Identification of malicious activities in industrial internet of things based on deep learning models

被引:219
作者
AL-Hawawreh, Muna [1 ]
Moustafa, Nour [1 ]
Sitnikova, Elena [1 ]
机构
[1] Univ New South Wales, ADFA, Sch Engn & Informat Technol, Canberra, ACT, Australia
关键词
Industrial internet of things (IIoT); Internet industrial control systems (IICSs); Deep learning; Auto-encoder;
D O I
10.1016/j.jisa.2018.05.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet Industrial Control Systems (IICSs) that connect technological appliances and services with physical systems have become a new direction of research as they face different types of cyber-attacks that threaten their success in providing continuous services to organizations. Such threats cause firms to suffer financial and reputational losses and the stealing of important information. Although Network Intrusion Detection Systems (NIDSs) have been proposed to protect against them, they have the difficult task of collecting information for use in developing an intelligent NIDS which can proficiently detect existing and new attacks. In order to address this challenge, this paper proposes an anomaly detection technique for IICSs based on deep learning models that can learn and validate using information collected from TCP/IP packets. It includes a consecutive training process executed using a deep auto-encoder and deep feedforward neural network architecture which is evaluated using two well-known network datasets, namely, the NSL-KDD and UNSW-NB15. As the experimental results demonstrate that this technique can achieve a higher detection rate and lower false positive rate than eight recently developed techniques, it could be implemented in real IICS environments. (c) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1 / 11
页数:11
相关论文
共 53 条
[1]  
Abolhasanzadeh B, 2015, INFORM KNOWLEDGE TEC, P1
[2]  
Abraham A., 2007, Int. J. Netw. Secur, V4, P328
[3]  
Alom MZ, 2015, PROC NAECON IEEE NAT, P339, DOI 10.1109/NAECON.2015.7443094
[4]   Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm [J].
Ambusaidi, Mohammed A. ;
He, Xiangjian ;
Nanda, Priyadarsi ;
Tan, Zhiyuan .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) :2986-2998
[5]  
[Anonymous], 2016, PROC 9 EAI INT C BIO, DOI DOI 10.4108/EAI.3-12-2015.2262516
[6]   An Artificial Immune-based Distributed Intrusion Detection Model for the Internet of Things [J].
Chen, Run ;
Liu, Caiming ;
Chen, Chao .
ADVANCED RESEARCH ON MATERIAL ENGINEERING, ARCHITECTURAL ENGINEERING AND INFORMATIZATION, 2012, 366 :165-+
[7]  
Chuan- long Y, 2017, IEEE Access, P1
[8]  
Dijk CV, 1990, Expert systems in auditing, P21
[9]   Industrie 4.0: Hit or Hype? [J].
Drath, Rainer ;
Horch, Alexander .
IEEE INDUSTRIAL ELECTRONICS MAGAZINE, 2014, 8 (02) :56-58
[10]  
Erhan D, 2010, J MACH LEARN RES, V11, P625