An ensemble deep learning model for cyber threat hunting in industrial internet of things

被引:51
|
作者
Yazdinejad, Abbas [1 ]
Kazemi, Mostafa [2 ]
Parizi, Reza M. [3 ]
Dehghantanha, Ali [1 ]
Karimipour, Hadis [4 ]
机构
[1] Univ Guelph, Sch Comp Sci, Cyber Sci Lab, Guelph, ON, Canada
[2] Shahed Univ, Fac Engn, Dept Elect Engn, Tehran, Iran
[3] Kennesaw State Univ, Coll Comp & Software Engn, Kennesaw, GA USA
[4] Univ Guelph, Sch Engn, Guelph, ON, Canada
关键词
Internet of things; IIoT; Anomaly detection; Ensemble deep learning; Neural networks; LSTM; INTRUSION DETECTION; ATTACKS; NETWORKS;
D O I
10.1016/j.dcan.2022.09.008
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
By the emergence of the fourth industrial revolution, interconnected devices and sensors generate large-scale, dynamic, and inharmonious data in Industrial Internet of Things (IIoT) platforms. Such vast heterogeneous data increase the challenges of security risks and data analysis procedures. As IIoT grows, cyber-attacks become more diverse and complex, making existing anomaly detection models less effective to operate. In this paper, an ensemble deep learning model that uses the benefits of the Long Short-Term Memory (LSTM) and the Auto -Encoder (AE) architecture to identify out-of-norm activities for cyber threat hunting in IIoT is proposed. In this model, the LSTM is applied to create a model on normal time series of data (past and present data) to learn normal data patterns and the important features of data are identified by AE to reduce data dimension. In addition, the imbalanced nature of IIoT datasets has not been considered in most of the previous literature, affecting low ac-curacy and performance. To solve this problem, the proposed model extracts new balanced data from the imbalanced datasets, and these new balanced data are fed into the deep LSTM AE anomaly detection model. In this paper, the proposed model is evaluated on two real IIoT datasets-Gas Pipeline (GP) and Secure Water Treatment (SWaT) that are imbalanced and consist of long-term and short-term dependency on data. The results are compared with conventional machine learning classifiers, Random Forest (RF), Multi-Layer Perceptron (MLP), Decision Tree (DT), and Super Vector Machines (SVM), in which higher performance in terms of accuracy is obtained, 99.3% and 99.7% based on GP and SWaT datasets, respectively. Moreover, the proposed ensemble model is compared with advanced related models, including Stacked Auto-Encoders (SAE), Naive Bayes (NB), Projective Adaptive Resonance Theory (PART), Convolutional Auto-Encoder (C-AE), and Package Signatures (PS) based LSTM (PS-LSTM) model.
引用
收藏
页码:101 / 110
页数:10
相关论文
共 50 条
  • [1] An ensemble deep learning model for cyber threat hunting in industrial internet of things
    Abbas Yazdinejad
    Mostafa Kazemi
    Reza MParizi
    Ali Dehghantanha
    Hadis Karimipour
    Digital Communications and Networks, 2023, 9 (01) : 101 - 110
  • [2] An ensemble deep federated learning cyber-threat hunting model for Industrial Internet of Things
    Jahromi, Amir Namavar
    Karimipour, Hadis
    Dehghantanha, Ali
    COMPUTER COMMUNICATIONS, 2023, 198 : 108 - 116
  • [3] Accurate threat hunting in industrial internet of things edge devices
    Yazdinejad, Abbas
    Zolfaghari, Behrouz
    Dehghantanha, Ali
    Karimipour, Hadis
    Srivastava, Gautam
    Parizi, Reza M.
    DIGITAL COMMUNICATIONS AND NETWORKS, 2023, 9 (05) : 1123 - 1130
  • [4] Accurate threat hunting in industrial internet of things edge devices
    Abbas Yazdinejad
    Behrouz Zolfaghari
    Ali Dehghantanha
    Hadis Karimipour
    Gautam Srivastava
    Reza MParizi
    Digital Communications and Networks, 2023, 9 (05) : 1123 - 1130
  • [5] Blockchain and Deep Learning for Cyber Threat-Hunting in Software-Defined Industrial IoT
    Kumar, Randhir
    Kumar, Prabhat
    Kumar, Abhinav
    Franklin, A. Antony
    Jolfaei, Alireza
    2022 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2022, : 776 - 781
  • [6] An Explainable Ensemble Deep Learning Approach for Intrusion Detection in Industrial Internet of Things
    Shtayat, Mousa'B Mohammad
    Hasan, Mohammad Kamrul
    Sulaiman, Rossilawati
    Islam, Shayla
    Khan, Atta Ur Rehman
    IEEE ACCESS, 2023, 11 : 115047 - 115061
  • [7] PIGNUS: A Deep Learning model for IDS in industrial internet-of-things
    Jayalaxmi, P. L. S.
    Saha, Rahul
    Kumar, Gulshan
    Alazab, Mamoun
    Conti, Mauro
    Cheng, Xiaochun
    COMPUTERS & SECURITY, 2023, 132
  • [8] An enhanced Deep-Learning empowered Threat-Hunting Framework for software-defined Internet of Things
    Kumar, Prabhat
    Jolfaei, Alireza
    Islam, A. K. M. Najmul
    COMPUTERS & SECURITY, 2025, 148
  • [9] A Deep Learning Model for Threat Hunting in Ethereum Blockchain
    Rabieinejad, Elnaz
    Yazdinejad, Abbas
    Parizi, Reza M.
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 1185 - 1190
  • [10] A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting
    HaddadPajouh, Hamed
    Dehghantanha, Ali
    Khayami, Raouf
    Choo, Kim-Kwang Raymond
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 85 : 88 - 96