HMS-IDS:针对 IIoT 中的零日漏洞和高级持续性威胁的威胁情报集成

IF 2.6 4区 综合性期刊 Q2 MULTIDISCIPLINARY SCIENCES Arabian Journal for Science and Engineering Pub Date : 2024-07-10 DOI:10.1007/s13369-024-08935-5
Kumar Saurabh, Vaidik Sharma, Uphar Singh, Rahamatullah Khondoker, Ranjana Vyas, O. P. Vyas
{"title":"HMS-IDS:针对 IIoT 中的零日漏洞和高级持续性威胁的威胁情报集成","authors":"Kumar Saurabh,&nbsp;Vaidik Sharma,&nbsp;Uphar Singh,&nbsp;Rahamatullah Khondoker,&nbsp;Ranjana Vyas,&nbsp;O. P. Vyas","doi":"10.1007/s13369-024-08935-5","DOIUrl":null,"url":null,"abstract":"<div><p>Critical Industries such as Manufacturing, Power, and Intelligent Transportation are increasingly using IIoT systems, making them more susceptible to cyberattacks. To counter these cyberattacks, policymakers have made strong guidelines, and various security provisions like secure authentication and encryption mechanisms as effective countermeasures for these systems. The exponential rise in cyberattacks has proven that all these measures are not sufficient to protect IIoT systems and have certain limitations. Considering the progress in Artificial Intelligence, it is widely acknowledged that Machine Learning (ML) based Intrusion Detection Systems (IDS) hold significant potential for identifying these cyberattacks. Numerous ML-based IDS have been proposed, which are capable of detecting known attacks but do not perform well in recognizing the “Unknown-Attacks” or Zero-Day Attacks (ZDAs) and Advanced Persistent Threats (APTs); hence, one of the most prominent concerns in the cyber industry is how threat intelligence could be used to protect against these exploits. The proposed “Hybrid Multi-Stage Intrusion Detection System” (HMS-IDS) is driven by supervised and unsupervised approaches to identify both known and unknown cyber-attacks in IIoT environments. By carefully evaluating the esteemed CIC-ToN-IoT dataset, the proposed IDS model attains staggering levels of accuracy, reaching an impressive 99.49% in detecting known attacks and an exceptional 98.936% in identifying unknown attacks. These compelling findings unequivocally substantiate the system’s efficacy in real-time detection of malicious cyber incursions targeting IIoT devices, thereby underscoring its tremendous potential for wide-scale implementation and practical deployment. To validate the proposed model’s reliability, the performance evaluation is also performed on state-of-the-art datasets, namely KDD-99 Cup, NSL-KDD, CICIDS 2017.</p></div>","PeriodicalId":54354,"journal":{"name":"Arabian Journal for Science and Engineering","volume":"50 2","pages":"1307 - 1327"},"PeriodicalIF":2.6000,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"HMS-IDS: Threat Intelligence Integration for Zero-Day Exploits and Advanced Persistent Threats in IIoT\",\"authors\":\"Kumar Saurabh,&nbsp;Vaidik Sharma,&nbsp;Uphar Singh,&nbsp;Rahamatullah Khondoker,&nbsp;Ranjana Vyas,&nbsp;O. P. Vyas\",\"doi\":\"10.1007/s13369-024-08935-5\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>Critical Industries such as Manufacturing, Power, and Intelligent Transportation are increasingly using IIoT systems, making them more susceptible to cyberattacks. To counter these cyberattacks, policymakers have made strong guidelines, and various security provisions like secure authentication and encryption mechanisms as effective countermeasures for these systems. The exponential rise in cyberattacks has proven that all these measures are not sufficient to protect IIoT systems and have certain limitations. Considering the progress in Artificial Intelligence, it is widely acknowledged that Machine Learning (ML) based Intrusion Detection Systems (IDS) hold significant potential for identifying these cyberattacks. Numerous ML-based IDS have been proposed, which are capable of detecting known attacks but do not perform well in recognizing the “Unknown-Attacks” or Zero-Day Attacks (ZDAs) and Advanced Persistent Threats (APTs); hence, one of the most prominent concerns in the cyber industry is how threat intelligence could be used to protect against these exploits. The proposed “Hybrid Multi-Stage Intrusion Detection System” (HMS-IDS) is driven by supervised and unsupervised approaches to identify both known and unknown cyber-attacks in IIoT environments. By carefully evaluating the esteemed CIC-ToN-IoT dataset, the proposed IDS model attains staggering levels of accuracy, reaching an impressive 99.49% in detecting known attacks and an exceptional 98.936% in identifying unknown attacks. These compelling findings unequivocally substantiate the system’s efficacy in real-time detection of malicious cyber incursions targeting IIoT devices, thereby underscoring its tremendous potential for wide-scale implementation and practical deployment. To validate the proposed model’s reliability, the performance evaluation is also performed on state-of-the-art datasets, namely KDD-99 Cup, NSL-KDD, CICIDS 2017.</p></div>\",\"PeriodicalId\":54354,\"journal\":{\"name\":\"Arabian Journal for Science and Engineering\",\"volume\":\"50 2\",\"pages\":\"1307 - 1327\"},\"PeriodicalIF\":2.6000,\"publicationDate\":\"2024-07-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Arabian Journal for Science and Engineering\",\"FirstCategoryId\":\"103\",\"ListUrlMain\":\"https://link.springer.com/article/10.1007/s13369-024-08935-5\",\"RegionNum\":4,\"RegionCategory\":\"综合性期刊\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"MULTIDISCIPLINARY SCIENCES\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Arabian Journal for Science and Engineering","FirstCategoryId":"103","ListUrlMain":"https://link.springer.com/article/10.1007/s13369-024-08935-5","RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"MULTIDISCIPLINARY SCIENCES","Score":null,"Total":0}
引用次数: 0

摘要

制造业、电力和智能交通等关键行业越来越多地使用物联网系统,这使它们更容易受到网络攻击。为了应对这些网络攻击,决策者制定了强有力的指导方针和各种安全规定,如安全认证和加密机制,作为这些系统的有效对策。网络攻击的指数式增长证明,所有这些措施都不足以保护 IIoT 系统,而且有一定的局限性。考虑到人工智能的进步,人们普遍认为基于机器学习(ML)的入侵检测系统(IDS)在识别这些网络攻击方面具有巨大潜力。已提出的许多基于 ML 的 IDS 能够检测已知攻击,但在识别 "未知攻击 "或零日攻击(ZDA)和高级持续性威胁(APT)方面表现不佳;因此,网络行业最关注的问题之一是如何利用威胁情报来防范这些攻击。所提出的 "混合多阶段入侵检测系统"(HMS-IDS)由监督和非监督方法驱动,可识别物联网环境中已知和未知的网络攻击。通过仔细评估备受推崇的 CIC-ToN-IoT 数据集,所提出的 IDS 模型达到了惊人的准确率水平,在检测已知攻击方面达到了令人印象深刻的 99.49%,在识别未知攻击方面达到了卓越的 98.936%。这些令人信服的发现明确证实了该系统在实时检测针对物联网设备的恶意网络入侵方面的功效,从而彰显了其在大规模实施和实际部署方面的巨大潜力。为了验证所提模型的可靠性,还在 KDD-99 Cup、NSL-KDD、CICIDS 2017 等最先进的数据集上进行了性能评估。
本文章由计算机程序翻译,如有差异,请以英文原文为准。

摘要图片

摘要图片

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
HMS-IDS: Threat Intelligence Integration for Zero-Day Exploits and Advanced Persistent Threats in IIoT

Critical Industries such as Manufacturing, Power, and Intelligent Transportation are increasingly using IIoT systems, making them more susceptible to cyberattacks. To counter these cyberattacks, policymakers have made strong guidelines, and various security provisions like secure authentication and encryption mechanisms as effective countermeasures for these systems. The exponential rise in cyberattacks has proven that all these measures are not sufficient to protect IIoT systems and have certain limitations. Considering the progress in Artificial Intelligence, it is widely acknowledged that Machine Learning (ML) based Intrusion Detection Systems (IDS) hold significant potential for identifying these cyberattacks. Numerous ML-based IDS have been proposed, which are capable of detecting known attacks but do not perform well in recognizing the “Unknown-Attacks” or Zero-Day Attacks (ZDAs) and Advanced Persistent Threats (APTs); hence, one of the most prominent concerns in the cyber industry is how threat intelligence could be used to protect against these exploits. The proposed “Hybrid Multi-Stage Intrusion Detection System” (HMS-IDS) is driven by supervised and unsupervised approaches to identify both known and unknown cyber-attacks in IIoT environments. By carefully evaluating the esteemed CIC-ToN-IoT dataset, the proposed IDS model attains staggering levels of accuracy, reaching an impressive 99.49% in detecting known attacks and an exceptional 98.936% in identifying unknown attacks. These compelling findings unequivocally substantiate the system’s efficacy in real-time detection of malicious cyber incursions targeting IIoT devices, thereby underscoring its tremendous potential for wide-scale implementation and practical deployment. To validate the proposed model’s reliability, the performance evaluation is also performed on state-of-the-art datasets, namely KDD-99 Cup, NSL-KDD, CICIDS 2017.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Arabian Journal for Science and Engineering
Arabian Journal for Science and Engineering MULTIDISCIPLINARY SCIENCES-
CiteScore
5.70
自引率
3.40%
发文量
993
期刊介绍: King Fahd University of Petroleum & Minerals (KFUPM) partnered with Springer to publish the Arabian Journal for Science and Engineering (AJSE). AJSE, which has been published by KFUPM since 1975, is a recognized national, regional and international journal that provides a great opportunity for the dissemination of research advances from the Kingdom of Saudi Arabia, MENA and the world.
期刊最新文献
Effects of Combined Utilization of Active Cooler/Heater and Blade-Shaped Nanoparticles in Base Fluid for Performance Improvement of Thermoelectric Generator Mounted in Between Vented Cavities A Review of the Shear Design Provisions of ACI Code and Eurocode for Self-Compacting Concrete, Recycled Aggregate Concrete, and Geopolymer Concrete Beams Advancements in Vertical Axis Wind Turbine Technologies: A Comprehensive Review Improved Electrochemical Performance of Co3O4 Incorporated MnO2 Nanowires for Energy Storage Applications Biological CO2 Utilization; Current Status, Challenges, and Future Directions for Photosynthetic and Non-photosynthetic Route
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1