工业物联网中值得信赖和可靠的基于深度学习的网络攻击检测

IF 11.7 1区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS IEEE Transactions on Industrial Informatics Pub Date : 2022-07-13 DOI:10.1109/TII.2022.3190352
Fazlullah Khan;Ryan Alturki;Md Arafatur Rahman;Spyridon Mastorakis;Imran Razzak;Syed Tauhidullah Shah
{"title":"工业物联网中值得信赖和可靠的基于深度学习的网络攻击检测","authors":"Fazlullah Khan;Ryan Alturki;Md Arafatur Rahman;Spyridon Mastorakis;Imran Razzak;Syed Tauhidullah Shah","doi":"10.1109/TII.2022.3190352","DOIUrl":null,"url":null,"abstract":"A fundamental expectation of the stakeholders from the Industrial Internet of Things (IIoT) is its trustworthiness and sustainability to avoid the loss of human lives in performing a critical task. A trustworthy IIoT-enabled network encompasses fundamental security characteristics, such as trust, privacy, security, reliability, resilience, and safety. The traditional security mechanisms and procedures are insufficient to protect these networks owing to protocol differences, limited update options, and older adaptations of the security mechanisms. As a result, these networks require novel approaches to increase trust-level and enhance security and privacy mechanisms. Therefore, in this article, we propose a novel approach to improve the trustworthiness of IIoT-enabled networks. We propose an accurate and reliable supervisory control and data acquisition (SCADA) network-based cyberattack detection in these networks. The proposed scheme combines the deep-learning-based pyramidal recurrent units (PRU) and decision tree (DT) with SCADA-based IIoT networks. We also use an ensemble-learning method to detect cyberattacks in SCADA-based IIoT networks. The nonlinear learning ability of PRU and the ensemble DT address the sensitivity of irrelevant features, allowing high detection rates. The proposed scheme is evaluated on 15 datasets generated from SCADA-based networks. The experimental results show that the proposed scheme outperforms traditional methods and machine learning-based detection approaches. The proposed scheme improves the security and associated measure of trustworthiness in IIoT-enabled networks.","PeriodicalId":13301,"journal":{"name":"IEEE Transactions on Industrial Informatics","volume":"19 1","pages":"1030-1038"},"PeriodicalIF":11.7000,"publicationDate":"2022-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9829330","citationCount":"7","resultStr":"{\"title\":\"Trustworthy and Reliable Deep-Learning-Based Cyberattack Detection in Industrial IoT\",\"authors\":\"Fazlullah Khan;Ryan Alturki;Md Arafatur Rahman;Spyridon Mastorakis;Imran Razzak;Syed Tauhidullah Shah\",\"doi\":\"10.1109/TII.2022.3190352\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A fundamental expectation of the stakeholders from the Industrial Internet of Things (IIoT) is its trustworthiness and sustainability to avoid the loss of human lives in performing a critical task. A trustworthy IIoT-enabled network encompasses fundamental security characteristics, such as trust, privacy, security, reliability, resilience, and safety. The traditional security mechanisms and procedures are insufficient to protect these networks owing to protocol differences, limited update options, and older adaptations of the security mechanisms. As a result, these networks require novel approaches to increase trust-level and enhance security and privacy mechanisms. Therefore, in this article, we propose a novel approach to improve the trustworthiness of IIoT-enabled networks. We propose an accurate and reliable supervisory control and data acquisition (SCADA) network-based cyberattack detection in these networks. The proposed scheme combines the deep-learning-based pyramidal recurrent units (PRU) and decision tree (DT) with SCADA-based IIoT networks. We also use an ensemble-learning method to detect cyberattacks in SCADA-based IIoT networks. The nonlinear learning ability of PRU and the ensemble DT address the sensitivity of irrelevant features, allowing high detection rates. The proposed scheme is evaluated on 15 datasets generated from SCADA-based networks. The experimental results show that the proposed scheme outperforms traditional methods and machine learning-based detection approaches. The proposed scheme improves the security and associated measure of trustworthiness in IIoT-enabled networks.\",\"PeriodicalId\":13301,\"journal\":{\"name\":\"IEEE Transactions on Industrial Informatics\",\"volume\":\"19 1\",\"pages\":\"1030-1038\"},\"PeriodicalIF\":11.7000,\"publicationDate\":\"2022-07-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9829330\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Industrial Informatics\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/9829330/\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Industrial Informatics","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/9829330/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 7

摘要

工业物联网(IIoT)利益相关者的一个基本期望是其可信度和可持续性,以避免在执行关键任务时造成人员伤亡。值得信赖的IIoT网络包含基本的安全特性,如信任、隐私、安全、可靠性、弹性和安全性。由于协议差异、更新选项有限以及安全机制的旧版本,传统的安全机制和程序不足以保护这些网络。因此,这些网络需要新的方法来提高信任级别并增强安全和隐私机制。因此,在本文中,我们提出了一种新的方法来提高IIoT网络的可信度。我们提出了一种准确可靠的监控和数据采集(SCADA)网络网络攻击检测方法。所提出的方案将基于深度学习的金字塔递归单元(PRU)和决策树(DT)与基于SCADA的IIoT网络相结合。我们还使用集成学习方法来检测基于SCADA的IIoT网络中的网络攻击。PRU和集成DT的非线性学习能力解决了不相关特征的敏感性,允许高检测率。在基于SCADA的网络生成的15个数据集上对所提出的方案进行了评估。实验结果表明,该方案优于传统方法和基于机器学习的检测方法。所提出的方案改进了启用IIoT的网络中的安全性和相关的可信度度量。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Trustworthy and Reliable Deep-Learning-Based Cyberattack Detection in Industrial IoT
A fundamental expectation of the stakeholders from the Industrial Internet of Things (IIoT) is its trustworthiness and sustainability to avoid the loss of human lives in performing a critical task. A trustworthy IIoT-enabled network encompasses fundamental security characteristics, such as trust, privacy, security, reliability, resilience, and safety. The traditional security mechanisms and procedures are insufficient to protect these networks owing to protocol differences, limited update options, and older adaptations of the security mechanisms. As a result, these networks require novel approaches to increase trust-level and enhance security and privacy mechanisms. Therefore, in this article, we propose a novel approach to improve the trustworthiness of IIoT-enabled networks. We propose an accurate and reliable supervisory control and data acquisition (SCADA) network-based cyberattack detection in these networks. The proposed scheme combines the deep-learning-based pyramidal recurrent units (PRU) and decision tree (DT) with SCADA-based IIoT networks. We also use an ensemble-learning method to detect cyberattacks in SCADA-based IIoT networks. The nonlinear learning ability of PRU and the ensemble DT address the sensitivity of irrelevant features, allowing high detection rates. The proposed scheme is evaluated on 15 datasets generated from SCADA-based networks. The experimental results show that the proposed scheme outperforms traditional methods and machine learning-based detection approaches. The proposed scheme improves the security and associated measure of trustworthiness in IIoT-enabled networks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
IEEE Transactions on Industrial Informatics
IEEE Transactions on Industrial Informatics 工程技术-工程:工业
CiteScore
24.10
自引率
8.90%
发文量
1202
审稿时长
5.1 months
期刊介绍: The IEEE Transactions on Industrial Informatics is a multidisciplinary journal dedicated to publishing technical papers that connect theory with practical applications of informatics in industrial settings. It focuses on the utilization of information in intelligent, distributed, and agile industrial automation and control systems. The scope includes topics such as knowledge-based and AI-enhanced automation, intelligent computer control systems, flexible and collaborative manufacturing, industrial informatics in software-defined vehicles and robotics, computer vision, industrial cyber-physical and industrial IoT systems, real-time and networked embedded systems, security in industrial processes, industrial communications, systems interoperability, and human-machine interaction.
期刊最新文献
Language-Guided Category Push–Grasp Synergy Learning in Clutter by Efficiently Perceiving Object Manipulation Space Adaptive Decentralized State Estimation for Multimachine Power Grids Under Measurement Noises With Unknown Statistics Analysis of Winding-Connection Sequence in Multiphase Series-End Winding Motor Drives for Leg-Current Stress Reduction Day-Ahead Wind Power Admissibility Assessment of Power Systems Considering Frequency Constraints A Data-Driven Obstacle Avoidance Scheme for Redundant Robots With Unknown Structures
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1