An ensemble deep learning model for cyber threat hunting in industrial internet of things

被引:51
|
作者
Yazdinejad, Abbas [1 ]
Kazemi, Mostafa [2 ]
Parizi, Reza M. [3 ]
Dehghantanha, Ali [1 ]
Karimipour, Hadis [4 ]
机构
[1] Univ Guelph, Sch Comp Sci, Cyber Sci Lab, Guelph, ON, Canada
[2] Shahed Univ, Fac Engn, Dept Elect Engn, Tehran, Iran
[3] Kennesaw State Univ, Coll Comp & Software Engn, Kennesaw, GA USA
[4] Univ Guelph, Sch Engn, Guelph, ON, Canada
关键词
Internet of things; IIoT; Anomaly detection; Ensemble deep learning; Neural networks; LSTM; INTRUSION DETECTION; ATTACKS; NETWORKS;
D O I
10.1016/j.dcan.2022.09.008
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
By the emergence of the fourth industrial revolution, interconnected devices and sensors generate large-scale, dynamic, and inharmonious data in Industrial Internet of Things (IIoT) platforms. Such vast heterogeneous data increase the challenges of security risks and data analysis procedures. As IIoT grows, cyber-attacks become more diverse and complex, making existing anomaly detection models less effective to operate. In this paper, an ensemble deep learning model that uses the benefits of the Long Short-Term Memory (LSTM) and the Auto -Encoder (AE) architecture to identify out-of-norm activities for cyber threat hunting in IIoT is proposed. In this model, the LSTM is applied to create a model on normal time series of data (past and present data) to learn normal data patterns and the important features of data are identified by AE to reduce data dimension. In addition, the imbalanced nature of IIoT datasets has not been considered in most of the previous literature, affecting low ac-curacy and performance. To solve this problem, the proposed model extracts new balanced data from the imbalanced datasets, and these new balanced data are fed into the deep LSTM AE anomaly detection model. In this paper, the proposed model is evaluated on two real IIoT datasets-Gas Pipeline (GP) and Secure Water Treatment (SWaT) that are imbalanced and consist of long-term and short-term dependency on data. The results are compared with conventional machine learning classifiers, Random Forest (RF), Multi-Layer Perceptron (MLP), Decision Tree (DT), and Super Vector Machines (SVM), in which higher performance in terms of accuracy is obtained, 99.3% and 99.7% based on GP and SWaT datasets, respectively. Moreover, the proposed ensemble model is compared with advanced related models, including Stacked Auto-Encoders (SAE), Naive Bayes (NB), Projective Adaptive Resonance Theory (PART), Convolutional Auto-Encoder (C-AE), and Package Signatures (PS) based LSTM (PS-LSTM) model.
引用
收藏
页码:101 / 110
页数:10
相关论文
共 50 条
  • [21] Development of lightweight intrusion model in Industrial Internet of Things using deep learning technique
    Sinha, Raj
    Thakur, Padmanabh
    Gupta, Sandeep
    Shukla, Anand
    DISCOVER APPLIED SCIENCES, 2024, 6 (07)
  • [22] SMART PARKING SYSTEM: OPTIMIZED ENSEMBLE DEEP LEARNING MODEL WITH INTERNET OF THINGS FOR SMART CITIES
    Jakkaladiki, Sudha Prathyusha
    Poulova, Petra
    Prazak, Pavel
    Tesarova, Barbora
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2023, 24 (04): : 1191 - 1201
  • [23] Intrusion detection for Industrial Internet of Things based on deep learning
    Lu, Yaoyao
    Chai, Senchun
    Suo, Yuhan
    Yao, Fenxi
    Zhang, Chen
    NEUROCOMPUTING, 2024, 564
  • [24] Applying Deep Reinforcement Learning for Detection of Internet-of-Things Cyber Attacks
    Rookard, Curtis
    Khojandi, Anahita
    2023 IEEE 13TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE, CCWC, 2023, : 389 - 395
  • [25] Security threat model under internet of things using deep learning and edge analysis of cyberspace governance
    Li, Zhi
    Ge, Yuemeng
    Guo, Jieying
    Chen, Mengyao
    Wang, Junwei
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2022, 13 (SUPPL 3) : 1164 - 1176
  • [26] Cyber Security Threats Detection in Internet of Things Using Deep Learning Approach
    Ullah, Farhan
    Naeem, Hamad
    Jabbar, Sohail
    Khalid, Shehzad
    Latif, Muhammad Ahsan
    Al-Turjman, Fadi
    Mostarda, Leonardo
    IEEE ACCESS, 2019, 7 : 124379 - 124389
  • [27] Security threat model under internet of things using deep learning and edge analysis of cyberspace governance
    Zhi Li
    Yuemeng Ge
    Jieying Guo
    Mengyao Chen
    Junwei Wang
    International Journal of System Assurance Engineering and Management, 2022, 13 : 1164 - 1176
  • [28] Decentralized Actionable Cyber Threat Intelligence for Networks and the Internet of Things
    Mena, Diego Mendez
    Yang, Baijian
    IOT, 2021, 2 (01): : 1 - 16
  • [29] CYBER-ATTACKS AND INTERNET OF THINGS AS A THREAT TO CRITICAL INFRASTRUCTURE
    Simec, Alen
    ECONOMIC AND SOCIAL DEVELOPMENT (ESD 2019): 37TH INTERNATIONAL SCIENTIFIC CONFERENCE ON ECONOMIC AND SOCIAL DEVELOPMENT - SOCIO ECONOMIC PROBLEMS OF SUSTAINABLE DEVELOPMENT, 2019, : 108 - 111
  • [30] Deep Learning-Enabled Threat Intelligence Scheme in the Internet of Things Networks
    Al-Hawawreh, Muna
    Moustafa, Nour
    Garg, Sahil
    Hossain, M. Shamim
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (04): : 2968 - 2981