improved
regulatory
compliance
Higher and
product
quality
Figure3.1 Benefits of AI in chemical Manufacturing
4. Results and discussion
Chemical Sector companies are decreasingly incorporating pall services into their
business operations. Numerous companies are espousing pall software- as-a-service (SaaS) to
enhance business functions in the areas of IT, mortal coffers, marketing, and force chain.
Advanced cloud services offer benefits similar as scalability, high vacuity, advanced data
analysis and storehouse, and dropped power cost. Still, these benefits may come with new
cybersecurity issues. In addition to presenting numerous of the same cybersecurity issues as
physical IT (e.g., denial of service, APT, stolen credentials, and phishing), pall services parade
virtual vulnerability to attacks, including hyperactive jacking, escalation, and virtual machine
escape.
4.1. Cyber security
The Chemical Sector is subject to a wide range of pitfalls stemming from cyber pitfalls
and hazards. Sophisticated cyber actors and nation- countries exploit vulnerabilities to steal
information and disrupt, destroy, or hang the delivery of essential services. As information
technology (IT) becomes decreasingly integrated with physical structure operations, there's
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden
123
J. JOHNSI ABISHA et al, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.5, May- 2024, pg. 116-129
increased threat for wide- scale or high- consequence events. Issues that present advanced
cybersecurity threat for the Chemical Sector include advanced patient trouble( APT) attacks,
pall- grounded services, distributed denial of service( DDoS) attacks, artificial control systems(
ICSs), increased connectivity and disruptive digital technology, the Internet of effects (IoT),
malware, and ransomware. Feting and mollifying these issues could help to limit cyber
intrusions.
• Hyperactive jacking: The hypervisor (software that manages virtual machines on a
physical system) is compromised, furnishing a cyber trouble actor with control of those
underpinning virtual machines.
• Escalation: A cyber trouble actor breaks out of the virtual terrain to gain elevated
access to coffers that are typically defended from the stoner.
• Virtual Machine Escape: The cyber trouble actor escapes a virtual machine (a virtual
system or operation that's running inside a physical system) and interacts directly with the virtual
machine’s hosting terrain.
Train
Employees
In Security
Principles
Limit
Authority
To Install
Software
Secure Wifi Networks
Prodect
Industry
Information
From Cyber
Attacks
CYBER
SECURITY IN
CHEMICAL
INDUSTRY
Create User
Account For
Each
Employee
Firewall For
Internet
Connection
Backup For
Blue Print
Of Chemical
Production
Figure4.1 Cyber security in chemical assiduity.
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden
124
J. JOHNSI ABISHA et al, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.5, May- 2024, pg. 116-129
scrutinized
realities exposed one or
further vulnerable services(e.g., MS-
Remote Procedure Call( MS- RPC) and Remote Desktop Protocol( RDP)) on
internet-accessible hosts that, absent compensating or mollifying controls, can
give original access into IT and OT structure.
Chemical Sector realities exposed unsubstantiated performances of FreeBSD,
OpenBSD, and Windows operating systems (zilches), adding exposure to
vulnerabilities that can enable concession.
Unsubstantiated or insecure encryption, which trouble actors are known to target,
was observed across realities. This increases the threat of blurted credentials,
sensitive information exposure, and regard recitation.
Recently enrolled Chemical Sector realities in CISA’s vulnerability scanning
reduced their exposed vulnerabilities by 42.3% within the first three months of
registration in CISA services, likely reducing openings for exploitation by trouble actors. .
4.2 Unborn prospects of AI in chemical assiduity
AI and ML technology in the chemical assiduity are only at the
morning of their
development, having a prosperous future in front of them. With further and further chemical
companies and CROs exercising AI in their processes, these technologies will keep developing
to meet these association growing demands and conditions. Let’s take a look at the unborn
prospects of AI in chemistry.
4.3. Accelerate Drug Discovery
In the future, AI will revise the process of medicine discovery indeed further, by
accelerating the identification of medicine campaigners. By assaying data from the history, AI
technology will help scientist in prognosticating the relations if motes and choosing the most
suitable campaigners fir future testing. This can help scientist reduce time and plutocrat at the
early stages of medicine development as well as deeper explore the chemical space.
4.4. Precision Medicine
Precision drugs main thing is to acclimate medical treatments to cases grounded on their
unique requirements andcharacterictics.AI will dissect patient data, people’s medical records,
and their life to identify patters and precinct pitfalls of certain conditions and treatment issues.
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden
125
J. JOHNSI ABISHA et al, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.5, May- 2024, pg. 116-129
4.5 Green Chemistry
There’s trend towards further sustainable and green chemical practices right now, and AI
can help achieve chemical responses and environmental impacts and design more effective,
environmentally friendly composites. With the use of AI, it'll be possible to minimize waste
generation and promotes more sustainable manufacturing practices.
4.6. Material Design and Discovery
AI can help scientist design and discover new accoutrements with asked parcels. With
the use of AI and ML, druggists will be suitable to prognosticate new accoutrements with
characteristic like conductivity, strength, and catalytic exertion. .
4.7. Robotization and Robotics
Combining AI with robotics can help automate laboratory processes and enhance
productivity. Robotic system that use AI can perform routine, repetitious tasks similar as data
analysis and sample medication briskly and more effective. This helps probe focus on more
important tasks and reduce the threat of mortal error.
4.8. Integration of Big Data
The chemical assiduity is each aboutdata.IT generates information from simulation,
experimental, studies, exploration, and other source. It's essential collect, store, and dissect this
data duly, and al will be suitable to dissect this data to uncover trends and retired connections
and new suppositions.
4.9. DL and ML applied in chemical sedulity
DL uses multiple layers to make artificial neural networks with the capability to make
intelligent opinions by recovering large amounts of data with a high position of complexity
without mortal intervention. DL ways can exercise a large amount of cyber security- related data
made available in cyberspace. Researchers use ML and DL styles to descry vicious behavior in
information systems arising from cyber- attacks. The operations of DL ways give visionary
monitoring in the artificial terrain, producing essential data about the manufacturing process.
Researchers apply various approaches to deal with this large amount of data. Sedulity applies
these ways to prize applicable data. ML relies on different algorithms to break data problems.
The type of algorithm depends on the problem to be answered, considering the variables
involved in the knowledge process. In the age of digital transformation, ML is a applicable
discipline in the disquisition field of AI- predicated cyber security.
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden
126
J. JOHNSI ABISHA et al, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.5, May- 2024, pg. 116-129
Series 1
12
10
8
6
4
2
0
2010
2011
2012
2013
2014
2015
2016
2017
2018
Series 1
Figure 3 Number of vulnerabilities reported in manufacturing related outfit
Since 2010
Trend of vulnerabilities affecting manufacturing combined outfit reported to the artificial
control systems computer emergency response team. In addition to the rising number of
vulnerabilities, the trouble from cyber risks is getting more significant as system and factors
come connected to each and to the outside world. Information technology, functional technology,
and intellectual property means are getting integrated.
Multitudinous manufacturing still believe they have “nothing of value” that hackers
would want or “no reason to be targeted “by cybercriminals. Still, as mooted over, the adding
connectivity in chemical sedulity and value of data within manufacturing networks is like a
beacon to hackers. In my disquisition, I want to point out that one of the easiest way to enter
your system through vicious CAD lines. These CAD lines use a visual introductory script to
weaken the security for future attacks. They can probe for certain train extension within a
dispatch garcon and router those lines to a fresher- correspondence address.
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden
127
J. JOHNSI ABISHA et al, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.5, May- 2024, pg. 116-129
The preceding operations of Al concentrate on chemical sedulity
• Discovery of molecular parcels
• Design molecules
• Discovering drugs
• Retrosynthesis response
• Predictive analysis
5. Conclusion
This thing was achieved through an in- depth examination of the transition from
traditional cybersecurity approaches to ultramodern, technology- driven strategies. The findings
revealed a significant shift towards the integration of advanced technologies similar as Artificial
Intelligence (AI) and Machine literacy (ML), which have proven to be vital in enhancing
cybersecurity measures. These technologies haven't only automated complex tasks but also
brought about a paradigm shift in trouble discovery and response mechanisms. Another critical
ideal was to assess the impact of mortal factors and transnational programs on cybersecurity
dynamics. The study stressed the pivotal part of mortal geste and mindfulness in shaping
cybersecurity issues. It also underlined the influence of transnational programs and regulations
in guiding and homogenizing cybersecurity practices across colorful diligence. The exploration
further handed a nuanced understanding of the challenges and vulnerabilities arising in the
cybersecurity geography.
It linked new pitfalls similar as AI- driven cyberattacks and emphasized the significance
of nonstop invention and adaption in cybersecurity strategies. In conclusion, this study has
exhaustively addressed its objects, offering a detailed
disquisition of the current state and
unborn directions of cybersecurity strategies. The crucial recommendations include the need for
ongoing education and training in cybersecurity, the relinquishment of a holistic approach that
combines technology with mortal factors, and the significance of aligning cybersecurity
strategies with transnational programs and norms. These recommendations are vital for
associations seeking to enhance their cybersecurity posture and effectively combat the evolving
geography of cyber pitfalls. This study, thus, serves as a pivotal resource for policymakers,
cybersecurity professionals, and experimenters, furnishing them with a roadmap for developing
robust and flexible cybersecurity strategies in a decreasingly digitalized world.
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden
128
J. JOHNSI ABISHA et al, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.5, May- 2024, pg. 116-129
References
[1]. Gerry Howser and Bruce McMillin. A Multiple Security Domain Model of a Drive-by-Wire System. In Computer
Software and Applications Conference (COMPSAC), 2013 IEEE 37th Annual, pages 369{374. IEEE, 2013.
[2]. Artificial intelligence powered large-scale renewable integrations in multi-energy systems for carbon neutrality
transition: Challenges and future perspectives Zhengxuan Liu, Ying Sun, Chaojie Xing, Jia Liu, Yingdong He,
Yuekuan Zhou, Guoqiang Zhang Energy and AI 10, 100195, 2022
[3]. Machine learning and deep learning in energy systems: A review Mohammad Mahdi Forootan, Iman Larki, Rahim
Zahedi, Abolfazl Ahmadi Sustainability 14 (8), 4832, 2022
[4]. Cybersecurity awareness in the context of the Industrial Internet of Things: A systematic literature review Angelo
Corallo, Mariangela Lazoi, Marianna Lezzi, Angela Luperto Computers in Industry 137, 103614, 2022
[5]. Industry 4.0 technologies for manufacturing sustainability: A systematic review and future research directions Anbesh
Jamwal, Rajeev Agrawal, Monica Sharma, Antonio Giallanza Applied Sciences 11 (12), 5725, 2021
[6]. Analysis of physical and cyber security-related events in the chemical and process industry Valeria Casson Moreno,
Genserik Reniers, Ernesto Salzano, Valerio Cozzani Process Safety and Environmental Protection 116, 621-631, 2018
[7]. Cybersecurity in the chemical industry GEORGE B Murphy Protecting Our Future 2, 2015
[8]. Process operational safety and cybersecurity Zhe Wu, Panagiotis D Christofides Springer International Publishing,
2021 Cyber Security for Chemical Plants Maurizio Martellini, Stephanie Meulenbelt, Krzysztof Paturej Cyber
Security: Deterrence and IT Protection for Critical Infrastructures, 37-51, 2013
[9]. Analysis of cybersecurity-related incidents in the process industry Matteo Iaiani, Alessandro Tugnoli, Sarah Bonvicini,
Valerio Cozzani Reliability Engineering & System Safety 209, 107485, 2021
[10]. Addressing industry 4.0 cybersecurity challenges Giovanna Culot, Fabio Fattori, Matteo Podrecca, Marco Sartor IEEE
Engineering Management Review 47 (3), 79-86, 2019
[11]. Cybersecurity for industrial control systems: A survey, Deval Bhamare, Maede Zolanvari, Aiman Erbad, Raj Jain,
Khaled Khan, Nader Meskin computers & security 89, 101677, 2020
[12]. Cyber security beyond the Industry 4.0 era. A short review on a few technological promises Antonio Clim Informatica
Economica 23 (2), 34-44, 2019
[13]. Artificial intelligence and cyber-physical systems: A review and perspectives for the future in the chemical industry
Luis MC Oliveira, Rafael Dias, Carine M Rebello, Márcio AF Martins, Alírio E Rodrigues, Ana M Ribeiro, Idelfonso
BR Nogueira AI 2 (3), 27, 2021
[14]. Artificial Intelligence in the digital chemical industry, its application and sustainability Praveen Kumar Ghodke, P
Swapna Reddy, Narendra Akiti, Hemalatha Kilari Recent Trends and Best Practices in Industry 4.0, 1-29, 2023
[15]. Artificial Intelligence techniques applied as estimator in chemical process systems–A literature survey Jarinah Mohd
Ali, Mohamed Azlan Hussain, Moses O Tade, Jie Zhang Expert Systems with Applications 42 (14), 5915-5931, 2015
[16]. Artificial intelligence applications for industry 4.0: A literature-based study Mohd Javaid, Abid Haleem, Ravi Pratap
Singh, Rajiv Suman Journal of Industrial Integration and Management 7 (01), 83-111, 2022
[17]. M Abul Hasan*, K Raghuveer, P S Pandey, Ashok Kumar, Ashim Bora, Deepa Jose, P R Kshirsagar*, Bui Thanh
Hung, Prasun Chakrabarti, M M Khanapurkar, “Internet of Things and its applications in Industry 4.0 for Smart Waste
Management”, Journal of Environmental Protection and Ecology, 22(6): 2368-2378,2021
[18]. Padmaja, M., Shitharth, S., Prasuna, K. et al. Grow of Artificial Intelligence to Challenge Security in IoT Application.
Wireless Pers Commun (2021). https://doi.org/10.1007/s11277-021-08725-4
[19]. Kshirsagar, P.R.; Yadav, A.D.; Joshi, K.A.; Chippalkatti, P.; Nerkar, R.Y. Classification and Detection of Brain Tumor
by using GLCM Texture Feature and ANFIS. J. Res. Image Signal Processing 2020, 5, 15–31.
[20]. Pravin Kshirsagar, Sudhir Akojwar Prediction of neurological disorders using optimized neural network, proceeding of
international conference on signal processing, communication, power and embedded system (October 2016)
[21]. P. Vijayakumar et. Al., “Machine learning algorithm for improving the efficient of forgery detection” AIP Conference
Proceedings ,Volume 2393, Issue 1 ,10.1063/5.0074086.
[22]. P. Vijayakumar et. Al., “Network security using multi-layer neural network”, AIP Conference Proceedings,Volume
2393, Issue1 ,10.1063/5.0074089.
[23]. Pravin R. Kshirsagar et. al., “Machine learning algorithm for leaf disease detection”, AIP Conference
Proceedings,Volume 2393, Issue 1 ,10.1063/5.0074122.
[24]. P. VijayakumarArtificial intelligence based algorithm to support disable person, AIP Conference Proceedings.Volume
2393, Issue 1 ,10.1063/5.0074090
[25]. Pravin R. Kshirsagar, Hariprasath Manoharan, Samir Kasim, Asif Irshad Khan, Md Mottahir Alam, Yoosef B.
Abushark, Worku Abera, "Expedite Quantification of Landslides Using Wireless Sensors and Artificial Intelligence for
Data Controlling Practices", Computational Intelligence and Neuroscience,vol.2022,ArticleID 3211512, 11 pages,
2022. https://doi.org/10.1155/2022/3211512
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden
129