Anomaly classification in industrial Internet of things: A review

被引:9
作者
Rodriguez, Martha [1 ]
Tobon, Diana P. [2 ]
Munera, Danny [1 ]
机构
[1] Univ Antioquia, Medellin, Colombia
[2] Univ Medellin, Medellin, Colombia
来源
INTELLIGENT SYSTEMS WITH APPLICATIONS | 2023年 / 18卷
关键词
Industrial Internet of things; IIoT; Anomaly detection; Anomaly classification; Context-awareness; Context-information; IOT; CONTEXT; PREDICTION;
D O I
10.1016/j.iswa.2023.200232
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The fourth industrial revolution (Industry 4.0) has the potential to provide real-time, secure, and autonomous manufacturing environments. The Industrial Internet of Things (IIoT) is a powerful tool to make this promise a reality because it can provide enhanced wireless connectivity for data collection and processing in interconnected plants. Implementing IIoT systems entails using heterogeneous technologies, which collect incomplete, unstructured, redundant, and noisy data. This condition raises security flaws and data collection issues that affect the data quality of the systems. One effective way to identify poor-quality data is through anomaly detection systems, which provide specific information that helps to decide whether a device is malfunctioning, a critical event is occurring, or the system's security is being breached. Using early anomaly detection mechanisms prevents the IIoT system from being influenced by anomalies in decision-making. Identifying the origin of the anomaly (e.g., event, failure, or attack) supports the user in making effective decisions about handling the data or identifying the device that exhibits abnormal behavior. However, implementing anomaly detection systems is not easy since various factors must be defined, such as what method to use for the best performance. What information must we process to detect and classify anomalies? Which devices have to be monitored to detect anomalies? Which device of the IIoT system will be in charge of executing the anomaly detection algorithm? Hence, in this paper, we performed a state-of-the-art review, including 99 different articles aiming to identify the answer of various authors to these questions. We also highlighted works on IIoT anomaly detection and classification, used methods, and open challenges. We found that automatic anomaly classification in IIoT is an open research topic, and additional information from the context of the application is rarely used to facilitate anomaly detection.
引用
收藏
页数:13
相关论文
共 132 条
[1]   ELBA-IoT: An Ensemble Learning Model for Botnet Attack Detection in IoT Networks [J].
Abu Al-Haija, Qasem ;
Al-Dala'ien, Mu'awya .
JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2022, 11 (01)
[2]   Boost-Defence for resilient IoT networks: A head-to-toe approach [J].
Abu Al-Haija, Qasem ;
Al Badawi, Ahmad ;
Bojja, Giridhar Reddy .
EXPERT SYSTEMS, 2022, 39 (10)
[3]   An Efficient Deep-Learning-Based Detection and Classification System for Cyber-Attacks in IoT Communication Networks [J].
Abu Al-Haija, Qasem ;
Zein-Sabatto, Saleh .
ELECTRONICS, 2020, 9 (12) :1-26
[4]   Agnostic CH-DT Technique for SCADA Network High-Dimensional Data-Aware Intrusion Detection System [J].
Ahakonye, Love Allen Chijioke ;
Nwakanma, Cosmas Ifeanyi ;
Lee, Jae-Min ;
Kim, Dong-Seong .
IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (12) :10344-10356
[5]   SCADA intrusion detection scheme exploiting the fusion of modified decision tree and Chi-square feature selection [J].
Ahakonye, Love Allen Chijioke ;
Nwakanma, Cosmas Ifeanyi ;
Lee, Jae-Min ;
Kim, Dong-Seong .
INTERNET OF THINGS, 2023, 21
[6]   An Efficient Intrusion Detection Model for Edge System in Brownfield Industrial Internet of Things [J].
AL-Hawawreh, Muna ;
Sitnikova, Elena ;
den Hartog, Frank .
3RD INTERNATIONAL CONFERENCE ON BIG DATA AND INTERNET OF THINGS (BDIOT 2019), 2018, :83-87
[7]   Industrial Internet of Things Based Ransomware Detection using Stacked Variational Neural Network [J].
AL-Hawawreh, Muna ;
Sitnikova, Elena .
3RD INTERNATIONAL CONFERENCE ON BIG DATA AND INTERNET OF THINGS (BDIOT 2019), 2018, :126-130
[8]   Identification of malicious activities in industrial internet of things based on deep learning models [J].
AL-Hawawreh, Muna ;
Moustafa, Nour ;
Sitnikova, Elena .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 :1-11
[9]   IoT Intrusion Detection Using Machine Learning with a Novel High Performing Feature Selection Method [J].
Albulayhi, Khalid ;
Abu Al-Haija, Qasem ;
Alsuhibany, Suliman A. ;
Jillepalli, Ananth A. ;
Ashrafuzzaman, Mohammad ;
Sheldon, Frederick T. .
APPLIED SCIENCES-BASEL, 2022, 12 (10)
[10]   An industrial Internet of things based platform for context-aware information services in manufacturing [J].
Alexopoulos, Kosmas ;
Sipsas, Konstantinos ;
Xanthakis, Evangelos ;
Makris, Sotiris ;
Mourtzis, Dimitris .
INTERNATIONAL JOURNAL OF COMPUTER INTEGRATED MANUFACTURING, 2018, 31 (11) :1111-1123