C. I. Nwakanma, Love Allen Chijioke Ahakonye, J. Njoku, Joy Eze, Dong‐Seong Kim
{"title":"Effective Industrial Internet of Things Vulnerability Detection Using Machine Learning","authors":"C. I. Nwakanma, Love Allen Chijioke Ahakonye, J. Njoku, Joy Eze, Dong‐Seong Kim","doi":"10.1109/ITED56637.2022.10051622","DOIUrl":null,"url":null,"abstract":"Protecting the industrial internet of things (IIoT) devices through vulnerability detection is critical as the consequences of attacks can be devastating. Machine learning (ML) has assisted several works in this regard, improving vulnerability detection accuracy. Based on established vulnerability assessment, development and performance comparison of various ML detection algorithms is essential. This work presents a description of the IIoT protocols and their vulnerabilities. The performance of the ML-based detection system was developed using the WUSTL-IIoT-2018 dataset for industrial control systems (SCADA) cy-bersecurity research. The approach was validated using the ICS-SCADA and CICDDoS2019 datasets, a recent dataset that captures new dimensions of distributed denial of service (DDoS) attacks on networks. The evaluation and validation results show that the proposed scheme could help with high vulnerability detection and mitigation accuracy across all evaluated datasets.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 5th Information Technology for Education and Development (ITED)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITED56637.2022.10051622","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Protecting the industrial internet of things (IIoT) devices through vulnerability detection is critical as the consequences of attacks can be devastating. Machine learning (ML) has assisted several works in this regard, improving vulnerability detection accuracy. Based on established vulnerability assessment, development and performance comparison of various ML detection algorithms is essential. This work presents a description of the IIoT protocols and their vulnerabilities. The performance of the ML-based detection system was developed using the WUSTL-IIoT-2018 dataset for industrial control systems (SCADA) cy-bersecurity research. The approach was validated using the ICS-SCADA and CICDDoS2019 datasets, a recent dataset that captures new dimensions of distributed denial of service (DDoS) attacks on networks. The evaluation and validation results show that the proposed scheme could help with high vulnerability detection and mitigation accuracy across all evaluated datasets.