Identification of malicious activities in industrial internet of things based on deep learning models

被引:219
作者
AL-Hawawreh, Muna [1 ]
Moustafa, Nour [1 ]
Sitnikova, Elena [1 ]
机构
[1] Univ New South Wales, ADFA, Sch Engn & Informat Technol, Canberra, ACT, Australia
关键词
Industrial internet of things (IIoT); Internet industrial control systems (IICSs); Deep learning; Auto-encoder;
D O I
10.1016/j.jisa.2018.05.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet Industrial Control Systems (IICSs) that connect technological appliances and services with physical systems have become a new direction of research as they face different types of cyber-attacks that threaten their success in providing continuous services to organizations. Such threats cause firms to suffer financial and reputational losses and the stealing of important information. Although Network Intrusion Detection Systems (NIDSs) have been proposed to protect against them, they have the difficult task of collecting information for use in developing an intelligent NIDS which can proficiently detect existing and new attacks. In order to address this challenge, this paper proposes an anomaly detection technique for IICSs based on deep learning models that can learn and validate using information collected from TCP/IP packets. It includes a consecutive training process executed using a deep auto-encoder and deep feedforward neural network architecture which is evaluated using two well-known network datasets, namely, the NSL-KDD and UNSW-NB15. As the experimental results demonstrate that this technique can achieve a higher detection rate and lower false positive rate than eight recently developed techniques, it could be implemented in real IICS environments. (c) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1 / 11
页数:11
相关论文
共 53 条
[21]  
Linda Ondrej, 2009, Proceedings 2009 International Joint Conference on Neural Networks (IJCNN 2009 - Atlanta), P1827, DOI 10.1109/IJCNN.2009.5178592
[22]  
Lipton Z.C., 2015, ARXIV150600019
[23]  
Ludwig S, 2017, 2017 IEEE S SERIES C
[24]   Traffic Flow Prediction With Big Data: A Deep Learning Approach [J].
Lv, Yisheng ;
Duan, Yanjie ;
Kang, Wenwen ;
Li, Zhengxi ;
Wang, Fei-Yue .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2015, 16 (02) :865-873
[25]  
Maglaras LA, 2014, 2014 10TH INTERNATIONAL CONFERENCE ON HETEROGENEOUS NETWORKING FOR QUALITY, RELIABILITY, SECURITY AND ROBUSTNESS (QSHINE), P133, DOI [10.1109/QSHINE.2014.6928673, 10.4108/icst.qshine.2014.256549]
[26]  
Maglaras LA, 2014, 2014 SCIENCE AND INFORMATION CONFERENCE (SAI), P626, DOI 10.1109/SAI.2014.6918252
[27]  
Marsden T., 2017, arXiv preprint arXiv: 1711. 02826
[28]   A survey of intrusion detection techniques in Cloud [J].
Modi, Chirag ;
Patel, Dhiren ;
Borisaniya, Bhavesh ;
Patel, Hiren ;
Patel, Avi ;
Rajarajan, Muttukrishnan .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) :42-57
[29]  
Moustafa N., 2017, ARXIV170705505, P5, DOI [10.4225/75/57a84d4fbefbb, DOI 10.4225/75/57A84D4FBEFBB]
[30]  
Moustafa N, 2015, BUILDING ANAL DATASE