
5 CONCLUSIONS
In conclusion, the proposed approach of leverag-
ing historical incident data and employing similar-
ity analysis algorithms in the MMT-RCA framework
has shown promising results in incident management
and root cause identification. By building a com-
prehensive incident repository and analyzing patterns
and correlations among issues, the framework effec-
tively identifies similar incidents and their underlying
causes. The validation experiments conducted using
real-world incident data from industrial settings pro-
vided by both ABB and FAGOR have demonstrated
the framework’s accuracy in diagnosing incidents and
significantly reducing the time needed for manual
analysis. The automation of the diagnosis process not
only improves incident response time but also enables
proactive maintenance, leading to increased system
uptime and enhanced operational efficiency. Overall,
the implementation of this approach holds great po-
tential for enhancing incident management practices
and optimizing the performance of industrial systems.
ACKNOWLEDGMENT
This work is partially supported by the European
Union’s Horizon Europe research and innovation pro-
gram under grant agreements No 957212 (VERIDE-
VOPS) and No 101070455 (DYNABIC). Views and
opinions expressed are however those of the author(s)
only and do not necessarily reflect those of the Euro-
pean Union.
REFERENCES
Black, P., Gondal, I., Vamplew, P., and Lakhotia, A. (2019).
Evolved similarity techniques in malware analysis. In
18th IEEE International Conference On Trust, Secu-
rity And Privacy In Computing And Communications /
13th IEEE International Conference On Big Data Sci-
ence And Engineering, TrustCom/BigDataSE 2019,
Rotorua, New Zealand, August 5-8, 2019, pages 404–
410. IEEE.
Choi, H., Yeo, D., Kwon, S., and Kim, Y. (2011). Gene
selection and prediction for cancer classification using
support vector machines with a reject option. Comput.
Stat. Data Anal., 55(5):1897–1908.
Ezugwu, A. E., Ikotun, A. M., Oyelade, O. N., Abualigah,
L. M., Agushaka, J. O., Eke, C. I., and Akinyelu,
A. A. (2022). A comprehensive survey of cluster-
ing algorithms: State-of-the-art machine learning ap-
plications, taxonomy, challenges, and future research
prospects. Eng. Appl. Artif. Intell., 110:104743.
He, Z., Chen, P., Luo, Y., Yan, Q., Chen, H., Yu, G.,
and Li, F. (2022). Graph based incident extraction
and diagnosis in large-scale online systems. In 37th
IEEE/ACM International Conference on Automated
Software Engineering, ASE 2022, Rochester, MI, USA,
October 10-14, 2022, pages 48:1–48:13. ACM.
Hemsley, K. and Fisher, R. E. (2018). A history of cy-
ber incidents and threats involving industrial control
systems. In Staggs, J. and Shenoi, S., editors, Crit-
ical Infrastructure Protection XII - 12th IFIP WG
11.10 International Conference, ICCIP 2018, Arling-
ton, VA, USA, March 12-14, 2018, Revised Selected
Papers, volume 542 of IFIP Advances in Informa-
tion and Communication Technology, pages 215–242.
Springer.
Kalam, A. A. E. (2021). Securing SCADA and critical in-
dustrial systems: From needs to security mechanisms.
Int. J. Crit. Infrastructure Prot., 32:100394.
Kallel, S., Cuppens, F., Boulahia-Cuppens, N., Kacem,
A. H., and Othmane, L. B. (2021). Special issue on
risk and security of smart systems. J. Inf. Secur. Appl.,
61:102925.
Kiermeier, M. and Feld, S. (2018). Visual analytics for root
cause analysis in self-organizing industrial systems. In
16th IEEE International Conference on Industrial In-
formatics, INDIN 2018, Porto, Portugal, July 18-20,
2018, pages 315–320. IEEE.
Kirkpatrick, K. (2019). Protecting industrial control sys-
tems. Commun. ACM, 62(10):14–16.
Lanotte, R., Merro, M., and Munteanu, A. (2023). In-
dustrial control systems security via runtime enforce-
ment. ACM Trans. Priv. Secur., 26(1):4:1–4:41.
Salazar, Z., Cavalli, A. R., Mallouli, W., Sebek, F., Za
¨
ıdi, F.,
and Rakoczy, M. E. (2022). Monitoring approaches
for security and safety analysis: Application to a load
position system. In 15th IEEE International Confer-
ence on Software Testing, Verification and Validation
Workshops ICST Workshops 2022, Valencia, Spain,
April 4-13, 2022, pages 40–48. IEEE.
Wang, H., Wu, Z., Jiang, H., Huang, Y., Wang, J., K
¨
opr
¨
u,
S., and Xie, T. (2021). Groot: An event-graph-based
approach for root cause analysis in industrial settings.
In 36th IEEE/ACM International Conference on Auto-
mated Software Engineering, ASE 2021, Melbourne,
Australia, November 15-19, 2021, pages 419–429.
IEEE.
ICSOFT 2024 - 19th International Conference on Software Technologies
338