iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems

被引:5
作者
Azad, Saiful [1 ]
Mahmud, Mufti [2 ,3 ,4 ,8 ]
Zamli, Kamal Z. [5 ]
Kaiser, M. Shamim [6 ]
Jahan, Sobhana [1 ]
Razzaque, Md. Abdur [7 ]
机构
[1] Green Univ Bangladesh, Dept Comp Sci & Engn, Dhaka, Bangladesh
[2] Nottingham Trent Univ, Dept Comp Sci, Nottingham NG11 8NS, England
[3] Nottingham Trent Univ, Comp & Informat Res Ctr, Nottingham NG11 8NS, England
[4] Nottingham Trent Univ, Med Technol Innovat Facil, Nottingham NG11 8NS, England
[5] Univ Malaysia Pahang, Fac Comp, Gambang 26300, Kuantan, Malaysia
[6] Jahangirnagar Univ, Inst Informat Technol, Dhaka 1342, Bangladesh
[7] Univ Dhaka, Dept Comp Sci & Engn, Dhaka 1000, Bangladesh
[8] Nottingham Trent Univ, Dept Comp Sci, Clifton Campus,Clifton Lane, Nottingham NG11 8NS, England
关键词
Cyber security; Industry; 4.0; Smart factory; FP-growth algorithm; Naive Bayes; INTERNET; NEGOTIATION; PREDICTION; MANAGEMENT; THREATS;
D O I
10.1016/j.eswa.2023.121676
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To meet the demand of the world's largest population, smart manufacturing has accelerated the adoption of smart factories-where autonomous and cooperative instruments across all levels of production and logistics networks are integrated through a Cyber-Physical Production System (CPPS). However, these networks are comprised of various heterogeneous devices with varying computational power and memory capabilities. As a result, many secure communication protocols - that demand considerably high computational power and memory - can not be verbatim employed on these networks, and thereby, leaving them more vulnerable to security threats and attacks over conventional networks. These threats can largely be tackled by employing a Trust Management Model (TMM) by exploiting the behavioural patterns of nodes to identify their trust class. In this context, ML-based models are best suited due to their ability to capture hidden patterns in data, learning and improving the pattern detection accuracy over time to counteract and tackle threats of a dynamic nature, which is absent in most of the conventional models. However, among the existing ML-based solutions in detecting attack patterns, many of them are computationally expensive, require a long training time, and a considerably large amount of training data-which are seldom available. An aid to this is the association rule learning (ARL) paradigm, whose models are computationally inexpensive and do not require a long training time. Therefore, this paper proposes an ARL-based intelligent Behavioural Trust Model (iBUST) for securing the CPPS. For this intelligent TMM, a variant of Frequency Pattern Growth (FP-Growth), called enhanced FP Growth (EFP-Growth) algorithm is developed by altering the internal data structures for faster execution and by developing a modified exponential decay function (MEDF) to automatically calculate minimum supports for adapting trust evolution characteristics. In addition, a new optimisation model for finding optimum parameter values in the MEDF and an algorithm for transmuting a 1D quantitative feature into a respective categorical feature are developed to facilitate the model. Afterwards, the trust class of an object is identified employing the Naive Bayes classifier. This proposed model is evaluated on a trust evolution-supported experimental environment along with other compared models taking a benchmark dataset into consideration, where it outperforms its counterparts.
引用
收藏
页数:16
相关论文
共 90 条
  • [31] Goethals B., 2004, Frequent Itemset Mining Dataset Repository
  • [32] Gronlund A, 2018, Arxiv, DOI [arXiv:1701.07204, 10.48550/arXiv.1701.07204]
  • [33] A Synergetic Trust Model Based on SVM in Underwater Acoustic Sensor Networks
    Han, Guangjie
    He, Yu
    Jiang, Jinfang
    Wang, Ning
    Guizani, Mohsen
    Ansere, James Adu
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (11) : 11239 - 11247
  • [34] International Telecommunication Union, 2017, Overview of trust provisioning for information and communication technology infrastructures and services
  • [35] Towards Machine Learning Based Intrusion Detection in IoT Networks
    Islam, Nahida
    Farhin, Fahiba
    Sultana, Ishrat
    Kaiser, M. Shamim
    Rahman, Md. Sazzadur
    Mahmud, Mufti
    Hosen, A. S. M. Sanwar
    Cho, Gi Hwan
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (02): : 1801 - 1821
  • [36] Machine Learning Based Trust Computational Model for IoT Services
    Jayasinghe, Upul
    Lee, Gyu Myoung
    Um, Tai-Won
    Shi, Qi
    [J]. IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2019, 4 (01): : 39 - 52
  • [37] Jayasinghe U, 2016, 2016 INT IEEE CONFERENCES ON UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING AND COMMUNICATIONS, CLOUD AND BIG DATA COMPUTING, INTERNET OF PEOPLE, AND SMART WORLD CONGRESS (UIC/ATC/SCALCOM/CBDCOM/IOP/SMARTWORLD), P930, DOI [10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.129, 10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0146]
  • [38] Artificial and Internet of Healthcare Things Based Alzheimer Care During COVID 19
    Jesmin, Sabrina
    Kaiser, M. Shamim
    Mahmud, Mufti
    [J]. BRAIN INFORMATICS, BI 2020, 2020, 12241 : 263 - 274
  • [39] Kaiser M. Shamim, 2021, Proceedings of International Conference on Trends in Computational and Cognitive Engineering. Proceedings of TCCE 2020. Advances in Intelligent Systems and Computing (AISC 1309), P317, DOI 10.1007/978-981-33-4673-4_25
  • [40] Kumar S, 2021, CONSUM COMM NETWORK, DOI [10.1109/CCNC49032.2021.9369645, 10.1007/s00779-021-01530-7, 10.17485/IJED/v9.23, 10.1145/3459930.3470856]