Natural Language Processing (NLP)-Based Frameworks for Cyber Threat Intelligence and Early Prediction of Cyberattacks in Industry 4.0: A Systematic Literature Review
Abstract
1. Introduction
1.1. Background and Motivation
1.2. Problem Statement
1.3. Objectives of the Review
- Identify and classify existing NLP-driven frameworks, algorithms, and methodologies used for CTI extraction, threat detection, and early attack prediction within Industry 4.0.
- Assess how these NLP-driven methods fit within manufacturing and industrial control settings, particularly in Internet of Things (IoT), SCADA, and ICS contexts.
- Evaluate research gaps at the crossroad of NLP, CTI, and Industry 4.0 cybersecurity on matters related to data quality as well as interpretability and scalability issues.
- Offer future research directions that integrate predictive analytics, AI, and NLP to develop anticipatory, domain-specific cybersecurity schemes for digital manufacturing systems.
1.4. Scope and Contribution
- Assess NLP-based systems for cyber threat analysis, information extraction, or predictive attack modelling.
- Apply these techniques in contexts relevant to Industry 4.0, including manufacturing, IoT, ICS, and SCADA systems.
- Offer empirical evaluations, comparative analyses, or frameworks showing measurable improvement in detection or prediction capability.
2. Background
3. Methodology
3.1. Review Protocol
- Defining research objectives and questions,
- Developing the search strategy,
- Establishing inclusion and exclusion criteria, and
- Extracting and synthesising data.
3.2. Search Strategy
- The application of NLP methods,
- their use in CTI or cyber-attack prediction, and
- their deployment or relevance within manufacturing or industrial environments.
Search Parameters
- Databases searched: IEEE Xplore, Scopus, Web of Science (WoS)
- Publication years: 2015–2025
- Language: English
- Document types: Peer-reviewed journal articles and conference papers
- Subject areas: Computer Science, Cybersecurity, Engineering, and Industrial Systems
3.3. Inclusion and Exclusion Criteria
3.3.1. Inclusion Criteria
- Peer-reviewed studies published between 2015 and 2025.
- Research written in English.
- Studies directly addressing NLP, CTI, or cyberattack prediction in manufacturing, Industry 4.0, or ICS contexts.
- Articles proposing or evaluating NLP-based frameworks or models for cybersecurity or threat intelligence.
3.3.2. Exclusion Criteria
- Non-English publications.
- Non-peer-reviewed literature (e.g., theses, reports).
- Studies not integrating NLP and CTI concepts.
- Duplicate records retrieved across databases.
- Records representing conference names only (not full papers).
3.4. PRISMA Flow of Study Selection
3.5. Data Extraction and Analysis
- Bibliographic details: Author(s), year, and source.
- Methodology: Research design, model type, or framework used.
- NLP Technique: e.g., Transformer, BERT, LLM, …
4. Results
4.1. Industrial Systems
4.1.1. Threat Intelligence Extraction: NER and Relation Extraction
4.1.2. Log and Alert Understanding: Tokenization Choices, Representation, and Temporal Structure
4.1.3. MITRE ATT&CK Integration: Technique Classification and Cross-Taxonomy Alignment
4.1.4. LLM-Centric Methods: In-Context Learning, RAG, and Agentic Workflows
4.1.5. Supporting Techniques and Complementary Industrial NLP Approaches
4.2. Critical Infrastructure Protection
4.3. Power and Energy Systems
4.4. Industrial Internet of Things
4.5. Electric Vehicles and Emerging Domains
4.6. Summary
5. Challenges and Research Gaps
6. Future Research Directions
7. Discussion
8. Conclusions
Supplementary Materials
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Ross, P.; Maynard, K. Towards a 4th industrial revolution. Intell. Build. Int. 2021, 13, 159–161. [Google Scholar] [CrossRef]
- Tuptuk, N.; Hailes, S. Security of smart manufacturing systems. J. Manuf. Syst. 2018, 47, 93–106. [Google Scholar] [CrossRef]
- Ukwandu, E.; Hewage, C.; Hindy, H. Editorial: Cyber security in the wake of fourth industrial revolution: Opportunities and challenges. Front. Big Data 2024, 7, 1369159. [Google Scholar] [CrossRef]
- Maggi, F.; Balduzzi, M.; Vosseler, R.; Rösler, M.; Quadrini, W.; Tavola, G.; Pogliani, M.; Quarta, D.; Zanero, S. Smart factory security: A case study on a modular smart manufacturing system. Procedia Comput. Sci. 2021, 180, 666–675. [Google Scholar] [CrossRef]
- Stănculescu, M.S. A case study of an industrial power plant under cyberattack. Energies 2021, 14, 2568. [Google Scholar] [CrossRef]
- Mittal, S.; Pearce, H.; Yampolskiy, M.; Oromiehie, E.; Prusty, B.G. On cyber sabotage risks in automated manufacturing of composites. J. Manuf. Syst. 2025, 77, 351–363. [Google Scholar] [CrossRef]
- The Guardian. Cyber-Attack Cost Marks and Spencer Lost Sales, Company Results Reveal. 21 May 2025. Available online: https://www.theguardian.com/business/2025/may/21/cyber-attack-cost-marks-and-spencer-lost-sales-company-results-reveal (accessed on 1 January 2026).
- Reuters. M&S Says Cyber Hackers Broke Through Third-Party Contractor. 21 May 2025. Available online: https://www.reuters.com/business/aerospace-defense/ms-says-cyber-hackers-broke-through-third-party-contractor-2025-05-21/ (accessed on 1 January 2026).
- Reuters. Britain’s JLR Hit by Cyber Incident That Disrupts Production, Sales. 2 September 2025. Available online: https://www.reuters.com/business/autos-transportation/britains-jlr-hit-by-cyber-incident-that-disrupts-production-sales-2025-09-02/ (accessed on 1 January 2026).
- Upadhyay, D.; Sampalli, S. SCADA (Supervisory Control and Data Acquisition) systems: Vulnerability assessment and security recommendations. Comput. Secur. 2020, 89, 101666. [Google Scholar] [CrossRef]
- Johnson, C.; Badger, L.; Waltermire, D.; Snyder, J.; Skorupka, C. Guide to Cyber Threat. NIST Special Publication, 2016. pp. 1–5. Available online: https://nsarchive.gwu.edu/sites/default/files/documents/5218969/Department-of-Commerce-U-S-NIST-Special.pdf (accessed on 1 January 2026).
- Alaeifar, P.; Pal, S.; Jadidi, Z.; Hussain, M.; Foo, E. Current approaches and future directions for cyber threat intelligence sharing: A survey. J. Inf. Secur. Appl. 2024, 83, 103786. [Google Scholar] [CrossRef]
- Zibak, A.; Sauerwein, C.; Simpson, A.C. Threat Intelligence Quality Dimensions for Research and Practice. Digit. Threat. Res. Pract. 2022, 3, 1–22. [Google Scholar] [CrossRef]
- Palo Alto Networks. What Is Cyber Threat Intelligence (CTI)? Cyberpedia, 2019. Available online: https://www.paloaltonetworks.com/cyberpedia/what-is-cyberthreat-intelligence-cti (accessed on 1 January 2026).
- Recorded Future. What are the 6 Phases of the Threat Intelligence Lifecycle? Threat Intelligence Blog, 5 February 2024. Available online: https://www.recordedfuture.com/blog/threat-intelligence-lifecycle-phases (accessed on 1 January 2026).
- Montasari, R.; Carroll, F.; Macdonald, S.; Jahankhani, H.; Hosseinian-Far, A.; Daneshkhah, A. Application of Artificial Intelligence and Machine Learning in Producing Actionable Cyber Threat Intelligence. In Digital Forensic Investigation of Internet of Things (IoT) Devices; Springer: Cham, Switzerland, 2020; pp. 47–64. [Google Scholar]
- Jurafsky, D.; Martin, J.H. Speech and Language Processing: An Introduction to Natural Language Processing, Computational Linguistics, and Speech Recognition, 3rd ed.; Pearson: London, UK, 2023. [Google Scholar]
- Chomsky, N. Syntactic Structures; Mouton: New York City, NY, USA, 1957. [Google Scholar]
- Eisenstein, J. Introduction to Natural Language Processing; MIT Press: Cambridge, MA, USA, 2019. [Google Scholar]
- Hochreiter, S.; Schmidhuber, J. Long Short-Term Memory. Neural Comput. 1997, 9, 1735–1780. [Google Scholar] [CrossRef]
- Kim, Y. Convolutional Neural Networks for Sentence Classification. In Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing, Doha, Qatar, 25–29 October 2014; pp. 1746–1751. [Google Scholar]
- Vaswani, A.; Shazeer, N.; Parmar, N.; Uszkoreit, J.; Jones, L.; Gomez, A.N.; Kaiser, Ł.; Polosukhin, I. Attention Is All You Need. In Advances in Neural Information Processing Systems (NeurIPS); Long Beach, CA, USA, 4–9 December 2017; Curran Associates, Inc.: Red Hook, NY, USA, 2017. [Google Scholar]
- Hutchins, W.J. The Georgetown-IBM Experiment Demonstrated in January 1954. In Machine Translation: From Real Users to Research; Springer: Berlin/Heidelberg, Germany, 2004; pp. 102–114. [Google Scholar]
- Brown, P.F.; Pietra, V.J.; Della Pietra, S.A.; Della Mercer, R.L. The Mathematics of Statistical Machine Translation: Parameter Estimation. Comput. Linguist. 1993, 19, 263–311. [Google Scholar]
- Biber, D.; Conrad, S.; Reppen, R. Corpus Linguistics: Investigating Language Structure and Use; Cambridge University Press: Cambridge, UK, 1998. [Google Scholar]
- Collobert, R.; Weston, J.; Bottou, L.; Karlen, M.; Kavukcuoglu, K.; Kuksa, P. Natural Language Processing (Almost) from Scratch. J. Mach. Learn. Res. 2011, 12, 2493–2537. [Google Scholar]
- Mikolov, T.; Chen, K.; Corrado, G.; Dean, J. Efficient Estimation of Word Representations in Vector Space. arXiv 2013, arXiv:1301.3781v3. [Google Scholar] [CrossRef]
- Devlin, J.; Chang, M.-W.; Lee, K.; Toutanova, K. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. In Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics (NAACL-HLT), Minneapolis, MN, USA, 2–7 June 2019; pp. 4171–4186. [Google Scholar]
- Jones, K.S. Natural language processing: A historical review. In Current Issues in Computational Linguistics: In Honour of Don Walker; Springer: Berlin/Heidelberg, Germany, 1994; pp. 3–16. [Google Scholar]
- Liu, Y.; Ott, M.; Goyal, N.; Du, J.; Joshi, M.; Chen, D.; Levy, O.; Lewis, M.; Zettlemoyer, L.; Stoyanov, V. Roberta: A robustly optimized bert pretraining approach. arXiv 2019, arXiv:1907.11692. [Google Scholar]
- Chen, J.; Lu, Y.; Zhang, Y.; Huang, F.; Qin, J. A management knowledge graph approach for critical infrastructure protection: Ontology design, information extraction and relation prediction. Int. J. Crit. Infrastruct. Prot. 2023, 43, 100634. [Google Scholar] [CrossRef]
- Alqudhaibi, A.; Albarrak, M.; Aloseel, A.; Jagtap, S.; Salonitis, K. Predicting Cybersecurity Threats in Critical Infrastructure for Industry 4.0: A Proactive Approach Based on Attacker Motivations. Sensors 2023, 23, 4539. [Google Scholar] [CrossRef]
- Monostori, L.; Kádár, B.; Bauernhansl, T.; Kondoh, S.; Kumara, S.; Reinhart, G.; Sauer, O.; Schuh, G.; Sihn, W.; Ueda, K. Cyber-physical systems in manufacturing. Cirp Ann. 2016, 65, 621–641. [Google Scholar] [CrossRef]
- IEC 62443-1-1:2009; Security for Industrial Automation and Control Systems: Models and Concepts. International Electrotechnical Commission: Geneva, Switzerland, 2009.
- IEC 62443-1-2; Security for Industrial Automation and Control Systems: Master Glossary of Terms and Abbreviations. International Electrotechnical Commission: Geneva, Switzerland, 2024. Available online: https://syc-se.iec.ch/deliveries/cybersecurity-guidelines/security-standards-and-best-practices/iec-62443/ (accessed on 12 August 2024).
- IEC 62443-1-3; Security for Industrial Automation and Control Systems: Cyber Security System Conformance Metrics. International Electrotechnical Commission: Geneva, Switzerland, 2024. Available online: https://www.iec.ch/dyn/www/f?p=103:38:417212030183982::::FSP_ORG_ID,FSP_APEX_PAGE,FSP_PROJECT_ID:1250,20,18900 (accessed on 12 August 2024).
- IEC 62443-2-1; Industrial Communication Networks—Network and System Security—Part 2-1: Establishing an IACS Security Program. International Electrotechnical Commission (IEC): Geneva, Switzerland, 2010.
- IEC 62443-3-3; Industrial Communication Networks—Network and System Security—Part 3-3: System Security Requirements and Security Levels. International Electrotechnical Commission (IEC): Geneva, Switzerland, 2013.
- Ross, R.; Pillitteri, V.; Graubart, R.; Bodeau, D.; McQuaid, R. Developing Cyber Resilient Systems: A Systems Security Engineering Approach; No. NIST Special Publication (SP) 800-160 Vol. 2 (Draft); National Institute of Standards and Technology: Gaithersburg, MD, USA, 2019. [Google Scholar]
- Büthe, T. Engineering uncontestedness? The origins and institutional development of the International Electrotechnical Commission (IEC). Bus. Politics 2010, 12, 1–62. [Google Scholar] [CrossRef]
- Wylde, V.; Rawindaran, N.; Lawrence, J.; Balasubramanian, R.; Prakash, E.; Jayal, A.; Khan, I.; Hewage, C.; Platts, J. Cybersecurity, data privacy and blockchain: A review. SN Comput. Sci. 2022, 3, 127. [Google Scholar] [CrossRef]
- Ani, U.P.D.; He, H.; Tiwari, A. Review of cybersecurity issues in industrial critical infrastructure: Manufacturing in perspective. J. Cyber Secur. Technol. 2017, 1, 32–74. [Google Scholar] [CrossRef]
- Kitchenham, B.; Charters, S. Guidelines for Performing Systematic Literature Reviews in Software Engineering, Version 2.3; EBSE Technical Report EBSE-2007-01; Software Engineering Group, School of Computer Science and Mathematics, Keele University: Keele, UK; Department of Computer Science, University of Durham: Durham, UK, 9 July 2007. [Google Scholar]
- Page, M.J.; McKenzie, J.E.; Bossuyt, P.M.; Boutron, I.; Hoffmann, T.C.; Mulrow, C.D.; Shamseer, L.; Tetzlaff, J.M.; Akl, E.A.; Brennan, S.E.; et al. The PRISMA 2020 statement: An updated guideline for reporting systematic reviews. BMJ 2021, 372, n71. [Google Scholar] [CrossRef]
- Chang, Y.; Wang, G.; Zhu, P.; He, J.; Kong, L. Research on Unified Cyber Threat Intelligence Entity Recognition Method Based on Multiple Features. In Proceedings of the 2023 4th International Conference on Computers and Artificial Intelligence Technology (CAIT), Macau, China, 13–15 December 2023. [Google Scholar]
- Cheng, K.; Tang, W.; Tan, L.; Yang, J. DeBERTaIC: A Framework for Cyber Threat Analysis Integrating DeBERTa Model and Attack Intelligence Chain. IEEE Trans. Consum. Electron. 2025, 71, 7756–7770. [Google Scholar] [CrossRef]
- Chen, S.-S.; Pai, T.-W.; Sun, C.-Y. EnhanceCTI: Enhanced semantic filtering and feature extraction framework for industry-specific cyber threat intelligence. Comput. Secur. 2025, 158, 104649. [Google Scholar] [CrossRef]
- Coote, E.; Lachine, B. Platform Management System Host-Based Anomaly Detection using TF-IDF and an LSTM Autoencoder. In Proceedings of the MILCOM 2023—2023 IEEE Military Communications Conference (MILCOM), Boston, MA, USA, 30 October–3 November 2023. [Google Scholar]
- Zhang, S.; Wang, Y.; Su, X. Threat Detection Framework Based on Industrial Internet of Things Logs. IEEE Access 2024, 12, 195642–195657. [Google Scholar] [CrossRef]
- Villanueva-Miranda, I.; Akbar, M. Analyzing Threat Vectors in ICS Cyberattacks. In Proceedings of the 2023 IEEE International Conference on Big Data (BigData), Sorrento, Italy, 15–18 December 2023. [Google Scholar]
- Kim, D.-Y.; Yoon, S.-S.; Euom, I.-C. V2TSA: Analysis of Vulnerability to Attack Techniques Using a Semantic Approach. IEEE Access 2024, 12, 166742–166760. [Google Scholar] [CrossRef]
- Albarrak, M.; Alqudhaibi, A.; Jagtap, S. AC_MAPPER: A robust approach to ATT&CK technique classification using input augmentation and class rebalancing. Int. J. Inf. Secur. 2025, 24, 232. [Google Scholar] [CrossRef]
- Alaliwat, F.; Alqahtani, L.; Alzahrani, M.; Alamoudi, N.; Hakami, S.; Alharby, A.; Alharbi, N. OTuHunt: An Aggregated Threat Hunting & Intelligence Platform for OT/ICS Environment and MSSP Services. In Proceedings of the 2025 12th International Conference on Information Technology (ICIT), Amman, Jordan, 27–30 May 2025. [Google Scholar]
- Ann, S.; Cho, S.-J.; Kim, H. A Preliminary Study on an Intrusion Detection Method using Large Language Models in Industrial Control Systems. In Proceedings of the 2024 Fifteenth International Conference on Ubiquitous and Future Networks (ICUFN), Budapest, Hungary, 2–5 July 2024. [Google Scholar]
- Jin, Z.; Zhao, J.; Li, W.; Sheng, C.; Sun, T.; Lv, F. An Integrated Approach to Enhancing Equipment Anomaly Detection Efficiency in Large Language Models Using Multiple Machine Learning Algorithms. In Proceedings of the 2025 5th International Conference on Artificial Intelligence and Industrial Technology Applications (AIITA), Xi’an, China, 28–30 March 2025. [Google Scholar]
- Chamotra, S.; Barbhuiya, F.A. Advancing Industrial Honeypots: FSM and LLM Integration for Realistic ICS Protocol Emulation. IEEE Trans. Industr. Inform. 2025; Early Access. [Google Scholar] [CrossRef]
- Marali, M.; Dhanalakshmi, R.; Rajagopalan, N. A hybrid transformer-based BERT and LSTM approach for vulnerability classification problems. Int. J. Math. Oper. Res. 2024, 28, 275–295. [Google Scholar] [CrossRef]
- Farhan, A.; Rahman, M.; Akbar, M.; Hossain, M.S. AWEB to Bridge Cybersecurity Attack Patterns and Weaknesses. In Proceedings of the 2024 IEEE International Conference on Big Data (BigData), Washington, DC, USA, 15–18 December 2024. [Google Scholar]
- Tory, A.R.; Hasan, K.F. An evaluation framework for network IDS/IPS datasets: Leveraging MITRE ATT&CK and industry relevance metrics. Comput. Secur. 2025, 161, 104777. [Google Scholar] [CrossRef]
- Wang, F.; Liu, Y.; Qin, Z.; Dong, F. A transformer-enhanced LSTM framework for robust malicious traffic detection in industrial control systems. Knowl. Based Syst. 2025, 321, 113725. [Google Scholar] [CrossRef]
- Hoang, N.X.; Hoang, N.V.; Du, N.H.; Huong, T.T.; Tran, K.P. Explainable Anomaly Detection for Industrial Control System Cybersecurity. IFAC-PapersOnLine 2022, 55, 1183–1188. [Google Scholar] [CrossRef]
- Chen, X.; Li, Y.; Xu, P.; Wang, K.; Naqvi, S.S.A. Overview of the Application of Knowledge Graph in Industrial Control Security Field. In Proceedings of the 2025 44th Chinese Control Conference (CCC), Chongqing, China, 28–30 July 2025. [Google Scholar]
- Wray, T.; Wang, Y. 5G Specifications Formal Verification with Over-the-Air Validation: Prompting is All You Need. In Proceedings of the MILCOM 2024—2024 IEEE Military Communications Conference (MILCOM), Washington, DC, USA, 28 October–1 November 2024. [Google Scholar]
- Mpatziakas, A.; Schoinas, I.; Lalas, A.; Drosou, A.; Chatzidiamantis, N.; Tzovaras, D. Deciphering Standards for cybersecurity in Industry 40: Advisory AIfor Cybersecure IIoT. In Proceedings of the 2025 IEEE International Conference on Cyber Security and Resilience (CSR), Chania, Greece, 4–6 August 2025. [Google Scholar]
- Settanni, G.; Shovgenya, Y.; Skopik, F.; Graf, R.; Wurzenberger, M.; Fiedler, R. Correlating cyber incident information to establish situational awareness in Critical Infrastructures. In Proceedings of the 2016 14th Annual Conference on Privacy, Security and Trust (PST), Auckland, New Zealand, 12–14 December 2016. [Google Scholar]
- Wang, Y.; Yang, C.; Lan, S.; Fei, W.; Wang, L.; Huang, G.Q.; Zhu, L. Towards Industrial Foundation Models: Framework, Key Issues and Potential Applications. In Proceedings of the 2024 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD), Tianjin, China, 8–10 May 2024. [Google Scholar]
- Salley, C.J.; Mohammadi, N.; Taylor, J.E. Safeguarding Infrastructure from Cyber Threats with NLP-Based Information Retrieval. In Proceedings of the 2023 Winter Simulation Conference (WSC), San Antonio, TX, USA, 10–13 December 2023. [Google Scholar]
- Yu, K.; Tan, L.; Mumtaz, S.; Al-Rubaye, S.; Al-Dulaimi, A.; Bashir, A.K.; Khan, F.A. Securing Critical Infrastructures: Deep-Learning-Based Threat Detection in IIoT. IEEE Commun. Mag. 2021, 59, 76–82. [Google Scholar] [CrossRef]
- He, H.; Gray, J.; Cangelosi, A.; Meng, Q.; McGinnity, T.M.; Mehnen, J. The Challenges and Opportunities of Artificial Intelligence for Trustworthy Robots and Autonomous Systems. In Proceedings of the 2020 3rd International Conference on Intelligent Robotic and Control Engineering (IRCE), Oxford, UK, 10–12 August 2020. [Google Scholar]
- Selim, A.; Zhao, J.; Yang, B. Large Language Model for Smart Inverter Cyber-Attack Detection via Textual Analysis of Volt/VAR Commands. IEEE Trans. Smart Grid 2024, 15, 6179–6182. [Google Scholar] [CrossRef]
- IEC 61850; Communication Networks and Systems for Power Utility Automation. International Electrotechnical Commission (IEC): Geneva, Switzerland, 2021.
- Manzoor, F.; Khattar, V.; Liu, C.-C.; Jin, M. Zero-day Attack Detection in Digital Substations using In-Context Learning. In Proceedings of the 2024 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Venice, Italy, 17–20 June 2024. [Google Scholar]
- Yang, C.; Niu, Y.; Huang, H.; Zhang, S.; Deng, X.; Yang, Y.; Wu, Q.; Liu, Y. A Cybersecurity Entity Recognition Method for Enhancing Situation Awareness in Power Systems. In Proceedings of the 2024 IEEE 4th New Energy and Energy Storage System Control Summit Forum (NEESSC), Hohhot, China, 29–31 August 2024. [Google Scholar]
- Shen, B.; Li, Q.; Chen, B.; Li, Z. Large Language Model-Based Security Situation Awareness for Smart Grid: Framework and Approaches. IEEE Access 2025, 13, 173600–173613. [Google Scholar] [CrossRef]
- Zaboli, A.; Hong, J.; Ştefanov, A.; Liu, C.C.; Hwang, C.S. Large Language Models for Power System Security: A Novel Multi-Modal Approach for Anomaly Detection in Energy Management Systems. IEEE Access 2025, 13, 203558–203585. [Google Scholar] [CrossRef]
- Sharshar, M.; Saber, A.M.; Svetinovic, D.; Youssef, A.M.; Kundur, D.; El-Saadany, E.F. Large Language Model-Based Framework for Explainable Cyberattack Detection in Automatic Generation Control Systems. In Proceedings of the 2025 IEEE Electrical Power and Energy Conference (EPEC), Waterloo, ON, Canada, 15–17 October 2025. [Google Scholar]
- Alankrita Pati, A.; Adhikary, N. Generative Pretraining Transformer Based False Data Injection Attack Detection Framework for DC Microgrid Under Uncertain Operating Condition. In Proceedings of the 2025 IEEE North-East India International Energy Conversion Conference and Exhibition (NE-IECCE), Silchar, India, 4–6 July 2025. [Google Scholar]
- Bandara, E.; Bouk, S.H.; Shetty, S.; Gore, R.; Kompella, S.; Mukkamala, R.; Rahman, A.; Foytik, P.; Liang, X.; Keong, N.W.; et al. Bassa-Llama—Fine-Tuned Meta’s Llama LLM, Blockchain and NFT Enabled Real-Time Network Attack Detection Platform for Wind Energy Power Plants. In Proceedings of the 2025 International Wireless Communications and Mobile Computing (IWCMC), Abu Dhabi, United Arab Emirates, 12–16 May 2025. [Google Scholar]
- Bandara, E.; Bouk, S.H.; Shetty, S.; Gore, R.; Kompella, S.; Mukkamala, R.; Rahman, A.; Foytik, P.; Liang, X.; Keong, N.W.; et al. VindSec-Llama—Fine-Tuned Meta’s Llama-3 LLM, Federated Learning, Blockchain and PBOM-enabled Data Security Architecture for Wind Energy Data Platforms. In Proceedings of the 2025 International Wireless Communications and Mobile Computing (IWCMC), Abu Dhabi, United Arab Emirates, 12–16 May 2025. [Google Scholar]
- Halgamuge, M.N. LLM-Driven Adaptive Security for the Internet of Energy (IoE). IEEE Netw. 2025; Early Access. [Google Scholar] [CrossRef]
- Fu, T.; Hu, J.; Min, G.; Khowaja, S.A.; Singh, K.; Dev, K. Federated Retrieval-Augmented Generation-Based LLM for Enhanced Cyber Threat Detection in the Internet-of-Energy. IEEE Netw. 2025; Early Access. [Google Scholar] [CrossRef]
- Zhang, S.; Zhang, H.; Zhou, W.; Zhang, R.; Yao, Z.; Zhou, Z. FDI attack detection and LLM-assisted resource allocation for 6G edge intelligence-empowered distribution power grid. China Commun. 2025, 22, 58–73. [Google Scholar] [CrossRef]
- Zaboli, A.; Choi, S.L.; Song, T.-J.; Hong, J. ChatGPT and Other Large Language Models for Cybersecurity of Smart Grid Applications. In Proceedings of the 2024 IEEE Power & Energy Society General Meeting (PESGM), Seattle, WA, USA, 21–25 July 2024. [Google Scholar]
- Li, J.; Xu, J.; Yang, S.; Ngai, E.C.H. Large Language Models in Smart Grid: Applications and Risks; Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Springer: Berlin/Heidelberg, Germany, 2026. [Google Scholar] [CrossRef]
- Jena, A.; Ding, F.; Wang, J.; Yao, Y.; Xie, L. LLM-Based Adaptive Distribution Voltage Regulation Under Frequent Topology Changes: An In-Context MPC Framework. IEEE Trans. Smart Grid 2025, 16, 4297–4300. [Google Scholar] [CrossRef]
- Yang, T.; Yan, B.; Yang, Q.; Wang, W. A packet payload anomaly detection approach for cyber-physical power systems. CSEE J. Power Energy Syst. 2023; Early Access. [Google Scholar] [CrossRef]
- Choi, C.; Choi, J. Ontology-Based Security Context Reasoning for Power IoT-Cloud Security Service. IEEE Access 2019, 7, 110510–110517. [Google Scholar] [CrossRef]
- Nielsen, T.D.; Rouillard, T.; Makarov, N. A Semantic Search Capability for a Grid Model Repository. In Proceedings of the 2019 IEEE Power & Energy Society General Meeting (PESGM), Atlanta, GA, USA, 4–8 August 2019. [Google Scholar]
- Khan, M.A. LLM-Driven Real-Time Threat Prediction and Response for Internet of Energy (IoE). IEEE Netw. 2025; Early Access. [Google Scholar] [CrossRef]
- Pei, J.; Dai, M.; Prasad, R.V.; Alghamdi, N.S.; Al-Otaibi, Y.D.; Bashir, A.K. FL Meets LLM: A Hybrid Security Framework for the Internet of Energy. IEEE Netw. 2025; Early Access. [Google Scholar] [CrossRef]
- Mogilicharla, S.; Tripathy, M.; Kanabar, M. Edge-Deployable ML Agent for Real-Time Tactic and Technique Attribution in Microgrid Security. IEEE Trans. Ind. Appl. 2025; Early Access. [Google Scholar] [CrossRef]
- Ferrag, M.A.; Ndhlovu, M.; Tihanyi, N.; Cordeiro, L.C.; Debbah, M.; Lestable, T.; Thandi, N.S. Revolutionizing Cyber Threat Detection with Large Language Models: A Privacy-Preserving BERT-Based Lightweight Model for IoT/IIoT Devices. IEEE Access, 2025; Early Access. [Google Scholar] [CrossRef]
- Ali, Z.; Marotta, A.; Tiberti, W.; Odoardi, O.; Cassioli, D.; Di Marco, P. Enhancing IIoT Security: BERT-Driven Intrusion Detection with MLP in Industrial Networks. In Proceedings of the 2025 IEEE 11th World Forum on Internet of Things (WF-IoT), Chengdu, China, 27–30 October 2025. [Google Scholar]
- Diwan, T.D.; Babu, R.T.S.; Madupati, B.; Garg, M.; Thummarakoti, S.; Babu, K.T.S. IIOT Security Concerns: An Extensive Analysis of IIOT Attacks and Defences. In Proceedings of the 2025 International Conference on Engineering, Technology & Management (ICETM), Madanapalle, India, 11–12 April 2025. [Google Scholar]
- Breve, B.; Cimino, G.; Deufemia, V.; Elefante, A. A BERT-based Model for Semantic Consistency Checking of Automation Rules. In DMSVIVA 2023-Proceedings of the 29th International DMS Conference on Visualization and Visual Languages; Knowledge Systems Institute Graduate School, KSI Research Inc.: Skokie, IL, USA, 2023; pp. 87–93. [Google Scholar]
- Rajamäki, J. Cybersecurity in Internet of Medical Things: Threats and Innovative AI-Driven Tools. In Proceedings of the 2025 IEEE Medical Measurements & Applications (MeMeA), Chania, Greece, 28–30 May 2025; pp. 1–6. [Google Scholar]
- Melícias, F.S.; Ribeiro, T.F.R.; Rabadão, C.; Santos, L.; Costa, R.L.D.C. GPT and Interpolation-Based Data Augmentation for Multiclass Intrusion Detection in IIoT. IEEE Access 2024, 12, 17945–17965. [Google Scholar] [CrossRef]
- Khandan, S.; Beyazgul, D.; Jogunola, O.; Tsado, Y.; Dargahi, T. Explainable AI-Driven Threat Detection Response for Industrial IoT. In Proceedings of the 2025 IEEE Conference on Communications and Network Security (CNS), Avignon, France, 8–11 September 2025. [Google Scholar]
- Liu, Y.; Li, S.; Hulayyil, S.B. Intelligent Detection of Cyber Attack Patterns in Industrial IoT Using Pretrained Language Models. Electronics 2025, 14, 4094. [Google Scholar] [CrossRef]
- Cimino, G.; Deufemia, V. SIGFRID: Unsupervised, Platform-Agnostic Interference Detection in IoT Automation Rules. ACM Trans. Internet Things 2025, 6, 1–33. [Google Scholar] [CrossRef]
- Deng, Z.; Sun, R.; Xue, M.; Wen, S.; Camtepe, S.; Nepal, S.; Xiang, Y. Leakage-Resilient and Carbon-Neutral Aggregation Featuring the Federated AI-Enabled Critical Infrastructure. IEEE Trans. Dependable Secur. Comput. 2025, 22, 3661–3675. [Google Scholar] [CrossRef]
- Mao, L.; Kang, P.; Yan, R. A Searchable Encryption Scheme Supporting Dynamic Data Management in Industrial Internet of Things. In Proceedings of the 2025 7th International Conference on Natural Language Processing (ICNLP), Guangzhou, China, 21–23 March 2025. [Google Scholar]
- Xie, Y.; Liu, W.; Wang, Y. A Traceable Cross-Domain Anonymous Authentication Scheme in Industrial Internet of Things. In Proceedings of the 2025 7th International Conference on Natural Language Processing (ICNLP), Guangzhou, China, 21–23 March 2025. [Google Scholar]
- Zhang, Z.; Liu, M.; Sun, M.; Deng, R.; Cheng, P.; Niyato, D.; Chow, M.Y.; Chen, J. Vulnerability of Machine Learning Approaches Applied in IoT-Based Smart Grid: A Review. IEEE Internet Things J. 2024, 11, 18951–18975. [Google Scholar] [CrossRef]
- Jamshidi, S.; Shahabi, N.; Nikanjam, A.; Nafi, K.W.; Khomh, F.; Fung, C. The role of Large Language Models in IoT security: A systematic review of advances, challenges, and opportunities. Internet Things 2025, 34, 101735. [Google Scholar] [CrossRef]
- Alipio, M.; Bures, M. The Role of Large Language Models in Designing Reliable Networks for Internet of Things: A Short Review of Most Recent Developments. IEEE Access 2025, 13, 168527–168545. [Google Scholar] [CrossRef]
- Hassanin, M.; Keshk, M.; Salim, S.; Alsubaie, M.; Sharma, D. PLLM-CS: Pre-trained Large Language Model (LLM) for cyber threat detection in satellite networks. Ad Hoc Netw. 2025, 166, 103645. [Google Scholar] [CrossRef]
- Wickramasurendra, N.; De Grande, R.E.; Carvalho, G.H.S. RF Jamming BERT Intrusion Detection Systems for Vehicular Networks. In Proceedings of the 2025 IEEE International Systems Conference (SysCon), Montreal, QC, Canada, 7–10 April 2025. [Google Scholar]
- Honnalli, R.; Farooq, J. Multimodal LLM-Guided Sequential Detection of Cyber Threats in Electric Vehicle Charging Systems. In Proceedings of the 2025 IEEE International Conference on Omni-Layer Intelligent Systems (COINS), Madison, WI, USA, 4–6 August 2025. [Google Scholar]
- Honnalli, R.; Farooq, J. LLM-Powered Agentic AI Approach to Securing EV Charging Systems Against Cyber Threats. In Proceedings of the 2025 IEEE 26th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), Fort Worth, TX, USA, 27–30 May 2025. [Google Scholar]
- Andreoni, M.; Lunardi, W.T.; Lawton, G.; Thakkar, S. Enhancing Autonomous System Security and Resilience with Generative AI: A Comprehensive Survey. IEEE Access 2024, 12, 109470–109493. [Google Scholar] [CrossRef]
- Wang, T.; Su, Q.; Chen, T. Formal Analysis of Security Properties of Cyber-Physical System Based on Timed Automata. In Proceedings of the 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC), Shenzhen, China, 26–29 June 2017. [Google Scholar]
- Ray, I.; Sreedharan, S.; Podder, R.; Bashir, S.K.; Ray, I. Explainable AI for Prioritizing and Deploying Defenses for Cyber-Physical System Resiliency. In Proceedings of the 2023 5th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), Atlanta, GA, USA, 1–3 November 2023. [Google Scholar]
- Pan, K.; Gusain, D.; Palensky, P. Modelica-Supported Attack Impact Evaluation in Cyber Physical Energy System. In Proceedings of the 2019 IEEE 19th International Symposium on High Assurance Systems Engineering (HASE), Hangzhou, China, 3–5 January 2019. [Google Scholar]
- Tirulo, A.; Chauhan, S.; Shafie-Khah, M. LLM-powered threat intelligence: Proactive detection of zero-day attacks in electric vehicle cyber-physical systems. Sustain. Energy Grids Netw. 2025, 43, 101877. [Google Scholar] [CrossRef]
- He, C.; Wang, Y.; Hu, J.; Luan, T.H.; Bi, Y.; Su, Z. Collaborative Vehicular Threat Sharing: A Long-Term Contract-Based Incentive Mechanism with Privacy Preservation. IEEE Trans. Intell. Transp. Syst. 2024, 25, 21528–21544. [Google Scholar] [CrossRef]
- Fragkos, G.; Wright, S.; Jones, C.B. GraphLLM-CPS: LLM Node Embeddings for Anomaly Detection in Cyber-Physical Systems. In Proceedings of the 2025 IEEE 30th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Tempe, AZ, USA, 14–16 October 2025. [Google Scholar]



| Theme | Key Concepts & Synonyms |
|---|---|
| A. NLP techniques | “natural language processing” OR NLP OR “language model” OR “large language model” OR LLM OR GPT OR BERT OR “topic modeling” OR “sentiment analysis” OR “named entity recognition” |
| B. Cyber Threat Intelligence | “cyber threat intelligence” OR CTI OR “threat intelligence” OR “cyber threat detection” OR ATTACK OR “TTP extraction” |
| C. Manufacturing/Industrial Context | manufacturing OR “industrial control systems” OR “industry 4.0” OR “critical infrastructure” OR “cyber-physical system” OR energy OR “industrial internet of things” OR IIoT |
| Database | Total Results |
|---|---|
| IEEE Xplore | 278 |
| Web of Science | 71 |
| Scopus | 36 |
| Total Identified | 385 |
| Work | Year | Industrial Security Method(s) | NLP Method(s) | TS | LLM Used | |||
|---|---|---|---|---|---|---|---|---|
| BAA | AD | ID | LS | |||||
| [45] | 2023 | NER | F | CySecBERT | ||||
| [46] | 2025 | NER; RE; IE | F | DeBERTa | ||||
| [47] | 2025 | SS | F | DistilBERT | ||||
| [48] | 2023 | ● | SS | - | N/A | |||
| [49] | 2024 | ● | ● | IE | P | T5 | ||
| [50] | 2023 | ● | NER; SS | F | SBERT | |||
| [51] | 2024 | ● | SS; TC | F | SBERT | |||
| [52] | 2025 | ● | TC; DA | F | BERT-CTI | |||
| [53] | 2025 | ● | NER; TC | F | BERT, GPT | |||
| [54] | 2024 | ● | R | P | GPT, LLaMA | |||
| [55] | 2025 | ● | R | F | LLaMA | |||
| [56] | 2025 | ● | R | P | Mistral, Llama3 | |||
| [57] | 2024 | ● | TC | F | BERT | |||
| [58] | 2023 | ● | TC; IE | F | SecureBERT, GPT-2 | |||
| [63] | 2024 | ● | R | P | GPT-3.5 | |||
| Methodological Era | Example Works | Strengths | Challenges | Primary Tasks |
|---|---|---|---|---|
| Sparse/Lexical Methods | [45,50,65] | Interpretable, low compute, easy deployment | Vocabulary drift, limited semantics, poor cross-domain generalization | NER, CLS, MAP |
| RNN-Based Methods | [48] | Temporal modelling, improved context | Data hunger, limited transferability, domain shift | NER, RE, CLS |
| LLM-Centric Methods | [46,52,64] | Semantic reasoning, multilingually, cross-domain fusion | Fine-tuning cost, hallucination, industrial deployment constraints | RET, REAS, CLS, NER, RE, MAP |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Share and Cite
Albarrak, M.; Salonitis, K.; Jagtap, S. Natural Language Processing (NLP)-Based Frameworks for Cyber Threat Intelligence and Early Prediction of Cyberattacks in Industry 4.0: A Systematic Literature Review. Appl. Sci. 2026, 16, 619. https://doi.org/10.3390/app16020619
Albarrak M, Salonitis K, Jagtap S. Natural Language Processing (NLP)-Based Frameworks for Cyber Threat Intelligence and Early Prediction of Cyberattacks in Industry 4.0: A Systematic Literature Review. Applied Sciences. 2026; 16(2):619. https://doi.org/10.3390/app16020619
Chicago/Turabian StyleAlbarrak, Majed, Konstantinos Salonitis, and Sandeep Jagtap. 2026. "Natural Language Processing (NLP)-Based Frameworks for Cyber Threat Intelligence and Early Prediction of Cyberattacks in Industry 4.0: A Systematic Literature Review" Applied Sciences 16, no. 2: 619. https://doi.org/10.3390/app16020619
APA StyleAlbarrak, M., Salonitis, K., & Jagtap, S. (2026). Natural Language Processing (NLP)-Based Frameworks for Cyber Threat Intelligence and Early Prediction of Cyberattacks in Industry 4.0: A Systematic Literature Review. Applied Sciences, 16(2), 619. https://doi.org/10.3390/app16020619

