iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems

被引:5
作者
Azad, Saiful [1 ]
Mahmud, Mufti [2 ,3 ,4 ,8 ]
Zamli, Kamal Z. [5 ]
Kaiser, M. Shamim [6 ]
Jahan, Sobhana [1 ]
Razzaque, Md. Abdur [7 ]
机构
[1] Green Univ Bangladesh, Dept Comp Sci & Engn, Dhaka, Bangladesh
[2] Nottingham Trent Univ, Dept Comp Sci, Nottingham NG11 8NS, England
[3] Nottingham Trent Univ, Comp & Informat Res Ctr, Nottingham NG11 8NS, England
[4] Nottingham Trent Univ, Med Technol Innovat Facil, Nottingham NG11 8NS, England
[5] Univ Malaysia Pahang, Fac Comp, Gambang 26300, Kuantan, Malaysia
[6] Jahangirnagar Univ, Inst Informat Technol, Dhaka 1342, Bangladesh
[7] Univ Dhaka, Dept Comp Sci & Engn, Dhaka 1000, Bangladesh
[8] Nottingham Trent Univ, Dept Comp Sci, Clifton Campus,Clifton Lane, Nottingham NG11 8NS, England
关键词
Cyber security; Industry; 4.0; Smart factory; FP-growth algorithm; Naive Bayes; INTERNET; NEGOTIATION; PREDICTION; MANAGEMENT; THREATS;
D O I
10.1016/j.eswa.2023.121676
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To meet the demand of the world's largest population, smart manufacturing has accelerated the adoption of smart factories-where autonomous and cooperative instruments across all levels of production and logistics networks are integrated through a Cyber-Physical Production System (CPPS). However, these networks are comprised of various heterogeneous devices with varying computational power and memory capabilities. As a result, many secure communication protocols - that demand considerably high computational power and memory - can not be verbatim employed on these networks, and thereby, leaving them more vulnerable to security threats and attacks over conventional networks. These threats can largely be tackled by employing a Trust Management Model (TMM) by exploiting the behavioural patterns of nodes to identify their trust class. In this context, ML-based models are best suited due to their ability to capture hidden patterns in data, learning and improving the pattern detection accuracy over time to counteract and tackle threats of a dynamic nature, which is absent in most of the conventional models. However, among the existing ML-based solutions in detecting attack patterns, many of them are computationally expensive, require a long training time, and a considerably large amount of training data-which are seldom available. An aid to this is the association rule learning (ARL) paradigm, whose models are computationally inexpensive and do not require a long training time. Therefore, this paper proposes an ARL-based intelligent Behavioural Trust Model (iBUST) for securing the CPPS. For this intelligent TMM, a variant of Frequency Pattern Growth (FP-Growth), called enhanced FP Growth (EFP-Growth) algorithm is developed by altering the internal data structures for faster execution and by developing a modified exponential decay function (MEDF) to automatically calculate minimum supports for adapting trust evolution characteristics. In addition, a new optimisation model for finding optimum parameter values in the MEDF and an algorithm for transmuting a 1D quantitative feature into a respective categorical feature are developed to facilitate the model. Afterwards, the trust class of an object is identified employing the Naive Bayes classifier. This proposed model is evaluated on a trust evolution-supported experimental environment along with other compared models taking a benchmark dataset into consideration, where it outperforms its counterparts.
引用
收藏
页数:16
相关论文
共 90 条
  • [1] Adiba FI., 2020, Int. J. Autom. Artif. Intell. Mach. Learn., V1, P80, DOI DOI 10.61797/IJAAIML.V1I1.45
  • [2] Ahmed Sabbir, 2022, Proceedings of Trends in Electronics and Health Informatics: TEHI 2021. Lecture Notes in Networks and Systems (376), P139, DOI 10.1007/978-981-16-8826-3_13
  • [3] Ahmed S., 2021, Data-Driven Mining, Learning and Analytics for Secured Smart Cities, P23, DOI [10.1007/978-3-030-72139-8_2, DOI 10.1007/978-3-030-72139-8_2]
  • [4] ADEPTNESS: Alzheimer's Disease Patient Management System Using Pervasive Sensors - Early Prototype and Preliminary Results
    Akhund, Tajim Md Niamat Ullah
    Mahi, Md Julkar Nayeen
    Tanvir, A. N. M. Hasnat
    Mahmud, Mufti
    Kaiser, M. Shamim
    [J]. BRAIN INFORMATICS, BI 2018, 2018, 11309 : 413 - 422
  • [5] A Monitoring System for Patients of Autism Spectrum Disorder Using Artificial Intelligence
    Al Banna, Md Hasan
    Ghosh, Tapotosh
    Abu Taher, Kazi
    Kaiser, M. Shamim
    Mahmud, Mufti
    [J]. BRAIN INFORMATICS, BI 2020, 2020, 12241 : 251 - 262
  • [6] Al-Maolegi M., 2014, Int. J. Nat. Lang. Comput., V1, P21, DOI [10.5121/ijnlc.2014.3103, DOI 10.5121/IJNLC.2014.3103]
  • [7] Application of Mathematical Modeling in Prediction of COVID-19 Transmission Dynamics
    AlArjani, Ali
    Nasseef, Md Taufiq
    Kamal, Sanaa M.
    Rao, B. V. Subba
    Mahmud, Mufti
    Uddin, Md Sharif
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2022, 47 (08) : 10163 - 10186
  • [8] Toward a Heterogeneous Mist, Fog, and Cloud-Based Framework for the Internet of Healthcare Things
    Asif-Ur-Rahman, Md
    Afsana, Fariha
    Mahmud, Mufti
    Kaiser, M. Shamim
    Ahmed, Muhammad R.
    Kaiwartya, Omprakash
    James-Taylor, Anne
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03) : 4049 - 4062
  • [9] Bhapkar H.R., 2021, LNDECT, V60, P57, DOI [10.1007/978-981-15-9682-7_7, DOI 10.1007/978-981-15-9682-7_7, DOI 10.1007/978]
  • [10] Bicaku A, 2017, IEEE INTL CONF IND I, P889, DOI 10.1109/INDIN.2017.8104889