[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3361758.3361762acmotherconferencesArticle/Chapter ViewAbstractPublication PagesbdiotConference Proceedingsconference-collections
research-article

An Efficient Intrusion Detection Model for Edge System in Brownfield Industrial Internet of Things

Published: 22 August 2019 Publication History

Abstract

The Industrial Internet of Things (IIoT) is bringing control systems online leading to significant innovation in industry and business. However, this development also comes with new cybersecurity threats. As much of the value of IIoT systems resides at the edge tier, this makes them potentially desired targets for attackers. Protecting edge physical systems by monitoring them and identifying malicious activities based on an efficient detection model is therefore of utmost importance. This paper proposes a detection model based on deep learning techniques that can learn and test using data collected from Remote Telemetry Unit (RTU) streams of gas pipeline system. It utilizes the sparse and denoising auto-encoder methods for unsupervised learning and deep neural networks for supervised learning to produce a high-level data representation from unlabeled and noisy data. Our results show that the proposed model achieves superior performance in identifying malicious activities.

References

[1]
IIC. 2016. Industrial Internet of Things Volume G4: Security Framework. Industrial Internet Consortium. https://www.iiconsortium.org/IISF.htm.
[2]
Yan. Q, Huang. W, Luo. X, Gong. Q, Yu. R. 2018. A multilevel DDoS mitigation framework for the industrial Internet of things. IEEE Communications Magazine, 56(2). 30--36.
[3]
Kobara. K.2016. Cyber physical security for industrial control systems and IoT. IEICE TRANSACTIONS on Information and Systems, 99(4). 787--795.
[4]
Stewart, B., Rosa. L., Cruz. T., Ferrag. M., Simões. P., Janicke. H. 2017. A Novel Intrusion Detection Mechanism for SCADA systems which automatically Adapts to Network Topology Changes. EAI Endorsed Trans. Indust. Netw. & Intellig. Syst.4(10). 4--12.
[5]
Vivek. S., Haythem. E., Manimaran. G. 2018. Security Evaluation of Two Intrusion Detection Systems in Smart Grid SCADA Environment. In 2018 North American Power Symposium (NAPS) (pp. 1--6). IEEE.
[6]
Furkan. Y. 2018. Deep learning in cyber security for internet of things. (Doctoral dissertation).
[7]
Al-hawawreh. M., Moustafa. N, and Sitnikova.E. 2018 Identification of malicious activities in industrial internet of things based on deep learning models. Journal of Information Security and Applications. 1--11.
[8]
Hodo, E., Bellekens, X., Hamilton, A., Dubouilh, P. L., Iorkyase, E., Tachtatzis, C., Atkinson, R. 2016. Threat analysis of IoT networks using artificial neural network intrusion detection system. in Networks, Computers and Communications (ISNCC), 2016 International Symposium on. IEEE.
[9]
Nader, P., P. Honeine, P. Beauseroy. 2013. Intrusion detection in SCADA systems using one-class classification. In Signal Processing Conference (EUSIPCO), 2013 Proceedings of the 21st European. IEEE.
[10]
Xun, P., Pei-Dong. Z., Yi-Fan. H, Peng-SHuai. C. Yan. Z. 2017. Command Disaggregation Attack and Mitigation in Industrial Internet of Things. Sensors, 17(10). 2408--2418.
[11]
Stefanidis, K. and A.G. Voyiatzis. 2016. An HMM-based anomaly detection approach for SCADA systems. in IFIP International Conference on Information Security Theory and Practice. Springer.85--100.
[12]
Justin, B., Raymond. B., Mark. B. 2013. An evaluation of machine learning methods to detect malicious SCADA communications. in Machine Learning and Applications (ICMLA), 2013 12th International Conference on. IEEE.
[13]
Armina. F, Farzad. 2017. Detection of false data injection attacks against state estimation in smart grids based on a mixture Gaussian distribution learning method. IET CyberPhysical Systems: Theory & Applications, 2(4). 161--171.
[14]
Sasanka. P, Christian. D. 2017. Deep Feature Extraction for multi-Class Intrusion Detection in Industrial Control Systems. Int. J. Comput. Theory Eng 9.5. 374--379. 2017.
[15]
Yin. C, Zhu. Y, FEI. J., He. X, 2017. A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks. IEEE Access. 21954--21961.
[16]
He, Y. Mendis.G., Wei. J. 2017. Real-time detection of false data injection attacks in smart grid: A deep learning-based intelligent mechanism. 2505--2516.
[17]
Zhao, H., Liu, H., Hu, W., & Yan, X. 2018. Anomaly detection and fault analysis of wind turbine components based on deep learning network. Renewable energy, 127, 825--834.
[18]
Taormina, R. and S. Galelli. 2017. Real-time detection of cyber-physical attacks on water distribution systems using deep learning. In World Environmental and Water Resources Congress 2017.
[19]
Meidan, Y., Bohadana, M., Mathov, Y., Mirsky, Y., Shabtai, A., Breitenbacher, D., & Elovici, Y. 2018. N-BaIoT--- Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders. IEEE Pervasive Computing, 17(3), 12--22.
[20]
Dong, B. Wang, X.2016. Comparison deep learning method to traditional methods using for network intrusion detection. in Communication Software and Networks (ICCSN), 2016 8th IEEE International Conference on. IEEE.
[21]
Aygun, R.C. Yavuz. A. 2017. Network anomaly detection with stochastically improved autoencoder based models. in Cyber Security and Cloud Computing (CSCloud), 2017 IEEE 4th International Conference on. IEEE.
[22]
Goodfellow, I., Bengio, Y., & Courville, A. 2016. Deep learning. MIT press.
[23]
Chen, Y. and Zaki. M. 2017. Kate: K-competitive autoencoder for text. in Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM.
[24]
Sevakula, R.K. and Verma. N. 2015. Fuzzy Rule Reduction using Sparse Auto-Encoders. in Fuzzy Systems (FUZZIEEE), 2015 IEEE International Conference on. IEEE.
[25]
Ingre, B, Yadav. A. 2015. Performance analysis of NSLKDD dataset using ANN. in 2015 International Conference on Signal Processing and Communication Engineering Systems. IEEE.
[26]
Morris, T., Z. Thornton, and I. Turnipseed. 2015. Industrial control system simulation and data logging for intrusion detection system research. 7th Annual Southeastern Cyber Security Summit.

Cited By

View all
  • (2024)Intrusion Detection Based on Feature Selection and Transformer BiGRUData Science10.1007/978-981-97-8743-2_10(134-144)Online publication date: 31-Oct-2024
  • (2023)Adversarial-HD: Hyperdimensional Computing Adversarial Attack Design for Secure Industrial Internet of ThingsProceedings of Cyber-Physical Systems and Internet of Things Week 202310.1145/3576914.3587484(1-6)Online publication date: 9-May-2023
  • (2023)Intelligent approaches toward intrusion detection systems for Industrial Internet of ThingsJournal of Network and Computer Applications10.1016/j.jnca.2023.103637215:COnline publication date: 24-May-2023
  • Show More Cited By

Index Terms

  1. An Efficient Intrusion Detection Model for Edge System in Brownfield Industrial Internet of Things

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    BDIOT '19: Proceedings of the 3rd International Conference on Big Data and Internet of Things
    August 2019
    139 pages
    ISBN:9781450372466
    DOI:10.1145/3361758
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    In-Cooperation

    • University of Pisa: University of Pisa
    • La Trobe University

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 22 August 2019

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Brownfield
    2. Cybersecurity
    3. Deep learning
    4. Edge system
    5. IDS

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    BDIOT 2019

    Acceptance Rates

    Overall Acceptance Rate 75 of 136 submissions, 55%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)12
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 31 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Intrusion Detection Based on Feature Selection and Transformer BiGRUData Science10.1007/978-981-97-8743-2_10(134-144)Online publication date: 31-Oct-2024
    • (2023)Adversarial-HD: Hyperdimensional Computing Adversarial Attack Design for Secure Industrial Internet of ThingsProceedings of Cyber-Physical Systems and Internet of Things Week 202310.1145/3576914.3587484(1-6)Online publication date: 9-May-2023
    • (2023)Intelligent approaches toward intrusion detection systems for Industrial Internet of ThingsJournal of Network and Computer Applications10.1016/j.jnca.2023.103637215:COnline publication date: 24-May-2023
    • (2023)An explainable ensemble of multi-view deep learning model for fake review detectionJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2023.10164435:8(101644)Online publication date: Sep-2023
    • (2023)Chatgpt for cybersecurity: practical applications, challenges, and future directionsCluster Computing10.1007/s10586-023-04124-526:6(3421-3436)Online publication date: 24-Aug-2023
    • (2022)Ensemble learning-based IDS for sensors telemetry data in IoT networksMathematical Biosciences and Engineering10.3934/mbe.202249319:10(10550-10580)Online publication date: 2022
    • (2022)Learning-Based Methods for Cyber Attacks Detection in IoT Systems: A Survey on Methods, Analysis, and Future ProspectsElectronics10.3390/electronics1109150211:9(1502)Online publication date: 7-May-2022
    • (2022)Industrial IoT Intrusion Detection via Evolutionary Cost-Sensitive Learning and Fog ComputingIEEE Internet of Things Journal10.1109/JIOT.2022.31882249:22(23260-23271)Online publication date: 15-Nov-2022
    • (2022)X-IIoTID: A Connectivity-Agnostic and Device-Agnostic Intrusion Data Set for Industrial Internet of ThingsIEEE Internet of Things Journal10.1109/JIOT.2021.31020569:5(3962-3977)Online publication date: 1-Mar-2022
    • (2021)Modelling and Evaluation of Network Intrusion Detection Systems Using Machine Learning TechniquesInternational Journal of Intelligent Information Technologies10.4018/IJIIT.28997117:4(81-99)Online publication date: 1-Oct-2021
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media