Deep-IFS: Intrusion Detection Approach for Industrial Internet of Things Traffic in Fog Environment

被引:95
作者
Abdel-Basset, Mohamed [1 ]
Chang, Victor [2 ]
Hawash, Hossam [1 ]
Chakrabortty, Ripon K. [3 ]
Ryan, Michael [3 ]
机构
[1] Zagazig Univ, Dept Comp Sci, Zagazig 44519, Egypt
[2] Teesside Univ, Middlesbrough TS1 3BA, Cleveland, England
[3] Univ New South Wales Canberra, Capabil Syst Ctr, Sch Engn & Informat Technol, Canberra, BC, Canada
关键词
Computational modeling; Forensics; Standards; Intrusion detection; Edge computing; Internet of Things; Deep learning (DL); forensics; industrial Internet of Things (IIoT); intrusion detection; NETWORKS;
D O I
10.1109/TII.2020.3025755
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The extensive propagation of industrial Internet of Things (IIoT) technologies has encouraged intruders to initiate a variety of attacks that need to be identified to maintain the security of end-user data and the safety of services offered by service providers. Deep learning (DL), especially recurrent approaches, has been applied successfully to the analysis of IIoT forensics but their key challenge of recurrent DL models is that they struggle with long traffic sequences and cannot be parallelized. Multihead attention (MHA) tried to address this shortfall but failed to capture the local representation of IIoT traffic sequences. In this article, we propose a forensics-based DL model (called Deep-IFS) to identify intrusions in IIoT traffic. The model learns local representations using local gated recurrent unit (LocalGRU), and introduces an MHA layer to capture and learn global representation (i.e., long-range dependencies). A residual connection between layers is designed to prevent information loss. Another challenge facing the current IIoT forensics frameworks is their limited scalability, limiting performance in handling Big IIoT traffic data produced by IIoT devices. This challenge is addressed by deploying and training the proposed Deep-IFS in a fog computing environment. The intrusion identification becomes scalable by distributing the computation and the IIoT traffic data across worker fog nodes for training the model. The master fog node is responsible for sharing training parameters and aggregating worker node output. The aggregated classification output is subsequently passed to the cloud platform for mitigating attacks. Empirical results on the Bot-IIoT dataset demonstrate that the developed distributed Deep-IFS can effectively handle Big IIoT traffic data compared with the present centralized DL-based forensics techniques. Further, the results validate the robustness of the proposed Deep-IFS across various evaluation measures.
引用
收藏
页码:7704 / 7715
页数:12
相关论文
共 30 条
[1]   A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security [J].
Al-Garadi, Mohammed Ali ;
Mohamed, Amr ;
Al-Ali, Abdulla Khalid ;
Du, Xiaojiang ;
Ali, Ihsan ;
Guizani, Mohsen .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03) :1646-1685
[2]   A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks [J].
Alkadi, Osama ;
Moustafa, Nour ;
Turnbull, Benjamin ;
Choo, Kim-Kwang Raymond .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (12) :9463-9472
[3]   Anomaly detection framework for Internet of things traffic using vector convolutional deep learning approach in fog environment [J].
Amma, Bhuvaneswari N. G. ;
Selvakumar, S. .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 113 :255-265
[4]   Exploring Unsupervised Learning Techniques for the Internet of Things [J].
Casolla, Giampaolo ;
Cuomo, Salvatore ;
di Cola, Vincenzo Schiano ;
Piccialli, Francesco .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (04) :2621-2628
[5]   A computational method for the European option price in an Internet of Things framework [J].
Cuomo, Salvatore ;
Di Somma, Vittorio ;
Piccialli, Francesco .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 107 :730-735
[6]  
Dai ZH, 2019, 57TH ANNUAL MEETING OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS (ACL 2019), P2978
[7]   Edge Intelligence: The Confluence of Edge Computing and Artificial Intelligence [J].
Deng, Shuiguang ;
Zhao, Hailiang ;
Fang, Weijia ;
Yin, Jianwei ;
Dustdar, Schahram ;
Zomaya, Albert Y. .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (08) :7457-7469
[8]   Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study [J].
Ferrag, Mohamed Amine ;
Maglaras, Leandros ;
Moschoyiannis, Sotiris ;
Janicke, Helge .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 50
[9]  
HADDADPAJOUH H, IN PRESS
[10]   Increasing the Trustworthiness in the Industrial IoT Networks Through a Reliable Cyberattack Detection Model [J].
Hassan, Mohammad Mehedi ;
Gumaei, Abdu ;
Huda, Shamsul ;
Almogren, Ahmad .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (09) :6154-6162