Intrusion Detection in Industrial Internet of Things Network-Based on Deep Learning Model with Rule-Based Feature Selection

被引:92
作者
Awotunde, Joseph Bamidele [1 ]
Chakraborty, Chinmay [2 ]
Adeniyi, Abidemi Emmanuel [3 ]
机构
[1] Univ Ilorin, Dept Comp Sci, Ilorin, Nigeria
[2] Birla Inst Technol, Dept Elect & Commun Engn, Mesra, Jharkhand, India
[3] Landmark Univ, Dept Comp Sci, Omu Aran, Nigeria
关键词
ANOMALY DETECTION SYSTEMS; SERVICE ATTACKS; DATA ANALYTICS; TAXONOMY; CHALLENGES; ALGORITHM; FRAMEWORK; MACHINE; CLUSTER; OCSVM;
D O I
10.1155/2021/7154587
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Industrial Internet of Things (IIoT) is a recent research area that links digital equipment and services to physical systems. The IIoT has been used to generate large quantities of data from multiple sensors, and the device has encountered several issues. The IIoT has faced various forms of cyberattacks that jeopardize its capacity to supply organizations with seamless operations. Such risks result in financial and reputational damages for businesses, as well as the theft of sensitive information. Hence, several Network Intrusion Detection Systems (NIDSs) have been developed to fight and protect IIoT systems, but the collections of information that can be used in the development of an intelligent NIDS are a difficult task; thus, there are serious challenges in detecting existing and new attacks. Therefore, the study provides a deep learning-based intrusion detection paradigm for IIoT with hybrid rule-based feature selection to train and verify information captured from TCP/IP packets. The training process was implemented using a hybrid rule-based feature selection and deep feedforward neural network model. The proposed scheme was tested utilizing two well-known network datasets, NSL-KDD and UNSW-NB15. The suggested method beats other relevant methods in terms of accuracy, detection rate, and FPR by 99.0%, 99.0%, and 1.0%, respectively, for the NSL-KDD dataset, and 98.9%, 99.9%, and 1.1%, respectively, for the UNSW-NB15 dataset, according to the results of the performance comparison. Finally, simulation experiments using various evaluation metrics revealed that the suggested method is appropriate for IIOT intrusion network attack classification.
引用
收藏
页数:17
相关论文
共 99 条
[1]   Fog Computing Micro Datacenter Based Dynamic Resource Estimation and Pricing Model for IoT [J].
Aazam, Mohammad ;
Huh, Eui-Nam .
2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (IEEE AINA 2015), 2015, :687-694
[2]   Intrusion detection using a fuzzy genetics-based learning algorithm [J].
Abadeh, M. Sanlee ;
Habibi, J. ;
Lucas, C. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (01) :414-428
[3]  
Abdulraheem Muyideen, 2021, Information and Communication Technology and Applications: Third International Conference, ICTA 2020. Communications in Computer and Information Science (1350), P444, DOI 10.1007/978-3-030-69143-1_34
[4]  
Abolhasanzadeh B., 2015, 2015 7th Conference on Information and Knowledge Technology (IKT), P1, DOI [DOI 10.1109/IKT.2015.7288799, 10.1109/IKT.2015.7288799]
[5]   Survey of approaches and features for the identification of HTTP-based botnet traffic [J].
Acarali, Dilara ;
Rajarajan, Muttukrishnan ;
Komninos, Nikos ;
Herwono, Ian .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 76 :1-15
[6]  
Adeniyi E.A., 2021, IoT in Healthcare and Ambient Assisted Living, P103, DOI DOI 10.1007/978-981-15-9897-5_6
[7]   Identification of malicious activities in industrial internet of things based on deep learning models [J].
AL-Hawawreh, Muna ;
Moustafa, Nour ;
Sitnikova, Elena .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 :1-11
[8]   An overview of security and privacy in smart cities' IoT communications [J].
Al-Turjman, Fadi ;
Zahmatkesh, Hadi ;
Shahroze, Ramiz .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (03)
[9]   Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system [J].
Al-Yaseen, Wathiq Laftah ;
Othman, Zulaiha Ali ;
Nazri, Mohd Zakree Ahmad .
EXPERT SYSTEMS WITH APPLICATIONS, 2017, 67 :296-303
[10]  
Alom MZ, 2015, PROC NAECON IEEE NAT, P339, DOI 10.1109/NAECON.2015.7443094