iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems

被引:5
作者
Azad, Saiful [1 ]
Mahmud, Mufti [2 ,3 ,4 ,8 ]
Zamli, Kamal Z. [5 ]
Kaiser, M. Shamim [6 ]
Jahan, Sobhana [1 ]
Razzaque, Md. Abdur [7 ]
机构
[1] Green Univ Bangladesh, Dept Comp Sci & Engn, Dhaka, Bangladesh
[2] Nottingham Trent Univ, Dept Comp Sci, Nottingham NG11 8NS, England
[3] Nottingham Trent Univ, Comp & Informat Res Ctr, Nottingham NG11 8NS, England
[4] Nottingham Trent Univ, Med Technol Innovat Facil, Nottingham NG11 8NS, England
[5] Univ Malaysia Pahang, Fac Comp, Gambang 26300, Kuantan, Malaysia
[6] Jahangirnagar Univ, Inst Informat Technol, Dhaka 1342, Bangladesh
[7] Univ Dhaka, Dept Comp Sci & Engn, Dhaka 1000, Bangladesh
[8] Nottingham Trent Univ, Dept Comp Sci, Clifton Campus,Clifton Lane, Nottingham NG11 8NS, England
关键词
Cyber security; Industry; 4.0; Smart factory; FP-growth algorithm; Naive Bayes; INTERNET; NEGOTIATION; PREDICTION; MANAGEMENT; THREATS;
D O I
10.1016/j.eswa.2023.121676
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To meet the demand of the world's largest population, smart manufacturing has accelerated the adoption of smart factories-where autonomous and cooperative instruments across all levels of production and logistics networks are integrated through a Cyber-Physical Production System (CPPS). However, these networks are comprised of various heterogeneous devices with varying computational power and memory capabilities. As a result, many secure communication protocols - that demand considerably high computational power and memory - can not be verbatim employed on these networks, and thereby, leaving them more vulnerable to security threats and attacks over conventional networks. These threats can largely be tackled by employing a Trust Management Model (TMM) by exploiting the behavioural patterns of nodes to identify their trust class. In this context, ML-based models are best suited due to their ability to capture hidden patterns in data, learning and improving the pattern detection accuracy over time to counteract and tackle threats of a dynamic nature, which is absent in most of the conventional models. However, among the existing ML-based solutions in detecting attack patterns, many of them are computationally expensive, require a long training time, and a considerably large amount of training data-which are seldom available. An aid to this is the association rule learning (ARL) paradigm, whose models are computationally inexpensive and do not require a long training time. Therefore, this paper proposes an ARL-based intelligent Behavioural Trust Model (iBUST) for securing the CPPS. For this intelligent TMM, a variant of Frequency Pattern Growth (FP-Growth), called enhanced FP Growth (EFP-Growth) algorithm is developed by altering the internal data structures for faster execution and by developing a modified exponential decay function (MEDF) to automatically calculate minimum supports for adapting trust evolution characteristics. In addition, a new optimisation model for finding optimum parameter values in the MEDF and an algorithm for transmuting a 1D quantitative feature into a respective categorical feature are developed to facilitate the model. Afterwards, the trust class of an object is identified employing the Naive Bayes classifier. This proposed model is evaluated on a trust evolution-supported experimental environment along with other compared models taking a benchmark dataset into consideration, where it outperforms its counterparts.
引用
收藏
页数:16
相关论文
共 90 条
  • [21] Mixed Bangla-English Spoken Digit Classification Using Convolutional Neural Network
    Das, Shuvro
    Yasmin, Mst Rubayat
    Arefin, Musfikul
    Abu Taher, Kazi
    Uddin, Md Nasir
    Rahman, Muhammad Arifur
    [J]. APPLIED INTELLIGENCE AND INFORMATICS, AII 2021, 2021, 1435 : 371 - 383
  • [22] CLUSTER SEPARATION MEASURE
    DAVIES, DL
    BOULDIN, DW
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1979, 1 (02) : 224 - 227
  • [23] Farhin Fahiba, 2021, Proceedings of International Conference on Trends in Computational and Cognitive Engineering. Proceedings of TCCE 2020. Advances in Intelligent Systems and Computing (AISC 1309), P455, DOI 10.1007/978-981-33-4673-4_36
  • [24] Towards Secured Service Provisioning for the Internet of Healthcare Things
    Farhin, Fahiba
    Kaiser, M. Shamim
    Mahmud, Mufti
    [J]. 2020 IEEE 14TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT2020), 2020,
  • [25] An expert recommendation algorithm based on Pearson correlation coefficient and FP-growth
    Feng, Wanli
    Zhu, Quanyin
    Zhuang, Jun
    Yu, Shimin
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 3): : S7401 - S7412
  • [26] Fournier-Viger P., 2010, Ph.D. thesis
  • [27] A survey of itemset mining
    Fournier-Viger, Philippe
    Lin, Jerry Chun-Wei
    Bay Vo
    Tin Truong Chi
    Zhang, Ji
    Hoai Bac Le
    [J]. WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY, 2017, 7 (04)
  • [28] Gavriloaie R, 2004, LECT NOTES COMPUT SC, V3053, P342
  • [29] Artificial intelligence and internet of things in screening and management of autism spectrum disorder
    Ghosh, Tapotosh
    Al Banna, Md. Hasan
    Rahman, Md. Sazzadur
    Kaiser, M. Shamim
    Mahmud, Mufti
    Hosen, A. S. M. Sanwar
    Cho, Gi Hwan
    [J]. SUSTAINABLE CITIES AND SOCIETY, 2021, 74
  • [30] Giandomenico N., 2018, Digital guardian's blog