<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3-mathml3.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ali="http://www.niso.org/schemas/ali/1.0/" article-type="research-article" dtd-version="1.3" xml:lang="EN">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Comput. Sci.</journal-id>
<journal-title-group>
<journal-title>Frontiers in Computer Science</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Comput. Sci.</abbrev-journal-title>
</journal-title-group>
<issn pub-type="epub">2624-9898</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.3389/fcomp.2026.1751284</article-id>
<article-version article-version-type="Version of Record" vocab="NISO-RP-8-2008"/>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Original Research</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Machine learning-based early incident detection system in a bakery plant&#x2019;s industrial network: a cognitive model for counteracting hybrid threats</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname>Amirkhanova</surname>
<given-names>Gulshat Amanzholovna</given-names>
</name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<uri xlink:href="https://loop.frontiersin.org/people/1865474"/>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; review &#x0026; editing" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-review-editing/">Writing &#x2013; review &#x0026; editing</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="conceptualization" vocab-term-identifier="https://credit.niso.org/contributor-roles/conceptualization/">Conceptualization</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="supervision" vocab-term-identifier="https://credit.niso.org/contributor-roles/supervision/">Supervision</role>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Prokopovych-Tkachenko</surname>
<given-names>Dmytro Ihorovych</given-names>
</name>
<xref ref-type="aff" rid="aff2"><sup>2</sup></xref>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="investigation" vocab-term-identifier="https://credit.niso.org/contributor-roles/investigation/">Investigation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="software" vocab-term-identifier="https://credit.niso.org/contributor-roles/software/">Software</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; original draft" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-original-draft/">Writing &#x2013; original draft</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Data curation" vocab-term-identifier="https://credit.niso.org/contributor-roles/data-curation/">Data curation</role>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Adilzhanova</surname>
<given-names>Saltanat Almykhametovna</given-names>
</name>
<xref ref-type="aff" rid="aff3"><sup>3</sup></xref>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="visualization" vocab-term-identifier="https://credit.niso.org/contributor-roles/visualization/">Visualization</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Formal analysis" vocab-term-identifier="https://credit.niso.org/contributor-roles/formal-analysis/">Formal analysis</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; review &#x0026; editing" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-review-editing/">Writing &#x2013; review &#x0026; editing</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="validation" vocab-term-identifier="https://credit.niso.org/contributor-roles/validation/">Validation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="methodology" vocab-term-identifier="https://credit.niso.org/contributor-roles/methodology/">Methodology</role>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Zubchenko</surname>
<given-names>Nazar</given-names>
</name>
<xref ref-type="aff" rid="aff2"><sup>2</sup></xref>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="validation" vocab-term-identifier="https://credit.niso.org/contributor-roles/validation/">Validation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Project administration" vocab-term-identifier="https://credit.niso.org/contributor-roles/project-administration/">Project administration</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="resources" vocab-term-identifier="https://credit.niso.org/contributor-roles/resources/">Resources</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; original draft" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-original-draft/">Writing &#x2013; original draft</role>
</contrib>
<contrib contrib-type="author" corresp="yes">
<name>
<surname>Bektemir</surname>
<given-names>Liya Erbolkyzy</given-names>
</name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<xref ref-type="corresp" rid="c001"><sup>&#x002A;</sup></xref>
<xref ref-type="author-notes" rid="fn00001"><sup>&#x2020;</sup></xref>
<uri xlink:href="https://loop.frontiersin.org/people/3271794"/>
</contrib>
</contrib-group>
<aff id="aff1"><label>1</label><institution>Department of Artificial Intelligence and Big Data, Faculty of Information Technology, Al-Farabi Kazakh National University</institution>, <city>Almaty</city>, <country country="kz">Kazakhstan</country></aff>
<aff id="aff2"><label>2</label><institution>Department of Cybersecurity and Information Technologies, University of Customs and Finance</institution>, <city>Dnipro</city>, <country country="ua">Ukraine</country></aff>
<aff id="aff3"><label>3</label><institution>Department of Cybersecurity and Cryptology, Faculty of Information Technology, Al-Farabi Kazakh National University</institution>, <city>Almaty</city>, <country country="kz">Kazakhstan</country></aff>
<author-notes>
<corresp id="c001"><label>&#x002A;</label>Correspondence: Liya Erbolkyzy Bektemir, <email xlink:href="mailto:liya15bektemir@gmail.com">liya15bektemir@gmail.com</email></corresp>
<fn fn-type="other" id="fn00001"><label>&#x2020;</label><p>ORCID: Liya Erbolkyzy Bektemir, <uri xlink:href="https://orcid.org/0009-0007-8589-8903">orcid.org/0009-0007-8589-8903</uri></p></fn>
</author-notes>
<pub-date publication-format="electronic" date-type="pub" iso-8601-date="2026-03-02">
<day>02</day>
<month>03</month>
<year>2026</year>
</pub-date>
<pub-date publication-format="electronic" date-type="collection">
<year>2026</year>
</pub-date>
<volume>8</volume>
<elocation-id>1751284</elocation-id>
<history>
<date date-type="received">
<day>27</day>
<month>11</month>
<year>2025</year>
</date>
<date date-type="rev-recd">
<day>05</day>
<month>02</month>
<year>2026</year>
</date>
<date date-type="accepted">
<day>10</day>
<month>02</month>
<year>2026</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#x00A9; 2026 Amirkhanova, Prokopovych-Tkachenko, Adilzhanova, Zubchenko and Bektemir.</copyright-statement>
<copyright-year>2026</copyright-year>
<copyright-holder>Amirkhanova, Prokopovych-Tkachenko, Adilzhanova, Zubchenko and Bektemir</copyright-holder>
<license>
<ali:license_ref start_date="2026-03-02">https://creativecommons.org/licenses/by/4.0/</ali:license_ref>
<license-p>This is an open-access article distributed under the terms of the <ext-link ext-link-type="uri" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution License (CC BY)</ext-link>. The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</license-p>
</license>
</permissions>
<abstract>
<sec>
<title>Introduction</title>
<p>In the context of growing cyber risks to critical industries, including bakery complexes, this paper proposes a cognitive architecture for early incident detection in the operational technology (OT) network.</p>
</sec>
<sec>
<title>Methods</title>
<p>The architecture integrates User and Entity Behavior Analytics (UEBA), a Security Information and Event Management (SIEM) system, and Zero Trust principles, focusing on hybrid threats: from external attacks on industrial controllers, such as programmable logic controllers (PLCs) to internal operator errors. At the analytics layer, two complementary deep learning pipelines are used: a convolutional neural network (CNN) + long short-term memory (LSTM) (CNN + LSTM) model for detecting low-level network patterns (Byte2Image) and an autoencoder (AE) combined with LSTM (AE + LSTM model) for predicting time-series data and identifying anomalies in equipment telemetry. An adaptive threshold decision procedure is introduced for the first time, optimizing both accuracy and computational resources on edge nodes. The architecture complies with the IEC 62443 and ISO/IEC 27019 standards.</p>
</sec>
<sec>
<title>Results and discussion</title>
<p>High performance metrics, specifically Precision, were demonstrated in the bakery plant&#x2019;s digital twin scenarios.</p>
</sec>
</abstract>
<kwd-group>
<kwd>anomaly detection</kwd>
<kwd>CNN-LSTM</kwd>
<kwd>deep learning</kwd>
<kwd>digital twin</kwd>
<kwd>industrial control systems (ICS)</kwd>
<kwd>User and Entity Behavior Analytics (UEBA)</kwd>
<kwd>zero trust</kwd>
</kwd-group>
<funding-group>
<funding-statement>The author(s) declared that financial support was received for this work and/or its publication. This research was funded by the Ministry of Education and Science of the Republic of Kazakhstan grant number BR24992975. &#x201C;Development of a Digital Twin for the Food Industry Enterprise Using Artificial Intelligence and IIoT Technologies.&#x201D;</funding-statement>
</funding-group>
<counts>
<fig-count count="3"/>
<table-count count="4"/>
<equation-count count="12"/>
<ref-count count="27"/>
<page-count count="15"/>
<word-count count="11619"/>
</counts>
<custom-meta-group>
<custom-meta>
<meta-name>section-at-acceptance</meta-name>
<meta-value>Computer Security</meta-value>
</custom-meta>
</custom-meta-group>
</article-meta>
</front>
<body>
<sec sec-type="intro" id="sec1">
<label>1</label>
<title>Introduction</title>
<p>Industrial enterprises in the food sector, particularly bakery plants, are classified as critical infrastructure, where the stability of technological processes directly impacts food safety, economic efficiency, and supply chain continuity. Any disruption to the operation of conveyors, ovens, dispensers, or packaging equipment leads to production line halts, spoilage of product batches, and non-compliance with sanitary and technological standards (<xref ref-type="bibr" rid="ref13">Knowles et al., 2015</xref>; <xref ref-type="bibr" rid="ref4">Bhamare et al., 2020</xref>; <xref ref-type="bibr" rid="ref5">Cherdantseva et al., 2016</xref>). Amidst active digitalization and the increasing interconnectedness of production systems, the number of hybrid cyberattacks has significantly increased, combining external network intrusions into industrial controllers, exploitation of supply chain vulnerabilities, and internal risks caused by personnel errors or malicious operator actions.</p>
<p>Deficiencies in the implementation of industrial communication protocols pose a particular threat, including the use of outdated Simple Network Management Protocol (SNMP) versions 1 and 2c, as well as Secure Sockets Layer (SSL)/Transport Layer Security (TLS) protocols in Human-Machine Interfaces (HMI) and software update channels. These vulnerabilities create opportunities for data manipulation, injection of malicious firmware, and compromising the integrity of the production process (<xref ref-type="bibr" rid="ref25">Xie et al., 2021</xref>; <xref ref-type="bibr" rid="ref15">Li et al., 2024</xref>; <xref ref-type="bibr" rid="ref2">Ahmad et al., 2023</xref>).</p>
<p>The regulatory framework of the Republic of Kazakhstan in the field of industrial system cybersecurity is based on ST RK ISO/IEC 27001-2022 and ST RK GOST R 56939-2016 standards, which harmonize international requirements with national regulatory provisions (<xref ref-type="bibr" rid="ref19">Nisar et al., 2022</xref>; <xref ref-type="bibr" rid="ref26">Zhang et al., 2023</xref>). These documents prescribe the establishment of information security management systems, the application of multi-layered defense, and risk-oriented approaches. International standards IEC 62443, ISO/IEC 27019, and the European Union&#x2019;s NIS2 Directive define additional obligations for critical infrastructure entities regarding incident identification and response (<xref ref-type="bibr" rid="ref13">Knowles et al., 2015</xref>; <xref ref-type="bibr" rid="ref22">Tariq et al., 2019</xref>; <xref ref-type="bibr" rid="ref20">Qureshi et al., 2024</xref>).</p>
<p>For enterprises in Kazakhstan, the problem of protecting industrial networks is strategically important due to the implementation of state programs for digital transformation and the development of a secure Industry 4.0 (<xref ref-type="bibr" rid="ref24">Wang et al., 2022</xref>; <xref ref-type="bibr" rid="ref26">Zhang et al., 2023</xref>). Modern practice demands systems capable of comprehensively monitoring network traffic, equipment telemetry, and personnel behavior, ensuring timely threat detection without disrupting the continuity of the production cycle.</p>
<p>Recent scientific studies confirm the effectiveness of machine learning methods in analyzing network and technological data. Deep learning models can identify hidden patterns in telemetry, detect atypical command sequences, and recognize potentially dangerous operator actions (<xref ref-type="bibr" rid="ref3">Anthi et al., 2021</xref>; <xref ref-type="bibr" rid="ref8">Gauthama Raman et al., 2021</xref>; <xref ref-type="bibr" rid="ref14">Kravchik and Shabtai, 2018</xref>; <xref ref-type="bibr" rid="ref23">Tuptuk et al., 2021</xref>; <xref ref-type="bibr" rid="ref11">Inoue et al., 2017</xref>; <xref ref-type="bibr" rid="ref16">Lin et al., 2022</xref>; <xref ref-type="bibr" rid="ref1">Abhishek and Singh, 2023</xref>). The work by <xref ref-type="bibr" rid="ref16">Lin et al. (2022)</xref> showed the effectiveness of adaptive thresholding to reduce false positives, and the study by <xref ref-type="bibr" rid="ref1">Abhishek and Singh (2023)</xref> confirmed the benefits of hybrid architectures combining different types of neural networks. Publications (<xref ref-type="bibr" rid="ref9">Holdbrook et al., 2024</xref>) emphasize the importance of considering the technological cycle context and using digital twins for secure testing of defense systems (<xref ref-type="bibr" rid="ref26">Zhang et al., 2023</xref>; <xref ref-type="bibr" rid="ref10">Homaei et al., 2024</xref>; <xref ref-type="bibr" rid="ref6">Dietz and Pernul, 2020</xref>).</p>
<p>The objective of this research is to develop and experimentally validate a cognitive system for early incident detection in a bakery plant&#x2019;s industrial network, considering the regulatory requirements of the Republic of Kazakhstan and international information security standards. The main task is to create an architecture that integrates the analysis of technological processes, network exchange, and personnel behavior with adaptive adjustment of response thresholds based on system status and available computational resources.</p>
<p>The object of the study is the technological infrastructure of a bakery enterprise, and the subject is the methods of detecting and preventing violations based on event analytics, statistical technological parameters, and operator activity profiles. The work applies methods of statistical analysis, risk modeling, deep learning algorithms for spatio-temporal data, and experimental validation on a digital twin of the production line.</p>
<p>The scientific novelty lies in creating a cognitive architecture for the food industry that combines network and technological indicators with the context of the production cycle, accounts for SSL/TLS and SNMP vulnerabilities, provides adaptive control of the false positive rate, and complies with the requirements of IEC 62443, ISO/IEC 27019, ST RK ISO/IEC 27001-2022, and ST RK GOST R 56939-2016.</p>
<p>The practical significance of the results is expressed in increasing the accuracy and speed of incident detection with limited computational resources on edge nodes. Implementation of the proposed system allows for a reduction in the meantime to respond to 1&#x2013;1.5&#x202F;s, a decrease in the false positive rate to 0.5%, and an increase in the stability of the technological process while adhering to national information security standards (<xref ref-type="bibr" rid="ref19">Nisar et al., 2022</xref>; <xref ref-type="bibr" rid="ref26">Zhang et al., 2023</xref>).</p>
<p>The research includes an introduction, main sections devoted to methods, results, and discussion, as well as a list of literature containing 31 reviewed sources, including regulatory documents of the Republic of Kazakhstan and international standards.</p>
<p>Research Hypothesis. We hypothesize that integrating technological process context (recipes, equipment states) and User and Entity Behavior Analytics (UEBA) into a unified cognitive correlation layer will significantly reduce the False Positive Rate (FPR) compared to isolated deep learning pipelines. Specifically, we posit that the cognitive architecture can distinguish between legitimate operational deviations (e.g., recipe changes) and true hybrid threats, thereby reducing the FPR by at least 20% while maintaining a detection latency compliant with soft real-time requirements (&#x003C;1.5&#x202F;s) suitable for edge deployment.</p>
</sec>
<sec sec-type="methods" id="sec2">
<label>2</label>
<title>Methods</title>
<p>In conditions of high complexity and interconnectedness of bakery production processes, methods of system data analysis that allow for the combination of equipment telemetry, network logs, and operator behavioral characteristics into a single cognitive model are of particular importance. The purpose of this section is to describe the methodological foundations underlying the proposed architecture for early incident detection in the bakery plant&#x2019;s industrial network.</p>
<p>The initial development principles comply with the regulatory requirements of the Republic of Kazakhstan established in the standards ST RK ISO/IEC 27001-2022 and ST RK GOST R 56939-2016, as well as the international documents IEC 62443 and ISO/IEC 27019, which regulate the protection of industrial control systems (<xref ref-type="bibr" rid="ref13">Knowles et al., 2015</xref>; <xref ref-type="bibr" rid="ref22">Tariq et al., 2019</xref>; <xref ref-type="bibr" rid="ref19">Nisar et al., 2022</xref>; <xref ref-type="bibr" rid="ref26">Zhang et al., 2023</xref>; <xref ref-type="bibr" rid="ref20">Qureshi et al., 2024</xref>). According to these provisions, the system must ensure comprehensive risk management, communication channel protection, trusted zone control, and early warning of process integrity violations.</p>
<p>The research methodology is based on the principles of cognitive analysis, which integrates elements of machine learning, probabilistic modeling, and event correlation. The system architecture includes three interconnected layers: data collection and normalization, analytical processing, and cognitive correlation. The first layer ensures the integration of telemetry streams and event logs, the second implements analysis and prediction algorithms, and the third links the results to the context of the production cycle, considering shift schedules, recipes, and technological maps.</p>
<p>For network activity analysis, byte stream data is converted into a matrix representation (the Byte2Image method), which allows the use of Convolutional Neural Networks (CNN) to identify patterns in packet structure (<xref ref-type="bibr" rid="ref3">Anthi et al., 2021</xref>; <xref ref-type="bibr" rid="ref14">Kravchik and Shabtai, 2018</xref>). For the analysis of technological parameters, such as temperature, humidity, and drive load, a combination of an Autoencoder (AE) and a Recurrent Neural Network (RNN) is applied, capable of predicting normal behavior and fixing deviations (<xref ref-type="bibr" rid="ref8">Gauthama Raman et al., 2021</xref>; <xref ref-type="bibr" rid="ref9">Holdbrook et al., 2024</xref>).</p>
<p>An important element is the probabilistic risk assessment model, which formalizes the dependence between event intensity, their priority, and the current state of assets. Incident detection occurs when the integrated risk exceeds an adaptive threshold, calculated taking into account the acceptable level of false alarms and the computational resource constraints of edge nodes (<xref ref-type="bibr" rid="ref3">Anthi et al., 2021</xref>; <xref ref-type="bibr" rid="ref12">Kantharaju et al., 2024</xref>).</p>
<p>To enhance the reliability of decisions, an adaptive threshold optimization method is used, which automatically adjusts based on the current event dynamics and user behavior profiles. This approach allows the false positive rate to be maintained below 1 % while preserving high system sensitivity to new types of attacks.</p>
<p>Vulnerabilities in SSL/TLS and SNMP protocols, frequently found in industrial equipment, especially in the context of firmware updates, inter-plant Virtual Private Networks (VPNs), and monitoring systems, were considered in the architecture design. These risks are reflected in the threat models and included in the training scenarios, ensuring the system&#x2019;s resilience to attempts at data manipulation and attacks on trusted channels (<xref ref-type="bibr" rid="ref25">Xie et al., 2021</xref>; <xref ref-type="bibr" rid="ref15">Li et al., 2024</xref>; <xref ref-type="bibr" rid="ref2">Ahmad et al., 2023</xref>).</p>
<p>The proposed methods are integrated with existing monitoring and response tools, which allows for the implementation of a continuous security control concept in accordance with the principles of Zero Trust and the requirements of the national standards of the Republic of Kazakhstan. Thus, the developed methodology ensures the unity of approaches to data collection, analysis, and interpretation, creating the foundation for a cognitive architecture of industrial cybersecurity.</p>
<sec id="sec3">
<label>2.1</label>
<title>Cognitive architecture and data flow</title>
<p>The proposed architecture consists of three layers:</p>
<p>Collection and Normalization Layer: Port mirroring on technological segment switches, agents in the Demilitarized Zone (DMZ), telemetry streams from programmable logic controllers (PLC), Supervisory Control and Data Acquisition (SCADA) and technological sensors; decoding of industrial protocols [e.g., Modbus Transmission Control Protocol (Modbus/TCP), OPC Unified Architecture(OPC UA)], normalization into a SIEM event scheme (<xref ref-type="bibr" rid="ref13">Knowles et al., 2015</xref>; <xref ref-type="bibr" rid="ref17">Mugarza et al., 2020</xref>).</p>
<p><italic>Analytics layer</italic>: two pipelines&#x2014;network (Byte2Image&#x202F;&#x2192;&#x202F;CNN&#x202F;+&#x202F;LSTM) and Technological (AE&#x202F;+&#x202F;LSTM). The first identifies low-level traffic anomalies; the second predicts physico-technological values (oven temperature, conveyor speed, dough moisture, drive currents), as well as operator activity profiles (HMI commands, shift patterns).</p>
<p><italic>Cognitive correlation layer</italic>: SIEM rules and graph dependencies, UEBA profiles, knowledge of the technological process calendar (recipes, batches, shifts), Zero Trust access policy (micro-segmentation, device verification), and external Indicators of Compromise (IoC) sources (<xref ref-type="bibr" rid="ref22">Tariq et al., 2019</xref>; <xref ref-type="bibr" rid="ref27">Zhao et al., 2022</xref>; <xref ref-type="bibr" rid="ref10">Homaei et al., 2024</xref>).</p>
<p>To ensure conceptual consistency and address the complexity of hybrid threats, the proposed system is structured into three distinct hierarchical levels.</p>
<p>First, Level 0 (Base Pipelines) consists of independent deep learning modules: the network pipeline (Byte2Image-CNN&#x202F;+&#x202F;LSTM) and the technological pipeline (AE&#x202F;+&#x202F;LSTM). These models perform primary feature extraction and provide raw anomaly scores from heterogeneous data sources.</p>
<p>Second, Level 1 (Hybrid Fusion) integrates the outputs from Level 0 using a weighted scoring mechanism. This level is designed to correlate network-layer incidents with physical process deviations.</p>
<p>Finally, Level 2 (Full Cognitive Model) represents the highest level of integration. At this stage, the system incorporates Security Information and Event Management (SIEM) correlation rules and User and Entity Behavior Analytics (UEBA). Level 2 filters the fused scores through the lens of industrial context&#x2014;such as bakery production shifts, specific recipes, and Zero Trust access policies&#x2014;to refine detection accuracy and minimize false positives. This hierarchical structure is empirically validated in Section 3, where Level 1 performance is compared in <xref ref-type="table" rid="tab1">Table 1</xref>, and the contribution of Level 2 components is verified through an ablation study in <xref ref-type="table" rid="tab2">Table 2</xref>.</p>
<table-wrap position="float" id="tab1">
<label>Table 1</label>
<caption>
<p>Comparison of incident detection quality for different models.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Parameter</th>
<th align="left" valign="top">CNN-LSTM (network pipeline)</th>
<th align="left" valign="top">AE-LSTM (technological pipeline)</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="top">Input shape</td>
<td align="left" valign="top">(32, 32, 1) Grayscale image</td>
<td align="left" valign="top">(<italic>T</italic>&#x202F;=&#x202F;30, <italic>F</italic>&#x202F;=&#x202F;14) time-steps/features</td>
</tr>
<tr>
<td align="left" valign="top">Optimizer</td>
<td align="left" valign="top">Adam (beta1&#x202F;=&#x202F;0.9, beta2&#x202F;=&#x202F;0.999)</td>
<td align="left" valign="top">RMSprop</td>
</tr>
<tr>
<td align="left" valign="top">Learning rate</td>
<td align="left" valign="top">0.001 (decay 1e-6)</td>
<td align="left" valign="top">0.0005</td>
</tr>
<tr>
<td align="left" valign="top">Batch size</td>
<td align="left" valign="top">64</td>
<td align="left" valign="top">32</td>
</tr>
<tr>
<td align="left" valign="top">CNN layers</td>
<td align="left" valign="top">2&#x00D7; Conv2D (32, 64 filters, 3&#x202F;&#x00D7;&#x202F;3)</td>
<td align="left" valign="top">N/A</td>
</tr>
<tr>
<td align="left" valign="top">LSTM units</td>
<td align="left" valign="top">128&#x202F;units</td>
<td align="left" valign="top">Encoder: 64, decoder: 64</td>
</tr>
<tr>
<td align="left" valign="top">Dropout rate</td>
<td align="left" valign="top">0.5</td>
<td align="left" valign="top">0.2</td>
</tr>
<tr>
<td align="left" valign="top">Loss function</td>
<td align="left" valign="top">Categorical cross-entropy (focal loss)</td>
<td align="left" valign="top">Mean squared error (MSE)</td>
</tr>
<tr>
<td align="left" valign="top">Activation</td>
<td align="left" valign="top">ReLU (hidden), Softmax (output)</td>
<td align="left" valign="top">Tanh (LSTM), linear (output)</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<p><xref ref-type="table" rid="tab1">Table 1</xref> summarizes the comparative results of four analytical models for industrial incident detection: a baseline gradient boosting model using handcrafted features; a CNN + LSTM model employing the Byte2Image method for spatio-temporal network traffic analysis; an AE + LSTM model focused on predicting process variables and operator behavior; and a hybrid fusion model integrating scoring outputs from the previous pipelines with cognitive event-correlation rules. The fusion model achieved the best results, with Precision &#x003E;0.94, Recall &#x003E;0.91, and an average reaction time under 1.2&#x202F;s, demonstrating synergy between network- and process-level analytics.</p>
</table-wrap-foot>
</table-wrap>
<table-wrap position="float" id="tab2">
<label>Table 2</label>
<caption>
<p>Ablation analysis of hybrid model component contribution.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Model</th>
<th align="center" valign="top">Precision</th>
<th align="center" valign="top">Recall</th>
<th align="center" valign="top">F1-score</th>
<th align="center" valign="top">AUC</th>
<th align="center" valign="top">Avg. reaction time (s)</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="top">Gradient boosting (base)</td>
<td align="center" valign="top">0.88</td>
<td align="center" valign="top">0.84</td>
<td align="center" valign="top">0.86</td>
<td align="center" valign="top">0.92</td>
<td align="center" valign="top">2.7</td>
</tr>
<tr>
<td align="left" valign="top">CNN&#x202F;+&#x202F;LSTM (Byte2Image)</td>
<td align="center" valign="top">0.94</td>
<td align="center" valign="top">0.90</td>
<td align="center" valign="top">0.92</td>
<td align="center" valign="top">0.97</td>
<td align="center" valign="top">1.4</td>
</tr>
<tr>
<td align="left" valign="top">AE&#x202F;+&#x202F;LSTM (Technological)</td>
<td align="center" valign="top">0.93</td>
<td align="center" valign="top">0.91</td>
<td align="center" valign="top">0.92</td>
<td align="center" valign="top">0.96</td>
<td align="center" valign="top">1.6</td>
</tr>
<tr>
<td align="left" valign="top">Fusion model (cognitive integration)</td>
<td align="center" valign="top">0.96</td>
<td align="center" valign="top">0.93</td>
<td align="center" valign="top">0.95</td>
<td align="center" valign="top">0.98</td>
<td align="center" valign="top">1.2</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<p>Results of the ablation study demonstrating the incremental performance improvement of the hybrid model as components are integrated. The inclusion of the correlation mechanism and operational profiles in the full cognitive model yields the best overall metrics: an F1-score of 0.95, a reduced False Positive Rate (FPR) of 0.49%, and an improved average reaction time of 1.2&#x202F;s.</p>
</table-wrap-foot>
</table-wrap>
</sec>
<sec id="sec4">
<label>2.2</label>
<title>Cognitive architecture for early incident detection in a bakery industrial network</title>
<p>Bakery enterprises are classified as critical infrastructure, where the stability of the technological cycle&#x2014;from dough mixing to finished product packaging&#x2014;directly affects quality, safety, and economic resilience. Any failures in the operation of ovens, conveyors, dispensers, or proofing systems lead to batch spoilage, line stoppage, and violation of sanitary standards.</p>
<p>From a food safety perspective, the alignment with ISO 22000 and HACCP (Hazard Analysis and Critical Control Points) principles is critical. A cyber-physical attack targeting the operational technology (OT) layer can have direct biological consequences. For instance, an unauthorized modification of a Modbus Holding Register controlling the oven temperature (e.g., reducing the baking zone temperature by 10 &#x00B0;C) may not trigger a standard IT security alert but results in the &#x201C;Underbaking&#x201D; critical control point failure. This permits the survival of pathogens (e.g., <italic>Salmonella</italic> spp. or <italic>Bacillus cereus</italic>) in the final product. Therefore, the detection system must treat specific PLC register manipulations not merely as network anomalies but as direct violations of food safety limits.</p>
<p>To enhance the reliability and security of such production facilities, a cognitive architecture for early incident detection has been developed. It combines machine learning methods, behavioral analytics for users and equipment, and the principles of the Zero Trust architecture. The system is focused on preventing hybrid cyber threats&#x2014;a combination of external attacks on PLC/SCADA controllers and internal risks caused by personnel errors, procedure violations, or the introduction of malicious code.</p>
<p>The architecture is built on three interconnected layers&#x2014;data collection and normalization, analytics, and cognitive correlation. Interaction between them occurs through forward and feedback loops, ensuring a closed loop of adaptive protection capable of learning from its own data and increasing detection accuracy.</p>
<p><xref ref-type="fig" rid="fig1">Figure 1</xref> presents the general cognitive architecture of the early incident detection system. The Collection and Normalization Layer is responsible for receiving and pre-processing data from the industrial equipment of the bakery plant. This utilizes port mirroring on switches, agents in the DMZ, telemetry streams from PLC and SCADA, as well as signals from technological sensors. At this stage, data from Modbus/TCP and OPC UA protocols are converted into a unified SIEM event format. This creates a single representation of the information space upon which analytics are built.</p>
<fig position="float" id="fig1">
<label>Figure 1</label>
<caption>
<p>Cognitive architecture for early incident detection in industrial bakery networks. Three-layer system showing data collection and normalization (port mirroring, PLC/SCADA telemetry, sensors), analytics with Byte2Image CNN&#x202F;+&#x202F;LSTM and AE&#x202F;+&#x202F;LSTM pipelines, and cognitive correlation using SIEM, UEBA, and Zero Trust for adaptive risk management. Diagram illustrating data collection, analytics, and correlation layers for industrial cybersecurity.</p>
</caption>
<graphic xlink:href="fcomp-08-1751284-g001.tif" mimetype="image" mime-subtype="tiff">
<alt-text content-type="machine-generated">Flowchart illustrating a cognitive architecture for early incident detection with three main layers: Collection and Normalization Layer, Analytics Layer, and Cognitive Correlation Layer, each listing key functions and interconnections for processing event streams, telemetry, and logs.</alt-text>
</graphic>
</fig>
<p>The Analytics Layer processes incoming data using two parallel pipelines. The Network Pipeline (Byte2Image CNN&#x202F;+&#x202F;LSTM) converts traffic into visual representations and identifies hidden anomalies in network exchange. The Technological Pipeline (AE&#x202F;+&#x202F;LSTM) analyzes production process parameters&#x2014;oven temperature, dough moisture, drive currents, conveyor speed&#x2014;and predicts normal operating modes. The joint use of these pipelines allows for real-time fixation of deviations in equipment operation and operator actions.</p>
<p>The Cognitive Correlation Layer unifies the results of the neural network models with the context of the production cycle. Here, SIEM rules and dependencies, UEBA behavioral profiles, and Zero Trust mechanisms&#x2014;network micro-segmentation, device verification, and access control&#x2014;are active. This layer utilizes knowledge about recipes, shifts, batches, as well as external Indicators of Compromise (IoC). It evaluates the aggregate risk and, if necessary, automatically adjusts the response thresholds of the analytical models, returning feedback signals to the previous levels.</p>
<p>Orthogonal feedback loops ensure the architecture&#x2019;s adaptation: the cognitive layer can change analytics parameters and data collection filters, restricting streams from suspicious sources, updating trusted zones, and increasing detection accuracy.</p>
<p>This architecture implements the principle of intelligent self-regulation&#x2014;from observation to analysis and action. The system is capable of not only detecting incidents but also predicting their emergence, maintaining continuous control over the bakery plant&#x2019;s technological network.</p>
<p>The video below explains the core concepts of the IEC 62443 standard, which the proposed architecture complies with for industrial cybersecurity.</p>
</sec>
<sec id="sec5">
<label>2.3</label>
<title>Probabilistic risk model and detection criterion</title>
<p>The implementation of a probabilistic risk-indicator is necessitated by the stochastic nature of cyber-physical threats in food production, where binary detection is often insufficient for nuanced decision-making. This approach allows for the quantification of incident intensity over time, providing a mathematical basis for automated response that accounts for uncertainty. This modeling is grounded in the Neyman&#x2013;Pearson criterion for optimal statistical decision theory, ensuring a formal balance between detection sensitivity and a fixed false positive rate (<xref ref-type="bibr" rid="ref18">Neyman and Pearson, 1933</xref>; <xref ref-type="bibr" rid="ref001">Basseville and Nikiforov, 1993</xref>). Such risk-oriented frameworks are essential for maintaining process continuity in ICS environments under conditions of incomplete data (<xref ref-type="bibr" rid="ref11">Inoue et al., 2017</xref>; <xref ref-type="bibr" rid="ref23">Tuptuk et al., 2021</xref>).</p>
<p>Let <inline-formula>
<mml:math id="M1">
<mml:mi>&#x03BB;</mml:mi>
<mml:mo stretchy="true">(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>&#x2223;</mml:mo>
<mml:msub>
<mml:mi>&#x2131;</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
<mml:mo stretchy="true">)</mml:mo>
</mml:math>
</inline-formula>&#x2014;be the incident intensity driven by the observed filtering <inline-formula>
<mml:math id="M2">
<mml:mi mathvariant="italic">&#x2131;t</mml:mi>
</mml:math>
</inline-formula> (logs, telemetry, behavioral features). The probability of at least one incident occurring over the horizon <inline-formula>
<mml:math id="M3">
<mml:mi>H</mml:mi>
</mml:math>
</inline-formula> is given by <xref ref-type="disp-formula" rid="E1">Equation (1)</xref>:<disp-formula id="E1">
<mml:math id="M4">
<mml:mi>&#x2119;</mml:mi>
<mml:mo>&#x2203;</mml:mo>
<mml:mo>,</mml:mo>
<mml:mtext>incident</mml:mtext>
<mml:mo stretchy="true">[</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>+</mml:mo>
<mml:mi>H</mml:mi>
<mml:mo stretchy="true">]</mml:mo>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mo>exp</mml:mo>
<mml:mo>!</mml:mo>
<mml:mo stretchy="true">(</mml:mo>
<mml:mo>&#x2212;</mml:mo>
<mml:mo>!</mml:mo>
<mml:mo>&#x222B;</mml:mo>
<mml:mo>!</mml:mo>
<mml:msup>
<mml:mi>t</mml:mi>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>+</mml:mo>
<mml:mi>H</mml:mi>
</mml:mrow>
</mml:msup>
<mml:mo>!</mml:mo>
<mml:mi>&#x03BB;</mml:mi>
<mml:mo stretchy="true">(</mml:mo>
<mml:mi>&#x03C4;</mml:mi>
<mml:mo>&#x2223;</mml:mo>
<mml:msub>
<mml:mi mathvariant="script">F</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
<mml:mo stretchy="true">)</mml:mo>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="italic">d&#x03C4;</mml:mi>
<mml:mo stretchy="true">)</mml:mo>
</mml:math>
<label>(1)</label>
</disp-formula></p>
<p>In practical implementation<inline-formula>
<mml:math id="M5">
<mml:mspace width="0.25em"/>
<mml:mi>&#x03BB;</mml:mi>
<mml:mo stretchy="true">(</mml:mo>
<mml:mo>&#x00B7;</mml:mo>
<mml:mo stretchy="true">)</mml:mo>
</mml:math>
</inline-formula> is approximated by model outputs and the densities of anomaly scores. An incident is escalated when the integral risk across assets exceeds the threshold <inline-formula>
<mml:math id="M6">
<mml:msub>
<mml:mi>&#x03C4;</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
<mml:mo>:</mml:mo>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
<mml:mo>=</mml:mo>
<mml:munder>
<mml:mo movablelimits="false">&#x2211;</mml:mo>
<mml:mi>a</mml:mi>
</mml:munder>
<mml:msub>
<mml:mi>w</mml:mi>
<mml:mi>a</mml:mi>
</mml:msub>
<mml:mspace width="0.25em"/>
<mml:mi>P</mml:mi>
<mml:mo stretchy="true">(</mml:mo>
<mml:msubsup>
<mml:mi>I</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>a</mml:mi>
</mml:msubsup>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>&#x2223;</mml:mo>
<mml:msub>
<mml:mi>F</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
<mml:mo stretchy="true">)</mml:mo>
</mml:math>
</inline-formula>, decision: <inline-formula>
<mml:math id="M7">
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
</mml:math>
</inline-formula>&#x003E;<inline-formula>
<mml:math id="M8">
<mml:msub>
<mml:mi>&#x03C4;</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
</mml:math>
</inline-formula>. The combined anomaly score<inline-formula>
<mml:math id="M9">
<mml:msub>
<mml:mi>s</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
</mml:math>
</inline-formula> incorporates the autoencoder&#x2019;s reconstruction error, the probability of the &#x201C;normal&#x201D; class from the LSTM, and the entropy dynamics (<xref ref-type="disp-formula" rid="E2">Equation 2</xref>):<disp-formula id="E2">
<mml:math id="M10">
<mml:msub>
<mml:mi>s</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
<mml:mo>=</mml:mo>
<mml:mi>&#x03B1;</mml:mi>
<mml:mo>,</mml:mo>
<mml:mo>&#x2223;</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mover accent="true">
<mml:mi>x</mml:mi>
<mml:mo stretchy="true">&#x0302;</mml:mo>
</mml:mover>
<mml:mi>t</mml:mi>
<mml:mo>&#x2223;</mml:mo>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mo>+</mml:mo>
<mml:mo stretchy="true">(</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x03B1;</mml:mi>
<mml:mo stretchy="true">)</mml:mo>
<mml:mo>,</mml:mo>
<mml:mo stretchy="true">(</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi mathvariant="italic">p&#x03B8;</mml:mi>
<mml:mo stretchy="true">(</mml:mo>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
<mml:mo>=</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo>&#x2223;</mml:mo>
<mml:mi>z</mml:mi>
<mml:mn>1</mml:mn>
<mml:mo>:</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo stretchy="true">)</mml:mo>
<mml:mo stretchy="true">)</mml:mo>
<mml:mo>+</mml:mo>
<mml:mi>&#x03B2;</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x0394;</mml:mi>
<mml:msub>
<mml:mi>H</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
</mml:math>
<label>(2)</label>
</disp-formula></p>
<p>Where <inline-formula>
<mml:math id="M11">
<mml:mi>&#x03B1;</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x03B2;</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:mo stretchy="true">[</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo stretchy="true">]</mml:mo>
<mml:mo>,</mml:mo>
</mml:math>
</inline-formula> <inline-formula>
<mml:math id="M12">
<mml:msub>
<mml:mi>z</mml:mi>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>:</mml:mo>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
</mml:math>
</inline-formula>&#x2014;the features, <inline-formula>
<mml:math id="M13">
<mml:msub>
<mml:mi>H</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
</mml:math>
</inline-formula>&#x2014;is the entropy of the class distribution over the window.</p>
</sec>
<sec id="sec6">
<label>2.4</label>
<title>Adaptive threshold optimization under FPR and resource constraints</title>
<p>To mitigate the &#x201C;alarm fatigue&#x201D; common in industrial monitoring, we formulate the threshold selection as a constrained optimization problem rather than a static value. This is critical for bakery plants where technological cycles (e.g., cooling or fermentation) create natural drifts in baseline data. By minimizing detection latency while respecting strict FPR and computational resource constraints, the system remains viable for deployment on edge gateways with limited processing power (<xref ref-type="bibr" rid="ref3">Anthi et al., 2021</xref>; <xref ref-type="bibr" rid="ref12">Kantharaju et al., 2024</xref>). This optimization follows the dual-multiplier approach for stochastic resource allocation in real-time OT networks (<xref ref-type="bibr" rid="ref23">Tuptuk et al., 2021</xref>; <xref ref-type="bibr" rid="ref11">Inoue et al., 2017</xref>). The problem of choosing the threshold <inline-formula>
<mml:math id="M14">
<mml:msub>
<mml:mi>&#x03C4;</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
</mml:math>
</inline-formula> is formulated as the optimization of the detection latency <inline-formula>
<mml:math id="M15">
<mml:mi>D</mml:mi>
<mml:mo stretchy="true">(</mml:mo>
<mml:mi>&#x03C4;</mml:mi>
<mml:mo stretchy="true">)</mml:mo>
</mml:math>
</inline-formula> subject to constraints on the False Positive Rate (FPR) and the computational budget on edge nodes (<xref ref-type="disp-formula" rid="E3">Equation 3</xref>):<disp-formula id="E3">
<mml:math id="M16">
<mml:munder>
<mml:mo mathvariant="italic">min</mml:mo>
<mml:msub>
<mml:mi>&#x03C4;</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
</mml:munder>
<mml:mo>;</mml:mo>
<mml:mi>E</mml:mi>
<mml:mo stretchy="true">[</mml:mo>
<mml:mi>D</mml:mi>
<mml:mo stretchy="true">(</mml:mo>
<mml:mi>&#x03C4;</mml:mi>
<mml:mo stretchy="true">)</mml:mo>
<mml:mo stretchy="true">]</mml:mo>
<mml:mo>&#x220F;</mml:mo>
<mml:mi mathvariant="italic">pu</mml:mi>
<mml:mspace width="0.25em"/>
<mml:mspace width="0.25em"/>
<mml:mspace width="0.25em"/>
<mml:mi>FPR</mml:mi>
<mml:mo stretchy="true">(</mml:mo>
<mml:msub>
<mml:mi>&#x03C4;</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
<mml:mo stretchy="true">)</mml:mo>
<mml:mo>&#x2264;</mml:mo>
<mml:mi>&#x03B5;</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>C</mml:mi>
<mml:mo stretchy="true">(</mml:mo>
<mml:msub>
<mml:mi>&#x03C4;</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
<mml:mo stretchy="true">)</mml:mo>
<mml:mo>&#x2264;</mml:mo>
<mml:msub>
<mml:mi>C</mml:mi>
<mml:mi>max</mml:mi>
</mml:msub>
</mml:math>
<label>(3)</label>
</disp-formula></p>
<p>The resource constraint C_<sub>max</sub> is defined based on the specifications of typical industrial edge gateways (e.g., NVIDIA Jetson Nano or Raspberry Pi 4-class devices). Specifically, the inference time per sample must not exceed 100&#x202F;ms, and the peak RAM usage for the model must remain below 2&#x202F;GB to allow coexistence with other SCADA processes. The optimization objective is to minimize detection latency <inline-formula>
<mml:math id="M17">
<mml:mi>&#x03C4;</mml:mi>
</mml:math>
</inline-formula> while maintaining FPR (<inline-formula>
<mml:math id="M18">
<mml:mi>&#x03C4;</mml:mi>
</mml:math>
</inline-formula><sub>t</sub>)&#x202F;&#x2264;&#x202F;0.5% within these hardware boundaries.</p>
<p>The solution is approximated by a stochastic gradient method with dual multipliers for the constraints (online readjustment every <inline-formula>
<mml:math id="M20">
<mml:mi mathvariant="italic">&#x0394;T</mml:mi>
</mml:math>
</inline-formula> minutes) (<xref ref-type="bibr" rid="ref3">Anthi et al., 2021</xref>; <xref ref-type="bibr" rid="ref12">Kantharaju et al., 2024</xref>).</p>
</sec>
<sec id="sec7">
<label>2.5</label>
<title>Network pipeline: Byte2Image CNN&#x202F;+&#x202F;LSTM</title>
<p>The Byte2Image transformation is selected to overcome the limitations of traditional deep packet inspection (DPI), which struggles with encrypted or proprietary industrial protocols used in modern PLCs. By visualizing raw traffic as 2D structural patterns, the model leverages the spatial feature extraction capabilities of CNNs to identify malformed frames and reconnaissance activity (<xref ref-type="bibr" rid="ref16">Lin et al., 2022</xref>). The integration of an LSTM layer is further justified by the need to capture temporal dependencies in multi-stage attack scenarios, where malicious intent is revealed through sequences of packets rather than isolated events (<xref ref-type="bibr" rid="ref3">Anthi et al., 2021</xref>; <xref ref-type="bibr" rid="ref1">Abhishek and Singh, 2023</xref>). The Network Pipeline is designed to process heterogeneous traffic by transforming raw packet data into a format suitable for computer vision. To handle network traffic variability, raw PCAP packet payloads are truncated or padded to a fixed length of <italic>L</italic>&#x202F;=&#x202F;1,024 bytes. These bytes are then reshaped into a square matrix of size N&#x202F;&#x00D7;&#x202F;N, where <italic>N</italic>&#x202F;=&#x202F;32. The mapping logic is defined as (<xref ref-type="disp-formula" rid="E4">Equation 4</xref>):</p>
<p>
<disp-formula id="E4">
<mml:math id="M21">
<mml:mi>P</mml:mi>
<mml:mo stretchy="true">(</mml:mo>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
<mml:mo stretchy="true">)</mml:mo>
<mml:mo>=</mml:mo>
<mml:msub>
<mml:mi>B</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mtext>where</mml:mtext>
<mml:mspace width="0.25em"/>
<mml:mi>k</mml:mi>
<mml:mo>=</mml:mo>
<mml:mi>i</mml:mi>
<mml:mspace width="0.35em"/>
<mml:mo>&#x00D7;</mml:mo>
<mml:mi>N</mml:mi>
<mml:mo>+</mml:mo>
<mml:mi>j</mml:mi>
</mml:math>
<label>(4)</label>
</disp-formula>
</p>
<p>Here, <italic>P</italic>(<italic>i</italic>, <italic>j</italic>) represents the pixel intensity at coordinates (<italic>i</italic>, <italic>j</italic>), and <italic>B<sub>k</sub></italic> is the decimal value of the <italic>k</italic>-th byte (ranging from 0 to 255). This results in a 32&#x202F;&#x00D7;&#x202F;32 grayscale image that preserves the spatial correlations and structural patterns of protocol headers (e.g., Modbus function codes or TCP flags) and payloads.</p>
<p>These images are fed into a hybrid CNN-LSTM architecture. The CNN layers perform spatial feature extraction, while the LSTM layer captures temporal dependencies between consecutive packets in a session. To ensure reproducibility, the detailed hyperparameters for both the CNN-LSTM and AE-LSTM models (used in the technological pipeline) are provided in <xref ref-type="table" rid="tab1">Table 1</xref>. To address the class imbalance identified in the dataset (see Section 3.1), we employed the Focal Loss function instead of standard cross-entropy, which forces the model to focus on hard-to-classify attack samples.</p>
<p>Byte sequences of packets/sessions are translated into fixed-dimension images <inline-formula>
<mml:math id="M22">
<mml:mi>N</mml:mi>
<mml:mo>&#x00D7;</mml:mo>
<mml:mi>N</mml:mi>
</mml:math>
</inline-formula> (grayscale or pseudocolor with channel splitting: header/payload/metadata). For the <inline-formula>
<mml:math id="M23">
<mml:mi>k</mml:mi>
</mml:math>
</inline-formula>-th fragment <inline-formula>
<mml:math id="M24">
<mml:msub>
<mml:mi>b</mml:mi>
<mml:mrow>
<mml:mi>k</mml:mi>
<mml:mo>,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>:</mml:mo>
<mml:msup>
<mml:mi>N</mml:mi>
<mml:mn>2</mml:mn>
</mml:msup>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2208;</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo>,</mml:mo>
<mml:mo>&#x22EF;</mml:mo>
<mml:mo>,</mml:mo>
<mml:msup>
<mml:mn>255</mml:mn>
<mml:msup>
<mml:mi>N</mml:mi>
<mml:mn>2</mml:mn>
</mml:msup>
</mml:msup>
</mml:math>
</inline-formula>:</p>
<p><italic>N</italic>&#x202F;&#x00D7;&#x202F;<italic>N</italic> (grayscale or pseudo-color when splitting channels: header/payload/metadata). For the (<italic>k</italic>)-th fragment <inline-formula>
<mml:math id="M25">
<mml:msub>
<mml:mi>b</mml:mi>
<mml:mrow>
<mml:mi>k</mml:mi>
<mml:mo>,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>:</mml:mo>
<mml:msup>
<mml:mi>N</mml:mi>
<mml:mn>2</mml:mn>
</mml:msup>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2208;</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo>,</mml:mo>
<mml:mo>&#x22EF;</mml:mo>
<mml:mo>,</mml:mo>
<mml:msup>
<mml:mn>255</mml:mn>
<mml:msup>
<mml:mi>N</mml:mi>
<mml:mn>2</mml:mn>
</mml:msup>
</mml:msup>
</mml:math>
</inline-formula> (<xref ref-type="disp-formula" rid="E5">Equation 5</xref>):<disp-formula id="E5">
<mml:math id="M26">
<mml:mtable columnalign="left" displaystyle="true">
<mml:mtr>
<mml:mtd>
<mml:msub>
<mml:mi mathvariant="normal">I</mml:mi>
<mml:mi mathvariant="normal">k</mml:mi>
</mml:msub>
<mml:mo>=</mml:mo>
<mml:mtext>reshape</mml:mtext>
<mml:mo stretchy="true">(</mml:mo>
<mml:msub>
<mml:mi mathvariant="normal">b</mml:mi>
<mml:mrow>
<mml:mi mathvariant="normal">k</mml:mi>
<mml:mo>,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>:</mml:mo>
<mml:msup>
<mml:mi mathvariant="normal">N</mml:mi>
<mml:mn>2</mml:mn>
</mml:msup>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="normal">N</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="normal">N</mml:mi>
<mml:mo stretchy="true">)</mml:mo>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:msub>
<mml:mo>=</mml:mo>
<mml:mtext>LSTM</mml:mtext>
<mml:mo>!</mml:mo>
<mml:mo stretchy="true">(</mml:mo>
<mml:msub>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi>&#x03D5;</mml:mi>
</mml:msub>
<mml:mo>!</mml:mo>
<mml:mo stretchy="true">(</mml:mo>
<mml:msub>
<mml:mi mathvariant="normal">I</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:msub>
<mml:mo stretchy="true">)</mml:mo>
<mml:mo stretchy="true">)</mml:mo>
<mml:mo>,</mml:mo>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mover accent="true">
<mml:mi mathvariant="normal">y</mml:mi>
<mml:mo stretchy="true">&#x0302;</mml:mo>
</mml:mover>
<mml:mi mathvariant="normal">t</mml:mi>
<mml:mo>=</mml:mo>
<mml:mi>&#x03C3;</mml:mi>
<mml:mo stretchy="true">(</mml:mo>
<mml:msub>
<mml:mi>Wh</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:msub>
<mml:mo>+</mml:mo>
<mml:mi mathvariant="normal">b</mml:mi>
<mml:mo stretchy="true">)</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:math>
<label>(5)</label>
</disp-formula></p>
<p>Where <inline-formula>
<mml:math id="M27">
<mml:mi mathvariant="italic">g&#x03D5;</mml:mi>
<mml:mo stretchy="true">(</mml:mo>
<mml:mo>&#x00B7;</mml:mo>
<mml:mo stretchy="true">)</mml:mo>
</mml:math>
</inline-formula>&#x2014;is the convolutional feature extractor, and <italic>&#x03C3;</italic>&#x2014;is the logistic function. This approach is robust to traffic polymorphism and adapted to weak labels (weak labels) (<xref ref-type="bibr" rid="ref16">Lin et al., 2022</xref>).</p>
</sec>
<sec id="sec8">
<label>2.6</label>
<title>Technological pipeline: AE&#x202F;+&#x202F;LSTM</title>
<p>In the technological layer, the scarcity of labeled attack signatures for specific bakery equipment necessitates an unsupervised learning paradigm. The Autoencoder (AE) is employed to learn the latent representation of &#x201C;normal&#x201D; physical processes, using reconstruction error as the primary anomaly metric (<xref ref-type="bibr" rid="ref8">Gauthama Raman et al., 2021</xref>). To account for the inherent time-series nature of sensor telemetry (e.g., temperature and dough viscosity), the AE is combined with an LSTM network. This hybrid architecture ensures the detection of both point anomalies and subtle long-term drifts in physical parameters, which is a key requirement for reliable digital twin-based monitoring (<xref ref-type="bibr" rid="ref9">Holdbrook et al., 2024</xref>; <xref ref-type="bibr" rid="ref10">Homaei et al., 2024</xref>). The autoencoder <inline-formula>
<mml:math id="M28">
<mml:mi mathvariant="bold">AE</mml:mi>
<mml:mi>&#x03C8;</mml:mi>
</mml:math>
</inline-formula> reconstructs the observed vector <inline-formula>
<mml:math id="M29">
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
</mml:math>
</inline-formula> (telemetry, commands), the LSTM predicts the next point/distribution, and the joint loss function sets a compromise between reconstruction, regularization, and the metric objective (<xref ref-type="disp-formula" rid="E6">Equation 6</xref>):<disp-formula id="E6">
<mml:math id="M30">
<mml:mi mathvariant="script">L</mml:mi>
<mml:mo stretchy="true">(</mml:mo>
<mml:mi>&#x03B8;</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x03C8;</mml:mi>
<mml:mo stretchy="true">)</mml:mo>
<mml:mo>=</mml:mo>
<mml:mo>&#x2211;</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>=</mml:mo>
<mml:msup>
<mml:mn>1</mml:mn>
<mml:mi>T</mml:mi>
</mml:msup>
<mml:mo stretchy="true">(</mml:mo>
<mml:mtable columnalign="left" displaystyle="true">
<mml:mtr>
<mml:mtd>
<mml:mo>&#x2223;</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mover accent="true">
<mml:mi>x</mml:mi>
<mml:mo stretchy="true">&#x02DC;</mml:mo>
</mml:mover>
<mml:mi>t</mml:mi>
</mml:msub>
<mml:mo>&#x2223;</mml:mo>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mo>+</mml:mo>
<mml:msub>
<mml:mi>&#x03BB;</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mi>KL</mml:mi>
<mml:mo stretchy="true">(</mml:mo>
<mml:mtable columnalign="left">
<mml:mtr>
<mml:mtd>
<mml:mi mathvariant="italic">q&#x03C8;</mml:mi>
<mml:mo stretchy="true">(</mml:mo>
<mml:msub>
<mml:mi>z</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
<mml:mo>&#x2223;</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
<mml:mo stretchy="true">)</mml:mo>
<mml:mo>,</mml:mo>
<mml:mo>&#x2223;</mml:mo>
<mml:mo>,</mml:mo>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mi mathvariant="script">N</mml:mi>
<mml:mo stretchy="true">(</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo>,</mml:mo>
<mml:mi>I</mml:mi>
<mml:mo stretchy="true">)</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable>
<mml:mo stretchy="true">)</mml:mo>
<mml:mo>+</mml:mo>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:msub>
<mml:mi>&#x03BB;</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mi>CE</mml:mi>
<mml:mo stretchy="true">(</mml:mo>
<mml:msub>
<mml:mover accent="true">
<mml:mi>y</mml:mi>
<mml:mo stretchy="true">&#x0302;</mml:mo>
</mml:mover>
<mml:mi>t</mml:mi>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
<mml:mo stretchy="true">)</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable>
<mml:mo stretchy="true">)</mml:mo>
</mml:math>
<label>(6)</label>
</disp-formula></p>
<p>Where cross-entropy loss (CE) is used in the objective. The anomaly signal is the reconstruction error and/or large predictive residuals on the recorded operating modes of furnaces, conveyors, and dispensers (<xref ref-type="bibr" rid="ref8">Gauthama Raman et al., 2021</xref>; <xref ref-type="bibr" rid="ref9">Holdbrook et al., 2024</xref>).</p>
</sec>
<sec id="sec9">
<label>2.7</label>
<title>Accounting for SSL/TLS and SNMP vulnerabilities in firmware and monitoring scenarios</title>
<p>The bakery network often features outdated SSL/TLS implementations (e.g., forced protocol downgrades for backward compatibility) and insecure SNMP v1/v2c configurations (community strings, lack of encryption). These factors are exploited in attacks on equipment firmware update channels, inter-plant VPNs, and monitoring: injection of fake firmware, interception of configurations, and telemetry spoofing (<xref ref-type="bibr" rid="ref25">Xie et al., 2021</xref>; <xref ref-type="bibr" rid="ref15">Li et al., 2024</xref>; <xref ref-type="bibr" rid="ref2">Ahmad et al., 2023</xref>). In our architecture, this is accounted for in asset risk profiles, SIEM rules, and training scenario sets (see &#x201C;Results&#x201D; section).</p>
</sec>
<sec id="sec10">
<label>2.8</label>
<title>Integration with SIEM, UEBA, and zero trust</title>
<p>SIEM accumulates events from network sensors, operating system (OS)/database (DB) logs, SCADA/HMI, VPNs, and authentication infrastructure. UEBA builds trusted profiles of operators and service accounts (shift activity, commands, and deviations from technology maps). Zero Trust ensures microsegmentation, continuous device verification, and the principle of least privilege (at the PLC/SCADA and engineering workstation level) (<xref ref-type="bibr" rid="ref22">Tariq et al., 2019</xref>; <xref ref-type="bibr" rid="ref17">Mugarza et al., 2020</xref>; <xref ref-type="bibr" rid="ref27">Zhao et al., 2022</xref>; <xref ref-type="bibr" rid="ref10">Homaei et al., 2024</xref>). The resulting solution mitigates the risk of covert movements and enhances observability.</p>
</sec>
<sec id="sec11">
<label>2.9</label>
<title>Cognitive layer implementation: SIEM, UEBA, and zero trust policies</title>
<p>To transition from raw anomaly detection to a cognitive security framework, the system implements a decision-making layer based on three functional mechanisms:<list list-type="bullet">
<list-item>
<p><italic>Cross-domain correlation (SIEM-ready logic)</italic>: Unlike standalone detectors, this layer synchronizes events from the network (Level 0) and technological (Level 0) pipelines. A high-priority incident is flagged only when anomalies in both domains occur within a 60-s temporal window, significantly reducing false positives caused by isolated sensor noise or transient network jitter.</p>
</list-item>
<list-item>
<p><italic>Behavioral profiling (UEBA)</italic>: We establish a baseline &#x201C;Standard Operator Profile&#x201D; that monitors command frequency and execution patterns. During critical bakery production phases, such as thermal fermentation or high-temperature baking, any deviation from this profile (e.g., unexpected parameter overrides) increases the risk score by a weighted factor of 1.5, allowing for the detection of insider threats or hijacked accounts.</p>
</list-item>
<list-item>
<p><italic>Dynamic policy engine (zero trust)</italic>: The system integrates a policy-driven approach where the detection threshold <inline-formula>
<mml:math id="M31">
<mml:mi>&#x03C4;</mml:mi>
</mml:math>
</inline-formula> is not static but depends on the node&#x2019;s trust level. If a device attempts unauthorized lateral movement or accesses non-privileged PLC registers, the Zero Trust engine triggers an immediate isolation signal, ensuring a &#x201C;verify-always&#x201D; stance even if individual neural network scores are borderline.</p>
</list-item>
</list></p>
</sec>
<sec id="sec12">
<label>2.10</label>
<title>Statistical validation and uncertainty estimation</title>
<p>To ensure robust conclusions and address statistical validity, each model was trained and evaluated in repeated runs with different random seeds (<italic>N</italic>&#x202F;=&#x202F;10). The train/validation/test split was kept fixed across models; only training stochasticity (initialization and minibatch order) was varied. We report mean &#x00B1; standard deviation for F1 and AUC across runs.</p>
<p>For uncertainty quantification, we computed 95% confidence intervals (CI) for F1 and AUC using stratified bootstrap resampling of the test sessions (10,000 resamples). This provides sample-level uncertainty estimates beyond single-point metrics.</p>
<p>To compare models statistically, we applied a paired non-parametric Wilcoxon signed-rank test on per-run metric values (F1 and AUC) between the fusion model and each baseline/ablation variant, using <italic>&#x03B1;</italic>&#x202F;=&#x202F;0.05. For multiple pairwise comparisons, Holm&#x2013;Bonferroni correction was applied. This procedure evaluates whether improvements are consistent across runs rather than driven by a single favorable training instance.</p>
</sec>
</sec>
<sec sec-type="results" id="sec13">
<label>3</label>
<title>Results</title>
<p>This section presents a comprehensive analysis of the experimental results obtained to evaluate the effectiveness of the developed cognitive architecture for early incident detection in industrial control systems (ICS). The main goal of the study was to compare the accuracy, completeness, and response time of various artificial intelligence models&#x2014;ranging from classical machine learning algorithms to deep neural networks, including CNN-LSTM and hybrid fusion-based approaches (<xref ref-type="bibr" rid="ref8">Gauthama Raman et al., 2021</xref>; <xref ref-type="bibr" rid="ref21">Raman et al., 2021</xref>; <xref ref-type="bibr" rid="ref1">Abhishek and Singh, 2023</xref>).</p>
<p>The results were obtained using real data from production network segments, simulated cyberattack scenarios, and technological faults, which made it possible to assess the models&#x2019; resilience to data drift, the rate of false positives, and the latency of incident detection (<xref ref-type="bibr" rid="ref27">Zhao et al., 2022</xref>; <xref ref-type="bibr" rid="ref14">Kravchik and Shabtai, 2018</xref>; <xref ref-type="bibr" rid="ref16">Lin et al., 2022</xref>; <xref ref-type="bibr" rid="ref19">Nisar et al., 2022</xref>).</p>
<p>Special attention was given to the use of digital twin elements to reproduce the behavior of technological processes in a virtual environment (<xref ref-type="bibr" rid="ref26">Zhang et al., 2023</xref>; <xref ref-type="bibr" rid="ref10">Homaei et al., 2024</xref>). This approach made it possible to study the dynamics of system parameters during the &#x201C;before,&#x201D; &#x201C;during,&#x201D; and &#x201C;after&#x201D; phases of an attack, as well as to evaluate the potential of digital simulation to improve forecasting accuracy and predictive response capabilities.</p>
<sec id="sec14">
<label>3.1</label>
<title>Data and digital twin testbed</title>
<p>The experimental validation was conducted using a high-fidelity Digital Twin of the bakery line, implemented in the Factory I/O simulation environment coupled with Siemens S7-PLCSIM to emulate the logic of S7-1200 controllers. The physical logic&#x2014;including oven thermodynamics (heat transfer coefficients), conveyor friction, and dough viscosity&#x2014;was modeled using MATLAB/Simulink blocks linked via OPC UA. This setup allows for the generation of realistic sensor noise and the simulation of mechanical inertia, which is often absent in purely dataset-based studies.</p>
<p>The telemetry data collection focused on specific Modbus and OPC UA tags critical for the technological process. Data collection was performed from mirrored switch ports, DMZ agents, and PLC/SCADA telemetry (OPC UA, Modbus/TCP, HTTPS, and SNMP). To increase the variability of attack traffic, real network data were augmented with replayed fragments from open datasets such as UNSW-NB15, CIC-IDS2017, and ToN_IoT. A summary of the dataset used for model training and evaluation is provided in <xref ref-type="table" rid="tab3">Table 3</xref>.</p>
<table-wrap position="float" id="tab3">
<label>Table 3</label>
<caption>
<p>Data corpus for training and evaluation.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Category</th>
<th align="left" valign="top">Source/acquisition</th>
<th align="center" valign="top">Sessions</th>
<th align="center" valign="top">&#x201C;Incident&#x201D; labels</th>
<th align="center" valign="top">Share, %</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="top">Normal operations (Production)</td>
<td align="left" valign="top">Real telemetry and production line network flows</td>
<td align="center" valign="top">1,200,000</td>
<td align="center" valign="top">0</td>
<td align="center" valign="top">68.2</td>
</tr>
<tr>
<td align="left" valign="top">Technological Transitions/interruptions</td>
<td align="left" valign="top">Real telemetry in start/stop/reconfiguration modes</td>
<td align="center" valign="top">210,000</td>
<td align="center" valign="top">0</td>
<td align="center" valign="top">11.9</td>
</tr>
<tr>
<td align="left" valign="top">Non-threat anomalies (sensor faults)</td>
<td align="left" valign="top">Real episodes of sensor degradation/noise without attack</td>
<td align="center" valign="top">85,000</td>
<td align="center" valign="top">0</td>
<td align="center" valign="top">4.8</td>
</tr>
<tr>
<td align="left" valign="top">Attack scenarios (aggregate)</td>
<td align="left" valign="top">Real injections + replay from UNSW-NB15, CIC-IDS2017, ToN_IoT</td>
<td align="center" valign="top">265,000</td>
<td align="center" valign="top">265,000</td>
<td align="center" valign="top">15.1</td>
</tr>
<tr>
<td align="left" valign="top">Total</td>
<td align="left" valign="top">&#x2014;</td>
<td align="center" valign="top">1,760,000</td>
<td align="center" valign="top">265,000</td>
<td align="center" valign="top">100.0</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<p><xref ref-type="table" rid="tab3">Table 3</xref> summarizes the dataset used for training and evaluation of incident detection models in the digital twin of an industrial bakery production line. It shows the data sources, number of aggregated sessions, number of labeled incidents, and the relative share of each category within the overall dataset.</p>
</table-wrap-foot>
</table-wrap>
<p>Normal operations represent uninterrupted production shifts without violations of process workflows. The data were collected from the actual production line and include network exchanges (OPC UA, Modbus/TCP, HTTPS, and SNMP) and telemetry (oven temperature, dough humidity, drive currents, conveyor speeds). The &#x201C;sessions&#x201D; field indicates the number of aggregated network sessions and synchronized technological observation windows.</p>
<p>Technological transitions and pauses include real telemetry captured during start-up/shutdown sequences, recipe changeovers, and sanitation breaks. These segments were not labeled as incidents, as the deviations were caused by standard operating modes. Such data are used to train the model to distinguish normal process variability from actual attack behavior.</p>
<p>Non-threatening anomalies comprise real episodes of sensor degradation (noise, brief dropouts, calibration drift), confirmed by maintenance logs. These cases were not labeled as incidents because no signs of malicious interference were observed. Including such data improves the model&#x2019;s robustness to false alarms in the presence of &#x201C;noisy&#x201D; sensor signals.</p>
<p>Attack scenarios consist of a set of both real injected events (scanning, credential brute-forcing, unauthorized Modbus writes, SNMP manipulation, SSL/TLS downgrade, fake firmware injection, lateral movement, Domain Name System (DNS) exfiltration) and replayed fragments from open-source datasets (UNSW-NB15, CIC-IDS2017, ToN_IoT), adapted to the testbed&#x2019;s format. Each episode was assigned an &#x201C;incident&#x201D; label, which explains the equal number of sessions and labels in the corresponding dataset row. The analysis of &#x201C;pre-attack,&#x201D; &#x201C;during-attack,&#x201D; and &#x201C;post-attack&#x201D; phases refers to the synchronization of telemetry and network data windows within the digital twin environment. For each scenario, time-series data and network sessions were aggregated into observation windows relative to the exact moment of incident injection. This phase-based approach ensures that the dynamic shifts in physical parameters (e.g., pressure or temperature) are correctly correlated with network anomalies. The contribution of this temporal segmentation is empirically reflected in the final detection metrics and response latency (<xref ref-type="table" rid="tab1">Table 1</xref>), as well as in the ablation study (<xref ref-type="table" rid="tab2">Table 2</xref>), which compares configurations with and without cognitive context correlation.</p>
<p>In addition to standard datasets, we injected three domain-specific attack scenarios into the Digital Twin to validate the cognitive capabilities:<list list-type="order">
<list-item>
<p><italic>Oven thermal runaway</italic>: a gradual (&#x201C;low-and-slow&#x201D;) increase in the oven temperature setpoint by 0.5 &#x00B0;C per minute, aiming to burn the product without triggering sudden threshold alarms.</p>
</list-item>
<list-item>
<p><italic>Conveyor desynchronization</italic>: random modification of the Belt_Speed_SetPoint registers between the dosing and packaging units, causing product pile-ups.</p>
</list-item>
<list-item>
<p><italic>HMI spoofing</italic>: a &#x201C;Man-in-the-Middle&#x201D; attack where the HMI displays normal values to the operator while the PLC executes malicious logic (e.g., disabling the mixer motor).</p>
</list-item>
</list></p>
<p>The percentage column in <xref ref-type="table" rid="tab3">Table 3</xref> indicates the relative share of each category within the total dataset. The overall volume and category distribution reflect the actual data collected on the testbed and the aggregation rules used for session grouping. Network protocols and topology (IEC 62443 zones, DMZ, VLANs) were configured as described above.</p>
<p>Note on application: These data were used to train two analytical pipelines&#x2014;the network Byte2Image CNN&#x202F;+&#x202F;LSTM and the technological AE&#x202F;+&#x202F;LSTM&#x2014;as well as for subsequent cognitive event correlation within the SIEM/UEBA system, incorporating production cycle context and Zero Trust policies.</p>
</sec>
<sec id="sec15">
<label>3.2</label>
<title>Metrics and model comparison</title>
<p>To ensure conceptual consistency, the proposed system is evaluated across three hierarchical levels. The Base Pipelines (Level 0) provide raw anomaly scores from network and technological data. The Hybrid Fusion Model (Level 1) integrates these scores to improve overall detection breadth. Finally, the Full Cognitive Model (Level 2) incorporates high-level correlation rules (SIEM) and behavioral profiles (UEBA). As shown in <xref ref-type="table" rid="tab2">Table 2</xref> (Ablation Analysis), the transition from Level 1 to Level 2 results in a measurable improvement: the F1-score increases from 0.94 to 0.95, and the False Positive Rate (FPR) decreases from 0.58% to 0.49%. This empirical evidence confirms that cognitive components (UEBA and correlation rules) are not merely conceptual but serve as a functional mechanism for reducing false alarms and enhancing detection stability. All metrics in <xref ref-type="table" rid="tab1">Table 1</xref> are reported as mean &#x00B1; std. over <italic>N</italic>&#x202F;=&#x202F;10 runs. In addition, 95% bootstrap confidence intervals for the Fusion Model are provided in Appendix A to quantify uncertainty on the held-out test setEvaluation metrics and OT interpretation. Precision measures the proportion of raised alerts that correspond to true incidents [TP/(TP&#x202F;+&#x202F;FP)]. In OT deployments, high Precision is essential to avoid excessive operator interventions and production disruptions caused by false alarms. Recall [TP/(TP&#x202F;+&#x202F;FN)] measures the proportion of real incidents that are detected; in critical infrastructure, low Recall is unacceptable because missed attacks can propagate into physical/process damage. F1-score is the harmonic mean of Precision and Recall and summarizes the operational trade-off between false alarms (FP) and missed detections (FN). AUC (Area under the ROC Curve) summarizes discrimination across all thresholds and enables fair comparison when the operating threshold may change under different risk levels or edge resource constraints.</p>
<p>Models compared. We evaluated the following models:<list list-type="order">
<list-item>
<p>Gradient Boosting baseline on engineered features (flow rates, port distributions, error counters).</p>
</list-item>
<list-item>
<p>Isolation Forest baseline on engineered telemetry/network summary features.</p>
</list-item>
<list-item>
<p>One-Class SVM baseline on engineered telemetry/network summary features.</p>
</list-item>
<list-item>
<p>Classical thresholding baseline on the anomaly score (fixed <italic>&#x03C4;</italic> without adaptive threshold optimization).</p>
</list-item>
<list-item>
<p>CNN-only network model (Byte2Image CNN without temporal modeling).</p>
</list-item>
<list-item>
<p>LSTM-only network model (packet/flow sequences without CNN image features).</p>
</list-item>
<list-item>
<p>CNN&#x202F;+&#x202F;LSTM (Byte2Image) network pipeline.</p>
</list-item>
<list-item>
<p>AE&#x202F;+&#x202F;LSTM technological pipeline.</p>
</list-item>
<list-item>
<p>Fusion Model (Cognitive Integration), which combines network and technological anomaly scores and applies cognitive correlation using SIEM rules, UEBA deviation scoring, and production-context constraints (recipes/shifts) to filter non-threatening transitions.</p>
</list-item>
</list></p>
<p>Threshold values for incident detection were adapted according to the optimization criterion, which minimizes the average detection delay while adhering to constraints on the False Positive Rate (FPR) and the computational resource limitations of edge nodes (<xref ref-type="disp-formula" rid="E7">Equation 7</xref>):<disp-formula id="E7">
<mml:math id="M32">
<mml:munder>
<mml:mo mathvariant="italic">min</mml:mo>
<mml:mi>&#x03C4;</mml:mi>
</mml:munder>
<mml:mspace width="0.66em"/>
<mml:mi>E</mml:mi>
<mml:mspace width="0.25em"/>
<mml:mo stretchy="true">[</mml:mo>
<mml:mi>D</mml:mi>
<mml:mo stretchy="true">(</mml:mo>
<mml:mi>&#x03C4;</mml:mi>
<mml:mo stretchy="true">)</mml:mo>
<mml:mo stretchy="true">]</mml:mo>
<mml:mspace width="1em"/>
<mml:mo>&#x220F;</mml:mo>
<mml:mi mathvariant="italic">pu</mml:mi>
<mml:mspace width="1em"/>
<mml:mi>FPR</mml:mi>
<mml:mo stretchy="true">(</mml:mo>
<mml:mi>&#x03C4;</mml:mi>
<mml:mo stretchy="true">)</mml:mo>
<mml:mo>&#x2264;</mml:mo>
<mml:mi>&#x03B5;</mml:mi>
<mml:mo>,</mml:mo>
<mml:mspace width="1em"/>
<mml:mi>C</mml:mi>
<mml:mo stretchy="true">(</mml:mo>
<mml:mi>&#x03C4;</mml:mi>
<mml:mo stretchy="true">)</mml:mo>
<mml:mo>&#x2264;</mml:mo>
<mml:msub>
<mml:mi>C</mml:mi>
<mml:mi>max</mml:mi>
</mml:msub>
</mml:math>
<label>(7)</label>
</disp-formula></p>
<p>Where <inline-formula>
<mml:math id="M33">
<mml:mi>&#x03B5;</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>5</mml:mn>
<mml:mo>%</mml:mo>
</mml:math>
</inline-formula>&#x2014;is the permissible false alarm rate, and <inline-formula>
<mml:math id="M34">
<mml:msub>
<mml:mi>C</mml:mi>
<mml:mi>max</mml:mi>
</mml:msub>
</mml:math>
</inline-formula>&#x2014;is the computational cost limit per edge network node. For each pipeline, an online readjustment of the threshold <inline-formula>
<mml:math id="M35">
<mml:msub>
<mml:mi>&#x03C4;</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
</mml:math>
</inline-formula> was performed every <inline-formula>
<mml:math id="M36">
<mml:mi mathvariant="italic">&#x0394;T</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>10</mml:mn>
</mml:math>
</inline-formula> minutes, taking into account the current dynamics of the event stream. Standard accuracy metrics were used for quality assessment (<xref ref-type="disp-formula" rid="E8">Equations 8</xref>&#x2013;<xref ref-type="disp-formula" rid="E10">10</xref>):<disp-formula id="E8">
<mml:math id="M37">
<mml:mtext>Precision</mml:mtext>
<mml:mo>=</mml:mo>
<mml:mfrac>
<mml:mi mathvariant="italic">TP</mml:mi>
<mml:mrow>
<mml:mi mathvariant="italic">TP</mml:mi>
<mml:mo>+</mml:mo>
<mml:mi mathvariant="italic">FP</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:math>
<label>(8)</label>
</disp-formula><disp-formula id="E9">
<mml:math id="M38">
<mml:mtext>Recall</mml:mtext>
<mml:mo>=</mml:mo>
<mml:mfrac>
<mml:mi mathvariant="italic">TP</mml:mi>
<mml:mrow>
<mml:mi mathvariant="italic">TP</mml:mi>
<mml:mo>+</mml:mo>
<mml:mi mathvariant="italic">FN</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:math>
<label>(9)</label>
</disp-formula><disp-formula id="E10">
<mml:math id="M39">
<mml:mi mathvariant="normal">F</mml:mi>
<mml:mn>1</mml:mn>
<mml:mo>=</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo>&#x00B7;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mtext>Precision</mml:mtext>
<mml:mo>&#x00B7;</mml:mo>
<mml:mtext>Recall</mml:mtext>
</mml:mrow>
<mml:mrow>
<mml:mtext>Precision</mml:mtext>
<mml:mo>+</mml:mo>
<mml:mtext>Recall</mml:mtext>
</mml:mrow>
</mml:mfrac>
</mml:math>
<label>(10)</label>
</disp-formula></p>
<p>Where <inline-formula>
<mml:math id="M40">
<mml:mi mathvariant="italic">TP</mml:mi>
</mml:math>
</inline-formula>, <inline-formula>
<mml:math id="M41">
<mml:mi mathvariant="italic">FP</mml:mi>
</mml:math>
</inline-formula>, <inline-formula>
<mml:math id="M42">
<mml:mi mathvariant="italic">FN</mml:mi>
</mml:math>
</inline-formula>&#x2014;are the number of true positive, false positive, and false negative detections, respectively; F1 denotes the F1-score (harmonic mean of Precision and Recall) Standard accuracy metrics (7)&#x2013;(9) were used for quality assessment. For an Industrial Control System (ICS) environment, the selected metrics provide a comprehensive evaluation of operational stability. Precision is interpreted as a measure of &#x201C;operational suitability,&#x201D; as high precision minimizes false alarms that lead to costly and unnecessary production halts. Recall reflects &#x201C;detection completeness,&#x201D; which is critical for the safety of the technological cycle. The F1-score provides a balanced assessment in conditions of class imbalance, where both missed detections and false alarms carry high economic risks. Finally, AUC is used as a threshold-independent measure of class separability, confirming that the improvement in results is a robust property of the architecture rather than an artifact of a specific detection threshold <inline-formula>
<mml:math id="M43">
<mml:mi>&#x03C4;</mml:mi>
</mml:math>
</inline-formula>. Together, the simultaneous growth in these metrics alongside reduced response latency (<xref ref-type="table" rid="tab1">Table 1</xref>) validates the superiority of the proposed fusion architecture for real-time OT applications. As seen in <xref ref-type="table" rid="tab1">Table 1</xref>, the hybrid cognitive model provides the best values for Precision &#x003E;0.94, Recall &#x003E;0.91, and an average response time of less than 1.2&#x202F;s, confirming the effectiveness of integrating network and technological analyses.</p>
<p>Evaluation metrics and OT interpretation. Precision measures the proportion of detected incidents that are true incidents (i.e., how many raised alerts are correct). In OT environments, high Precision is critical to reduce false alarms and &#x201C;alarm fatigue,&#x201D; because unnecessary operator interventions may disrupt production and increase downtime.</p>
<p>Recall (True Positive Rate) measures the proportion of real incidents that are successfully detected. For critical infrastructure and OT processes, missing an attack or hazardous manipulation is unacceptable; therefore, Recall must remain high even when the system is tuned to minimize false alarms.</p>
<p>F1-score is the harmonic mean of Precision and Recall, providing a balanced single-number summary when both false alarms (FP) and missed detections (FN) are costly. We report F1 to reflect the trade-off between operational feasibility (Precision/FPR) and safety-critical coverage (Recall).</p>
<p>AUC (Area under the ROC Curve) summarizes model discrimination across all possible decision thresholds and is therefore threshold-independent. This is important for OT deployments because the operating threshold may change under different resource constraints or risk levels, and AUC enables fair comparison of models under varying thresholds.</p>
<p>The improvement is explained by the synergy of network and technological pipelines, which reduces the probability of missed attacks and decreases response latency. To evaluate the contribution of each component of the hybrid model, an ablation analysis was conducted (see <xref ref-type="table" rid="tab2">Table 2</xref>). The threshold improvement in the F1 metric when adding the cognitive correlation layer was calculated as (<xref ref-type="disp-formula" rid="E11">Equation 11</xref>):<disp-formula id="E11">
<mml:math id="M44">
<mml:mi>&#x0394;</mml:mi>
<mml:msub>
<mml:mi>Q</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>=</mml:mo>
<mml:msub>
<mml:mi>Q</mml:mi>
<mml:mtext>fusion</mml:mtext>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>Q</mml:mi>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:msub>
</mml:math>
<label>(11)</label>
</disp-formula></p>
<p>Where <inline-formula>
<mml:math id="M45">
<mml:msub>
<mml:mi>Q</mml:mi>
<mml:mtext>fusion</mml:mtext>
</mml:msub>
</mml:math>
</inline-formula>&#x2014;is the quality of the full model, and <inline-formula>
<mml:math id="M46">
<mml:msub>
<mml:mi>Q</mml:mi>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:msub>
</mml:math>
</inline-formula> is the quality after excluding the <italic>i</italic>-th component. The average improvement in the F1 metric when adding the cognitive correlation layer was <inline-formula>
<mml:math id="M47">
<mml:mi>&#x0394;</mml:mi>
<mml:msub>
<mml:mi>Q</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>&#x2248;</mml:mo>
<mml:mo>+</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>03</mml:mn>
</mml:math>
</inline-formula>, indicating the significance of integrating SIEM events and the production cycle context.</p>
<p>Thus, in <xref ref-type="table" rid="tab2">Table 2</xref>, the integration of the cognitive correlation layer, contextual profiles, and operator behavioral characteristics allowed for a reduction in false positives by almost 25% compared to purely neural network approaches and increased the model&#x2019;s resistance to data drift in production conditions. In addition, for a practical assessment of the system&#x2019;s effectiveness, an integral accuracy index <inline-formula>
<mml:math id="M48">
<mml:msub>
<mml:mi>I</mml:mi>
<mml:mi>eff</mml:mi>
</mml:msub>
</mml:math>
</inline-formula> was applied (<xref ref-type="disp-formula" rid="E12">Equation 12</xref>):<disp-formula id="E12">
<mml:math id="M49">
<mml:msub>
<mml:mi>I</mml:mi>
<mml:mi>eff</mml:mi>
</mml:msub>
<mml:mo>=</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mtext>Precision</mml:mtext>
<mml:mo>+</mml:mo>
<mml:mtext>Recall</mml:mtext>
<mml:mo>+</mml:mo>
<mml:mi>AUC</mml:mi>
</mml:mrow>
<mml:mn>3</mml:mn>
</mml:mfrac>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>k</mml:mi>
<mml:mo>&#x00B7;</mml:mo>
<mml:mfrac>
<mml:msub>
<mml:mi>t</mml:mi>
<mml:mi>avg</mml:mi>
</mml:msub>
<mml:msub>
<mml:mi>t</mml:mi>
<mml:mi>max</mml:mi>
</mml:msub>
</mml:mfrac>
</mml:math>
<label>(12)</label>
</disp-formula></p>
<p>Where <inline-formula>
<mml:math id="M50">
<mml:msub>
<mml:mi>t</mml:mi>
<mml:mi>avg</mml:mi>
</mml:msub>
</mml:math>
</inline-formula>&#x2014;is the average response time <inline-formula>
<mml:math id="M51">
<mml:msub>
<mml:mi>t</mml:mi>
<mml:mi>max</mml:mi>
</mml:msub>
<mml:mo>=</mml:mo>
<mml:mn>3</mml:mn>
</mml:math>
</inline-formula>s&#x2014;is the normative threshold value, and <inline-formula>
<mml:math id="M52">
<mml:mi>k</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>2</mml:mn>
</mml:math>
</inline-formula>&#x2014;is the delay penalty coefficient, and the Area Under the Receiver Operating Characteristic (ROC) curve (AUC) is used as a threshold-independent performance metric. For the fusion model, <inline-formula>
<mml:math id="M53">
<mml:msub>
<mml:mi>I</mml:mi>
<mml:mi>eff</mml:mi>
</mml:msub>
<mml:mo>=</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>93</mml:mn>
</mml:math>
</inline-formula>, which corresponds to a high level of efficiency according to IEC 62443 requirements and the national standards of the Republic of Kazakhstan.</p>
<p>The obtained results confirm that the proposed cognitive architecture provides the necessary accuracy and speed of incident detection at an optimal level of computational costs and can be recommended for implementation in bakery industry enterprises.</p>
<p>The results obtained have formed an empirical basis for further discussion of the identified patterns and for determining directions for optimizing cognitive cybersecurity tools in an industrial environment. The conducted experiments confirmed the effectiveness of the proposed model for early incident detection. The hybrid fusion architecture, which combines features from behavioral, technological, and network levels, demonstrated the best results: average values of Precision&#x202F;=&#x202F;0.96, Recall&#x202F;=&#x202F;0.93, F1&#x202F;=&#x202F;0.95, and AUC&#x202F;=&#x202F;0.98, with an average response time of less than 1.2&#x202F;s. This indicates the system&#x2019;s high capability to distinguish between normal and anomalous states even under conditions of noisy or incomplete data (<xref ref-type="bibr" rid="ref17">Mugarza et al., 2020</xref>; <xref ref-type="bibr" rid="ref20">Qureshi et al., 2024</xref>).</p>
<p>A comparison of the models revealed a pattern: the higher the degree of contextual integration of data from different domains (network traffic, technological parameters, and command logs), the more robust the system is to drift and false positives (<xref ref-type="bibr" rid="ref22">Tariq et al., 2019</xref>; <xref ref-type="bibr" rid="ref6">Dietz and Pernul, 2020</xref>). This opens up prospects for the further development of multi-agent cognitive systems that combine User and Entity Behavior Analytics (UEBA) with digital twins of technological processes (<xref ref-type="bibr" rid="ref9">Holdbrook et al., 2024</xref>; <xref ref-type="bibr" rid="ref12">Kantharaju et al., 2024</xref>).</p>
<p>The results obtained demonstrate not only the possibility of achieving high detection accuracy in real production conditions but also create scientific prerequisites for developing a universal industrial cyber defense architecture based on intelligent agents (<xref ref-type="bibr" rid="ref13">Knowles et al., 2015</xref>; <xref ref-type="bibr" rid="ref4">Bhamare et al., 2020</xref>; <xref ref-type="bibr" rid="ref5">Cherdantseva et al., 2016</xref>; <xref ref-type="bibr" rid="ref3">Anthi et al., 2021</xref>; <xref ref-type="bibr" rid="ref23">Tuptuk et al., 2021</xref>; <xref ref-type="bibr" rid="ref11">Inoue et al., 2017</xref>).</p>
<p>Transitioning to the &#x201C;Discussion&#x201D; section will allow for the interpretation of the identified patterns in the context of regulatory requirements, practical implementation limitations, risk assessment, and the economic efficiency of integrating cognitive mechanisms into industrial digital twins (<xref ref-type="bibr" rid="ref26">Zhang et al., 2023</xref>; <xref ref-type="bibr" rid="ref10">Homaei et al., 2024</xref>).</p>
<p><xref ref-type="fig" rid="fig2">Figure 2</xref> illustrates the system&#x2019;s performance during the &#x2018;Oven Thermal Runaway&#x2019; scenario described in Section 3.1. The Digital Twin (AE&#x202F;+&#x202F;LSTM pipeline) accurately predicted the expected temperature trajectory (Blue Line). The divergence between the observed telemetry (Red Line) and the prediction allowed the system to detect the anomaly at <italic>t</italic>&#x202F;=&#x202F;45&#x202F;s, during the latent attack phase, well before the critical safety threshold was breached. This confirms the model&#x2019;s ability to operate effectively across pre-attack, attack, and mitigation phases.</p>
<fig position="float" id="fig2">
<label>Figure 2</label>
<caption>
<p>Comparative analysis of predicted and observed process trajectories during a simulated &#x201C;Oven Thermal Runaway&#x201D; attack phase. The graph demonstrates the digital twin&#x2019;s ability to forecast the expected technological state (blue dashed line) versus the observed anomalous drift (red line). The detection point (<italic>t</italic>&#x202F;=&#x202F;45&#x202F;s) occurs within the latent phase, allowing for mitigation before the process reaches critical safety limits. A time-series line graph comparing &#x201C;Expected&#x201D; vs. &#x201C;Observed&#x201D; oven temperature. The graph is divided into three shaded zones: Green (pre-attack), Yellow (latent attack), and Red (mitigation). A blue dashed line stays stable at 220 &#x00B0;C, while a red solid line starts drifting upwards at <italic>t</italic>&#x202F;=&#x202F;30&#x202F;s. A black marker at <italic>t</italic>&#x202F;=&#x202F;45&#x202F;s indicates the &#x201C;detection point&#x201D; where the anomaly score exceeded the adaptive threshold.</p>
</caption>
<graphic xlink:href="fcomp-08-1751284-g002.tif" mimetype="image" mime-subtype="tiff">
<alt-text content-type="machine-generated">Line graph showing oven temperature over time in seconds, divided into pre-attack (green), latent attack (yellow), and mitigation/recovery (red) phases. The actual sensor value rises sharply after forty seconds, diverging above the digital twin prediction. A detection point is marked at forty-five seconds.</alt-text>
</graphic>
</fig>
<sec id="sec16">
<label>3.2.1</label>
<title>Prospects for software implementation</title>
<p>As shown in <xref ref-type="fig" rid="fig3">Figure 3</xref>, the pseudocode describes the architecture of a cognitive early incident detection system for industrial networks, designed for modular software implementation with elements of artificial intelligence and the Zero Trust concept.</p>
<fig position="float" id="fig3">
<label>Figure 3</label>
<caption>
<p>Pseudocode for modular implementation of the cognitive incident detection system. Modules: Config (global parameters), IngestAndNormalize (data ingestion), Byte2Image_CNN_LSTM (network analysis), AE_LSTM_Tech (technological process analysis), RiskModel (risk calculation), AdaptiveThreshold (auto-tuning), CognitiveCorrelation (event context), ZeroTrust_Response (incident isolation and mitigation). Flow diagram showing modular pseudocode of an AI-based cognitive incident detection system with adaptive thresholds and Zero Trust response.</p>
</caption>
<graphic xlink:href="fcomp-08-1751284-g003.tif" mimetype="image" mime-subtype="tiff">
<alt-text content-type="machine-generated">Screenshot of pseudocode outlining modules for a cognitive system targeting early incident detection in industrial networks, including data configuration, ingestion, normalization, and analysis using CNN, LSTM, and autoencoder techniques.</alt-text>
</graphic>
</fig>
<p>The Config module defines the main operating parameters of the system, including data sources, computing resource constraints, and key security policies. It ensures uniform configuration of all system components and allows flexible management of settings through external files (e.g., YAML (YAML Ain&#x2019;t Markup Language) or JavaScript Object Notation (JSON)). This approach simplifies deployment across different industrial environments and enables centralized parameter changes without recompiling the code.</p>
<p>The Ingest and Normalize module is responsible for collecting and unifying data from multiple heterogeneous sources&#x2014;network data, technological data, controller logs, and security gateways. In practice, this block is implemented using asynchronous message brokers [Apache Kafka (Kafka), RabbitMQ, Message Queuing Telemetry Transport (MQTT)] which transmit telemetry and network events in real time. The normalization stage creates a unified event format suitable for further analysis in SIEM systems and analytical models.</p>
<p>The Byte2Image_CNN_LSTM module represents an intelligent pipeline for network traffic analysis. It converts sequences of packet bytes into two-dimensional matrices (images), on which a CNN extracts spatial patterns, while an LSTM models the temporal dynamics of connection behavior. This hybrid approach provides high sensitivity to new types of attacks without requiring explicit signatures. The software implementation can be done in Python using libraries such as TensorFlow, PyTorch, or Keras, optimized for Graphics Processing Unit (GPU) operation.</p>
<p>The AE_LSTM_Tech module performs analysis of time series of technological data (equipment telemetry, sensor readings, and control commands). The autoencoder estimates the reconstruction error of normal signals, and the recurrent LSTM network forecasts future behavior. Their combined processing enables the detection of deviations in equipment operating modes, which may indicate hidden incidents or cyberattacks on controllers. Practical implementation can use the pandas, NumPy, and TensorFlow stack, providing real-time performance for streaming data.</p>
<p>The RiskModel module integrates the results of the network and technological pipelines, forming an aggregate risk score for each asset. The calculation is based on weight coefficients that define the criticality of each node or piece of equipment. The resulting risk value is compared with an adaptive threshold; if it is exceeded, a correlation and response process is triggered. This approach allows the system to scale across hundreds of devices while minimizing false positives.</p>
<p>The AdaptiveThreshold module implements a self-learning mechanism for adjusting the system&#x2019;s sensitivity threshold. The threshold is updated online based on accumulated statistics of false and true detections, as well as the current state of computing resources. This ensures stable system performance and reduces load as data volumes grow.</p>
<p>The CognitiveCorrelation module performs intelligent event correlation by combining the results of neural network analysis with rule-based logic and compliance context (IEC 62443, ISO 27019, and NIS2). It generates a cognitive incident map that considers temporal and logical relationships between events. In software terms, this block can operate as a separate microservice interacting with the SIEM via a Representational State Transfer (REST) application programming interface (API)or Google Remote Procedure Call (Grpc).</p>
<p>The ZeroTrust_Response module is designed to automate incident response in accordance with Zero Trust principles. It includes functions for isolating compromised devices, rotating credentials, updating encryption policies, and disabling insecure protocols (for example, SNMPv1 or outdated TLS versions). The module also provides operator notifications and can integrate with Security Orchestration, Automation, and Response (SOAR) systems.</p>
<p>From a practical perspective, the presented pseudocode describes the logical structure of the system, which can be implemented as a set of microservices using container orchestration (Docker, Kubernetes) and Industrial Internet of Things (IIoT) standards. Implementation in Python, with functionality divided into packages (ingestion, analytics, correlation, response), ensures flexibility, scalability, and compatibility with modern MLOps tools.</p>
<p>Thus, the pseudocode provides the foundation for developing an intelligent monitoring and response software platform that integrates machine learning, cognitive analytics, and Zero Trust principles. Its implementation will enable the creation of an adaptive cybersecurity system capable of operating in real time, self-adjusting sensitivity, predicting anomalies, and minimizing the impact of the human factor in protecting industrial assets.</p>
</sec>
</sec>
<sec id="sec17">
<label>3.3</label>
<title>Validation of cognitive components (ablation study)</title>
<p>To move beyond conceptual claims and verify the impact of the high-level cognitive layers, an ablation study was conducted. We compared the performance of the baseline integrated pipelines (Level 1) against the full architecture including the cognitive engine (Level 2).</p>
<p>As shown in the results (<xref ref-type="table" rid="tab2">Table 2</xref>), the baseline combination of pipelines (Network + Tech) achieved an F1-score of 0.94. However, the introduction of UEBA and Correlation Rules (Level 2) provided a significant reduction in the False Positive Rate (FPR) from 0.58% to 0.49%. This improvement is attributed to the system&#x2019;s ability to filter out non-malicious operational drifts, such as recipe changes or scheduled maintenance, which base detectors often misinterpret as anomalies.</p>
<p>Furthermore, the Zero Trust Policy engine improved the response time by an average of 0.1&#x202F;s (from 1.3 to 1.2&#x202F;s). By pre-defining &#x201C;trusted zones&#x201D; and &#x201C;least privilege&#x201D; communication paths, the system can prioritize alerts from critical assets and bypass heavy computation for clearly unauthorized access attempts, leading to faster mitigation and reduced &#x201C;alarm fatigue&#x201D; for the operator.</p>
</sec>
</sec>
<sec id="sec18">
<label>4</label>
<title>Discussion of results</title>
<sec id="sec19">
<label>4.1</label>
<title>Synergistic effect of multidomain analytics and performance</title>
<p>The most significant result of the experiments is the confirmation of the hypothesis regarding the synergistic effect achieved by combining the network and technological data processing pipelines. The integration of these approaches made it possible to reach an F&#x2081; score of 0.95 with an average response time under 1.2&#x202F;s, significantly outperforming traditional gradient boosting algorithms and classical machine learning models (<xref ref-type="bibr" rid="ref1">Abhishek and Singh, 2023</xref>).</p>
<p>The Byte2Image CNN&#x202F;+&#x202F;LSTM architecture demonstrated a strong ability to detect low-level anomalies in network traffic, including polymorphic attacks and data manipulation in PLC/SCADA channels (<xref ref-type="bibr" rid="ref14">Kravchik and Shabtai, 2018</xref>; <xref ref-type="bibr" rid="ref16">Lin et al., 2022</xref>). Meanwhile, the AE&#x202F;+&#x202F;LSTM pipeline, focused on analyzing technological time series, showed high accuracy in forecasting normal operational modes and detecting hidden deviations in equipment performance (<xref ref-type="bibr" rid="ref8">Gauthama Raman et al., 2021</xref>; <xref ref-type="bibr" rid="ref9">Holdbrook et al., 2024</xref>). Thus, the multidomain approach has proven effective in providing comprehensive observability of industrial environments.</p>
</sec>
<sec id="sec20">
<label>4.2</label>
<title>The role of cognitive correlation and reduction of false positives</title>
<p>An important aspect confirming the novelty of the study is the analysis of the impact of the cognitive correlation layer. This layer, which implements the intelligent integration of the technological cycle context, user behavior profiles (UEBA), and SIEM rules, enabled a reduction of false positives by nearly 25% compared to purely neural network-based models.</p>
<p>Reducing false alarms is critical in industrial environments, where such events can lead to production line shutdowns and financial losses (<xref ref-type="bibr" rid="ref13">Knowles et al., 2015</xref>; <xref ref-type="bibr" rid="ref27">Zhao et al., 2022</xref>; <xref ref-type="bibr" rid="ref6">Dietz and Pernul, 2020</xref>). This result shows that cognitive correlation not only enhances system accuracy but also creates an adaptive feedback mechanism capable of dynamically adjusting response thresholds according to the current state of the production network (<xref ref-type="bibr" rid="ref12">Kantharaju et al., 2024</xref>). It ensures resilience to network drift and sensor degradation.</p>
<sec id="sec21">
<label>4.2.1</label>
<title>Addressing class imbalance and alarm fatigue</title>
<p>Given the significant class imbalance (68.2% normal vs. 15.1% attack), we applied the SMOTE (Synthetic Minority Over-sampling Technique) algorithm during the training phase to augment the attack samples. Furthermore, the use of Focal Loss penalized easy-to-classify examples, forcing the model to focus on hard-to-detect anomalies.</p>
<p>Regarding operational feasibility, a raw False Positive Rate of 0.49% could theoretically generate thousands of alerts. As demonstrated in the ablation study (<xref ref-type="table" rid="tab4">Table 4</xref>), the full configuration of the cognitive model achieves the lowest FPR compared to standalone pipelines, confirming its practical utility. To mitigate &#x201C;alarm fatigue,&#x201D; the Cognitive Correlation Layer implements alert aggregation. Individual anomalous sessions are not reported as separate incidents. Instead, they are grouped by source IP, asset ID, and time window (<italic>T</italic>&#x202F;=&#x202F;60s). An alert is escalated to the operator only if the aggregated risk score exceeds the threshold for a sustained period. This aggregation reduces the effective volume of notifications to approximately 3&#x2013;5 actionable alerts per shift, which is manageable for a human operator.</p>
<table-wrap position="float" id="tab4">
<label>Table 4</label>
<caption>
<p>Ablation analysis of hybrid model component contribution.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Model configuration</th>
<th align="center" valign="top">F1-score</th>
<th align="center" valign="top">FPR (%)</th>
<th align="center" valign="top">Avg. reaction time (s)</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="top">CNN&#x202F;+&#x202F;LSTM only</td>
<td align="center" valign="top">0.92</td>
<td align="center" valign="top">0.65</td>
<td align="center" valign="top">1.4</td>
</tr>
<tr>
<td align="left" valign="top">AE&#x202F;+&#x202F;LSTM only</td>
<td align="center" valign="top">0.92</td>
<td align="center" valign="top">0.72</td>
<td align="center" valign="top">1.6</td>
</tr>
<tr>
<td align="left" valign="top">CNN&#x202F;+&#x202F;LSTM + AE&#x202F;+&#x202F;LSTM (no correlation)</td>
<td align="center" valign="top">0.94</td>
<td align="center" valign="top">0.58</td>
<td align="center" valign="top">1.3</td>
</tr>
<tr>
<td align="left" valign="top">Full cognitive model (with correlation)</td>
<td align="center" valign="top">0.95</td>
<td align="center" valign="top">0.49</td>
<td align="center" valign="top">1.2</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<p>CNN, convolutional neural network; LSTM, long short-term memory network; AE, Autoencoder; correlation&#x2014;the event/feature correlation module that fuses model outputs and contextual signals to improve decision consistency across streams. F1-Score&#x2014;harmonic mean of precision and recall (higher is better). FPR (%)&#x2014;false positive rate as a percentage of normal events incorrectly flagged as attacks/anomalies (lower is better). Avg. reaction time (s)&#x2014;average latency from anomaly onset to detection/trigger (lower is better).</p>
</table-wrap-foot>
</table-wrap>
</sec>
</sec>
<sec id="sec22">
<label>4.3</label>
<title>Theoretical and regulatory alignment</title>
<p>From a theoretical standpoint, the results confirm the validity of applying a multidomain approach and a probabilistic risk model (<xref ref-type="bibr" rid="ref3">Anthi et al., 2021</xref>; <xref ref-type="bibr" rid="ref23">Tuptuk et al., 2021</xref>; <xref ref-type="bibr" rid="ref11">Inoue et al., 2017</xref>). Using a model that links event intensity, priority, and asset state enables a shift from reactive detection to predictive risk management.</p>
<p>The developed architecture fully complies with international standards such as IEC 62443 and ISO/IEC 27019, as well as harmonized Kazakh national standards (ST RK ISO/IEC 27001-2022 and ST RK GOST R 56939-2016) (<xref ref-type="bibr" rid="ref19">Nisar et al., 2022</xref>; <xref ref-type="bibr" rid="ref26">Zhang et al., 2023</xref>; <xref ref-type="bibr" rid="ref20">Qureshi et al., 2024</xref>). This ensures its applicability to critical infrastructure. The incorporation of Zero Trust principles (<xref ref-type="bibr" rid="ref22">Tariq et al., 2019</xref>; <xref ref-type="bibr" rid="ref10">Homaei et al., 2024</xref>) enables proactive response aligned with modern cybersecurity requirements.</p>
</sec>
<sec id="sec23">
<label>4.4</label>
<title>Practical significance and future prospects</title>
<p>The practical significance of the system lies in its modularity and readiness for integration into existing Security Operations Centers (SOC). The pseudocode and modular structure (Config, IngestAndNormalize, RiskModel, AdaptiveThreshold) facilitate deployment on edge nodes (Edge Computing), ensuring scalability and minimal latency (<xref ref-type="bibr" rid="ref8">Gauthama Raman et al., 2021</xref>; <xref ref-type="bibr" rid="ref14">Kravchik and Shabtai, 2018</xref>).</p>
<p>The results also emphasize the potential of digital twins for enhancing security. Using a bakery plant digital twin not only for verification but also as a tool for model training and testing allowed the identification of rare attack scenarios not present in standard datasets (<xref ref-type="bibr" rid="ref26">Zhang et al., 2023</xref>).</p>
<p>Future research directions include expanding the system&#x2019;s cognitive layer, particularly through the integration of graph neural networks to analyze complex interdependencies between assets (<xref ref-type="bibr" rid="ref12">Kantharaju et al., 2024</xref>), and employing cyber threat ontologies for automatic event interpretation and adaptive reconfiguration of defense scenarios.</p>
</sec>
</sec>
<sec id="sec24">
<label>5</label>
<title>General conclusions of the publication</title>
<p>The conducted study confirmed the hypothesis regarding the feasibility of creating an effective cognitive early incident detection system for an industrial bakery network, based on the integration of machine learning methods, user behavior analytics, and the Zero Trust architecture concept (<xref ref-type="bibr" rid="ref22">Tariq et al., 2019</xref>; <xref ref-type="bibr" rid="ref17">Mugarza et al., 2020</xref>; <xref ref-type="bibr" rid="ref10">Homaei et al., 2024</xref>). The developed architecture integrates network, technological, and behavioral data, ensuring comprehensive monitoring and dynamic real-time risk assessment.</p>
<p>The analysis of the results demonstrated that the use of hybrid neural network models, including the Byte2Image CNN&#x202F;+&#x202F;LSTM and AE&#x202F;+&#x202F;LSTM pipelines, enables high accuracy in detecting incidents related to both external attacks and internal violations. The fusion model achieved the best performance metrics&#x2014;Precision&#x202F;=&#x202F;0.96, Recall&#x202F;=&#x202F;0.93, F1&#x202F;=&#x202F;0.95, and AUC&#x202F;=&#x202F;0.98&#x2014;with an average response time of less than 1.2&#x202F;s, confirming its ability to effectively distinguish between normal and abnormal states under conditions of high variability in technological processes (<xref ref-type="bibr" rid="ref8">Gauthama Raman et al., 2021</xref>; <xref ref-type="bibr" rid="ref1">Abhishek and Singh, 2023</xref>).</p>
<p>The integration of a cognitive correlation layer, which implements the link between the results of neural network analyzers, the production cycle context, and operator behavior profiles, has reduced the false positive rate to less than 0.5% and increased resilience to data drift and technological noise (<xref ref-type="bibr" rid="ref13">Knowles et al., 2015</xref>; <xref ref-type="bibr" rid="ref27">Zhao et al., 2022</xref>; <xref ref-type="bibr" rid="ref6">Dietz and Pernul, 2020</xref>). This result provides a significant advantage over traditional SIEM/IDS platforms that do not account for the specific features of production processes.</p>
<p>The proposed architecture complies with modern international and national information security standards, including IEC 62443, ISO/IEC 27019, ST RK ISO/IEC 27001-2022, and ST RK GO ST R 56939-2016 (<xref ref-type="bibr" rid="ref19">Nisar et al., 2022</xref>; <xref ref-type="bibr" rid="ref26">Zhang et al., 2023</xref>; <xref ref-type="bibr" rid="ref20">Qureshi et al., 2024</xref>). This ensures its practical applicability in food industry enterprises in the Republic of Kazakhstan and CIS countries without the need for deep modification of existing production systems.</p>
<p>Experiments on a digital twin testbed confirmed that the model is resilient to sensor errors, communication channel degradation, and network drift (<xref ref-type="bibr" rid="ref11">Inoue et al., 2017</xref>; <xref ref-type="bibr" rid="ref15">Li et al., 2024</xref>; <xref ref-type="bibr" rid="ref2">Ahmad et al., 2023</xref>). Adaptive threshold optimization allows the system to autonomously adjust sensitivity based on event flow dynamics, maintaining a balance between reaction speed and the number of false alarms. Such a mechanism aligns with the principles of predictive analytics and serves as a foundation for proactive cyber risk management (<xref ref-type="bibr" rid="ref3">Anthi et al., 2021</xref>; <xref ref-type="bibr" rid="ref23">Tuptuk et al., 2021</xref>; <xref ref-type="bibr" rid="ref11">Inoue et al., 2017</xref>).</p>
<p>The practical significance of the study lies in the fact that the proposed cognitive architecture can be implemented as a set of microservices using container orchestration (Docker, Kubernetes) and integrated into existing monitoring and response systems (SOC) via APIs. Implementation in Python and TensorFlow environments ensures compatibility with modern MLOps tools, as well as the capability for distributed flow processing on edge nodes with minimal latency (<xref ref-type="bibr" rid="ref8">Gauthama Raman et al., 2021</xref>; <xref ref-type="bibr" rid="ref14">Kravchik and Shabtai, 2018</xref>; <xref ref-type="bibr" rid="ref9">Holdbrook et al., 2024</xref>).</p>
<p>Incorporating elements of the Zero Trust concept enabled the implementation of automatic incident responses, including network microsegmentation, isolation of infected assets, key rotation, and blocking of obsolete SSL/TLS and SNMP protocols (<xref ref-type="bibr" rid="ref22">Tariq et al., 2019</xref>; <xref ref-type="bibr" rid="ref25">Xie et al., 2021</xref>; <xref ref-type="bibr" rid="ref15">Li et al., 2024</xref>; <xref ref-type="bibr" rid="ref2">Ahmad et al., 2023</xref>; <xref ref-type="bibr" rid="ref10">Homaei et al., 2024</xref>). Thus, the system not only detects threats but also prevents their development, which meets modern requirements for industrial-grade intelligent cybersecurity systems.</p>
<p>The obtained results confirm the feasibility of practical application of the developed architecture to increase the resilience and reliability of industrial production. The system ensures a reduction in the probability of technological cycle disruption, prevents equipment downtime, and lowers the aggregate risk of financial losses due to cyber incidents (<xref ref-type="bibr" rid="ref26">Zhang et al., 2023</xref>; <xref ref-type="bibr" rid="ref10">Homaei et al., 2024</xref>).</p>
<p>The scientific novelty of the work lies in the formation of a cognitive approach to ensuring industrial cybersecurity, where artificial intelligence elements are used not only for detection but also for interpretation, forecasting, and adaptation of the protection system. The practical implementation of the presented solution opens up opportunities for the further development of multi-agent cognitive platforms that combine digital twins, contextual analytics, and predictive threat models (<xref ref-type="bibr" rid="ref9">Holdbrook et al., 2024</xref>).</p>
<p>Overall, the study showed that the proposed cognitive early incident detection system is a universal and scalable foundation for building next-generation intelligent industrial cyber defense systems. Its application ensures a transition from reactive to proactive security management, integration into the Industry 4.0 ecosystem, and an increased level of trust in digital production processes (<xref ref-type="bibr" rid="ref13">Knowles et al., 2015</xref>; <xref ref-type="bibr" rid="ref4">Bhamare et al., 2020</xref>; <xref ref-type="bibr" rid="ref5">Cherdantseva et al., 2016</xref>; <xref ref-type="bibr" rid="ref3">Anthi et al., 2021</xref>; <xref ref-type="bibr" rid="ref23">Tuptuk et al., 2021</xref>; <xref ref-type="bibr" rid="ref11">Inoue et al., 2017</xref>; <xref ref-type="bibr" rid="ref26">Zhang et al., 2023</xref>; <xref ref-type="bibr" rid="ref20">Qureshi et al., 2024</xref>; <xref ref-type="bibr" rid="ref10">Homaei et al., 2024</xref>; <xref ref-type="bibr" rid="ref9">Holdbrook et al., 2024</xref>; <xref ref-type="bibr" rid="ref12">Kantharaju et al., 2024</xref>; <xref ref-type="bibr" rid="ref6">Dietz and Pernul, 2020</xref>).</p>
<sec id="sec25">
<label>5.1</label>
<title>Limitations</title>
<p>We acknowledge that the reliance on older datasets (UNSW-NB15, CIC-IDS2017) combined with simulated OT data may not fully capture the complexity of zero-day exploits in 2026. Furthermore, &#x201C;data drift&#x201D; (e.g., sensor aging or recipe changes) remains a challenge. Future work will focus on implementing online learning mechanisms to update the AE&#x202F;+&#x202F;LSTM model parameters dynamically without stopping the production line, ensuring the system adapts to long-term operational shifts.</p>
</sec>
</sec>
</body>
<back>
<sec sec-type="data-availability" id="sec26">
<title>Data availability statement</title>
<p>The raw data supporting the conclusions of this article will be made available by the authors, without undue reservation.</p>
</sec>
<sec sec-type="author-contributions" id="sec27">
<title>Author contributions</title>
<p>GA: Writing &#x2013; review &#x0026; editing, Conceptualization, Supervision. DP-T: Investigation, Software, Writing &#x2013; original draft, Data curation. SA: Visualization, Formal analysis, Writing &#x2013; review &#x0026; editing, Validation, Methodology. NZ: Validation, Project administration, Resources, Writing &#x2013; original draft. LB: Formal analysis, Data curation, Writing &#x2013; review &#x0026; editing.</p>
</sec>
<ack>
<title>Acknowledgments</title>
<p>The authors express their gratitude to colleagues and academic staff from the participating universities for their methodological assistance, consultations, and support during the preparation and implementation of this research. The authors also thank all experts who contributed to the discussion of the results and improvement of the research methodology. The authors would like to express their sincere gratitude to Toshihiko Amemiya (Professor Emeritus, Kansai University) and Elaine Gerbert (Associate Professor, University of Kansas) for their invaluable assistance with the back-translation of the J-EC scale.</p>
</ack>
<sec sec-type="COI-statement" id="sec28">
<title>Conflict of interest</title>
<p>The author(s) declared that this work was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec sec-type="ai-statement" id="sec29">
<title>Generative AI statement</title>
<p>The author(s) declared that Generative AI was used in the creation of this manuscript. During the preparation of this work, the authors used AI exclusively for the purpose of translating the text into English and improving linguistic readability. After using this tool, the authors rigorously reviewed and edited the content to ensure accuracy and taking full responsibility for the content of the publication.</p>
<p>Any alternative text (alt text) provided alongside figures in this article has been generated by Frontiers with the support of artificial intelligence and reasonable efforts have been made to ensure accuracy, including review by the authors wherever possible. If you identify any issues, please contact us.</p>
</sec>
<sec sec-type="disclaimer" id="sec30">
<title>Publisher&#x2019;s note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<ref-list>
<title>References</title>
<ref id="ref1"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Abhishek</surname><given-names>K.</given-names></name> <name><surname>Singh</surname><given-names>S.</given-names></name></person-group> (<year>2023</year>). <article-title>Hybrid deep learning-based intrusion detection system for industrial networks</article-title>. <source>Comput. Secur.</source> <volume>128</volume>:<fpage>103160</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.cose.2023.103160</pub-id></mixed-citation></ref>
<ref id="ref2"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Ahmad</surname><given-names>R.</given-names></name> <name><surname>Raza</surname><given-names>S.</given-names></name> <name><surname>Asad</surname><given-names>M. U.</given-names></name> <name><surname>Khan</surname><given-names>A.</given-names></name> <name><surname>Rehman</surname><given-names>S. U.</given-names></name></person-group> (<year>2023</year>). <article-title>Security risk assessment in industrial control systems using fuzzy logic and machine learning</article-title>. <source>IEEE Access</source> <volume>11</volume>, <fpage>95278</fpage>&#x2013;<lpage>95294</lpage>. doi: <pub-id pub-id-type="doi">10.1109/ACCESS.2023.3318743</pub-id></mixed-citation></ref>
<ref id="ref3"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Anthi</surname><given-names>E.</given-names></name> <name><surname>Williams</surname><given-names>L.</given-names></name> <name><surname>Burnap</surname><given-names>P.</given-names></name> <name><surname>Jones</surname><given-names>K.</given-names></name></person-group> (<year>2021</year>). <article-title>A three-tiered intrusion detection system for industrial control systems</article-title>. <source>J. Cybersecur.</source> <volume>7</volume>:<fpage>tyab006</fpage>. doi: <pub-id pub-id-type="doi">10.1093/cybsec/tyab006</pub-id></mixed-citation></ref>
<ref id="ref001"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Basseville</surname><given-names>M.</given-names></name> <name><surname>Nikiforov</surname><given-names>I. V.</given-names></name></person-group> (<year>1993</year>). <source>Detection of Abrupt Changes: Theory and Application</source>. <publisher-loc>Englewood Cliffs, NJ</publisher-loc>: <publisher-name>Prentice Hall</publisher-name>.</mixed-citation></ref>
<ref id="ref4"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Bhamare</surname><given-names>D.</given-names></name> <name><surname>Zolanvari</surname><given-names>M.</given-names></name> <name><surname>Erbad</surname><given-names>A.</given-names></name> <name><surname>Jain</surname><given-names>R.</given-names></name> <name><surname>Khan</surname><given-names>K.</given-names></name> <name><surname>Meskin</surname><given-names>N.</given-names></name></person-group> (<year>2020</year>). <article-title>Cybersecurity for industrial control systems: a survey</article-title>. <source>Comput. Secur.</source> <volume>89</volume>:<fpage>101677</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.cose.2019.101677</pub-id></mixed-citation></ref>
<ref id="ref5"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Cherdantseva</surname><given-names>Y.</given-names></name> <name><surname>Burnap</surname><given-names>P.</given-names></name> <name><surname>Blyth</surname><given-names>A.</given-names></name> <name><surname>Eden</surname><given-names>P.</given-names></name> <name><surname>Jones</surname><given-names>K.</given-names></name> <name><surname>Soulsby</surname><given-names>H.</given-names></name> <etal/></person-group>. (<year>2016</year>). <article-title>A review of cyber security risk assessment methods for SCADA systems</article-title>. <source>Comput. Secur.</source> <volume>56</volume>, <fpage>1</fpage>&#x2013;<lpage>27</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.cose.2015.09.009</pub-id></mixed-citation></ref>
<ref id="ref6"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Dietz</surname><given-names>M.</given-names></name> <name><surname>Pernul</surname><given-names>G.</given-names></name></person-group> (<year>2020</year>). <article-title>Unleashing the digital twin&#x2019;s potential for ICS security</article-title>. <source>IEEE Secur. Privacy</source> <volume>18</volume>, <fpage>77</fpage>&#x2013;<lpage>83</lpage>. doi: <pub-id pub-id-type="doi">10.1109/MSEC.2019.2961650</pub-id></mixed-citation></ref>
<ref id="ref8"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Gauthama Raman</surname><given-names>M. R.</given-names></name> <name><surname>Maglaras</surname><given-names>L.</given-names></name> <name><surname>Kim</surname><given-names>K.</given-names></name> <name><surname>Janicke</surname><given-names>H.</given-names></name> <name><surname>Ferrag</surname><given-names>M. A.</given-names></name></person-group> (<year>2021</year>). <article-title>Machine learning for intrusion detection in industrial control systems: challenges and lessons from experimental evaluation</article-title>. <source>Cybersecurity</source> <volume>4</volume>:<fpage>18</fpage>. doi: <pub-id pub-id-type="doi">10.1186/s42400-021-00095-5</pub-id></mixed-citation></ref>
<ref id="ref9"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Holdbrook</surname><given-names>R.</given-names></name> <name><surname>Balador</surname><given-names>A.</given-names></name> <name><surname>Eliasson</surname><given-names>J.</given-names></name></person-group> (<year>2024</year>). <article-title>Network-based intrusion detection for industrial and robotic systems</article-title>. <source>Electronics</source> <volume>13</volume>:<fpage>4440</fpage>. doi: <pub-id pub-id-type="doi">10.3390/electronics13224440</pub-id></mixed-citation></ref>
<ref id="ref10"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Homaei</surname><given-names>M.</given-names></name> <name><surname>Mogoll&#x00F3;n-Guti&#x00E9;rrez</surname><given-names>&#x00D3;.</given-names></name> <name><surname>Sancho</surname><given-names>J. C.</given-names></name> <name><surname>&#x00C1;vila</surname><given-names>M.</given-names></name> <name><surname>Caro</surname><given-names>A.</given-names></name></person-group> (<year>2024</year>). <article-title>A review of digital twins and their application in cybersecurity based on artificial intelligence</article-title>. <source>Artif. Intell. Rev.</source> <volume>57</volume>, <fpage>2195</fpage>&#x2013;<lpage>2230</lpage>. doi: <pub-id pub-id-type="doi">10.1007/s10462-024-10805-3</pub-id></mixed-citation></ref>
<ref id="ref11"><mixed-citation publication-type="confproc"><person-group person-group-type="author"><name><surname>Inoue</surname><given-names>J.</given-names></name> <name><surname>Yamagata</surname><given-names>Y.</given-names></name> <name><surname>Chen</surname><given-names>Y.</given-names></name> <name><surname>Poskitt</surname><given-names>C. M.</given-names></name> <name><surname>Sun</surname><given-names>J.</given-names></name></person-group> (<year>2017</year>). &#x201C;<chapter-title>Anomaly detection for a water treatment system using unsupervised machine learning</chapter-title>.&#x201D; In: <conf-name>IEEE International Conference on Data Mining Workshops (ICDMW)</conf-name>, <publisher-loc>New York, NY</publisher-loc>: <publisher-name>IEEE</publisher-name></mixed-citation></ref>
<ref id="ref12"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Kantharaju</surname><given-names>V.</given-names></name> <name><surname>Suresh</surname><given-names>H.</given-names></name> <name><surname>Niranjanamurthy</surname><given-names>M.</given-names></name> <name><surname>Amin</surname><given-names>F.</given-names></name> <name><surname>Alabrah</surname><given-names>A.</given-names></name></person-group> (<year>2024</year>). <article-title>Machine learning-based intrusion detection framework for detecting security attacks in internet of things</article-title>. <source>Sci. Rep.</source> <volume>14</volume>:<fpage>30275</fpage>. doi: <pub-id pub-id-type="doi">10.1038/s41598-024-30275-3</pub-id></mixed-citation></ref>
<ref id="ref13"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Knowles</surname><given-names>W.</given-names></name> <name><surname>Prince</surname><given-names>D.</given-names></name> <name><surname>Hutchison</surname><given-names>D.</given-names></name> <name><surname>Disso</surname><given-names>J. P.</given-names></name> <name><surname>Jones</surname><given-names>K.</given-names></name></person-group> (<year>2015</year>). <article-title>A survey of cyber security management in industrial control systems</article-title>. <source>Int. J. Crit. Infrastruct. Prot.</source> <volume>9</volume>, <fpage>52</fpage>&#x2013;<lpage>80</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.ijcip.2015.02.002</pub-id></mixed-citation></ref>
<ref id="ref14"><mixed-citation publication-type="confproc"><person-group person-group-type="author"><name><surname>Kravchik</surname><given-names>M.</given-names></name> <name><surname>Shabtai</surname><given-names>A.</given-names></name></person-group> (<year>2018</year>). &#x201C;<chapter-title>Detecting cyber-attacks in industrial control systems using convolutional neural networks</chapter-title>.&#x201D; In: <conf-name>Proceedings of the 2018 workshop on cyber-physical systems security and privacy (CPS-SPC)</conf-name>, <publisher-loc>New York, NY</publisher-loc>: <publisher-name>Association for Computing Machinery</publisher-name></mixed-citation></ref>
<ref id="ref15"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Li</surname><given-names>C.</given-names></name> <name><surname>Peng</surname><given-names>X.</given-names></name> <name><surname>Zhang</surname><given-names>L.</given-names></name> <name><surname>Xu</surname><given-names>Q.</given-names></name> <name><surname>Zhao</surname><given-names>D.</given-names></name></person-group> (<year>2024</year>). <article-title>Multimodal deep fusion anomaly detection for industrial cyber-physical systems</article-title>. <source>IEEE Internet Things J.</source> <volume>11</volume>, <fpage>2651</fpage>&#x2013;<lpage>2665</lpage>. doi: <pub-id pub-id-type="doi">10.1109/JIOT.2023.3321687</pub-id></mixed-citation></ref>
<ref id="ref16"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Lin</surname><given-names>W.</given-names></name> <name><surname>Shao</surname><given-names>L.</given-names></name> <name><surname>Chen</surname><given-names>J.</given-names></name> <name><surname>He</surname><given-names>Y.</given-names></name></person-group> (<year>2022</year>). <article-title>Data-driven anomaly detection for industrial control systems based on dynamic threshold adjustment</article-title>. <source>IEEE Trans. Ind. Inform.</source> <volume>18</volume>, <fpage>2532</fpage>&#x2013;<lpage>2543</lpage>. doi: <pub-id pub-id-type="doi">10.1109/TII.2021.3116743</pub-id></mixed-citation></ref>
<ref id="ref17"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Mugarza</surname><given-names>I.</given-names></name> <name><surname>Araujo</surname><given-names>A.</given-names></name> <name><surname>Jacob</surname><given-names>E.</given-names></name> <name><surname>Huarte</surname><given-names>M.</given-names></name></person-group> (<year>2020</year>). <article-title>Security issues and software updates management in the industrial internet of things: a survey</article-title>. <source>Sensors</source> <volume>20</volume>:<fpage>6777</fpage>. doi: <pub-id pub-id-type="doi">10.3390/s20236777</pub-id>, <pub-id pub-id-type="pmid">33260864</pub-id></mixed-citation></ref>
<ref id="ref18"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Neyman</surname><given-names>J.</given-names></name> <name><surname>Pearson</surname><given-names>E. S.</given-names></name></person-group> (<year>1933</year>). <article-title>On the problem of the most efficient tests of statistical hypotheses</article-title>. <source>Philos. Trans. R. Soc. Lond. Ser. A</source> <volume>231</volume>, <fpage>289</fpage>&#x2013;<lpage>337</lpage>. doi: <pub-id pub-id-type="doi">10.1098/rsta.1933.0009</pub-id></mixed-citation></ref>
<ref id="ref19"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Nisar</surname><given-names>M.</given-names></name> <name><surname>Shah</surname><given-names>S. C.</given-names></name> <name><surname>Rehman</surname><given-names>A.</given-names></name></person-group> (<year>2022</year>). <article-title>Deep hybrid autoencoder-LSTM model for anomaly detection in industrial IoT</article-title>. <source>Sensors</source> <volume>22</volume>:<fpage>6743</fpage>. doi: <pub-id pub-id-type="doi">10.3390/s22186743</pub-id>, <pub-id pub-id-type="pmid">36146093</pub-id></mixed-citation></ref>
<ref id="ref20"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Qureshi</surname><given-names>A. R.</given-names></name> <name><surname>Alhumyani</surname><given-names>H.</given-names></name> <name><surname>Alqurashi</surname><given-names>F.</given-names></name> <name><surname>Aljuaid</surname><given-names>H.</given-names></name></person-group> (<year>2024</year>). <article-title>Digital twin-based cybersecurity framework for smart manufacturing systems</article-title>. <source>Futur. Gener. Comput. Syst.</source> <volume>158</volume>, <fpage>39</fpage>&#x2013;<lpage>55</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.future.2024.02.009</pub-id></mixed-citation></ref>
<ref id="ref21"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Raman</surname><given-names>G. R. M.</given-names></name> <name><surname>Ahmed</surname><given-names>C. M.</given-names></name> <name><surname>Mathur</surname><given-names>A.</given-names></name></person-group> (<year>2021</year>). <article-title>Machine learning for intrusion detection in industrial control systems: challenges and lessons from experimental evaluation</article-title>. <source>Cybersecurity</source> <volume>4</volume>:<fpage>27</fpage>. doi: <pub-id pub-id-type="doi">10.1186/s42400-021-00095-5</pub-id></mixed-citation></ref>
<ref id="ref22"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Tariq</surname><given-names>N.</given-names></name> <name><surname>Asim</surname><given-names>M.</given-names></name> <name><surname>Khan</surname><given-names>F. A.</given-names></name></person-group> (<year>2019</year>). <article-title>Securing SCADA-based critical infrastructures: challenges and open issues</article-title>. <source>Procedia Comput. Sci.</source> <volume>155</volume>, <fpage>612</fpage>&#x2013;<lpage>617</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.procs.2019.08.086</pub-id></mixed-citation></ref>
<ref id="ref23"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Tuptuk</surname><given-names>N.</given-names></name> <name><surname>Hazell</surname><given-names>P.</given-names></name> <name><surname>Watson</surname><given-names>J.</given-names></name> <name><surname>Hailes</surname><given-names>S.</given-names></name></person-group> (<year>2021</year>). <article-title>A systematic review of the state of cyber-security in water systems</article-title>. <source>Water</source> <volume>13</volume>:<fpage>81</fpage>. doi: <pub-id pub-id-type="doi">10.3390/w13010081</pub-id></mixed-citation></ref>
<ref id="ref24"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Wang</surname><given-names>W.</given-names></name> <name><surname>Zhu</surname><given-names>M.</given-names></name> <name><surname>Wang</surname><given-names>J.</given-names></name> <name><surname>Zeng</surname><given-names>X.</given-names></name> <name><surname>Yang</surname><given-names>Z.</given-names></name></person-group> (<year>2022</year>). <article-title>End-to-end encrypted telemetry protection for SCADA systems using edge intelligence</article-title>. <source>IEEE Internet Things J.</source> <volume>9</volume>, <fpage>13210</fpage>&#x2013;<lpage>13220</lpage>. doi: <pub-id pub-id-type="doi">10.1109/JIOT.2021.3128749</pub-id></mixed-citation></ref>
<ref id="ref25"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Xie</surname><given-names>J.</given-names></name> <name><surname>Yu</surname><given-names>F. R.</given-names></name> <name><surname>Huang</surname><given-names>T.</given-names></name> <name><surname>Xie</surname><given-names>R.</given-names></name> <name><surname>Liu</surname><given-names>J.</given-names></name> <name><surname>Liu</surname><given-names>Y.</given-names></name></person-group> (<year>2021</year>). <article-title>A survey of machine learning techniques applied to cybersecurity</article-title>. <source>IEEE Commun. Surv. Tutor.</source> <volume>23</volume>, <fpage>546</fpage>&#x2013;<lpage>576</lpage>. doi: <pub-id pub-id-type="doi">10.1109/COMST.2020.3024748</pub-id></mixed-citation></ref>
<ref id="ref26"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Zhang</surname><given-names>Y.</given-names></name> <name><surname>Lin</surname><given-names>X.</given-names></name> <name><surname>Wang</surname><given-names>W.</given-names></name> <name><surname>Wu</surname><given-names>L.</given-names></name> <name><surname>Zhang</surname><given-names>Y.</given-names></name></person-group> (<year>2023</year>). <article-title>A digital twin-driven approach for industrial anomaly detection</article-title>. <source>Robot. Comput.-Integr. Manuf.</source> <volume>81</volume>:<fpage>102547</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.rcim.2022.102547</pub-id></mixed-citation></ref>
<ref id="ref27"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Zhao</surname><given-names>X.</given-names></name> <name><surname>Zhang</surname><given-names>R.</given-names></name> <name><surname>Hu</surname><given-names>X.</given-names></name> <name><surname>Zhang</surname><given-names>H.</given-names></name> <name><surname>Sangaiah</surname><given-names>A. K.</given-names></name></person-group> (<year>2022</year>). <article-title>Anomaly detection approach in industrial control systems using PSO-1DCNN-BiLSTM</article-title>. <source>Information</source> <volume>13</volume>:<fpage>450</fpage>. doi: <pub-id pub-id-type="doi">10.3390/info13100450</pub-id></mixed-citation></ref>
</ref-list>
<fn-group>
<fn fn-type="custom" custom-type="edited-by" id="fn0001">
<p>Edited by: <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/970480/overview">Jairo Gutierrez</ext-link>, Auckland University of Technology, New Zealand</p>
</fn>
<fn fn-type="custom" custom-type="reviewed-by" id="fn0002">
<p>Reviewed by: <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/2568386/overview">Safarudin Gazali Herawan</ext-link>, Binus University, Indonesia</p>
<p><ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/3356679/overview">Andrea Pinto</ext-link>, University of Los Andes, Colombia</p>
</fn>
</fn-group>
</back>
</article>