Identification of malicious activities in industrial internet of things based on deep learning models

被引:219
作者
AL-Hawawreh, Muna [1 ]
Moustafa, Nour [1 ]
Sitnikova, Elena [1 ]
机构
[1] Univ New South Wales, ADFA, Sch Engn & Informat Technol, Canberra, ACT, Australia
关键词
Industrial internet of things (IIoT); Internet industrial control systems (IICSs); Deep learning; Auto-encoder;
D O I
10.1016/j.jisa.2018.05.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet Industrial Control Systems (IICSs) that connect technological appliances and services with physical systems have become a new direction of research as they face different types of cyber-attacks that threaten their success in providing continuous services to organizations. Such threats cause firms to suffer financial and reputational losses and the stealing of important information. Although Network Intrusion Detection Systems (NIDSs) have been proposed to protect against them, they have the difficult task of collecting information for use in developing an intelligent NIDS which can proficiently detect existing and new attacks. In order to address this challenge, this paper proposes an anomaly detection technique for IICSs based on deep learning models that can learn and validate using information collected from TCP/IP packets. It includes a consecutive training process executed using a deep auto-encoder and deep feedforward neural network architecture which is evaluated using two well-known network datasets, namely, the NSL-KDD and UNSW-NB15. As the experimental results demonstrate that this technique can achieve a higher detection rate and lower false positive rate than eight recently developed techniques, it could be implemented in real IICS environments. (c) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1 / 11
页数:11
相关论文
共 53 条
[11]  
Hardy W., 2016, P INT C DAT SCI STEE, P61
[12]  
Hodo E., 2017, Shallow and deep networks intrusion detection system: A taxonomy and survey
[13]  
Hodo E, 2016, NETWORKS COMPUTERS C, P1
[14]   Deep Architecture for Traffic Flow Prediction: Deep Belief Networks With Multitask Learning [J].
Huang, Wenhao ;
Song, Guojie ;
Hong, Haikun ;
Xie, Kunqing .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2014, 15 (05) :2191-2201
[15]  
Katsikeas S, 2017, S COMPUTERS COMMUNIC
[16]  
석선희, 2016, [Journal of The Korea Institute of Information Security and Cryptology, 정보보호학회논문지], V26, P197
[17]   Immune system approaches to intrusion detection - A review [J].
Kim J. ;
Bentley P.J. ;
Aickelin U. ;
Greensmith J. ;
Tedesco G. ;
Twycross J. .
Natural Computing, 2007, 6 (4) :413-466
[18]   THE REAL STORY OF STUXNET [J].
Kushner, David .
IEEE SPECTRUM, 2013, 50 (03) :48-53
[19]   Efficient Mini-batch Training for Stochastic Optimization [J].
Li, Muu ;
Zhang, Tong ;
Chen, Yuqiang ;
Smola, Alexander J. .
PROCEEDINGS OF THE 20TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING (KDD'14), 2014, :661-670
[20]  
Li Y, 2015, Int J Secur Appl Methods, V9