Deep Ensemble Model for Detecting Attacks in Industrial IoT

Deep Ensemble Model for Detecting Attacks in Industrial IoT

Bibhuti Bhusana Behera, Binod Kumar Pattanayak, Rajani Kanta Mohanty
Copyright: © 2022 |Pages: 29
DOI: 10.4018/IJISP.311467
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In this research work, a novel IIoT attack detection framework is designed by following four major phases: pre-processing, imbalance processing, feature extraction, and attack detection. The attack detection is carried out using the projected ensemble classification framework. The projected ensemble classification framework encapsulates the recurrent neural network, CNN, and optimized bi-directional long short-term memory (BI-LSTM). The RNN and CNN in the ensemble classification framework is trained with the extracted features. The outcome acquired from RNN and CNN is utilized for training the optimized BI-LSTM model. The final outcome regarding the presence/absence of attacks in the industrial IoT is portrayed by the optimized BI-LSTM model. Therefore, the weight of BI-LSTM model is fine-tuned using the newly projected hybrid optimization model referred as cat mouse updated slime mould algorithm (CMUSMA). The projected hybrids the concepts of both the standard slime mould algorithm (SMA) and cat and mouse-based optimizer(CMBO), respectively.
Article Preview
Top

1. Introduction

The IIoT improves connection across many sectors, resulting in much more useful data and insight about processes. In many management domains including such smart electricity, sustainable city, healthcare, automated manufacturing, agribusiness, logistic, and transport, IIoT is being used to connect knowledge, services, as well as personnel for smart processes (Sun, et al., 2021; Zhou, et al., 2019; Nayak, et al., 2021). It communicates with such a wide range of sensors and supports vital infrastructure, necessitating a bigger network size (Singh and Jain 2022 ; Singh and Jain 2021) . The IIoT intends to create smart manufacturing items that enable technology infrastructure to communicate effectively with their clients and partners (Althobaiti, et al., 2021; Selim, et al., 2021; Kim, et al., 2020; Li, et al., 2021). Industrial 4.0 seeks to solve industry productivity challenges via the use of data-driven solutions and smart devices. Improved efficiency as well as improvements throughout production can indeed be achieved using this knowledge. This extended connection, nevertheless, exposes those linked devices to distinct cyber-threats. Cybercriminals have become more proficient as manufacturing sites become increasingly networked. The term “industrial control system” refers to the numerous types of control functions as well as integrated components used only to manage manufacturing processes. The ICS has indeed been subjected to an upsurge in cyber-attacks that also have resulted in a variety of problems. Safety precautions that are ineffective have such a negative effect on workers as well as the organisation. Production delays, damage to buildings, health and compensation expenditures, materials expenses, company setbacks, legal fees, and equipment and materials injury are just a few of the consequences. Intrusion detection systems (IDS) uncover security flaws in traffic on the network and network infrastructure. It can also be used to discover whether attackers commence exploring equipment, which would be the first step towards building trustworthy IIoT (Basheer, et al., 2021; Saigopal, et al., 2020; Koroniotis, et al., 2021; Wadsworth, et al., 2019). The IDS system involves gathering network activity, accounting records, log management, and information across network important aspects to determine whether the networking has any security vulnerabilities. The IDS approach for IIoT must be tailored towards the type of the instruments. To increase the efficiency of IIoT operations, deep learning approaches are employed alongside IoT. For next-generation IoT networks, it maintains the balance among effectiveness and computational complexity. Different studies have yielded a number of strategies for Intrusion detection systems in the workplace.

Complete Article List

Search this Journal:
Reset
Volume 18: 1 Issue (2024)
Volume 17: 1 Issue (2023)
Volume 16: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 15: 4 Issues (2021)
Volume 14: 4 Issues (2020)
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing