Detection of Attacks on Industrial Internet of Things Using Fewer Features

Hong-Yu Chuang, Ruey-Maw Chen
{"title":"Detection of Attacks on Industrial Internet of Things Using Fewer Features","authors":"Hong-Yu Chuang, Ruey-Maw Chen","doi":"10.1109/IS3C57901.2023.00009","DOIUrl":null,"url":null,"abstract":"Malicious attack detection becomes a critical issue in Industrial IoT(IIoT) environments. Meanwhile, the IoT market is constantly growing, and new IoT devices are connected to the Internet day by day, causing a rapid increase in network traffic. To enable IDS to detect malicious attacks in high-load network environments, a lightweight IDS is required. Therefore, Machine Learning (ML) based intrusion detection systems (IDS) with fewer features to meet the lightweight IDS are applied to the TON_IoT dataset. A Pearson correlation coefficient (PCC) is applied to calculate correlations among features, followed by Jamovi analysis software’s frequency table to analyze the core features of the TON_IoT dataset. Finally, the original 45 features are reduced to 10 core features for IDS to detect malicious activity. To verify the performance of malicious attack activities with the reduced 10 core features, four evaluation criteria are used: accuracy, precision, recall, and F1 score. Two ML techniques, KNN and RF, are applied for testing. According to experimental results, both ML techniques can detect multiple types of attacks with an accuracy of over 99%, indicating that using the proposed 10 core features for attack detection can still yield high accuracy.","PeriodicalId":142483,"journal":{"name":"2023 Sixth International Symposium on Computer, Consumer and Control (IS3C)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 Sixth International Symposium on Computer, Consumer and Control (IS3C)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IS3C57901.2023.00009","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Malicious attack detection becomes a critical issue in Industrial IoT(IIoT) environments. Meanwhile, the IoT market is constantly growing, and new IoT devices are connected to the Internet day by day, causing a rapid increase in network traffic. To enable IDS to detect malicious attacks in high-load network environments, a lightweight IDS is required. Therefore, Machine Learning (ML) based intrusion detection systems (IDS) with fewer features to meet the lightweight IDS are applied to the TON_IoT dataset. A Pearson correlation coefficient (PCC) is applied to calculate correlations among features, followed by Jamovi analysis software’s frequency table to analyze the core features of the TON_IoT dataset. Finally, the original 45 features are reduced to 10 core features for IDS to detect malicious activity. To verify the performance of malicious attack activities with the reduced 10 core features, four evaluation criteria are used: accuracy, precision, recall, and F1 score. Two ML techniques, KNN and RF, are applied for testing. According to experimental results, both ML techniques can detect multiple types of attacks with an accuracy of over 99%, indicating that using the proposed 10 core features for attack detection can still yield high accuracy.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于较少特征的工业物联网攻击检测
恶意攻击检测成为工业物联网(IIoT)环境中的一个关键问题。与此同时,物联网市场不断增长,新的物联网设备日益接入互联网,导致网络流量快速增长。为了使IDS能够检测高负载网络环境中的恶意攻击,需要轻量级IDS。因此,基于机器学习(ML)的入侵检测系统(IDS)具有较少的特征来满足轻量级的入侵检测系统被应用于TON_IoT数据集。采用Pearson相关系数(PCC)计算特征之间的相关性,利用Jamovi分析软件的频率表分析TON_IoT数据集的核心特征。最后,IDS将原来的45个功能减少到10个核心功能,以检测恶意活动。为了用减少的10个核心特征验证恶意攻击活动的性能,使用了四个评估标准:准确性、精度、召回率和F1分数。两种ML技术,KNN和RF,应用于测试。实验结果表明,两种机器学习技术都可以检测多种类型的攻击,准确率超过99%,这表明使用提出的10个核心特征进行攻击检测仍然可以产生很高的准确率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Overview of Coordinated Frequency Control Technologies for Wind Turbines, HVDC and Energy Storage Systems Apply Masked-attention Mask Transformer to Instance Segmentation in Pathology Images A Broadband Millimeter-Wave 5G Low Noise Amplifier Design in 22 nm Fully-Depleted Silicon-on-Insulator (FD-SOI) CMOS Wearable PVDF-TrFE-based Pressure Sensors for Throat Vibrations and Arterial Pulses Monitoring Fast Detection of Fabric Defects based on Neural Networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1