APT Adversarial Defence Mechanism for Industrial IoT Enabled Cyber-Physical System

被引:12
|
作者
Javed, Safdar Hussain [1 ]
Bin Ahmad, Maaz [1 ]
Asif, Muhammad [2 ]
Akram, Waseem [2 ]
Mahmood, Khalid [3 ]
Das, Ashok Kumar [4 ]
Shetty, Sachin [5 ,6 ]
机构
[1] Karachi Inst Econ & Technol KIET, Coll Comp & Informat Sci, Karachi 75190, Sindh, Pakistan
[2] Lahore Garrison Univ, Dept Comp Sci, Lahore 54810, Pakistan
[3] Natl Yunlin Univ Sci & Technol, Grad Sch Intelligent Data Sci, Touliu 64002, Taiwan
[4] Int Inst Informat Technol Hyderabad, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[5] Old Dominion Univ, Virginia Modeling Anal & Simulat Ctr, Dept Modeling Simulat & Visualizat Engn, Suffolk, VA 23435 USA
[6] Old Dominion Univ, Ctr Cybersecur Educ & Res, Suffolk, VA 23435 USA
关键词
Advanced persistent threat; deep learning; cyber-physical systems; graph attention net-works; graph neural networks; the Industrial Internet of Things; INTRUSION DETECTION; NEURAL-NETWORK; IIOT; INTERNET; MODEL;
D O I
10.1109/ACCESS.2023.3291599
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The objective of Advanced Persistent Threat (APT) attacks is to exploit Cyber-Physical Systems (CPSs) in combination with the Industrial Internet of Things (I-IoT) by using fast attack methods. Machine learning (ML) techniques have shown potential in identifying APT attacks in autonomous and malware detection systems. However, detecting hidden APT attacks in the I-IoT-enabled CPS domain and achieving real-time accuracy in detection present significant challenges for these techniques. To overcome these issues, a new approach is suggested that is based on the Graph Attention Network (GAN), a multi-dimensional algorithm that captures behavioral features along with the relevant information that other methods do not deliver. This approach utilizes masked self-attentional layers to address the limitations of prior Deep Learning (DL) methods that rely on convolutions. Two datasets, the DAPT2020 malware, and Edge I-IoT datasets are used to evaluate the approach, and it attains the highest detection accuracy of 96.97% and 95.97%, with prediction time of 20.56 seconds and 21.65 seconds, respectively. The GAN approach is compared to conventional ML algorithms, and simulation results demonstrate a significant performance improvement over these algorithms in the I-IoT-enabled CPS realm.
引用
收藏
页码:74000 / 74020
页数:21
相关论文
共 50 条
  • [41] Integrated Cyber-Physical Resiliency for Power Grids Under IoT-Enabled Dynamic Botnet Attacks
    Zhao, Yuhan
    Chen, Juntao
    Zhu, Quanyan
    IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2024, 32 (05) : 1755 - 1769
  • [42] Edge intelligence-enabled cyber-physical systems
    Zhu, Rongbo
    Anjum, Ashiq
    Li, Hongxiang
    Ma, Maode
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (13)
  • [43] A comprehensive knowledge map for AI improving security management of cyber-physical system enabled smart manufacturing
    Cao, Yu
    Yang, Ang
    Li, Hanning
    Zeng, Qingcheng
    Gao, Jing
    COMPUTERS & SECURITY, 2024, 137
  • [44] Industrial Cyber-Physical Systems-Based Cloud IoT Edge for Federated Heterogeneous Distillation
    Wang, Chengjia
    Yang, Guang
    Papanastasiou, Giorgos
    Zhang, Heye
    Rodrigues, Joel J. P. C.
    de Albuquerque, Victor Hugo C.
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (08) : 5511 - 5521
  • [45] An Integrated Cyber Security Risk Management Approach for a Cyber-Physical System
    Kure, Halima Ibrahim
    Islam, Shareeful
    Razzaque, Mohammad Abdur
    APPLIED SCIENCES-BASEL, 2018, 8 (06):
  • [46] The Security Challenges in the IoT enabled Cyber-Physical Systems and Opportunities for Evolutionary Computing & Other Computational Intelligence
    He, Hongmei
    Maple, Carsten
    Watson, Tim
    Tiwari, Ashutosh
    Mehnen, Joern
    Jin, Yaochu
    Gabrys, Bogdan
    2016 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2016, : 1015 - 1021
  • [47] Development and Validation of a Cyber-Physical System Leveraging EFDPN for Enhanced WSN-IoT Network Security
    Krishnasamy, Sundaramoorthy
    Alotaibi, Mutlaq B.
    Alehaideb, Lolwah I.
    Abbas, Qaisar
    SENSORS, 2023, 23 (22)
  • [48] Generative-Adversarial Class-Imbalance Learning for Classifying Cyber-Attacks and Faults-A Cyber-Physical Power System
    Farajzadeh-Zanjani, Maryam
    Hallaji, Ehsan
    Razavi-Far, Roozbeh
    Saif, Mehrdad
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (06) : 4068 - 4081
  • [49] XAI enhancing cyber defence against adversarial attacks in industrial applications
    Makridis, Georgios
    Theodoropoulos, Spyros
    Dardanis, Dimitrios
    Makridis, Ioannis
    Separdani, Maria Margarita
    Fatouros, Georgios
    Kyriazis, Dimosthenis
    Koulouris, Panagiotis
    2022 IEEE 5TH INTERNATIONAL CONFERENCE ON IMAGE PROCESSING APPLICATIONS AND SYSTEMS, IPAS, 2022,
  • [50] ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems
    Li, Jiangnan
    Yang, Yingyuan
    Sun, Jinyuan Stella
    Tomsovic, Kevin
    Qi, Hairong
    ASIA CCS'21: PROCEEDINGS OF THE 2021 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 52 - 66