Select region & language

Global

English

Austria

German

Belgium

Dutch

French

Bulgaria

Bulgarian

Croatia

Croatian

Czech Republic

Czech

Denmark

Danish

Estonia

Estonian

Finland

Finnish

France

French

Germany

German

Greece

Greek

Hungary

Hungarian

Ireland

English

Italy

Italian

Latvia

Latvian

Lithuania

Lithuanian

Luxembourg

French

Netherlands

Dutch

Norway

Norwegian

Poland

Polish

Portugal

Portuguese

Romania

Romanian

Russia

Russian

Serbia

Serbian

Slovakia

Slovakian

Slovenia

Slovenian

Spain

Spanish

Sweden

Swedish

Turkiye

Turkish

United Kingdom

English

Global

English

Argentina

Spanish

Aruba

Spanish

Bolivia

Spanish

Brazil

Portuguese

Chile

Spanish

Colombia

Spanish

Costa Rica

Spanish

Dominican Republic

Spanish

Ecuador

Spanish

El Salvador

Spanish

Guatemala

Spanish

Honduras

Spanish

Mexico

Spanish

Panama

Spanish

Paraguay

Spanish

Peru

Spanish

Puerto Rico

Spanish

United States of America

English

Uruguay

Spanish

Global

English

Bahrain

English

Botswana

English

French

Cameroon

English

French

Côte d'Ivoire

English

French

Israel

Hebrew

Jordan

English

Kuwait

English

Lebanon

English

Madagascar

English

French

Mauritius

English

French

Oman

English

Pakistan

English

Palestine

English

Qatar

English

Saudi Arabia

English

South Africa

English

Tanzania

English

French

United Arab Emirates

English

Zimbabwe

English

French

Global

English

Australia

English

Bangladesh

English

India

English

Indonesia

English

Japan

Japanese

Kazakhstan

Russian

Malaysia

English

New Zealand

English

Philippines

English

Singapore

English

South Korea

Korean

Sri Lanka

English

Taiwan (Chinese Taipei)

Chinese - Traditional

Thailand

English

Vietnam

English

Buzzword demystifer: Industry 4.0 cyber security

ABB Review | 01/2025 | 2025-05-05

Industry 4.0 is revolutionizing industries through automation, artificial intelligence (AI) and big data. Optimized efficiency, reduced downtime via predictive maintenance and enhanced decision-making using real-time data are just some of the benefits that allow Industry 4.0 to drive cost savings, innovation, agility and, ultimately, competitiveness.

Sourav Kunal, ABB Pulp and Paper, Dundalk, Ireland, sourav.kunal@ie.abb.com

The intelligent embedded operational technology (OT) and industrial control systems (ICSs) that are central to the success of Industry 4.0 are generally connected to the cloud. As such, these devices face potential cyber threats, including malware, ransomware, data breaches and denial-of-service (DoS) attacks. To combat these threats, industries must implement strong cyber security measures such as encryption, multifactor authentication, network segmentation and regular software updates.

However, a remaining challenge faced by the vastly increased threat surface presented by OT and ICSs is how to attain real-time observability of these remote fleet of devices in terms of performance patterns, behavior anomalies and events. In short, there is a need for real-time intrusion detection on these resource-constrained embedded devices.

Look but do not touch

ABB’s proposed solution is based on an Extended Berkely Packet Filter (eBPF) approach. eBPF is a well-established technology that makes it possible to run special programs deep inside the Linux operating system in an isolated way. Technology makes the Linux kernel programmable without writing a single line of low-level kernel code. An application programming interface (API) allows eBPF to hook into the Linux kernel and listen to all types of system calls there. eBPF comes compiled with Linux kernels version 4.10 onwards, so it requires no extra installation.

An eBPF agent can be created that carries custom signatures and detects various types of attacks or anomalies on ICS protocols such as Modbus, DNP, MMS, etc. For example:

  • Removable storage media mounted on the target
  • FTP/Telnet logins
  • Sensitive file modifications
  • Rogue process creation on the target
  • Processes with high CPU loading
  • Kernel-level attacks, such as privilege escalation through kernel module loading.

Events are reported to either a remote cloud operations team or local operator workstation. Critically, the agent watches for security events happening on devices in real time.

The agent can also be used to push detection signatures for a zero-day attack without rebooting the device. Further, deep packet inspection capabilities can be used to analyze incoming and outgoing traffic on the device.

 

Open-source and close scrutiny

ABB’s eBPF approach to cyber security provides continuous, inbuilt security event monitoring and anomaly detection. Based on threat intelligence, new detection signatures for zero-day vulnerabilities and newly disclosed weaknesses can be pushed to the on-field OT devices with zero downtime, thus reducing the interval between patch release and implementation.

The agent uses available eBPF technology and open-source tools, minimizing costs and, with the appropriate kernel version, can support legacy systems.

Advanced testing is underway, and it is hoped that this eBPF approach to cyber security that provides continuous cyber security monitoring and anomaly detection will soon be in use in the field.

 

Explore ABB Review