An Adaptive Trust Boundary Protection for IIoT Networks Using Deep-Learning Feature-Extraction-Based Semisupervised Model

被引:42
作者
Hassan, Mohammad Mehedi [1 ]
Huda, Shamsul [2 ]
Sharmeen, Shaila [2 ]
Abawajy, Jemal [2 ]
Fortino, Giancarlo [3 ]
机构
[1] King Saud Univ, Coll Comp & Informat Sci, Riyadh 11543, Saudi Arabia
[2] Deakin Univ, Sch Informat Technol, Melbourne, Vic 3217, Australia
[3] Univ Calabria, Dept Informat Modeling Elect & Syst, I-87036 Arcavacata Di Rende, Italy
关键词
Cyberattack models; deep learning; IIoT; industrial control system; protocol vulnerabilities; secure DNP3.0; semisupervised model; trust boundary protection;
D O I
10.1109/TII.2020.3015026
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid development of Internet of Things (IoT) platforms provides the industrial domain with many critical solutions, such as joint venture virtual production systems. However, the extensive interconnection of industrial systems with corporate systems in industrial Internet of Things (IIoT) networks exposes the industrial domain to severe cyber risks. Because of many proprietary multilevel protocols, limited upgrade opportunities, heterogeneous communication infrastructures, and a very large trust boundary, conventional IT security fails to prevent cyberattacks against IIoT networks. Recent secure protocols, such as secure distributed network protocol (DNP 3.0), are limited to weak hash functions for critical response time requirements. As a complementary, we propose an adaptive trust boundary protection for IIoT networks using a deep-learning, feature-extraction-based semisupervised model. Our proposed approach is novel in that it is compatible with multilevel protocols of IIoT. The proposed approach does not require any manual effort to update the attack databases and can learn the rapidly changing natures of unknown attack models using unsupervised learnings and unlabeled data from the wild. Therefore, the proposed approach is resilient to emerging cyberattacks and their dynamic nature. The proposed approach has been verified using a real IIoT testbed. Extensive experimental analysis of the attack models and results shows that the proposed approach significantly improves the identification of attacks over conventional security control techniques.
引用
收藏
页码:2860 / 2870
页数:11
相关论文
共 29 条
[1]   Integrated protection of industrial control systems from cyber-attacks: the ATENA approach [J].
Adamsky, F. ;
Aubigny, M. ;
Battisti, F. ;
Carli, M. ;
Cimorelli, F. ;
Cruz, T. ;
Di Giorgio, A. ;
Foglietta, C. ;
Galli, A. ;
Giuseppi, A. ;
Liberati, F. ;
Neri, A. ;
Panzieri, S. ;
Pascucci, F. ;
Proenca, J. ;
Pucci, P. ;
Rosa, L. ;
Soua, R. .
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2018, 21 :72-82
[2]  
[Anonymous], 2020, SWISS ARMY KNIFE
[3]   Performance Evaluation and Modeling of an Industrial Application-Layer Firewall [J].
Cheminod, Manuel ;
Durante, Luca ;
Seno, Lucia ;
Valenzano, Adriano .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (05) :2159-2170
[4]   An Anonymous Authentication and Key Establish Scheme for Smart Grid: FAuth [J].
Chen, Yuwen ;
Martinez, Jose-Fernan ;
Castillejo, Pedro ;
Lopez, Lourdes .
ENERGIES, 2017, 10 (09)
[5]   Secure Authentication in the Grid: A Formal Analysis of DNP3: SAv5 [J].
Cremers, Cas ;
Dehnel-Wild, Martin ;
Milner, Kevin .
COMPUTER SECURITY - ESORICS 2017, PT I, 2018, 10492 :389-407
[6]   Design of Binary Erasure Code With Triple Simultaneous Objectives for Distributed Edge Caching in Industrial Internet of Things Networks [J].
Dai, Mingjun ;
Deng, Haiyan ;
Chen, Bin ;
Su, Gongchao ;
Lin, Xiaohui ;
Wang, Hui .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (08) :5497-5504
[7]   S-GoSV: Framework for Generating Secure IEC 61850 GOOSE and Sample Value Messages [J].
Farooq, Shaik Mullapathi ;
Hussain, S. M. Suhail ;
Ustun, Taha Selim .
ENERGIES, 2019, 12 (13)
[8]   A Trust-Based Team Formation Framework for Mobile Intelligence in Smart Factories [J].
Fortino, Giancarlo ;
Messina, Fabrizio ;
Rosaci, Domenico ;
Sarne, Giuseppe M. L. ;
Savaglio, Claudio .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (09) :6133-6142
[9]   Extremely randomized trees [J].
Geurts, P ;
Ernst, D ;
Wehenkel, L .
MACHINE LEARNING, 2006, 63 (01) :3-42
[10]   Hour-Ahead Price Based Energy Management Scheme for Industrial Facilities [J].
Huang, Xuefei ;
Hong, Seung Ho ;
Li, Yuting .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (06) :2886-2898