IIoT Malware Detection Using Edge Computing and Deep Learning for Cybersecurity in Smart Factories

被引:22
作者
Kim, Ho-myung [1 ]
Lee, Kyung-ho [1 ]
机构
[1] Korea Univ, Sch Cybersecur, Seoul 02481, South Korea
来源
APPLIED SCIENCES-BASEL | 2022年 / 12卷 / 15期
关键词
smart factory; IIoT; edge computing; malware detection; deep learning; cyberattack; cybersecurity; ATTACK DETECTION; INTERNET; THINGS; IOT; SECURITY; CLASSIFICATION; NETWORKS;
D O I
10.3390/app12157679
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The smart factory environment has been transformed into an Industrial Internet of Things (IIoT) environment, which is an interconnected and open approach. This has made smart manufacturing plants vulnerable to cyberattacks that can directly lead to physical damage. Most cyberattacks targeting smart factories are carried out using malware. Thus, a solution that efficiently detects malware by monitoring and analyzing network traffic for malware attacks in smart factory IIoT environments is critical. However, achieving accurate real-time malware detection in such environments is difficult. To solve this problem, this study proposes an edge computing-based malware detection system that efficiently detects various cyberattacks (malware) by distributing vast amounts of smart factory IIoT traffic information to edge servers for deep learning processing. The proposed malware detection system consists of three layers (edge device, edge, and cloud layers) and utilizes four meaningful functions (model training and testing, model deployment, model inference, and training data transmission) for edge-based deep learning. In experiments conducted on the Malimg dataset, the proposed malware detection system incorporating a convolutional neural network with image visualization technology achieved an overall classification accuracy of 98.93%, precision of 98.93%, recall of 98.93%, and F1-score of 98.92%.
引用
收藏
页数:25
相关论文
共 105 条
[1]   A Mechanism for Securing IoT-enabled Applications at the Fog Layer [J].
Abbas, Nadeem ;
Asim, Muhammad ;
Tariq, Noshina ;
Baker, Thar ;
Abbas, Sohail .
JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2019, 8 (01)
[2]  
Akarsh S, 2019, INT CONF ADVAN COMPU, P1059, DOI [10.1109/ICACCS.2019.8728471, 10.1109/icaccs.2019.8728471]
[3]   Identification of malicious activities in industrial internet of things based on deep learning models [J].
AL-Hawawreh, Muna ;
Moustafa, Nour ;
Sitnikova, Elena .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 :1-11
[4]  
Alam Mohammad Nazmul, 2020, 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT), P1173, DOI 10.1109/ICSSIT48917.2020.9214225
[5]   Profiling and classifying the behavior of malicious codes [J].
Alazab, Mamoun .
JOURNAL OF SYSTEMS AND SOFTWARE, 2015, 100 :91-102
[6]   CoLL-IoT: A Collaborative Intruder Detection System for Internet of Things Devices [J].
Alshahrani, Hani Mohammed .
ELECTRONICS, 2021, 10 (07)
[7]  
Althubiti S.A., 2018, P 2018 28 INT TEL NE
[8]  
[Anonymous], 2017, GE REPORT EVERYTHING
[9]  
[Anonymous], 2018, Good practices on interdependencies between OES and DSPs
[10]   A New Malware Classification Framework Based on Deep Learning Algorithms [J].
Aslan, Omer ;
Yilmaz, Abdullah Asim .
IEEE ACCESS, 2021, 9 :87936-87951