A Novel Approach for Network Vulnerability Analysis in IIoT

被引:1
作者
Sudhakar, K. [1 ]
Senthilkumar, S. [1 ]
机构
[1] Univ Coll Engn, Dept Comp Sci & Engn, Rajamadam 614701, India
来源
COMPUTER SYSTEMS SCIENCE AND ENGINEERING | 2023年 / 45卷 / 01期
关键词
Industrial internet of things (iiot); attack detection; features selection; maximum posterior dichotomous quadratic discriminant analysis; jaccardized rocchio emphasis boost classification; INDUSTRIAL INTERNET; INTRUSION DETECTION; SECURITY; IOT;
D O I
10.32604/csse.2023.029680
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Industrial Internet of Things (IIoT) offers efficient communication among business partners and customers. With an enlargement of IoT tools connected through the internet, the ability of web traffic gets increased. Due to the raise in the size of network traffic, discovery of attacks in IIoT and malicious traffic in the early stages is a very demanding issues. A novel technique called Maximum Posterior Dichotomous Quadratic Discriminant Jaccardized Rocchio Emphasis Boost Classification (MPDQDJREBC) is introduced for accurate attack detection with minimum time consumption in IIoT. The proposed MPDQDJREBC technique includes feature selection and categorization. First, the network traffic features are collected from the dataset. Then applying the Maximum Posterior Dichotomous Quadratic Discriminant analysis to find the significant features for accurate classification and minimize the time consumption. After the significant features selection, classification is performed using the Jaccardized Rocchio Emphasis Boost technique. Jaccardized Rocchio Emphasis Boost Classification technique combines the weak learner result into strong output. Jaccardized Rocchio classification technique is considered as the weak learners to identify the normal and attack. Thus, proposed MPDQDJREBC technique gives strong classification results through lessening the quadratic error. This assists for proposed MPDQDJREBC technique to get better the accuracy for attack detection with reduced time usage. Experimental assessment is carried out with UNSW_NB15 Dataset using different factors such as accuracy, precision, recall, F-measure and attack detection time. The observed results exhibit the MPDQDJREBC technique provides higher accuracy and lesser time consumption than the conventional techniques.
引用
收藏
页码:263 / 277
页数:15
相关论文
共 20 条
  • [1] Deep-IFS: Intrusion Detection Approach for Industrial Internet of Things Traffic in Fog Environment
    Abdel-Basset, Mohamed
    Chang, Victor
    Hawash, Hossam
    Chakrabortty, Ripon K.
    Ryan, Michael
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (11) : 7704 - 7715
  • [2] A Machine-Learning-Based Technique for False Data Injection Attacks Detection in Industrial IoT
    Aboelwafa, Mariam M. N.
    Seddik, Karim G.
    Eldefrawy, Mohamed H.
    Gadallah, Yasser
    Gidlund, Mikael
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (09): : 8462 - 8471
  • [3] TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems
    Alsaedi, Abdullah
    Moustafa, Nour
    Tari, Zahir
    Mahmood, Abdun
    Anwar, Adnan
    [J]. IEEE ACCESS, 2020, 8 : 165130 - 165150
  • [4] A scalable specification-agnostic multi-sensor anomaly detection system for IIoT environments
    Aoudi, Wissam
    Almgren, Magnus
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2020, 30
  • [5] A machine learning based IoT for providing an intrusion detection system for security
    Atul, Dhanke Jyoti
    Kamalraj, R.
    Ramesh, G.
    Sankaran, K. Sakthidasan
    Sharma, Sudhir
    Khasim, Syed
    [J]. MICROPROCESSORS AND MICROSYSTEMS, 2021, 82
  • [6] Toward a Distributed Approach for Detection and Mitigation of Denial-of-Service Attacks Within Industrial Internet of Things
    Borgiani, Vladimir
    Moratori, Patrick
    Kazienko, Juliano F.
    Tubino, Emilio R. R.
    Quincozes, Silvio E.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (06) : 4569 - 4578
  • [7] Anomaly Detection in Aging Industrial Internet of Things
    Genge, Bela
    Haller, Piroska
    Enachescu, Calin
    [J]. IEEE ACCESS, 2019, 7 : 74217 - 74230
  • [8] A Graph-Based Security Framework for Securing Industrial IoT Networks from Vulnerability Exploitations
    George, Gemini
    Thampi, Sabu M.
    [J]. IEEE ACCESS, 2018, 6 : 43586 - 43601
  • [9] A Hybrid Deep Random Neural Network for Cyberattack Detection in the Industrial Internet of Things
    Huma, Zil E.
    Latif, Shahid
    Ahmad, Jawad
    Idrees, Zeba
    Ibrar, Anas
    Zou, Zhuo
    Alqahtani, Fehaid
    Baothman, Fatmah
    [J]. IEEE ACCESS, 2021, 9 : 55595 - 55605
  • [10] A Novel Attack Detection Scheme for the Industrial Internet of Things Using a Lightweight Random Neural Network
    Latif, Shahid
    Zou, Zhuo
    Idrees, Zeba
    Ahmad, Jawad
    [J]. IEEE ACCESS, 2020, 8 (08): : 89337 - 89350