  {"id":34679,"date":"2018-11-13T18:19:16","date_gmt":"2018-11-13T23:19:16","guid":{"rendered":"https:\/\/digital.hbs.edu\/platform-rctom\/submission\/general-electric-and-nozomi-networks-defending-industrial-control-systems-using-machine-learning\/"},"modified":"2018-11-13T18:19:16","modified_gmt":"2018-11-13T23:19:16","slug":"general-electric-and-nozomi-networks-defending-industrial-control-systems-using-machine-learning","status":"publish","type":"hck-submission","link":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/general-electric-and-nozomi-networks-defending-industrial-control-systems-using-machine-learning\/","title":{"rendered":"General Electric and Nozomi Networks: Defending Industrial Control Systems using Machine Learning"},"content":{"rendered":"<p><strong><em>Introduction<\/em><\/strong><\/p>\n<p>General Electric Company is a conglomerate that operates in various energy and industrial segments that rely heavily on industrial control systems (ICS).\u00a0 Machine learning has become a pivotal element in protecting these systems against cyber-attacks.\u00a0 Attacks have targeted various functions of these energy and industrial companies operating on the SCADA (supervisory control and data acquisition) system.<a href=\"#_edn1\" name=\"_ednref1\">[1]<\/a>\u00a0 SCADA systems have been the target of probing attacks conducted by terrorist groups and nation states.\u00a0 According to an independent survey conducted by Business Advantage, approximately 54% of companies have experienced an ICS security incident in the past 12 months.<a href=\"#_edn2\" name=\"_ednref2\">[2]<\/a> The presence of these attacks highlights the rapidly growing market for ICS cybersecurity for vulnerable public infrastructure.\u00a0 As a result, General Electric has partnered with Nozomi Networks, a company well known for its cybersecurity and artificial intelligence capabilities.\u00a0 Together, they are aiming to leverage the megatrend of machine learning in order to protect the energy and industrial sector.<a href=\"#_edn3\" name=\"_ednref3\">[3]<\/a><\/p>\n<p><strong><em>Partnership for Secure Systems<\/em><\/strong><\/p>\n<p>General Electric\u2019s partnership with Nozomi Networks uses the proprietary SCADAguardian platform in order to protect ICS from various cyberattacks.\u00a0 SCADAguardian leverages both artificial intelligence and machine learning in order to protect the control system components.<a href=\"#_edn4\" name=\"_ednref4\">[4]<\/a>\u00a0 The system is designed to assist subsidiaries of GE to monitor their physical and digital infrastructure using large amounts of data that have established operating baselines.\u00a0 The overarching goal is to align the system with the company\u2019s desire to optimize the \u201cefficiency, security, and reliability\u201d of industrial systems<a href=\"#_edn5\" name=\"_ednref5\">[5]<\/a>\u00a0 SCADAguardian operates in concert with GE\u2019s Predix, which is a system that supports infrastructure and operations.<a href=\"#_edn6\" name=\"_ednref6\">[6]<\/a>\u00a0 The Predix system in concert with SCADAguardian provides key indicators to investigate causes of equipment malfunction or degradation.<\/p>\n<p><strong><em>Current and Near Future Applications<\/em><\/strong><\/p>\n<p>This data collected by both GE\u2019s Predix system and SCADAguardian are quintessential examples of using machine learning to optimize performance.\u00a0 In the short term, General Electric has partnered with Naomi Networks to implement SCADAguard to assist with multiple levels of security.<a href=\"#_edn7\" name=\"_ednref7\">[7]<\/a>\u00a0 This includes security for endpoint devices and data stored in the cloud in concert with a Central Management Console (CMC), which centralizes the aggregated data.<a href=\"#_edn8\" name=\"_ednref8\">[8]<\/a>\u00a0 Machine learning is critical throughout these functions to complete risk assessment, threat identification, prevention, and response.<\/p>\n<p>In the medium term, there are two primary areas where General Electric is weighing their investment in machine learning.\u00a0 The first is standardizing the defense of all plants and SCADA systems.<a href=\"#_edn9\" name=\"_ednref9\">[9]<\/a>\u00a0 The second is aggregating the data of SCADA systems into a defensible network with the appropriate firewalls in place. Once all of the plants are online, they are using machine learning techniques to optimize their defense against cyber-attacks.<\/p>\n<p><strong><em>Recommendations<\/em><\/strong><\/p>\n<p>In the short term, GE should continue to hire cybersecurity professionals for upgrades and training.\u00a0 With its wide expanse of geographic and networked subsidiaries, GE has the potential to be a significant target.\u00a0 Not only could cyberattacks on SCADA systems threaten brand image, but also endanger the lives of employees operating the machinery.<a href=\"#_edn10\" name=\"_ednref10\">[10]<\/a>\u00a0 While specific company data is often held confidential, on average, ICS attacks resulted in $497,097 of costs for targeted large companies in 2017 (500+ employees).<a href=\"#_edn11\" name=\"_ednref11\">[11]<\/a><\/p>\n<p>Over the next decade, GE should partner with entities in the U.S. government in order to counter the wider range of threats.\u00a0 The Department of Energy created an office of Cybersecurity, Energy Security, and Emergency Response (CESER) to assist with mitigation techniques.<a href=\"#_edn12\" name=\"_ednref12\">[12]<\/a>\u00a0 Still, there is a gap between mitigation techniques sponsored by the DOE and companies\u2019 willingness to report incident data.\u00a0 Since threats range from spear phishing to Advanced Persistent Threats (APTs), where a wide span of responses is required, requiring additional funding and resources.<a href=\"#_edn13\" name=\"_ednref13\">[13]<\/a> General Electric should join in partnership with CESER in order to consolidate corporate data with classified data and improve the quality of their data analysis.<\/p>\n<p><strong><em>Conclusion<\/em><\/strong><\/p>\n<p>Machine learning has improved General Electric\u2019s ability to face a complex threat on SCADA systems by leveraging SCADAguardian.\u00a0 In this specific case, a large conglomerate invested capital in a cybersecurity company in order to tailor products.\u00a0 A few questions remain \u2013 should other large companies follow a similar model and partner with outside organizations?\u00a0 Would it be more beneficial to grow machine learning techniques in the cybersecurity realm internally?\u00a0 Are there any cases where companies should develop solely internal tools for securing their ICS?<\/p>\n<p>&nbsp;<\/p>\n<p>(Word Count: 717)<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"#_ednref1\" name=\"_edn1\"><\/a>[1] General Electric Digital, \u201cCyber Security and Data Governance,\u201d Accessed on November 10, 2018, https:\/\/www.ge.com\/digital\/applications\/cyber-security.<\/p>\n<p><a href=\"#_ednref2\" name=\"_edn2\"><\/a>[2] Kaspersky Labs, \u201cThe State of Industrial Cybersecurity 2017,\u201d <u>Business Advantage,<\/u> 2017, https:\/\/go.kaspersky.com\/rs\/802-IJN-240\/images\/ICS WHITE PAPER.pdf.<\/p>\n<p><a href=\"#_ednref3\" name=\"_edn3\"><\/a>[3] Mary Ryan, \u201cInvenergy Future Fund Leads $15 Million Investment in Industrial Cybersecurity Leader Nozomi Networks,\u201d January 10, 2018, https:\/\/invenergyllc.com\/news\/invenergy-future-fund-leads-15-million-investment-in-industrial-cybersecurity-leader-nozomi-networks.<\/p>\n<p><a href=\"#_ednref4\" name=\"_edn4\"><\/a>[4] Aaron Hand, \u201cPartnership Combines Cybersecurity With Predictive Maintenance,\u201d August 24, 2018, https:\/\/www.automationworld.com\/article\/technologies\/security\/partnership-combines-cybersecurity-predictive-maintenance.<\/p>\n<p><a href=\"#_ednref5\" name=\"_edn5\"><\/a>[5] Rebecca Slayton, &#8220;Efficient, Secure Green: Digital Utopianism and the Challenge of Making the Electrical Grid \u2018Smart\u2019&#8221; Information &amp; Culture 48, no. 4 (2013): 448-78. http:\/\/www.jstor.org.ezp-prod1.hul.harvard.edu\/stable\/43737372.<\/p>\n<p><a href=\"#_ednref6\" name=\"_edn6\"><\/a>[6] General Electric, \u201cPredix HMI\/SCADA,\u201d Accessed on November 10, 2018,\u00a0 https:\/\/www.ge.com\/digital\/applications\/hmi-scada.scada<\/p>\n<p><a href=\"#_ednref7\" name=\"_edn7\"><\/a>[7] Nozomi Networks, \u201cGE Power and Nozomi Networks to Enhance Cyber Security for Energy and Industrial Operators Worldwide,\u201d October 4, 2018, https:\/\/www.nozominetworks.com\/2018\/10\/04\/press-release\/ge-and-nozomi-networks-to-enhance-cyber-security-for-energy-and-industrial-operators-worldwide\/.<\/p>\n<p><a href=\"#_ednref8\" name=\"_edn8\"><\/a>[8] Nozomi Networks, \u201cData Sheet SCADAguardian,\u201d Nozomi Networks, 2018, https:\/\/www.nozominetworks.com.<\/p>\n<p><a href=\"#_ednref9\" name=\"_edn9\"><\/a>[9] Nozomi Networks, \u201cGE Power and Nozomi Networks.\u201d<\/p>\n<p><a href=\"#_ednref10\" name=\"_edn10\"><\/a>[10] Dong-Joo Kang, Hak-Man Kim, &#8220;Development of test-bed and security devices for SCADA communication in electric power system&#8221;, Telecommunications Energy Conference 2009. INTELEC 2009. 31st International, pp. 1-5, 2009.<\/p>\n<p><a href=\"#_ednref11\" name=\"_edn11\"><\/a>[11] Kaspersky, \u201cThe State of Industrial Cybersecurity 2017.\u201d<\/p>\n<p><a href=\"#_ednref12\" name=\"_edn12\"><\/a>[12] Sonal Patel, \u201cDOE Layes Out How Power Sector Could Win the Cybersecurity Battle,\u201d May 17, 2018, https:\/\/www.powermag.com\/doe-lays-out-how-power-sector-could-win-the-cybersecurity-battle\/.<\/p>\n<p><a href=\"#_ednref13\" name=\"_edn13\"><\/a>[13] Kaspersky, \u201cThe State of Industrial Cybersecurity 2017.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>General Electric has partnered with Nozomi Networks, a company well known for its cybersecurity and artificial intelligence capabilities, to protect the energy and industrial sector.<\/p>\n","protected":false},"author":11922,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","categories":[845,1091,346],"class_list":["post-34679","hck-submission","type-hck-submission","status-publish","hentry","category-cybersecurity","category-general-electric","category-machine-learning","hck-taxonomy-organization-general-electric","hck-taxonomy-industry-industrial-products"],"connected_submission_link":"https:\/\/d3.harvard.edu\/platform-rctom\/assignment\/rc-tom-challenge-2018\/","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>General Electric and Nozomi Networks: Defending Industrial Control Systems using Machine Learning - Technology and Operations Management<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/general-electric-and-nozomi-networks-defending-industrial-control-systems-using-machine-learning\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"General Electric and Nozomi Networks: Defending Industrial Control Systems using Machine Learning - Technology and Operations Management\" \/>\n<meta property=\"og:description\" content=\"General Electric has partnered with Nozomi Networks, a company well known for its cybersecurity and artificial intelligence capabilities, to protect the energy and industrial sector.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/general-electric-and-nozomi-networks-defending-industrial-control-systems-using-machine-learning\/\" \/>\n<meta property=\"og:site_name\" content=\"Technology and Operations Management\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/general-electric-and-nozomi-networks-defending-industrial-control-systems-using-machine-learning\\\/\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/general-electric-and-nozomi-networks-defending-industrial-control-systems-using-machine-learning\\\/\",\"name\":\"General Electric and Nozomi Networks: Defending Industrial Control Systems using Machine Learning - Technology and Operations Management\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/#website\"},\"datePublished\":\"2018-11-13T23:19:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/general-electric-and-nozomi-networks-defending-industrial-control-systems-using-machine-learning\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/general-electric-and-nozomi-networks-defending-industrial-control-systems-using-machine-learning\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/general-electric-and-nozomi-networks-defending-industrial-control-systems-using-machine-learning\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Submissions\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"General Electric and Nozomi Networks: Defending Industrial Control Systems using Machine Learning\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/#website\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/\",\"name\":\"Technology and Operations Management\",\"description\":\"MBA Student Perspectives\",\"potentialAction\":[{\"@type\":\"性视界Action\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"General Electric and Nozomi Networks: Defending Industrial Control Systems using Machine Learning - Technology and Operations Management","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/general-electric-and-nozomi-networks-defending-industrial-control-systems-using-machine-learning\/","og_locale":"en_US","og_type":"article","og_title":"General Electric and Nozomi Networks: Defending Industrial Control Systems using Machine Learning - Technology and Operations Management","og_description":"General Electric has partnered with Nozomi Networks, a company well known for its cybersecurity and artificial intelligence capabilities, to protect the energy and industrial sector.","og_url":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/general-electric-and-nozomi-networks-defending-industrial-control-systems-using-machine-learning\/","og_site_name":"Technology and Operations Management","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/general-electric-and-nozomi-networks-defending-industrial-control-systems-using-machine-learning\/","url":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/general-electric-and-nozomi-networks-defending-industrial-control-systems-using-machine-learning\/","name":"General Electric and Nozomi Networks: Defending Industrial Control Systems using Machine Learning - Technology and Operations Management","isPartOf":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/#website"},"datePublished":"2018-11-13T23:19:16+00:00","breadcrumb":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/general-electric-and-nozomi-networks-defending-industrial-control-systems-using-machine-learning\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/d3.harvard.edu\/platform-rctom\/submission\/general-electric-and-nozomi-networks-defending-industrial-control-systems-using-machine-learning\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/general-electric-and-nozomi-networks-defending-industrial-control-systems-using-machine-learning\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/d3.harvard.edu\/platform-rctom\/"},{"@type":"ListItem","position":2,"name":"Submissions","item":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/"},{"@type":"ListItem","position":3,"name":"General Electric and Nozomi Networks: Defending Industrial Control Systems using Machine Learning"}]},{"@type":"WebSite","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/#website","url":"https:\/\/d3.harvard.edu\/platform-rctom\/","name":"Technology and Operations Management","description":"MBA Student Perspectives","potentialAction":[{"@type":"性视界Action","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/d3.harvard.edu\/platform-rctom\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission\/34679","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission"}],"about":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/types\/hck-submission"}],"author":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/users\/11922"}],"replies":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/comments?post=34679"}],"version-history":[{"count":0,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission\/34679\/revisions"}],"wp:attachment":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/media?parent=34679"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/categories?post=34679"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}