Deep Learning-Based Rule-Based Feature Selection for Intrusion Detection in Industrial Internet of Things Networks

Authors

  • Archana V. Potnurwar Priyadarshini College of Engineering, Nagpur, Maharashtra, India
  • Vrushali K. Bongirwar Shri Ramdeobaba College of Engineering and Management, Nagpur, Maharashtra, India
  • Samir Ajani St. Vincent Pallotti College of Engineering and Technology, Nagpur, Maharashtra, India
  • Nilesh Shelke Symbiosis Institute of Technology, Nagpur Campus, Symbiosis International (Deemed University), Pune, Maharashtra, India
  • Mrunalee Dhone G H Raisoni College of Engineering, Nagpur, Maharashtra, India
  • Namita Parati Maturi Venkata Subba Rao (MVSR) Engineering College, Hyderabad, Telangana State, India

Keywords:

Intrusion detection, Deep Learning, Network Intrusion, Deep Feed Forward Neural Network, Industrial Internet of Things

Abstract

In the field of Industrial IoT area, It produces enormous volumes of data by utilising the power of sensors. The IIoT does, however, confront considerable obstacles, particularly in the form of cyber-attacks that can jeopardise organisations and interrupt operations. Sensitive information is stolen as a result of these attacks, in addition to causing losses in money and reputation.To address these risks, numerous Network Intrusion Prevention Systems (NIDSs) have been developed to protect IIoT systems. But creating a useful and intelligent NIDS is a challenging endeavour, largely because there aren't many large data sets that can be utilised to design and test such systems.In response to these difficulties, this research proposes a novel deep learning-based intrusion detection technique for IIoT systems. To help identify relevant data derived from TCP/IP packets, a hybrid rule-based feature selection mechanism is included in the proposed system. The solution attempts to increase the precision and effectiveness of intrusion detection in IIoT environments by utilising deep learning methods.In this study, deep learning techniques are employed to offer a novel method for industrial internet of things (IIoT) system intrusion detection. The proposed paradigm combines a Deep Feed Forward Neural Network model (DFFNN) with a hybrid rule-based feature selection strategy to quickly train and assess data obtained from TCP/IP packets. The effectiveness of the technique was evaluated on two well-known network datasets, NSL-KDD and UNSW-NB15. This study demonstrated the potential of the provided technique for classifying network attacks in scenarios of IIoT penetration. The trials used a number of evaluation measures to demonstrate the usefulness of the suggested method for precisely identifying and classifying intrusions within IIoT networks.

Downloads

Download data is not yet available.

References

P. Ambika, “Machine learning and deep learning algorithms on the Industrial Internet of Things (IIoT),” Advances in Computers, vol. 117, no. 1, pp. 321–338, 2020.

R. Ashima, A. Haleem, S. Bahl, M. Javaid, S. K. Mahla, and S. Singh, “Automation and manufacturing of smart materials in Additive Manufacturing technologies using the Internet of Things towards the adoption of Industry 4.0,” Materials Today: Proceedings, vol. 45, pp. 5081–5088, 2021.

L. M. Gladence, V. M. Anu, R. Rathna, and E. Brumancia, “Recommender system for home automation using IoT and artificial intelligence,” Journal of Ambient Intelligence and Humanized Computing, pp. 1–9, 2020.

T. Sherasiya, H. Upadhyay, and H. B. Patel, “A survey: intrusion detection system for internet of things,” International Journal of Computer Science and Engineering (IJCSE), vol. 5, no. 2, pp. 91–98, 2016.

J. B. Awotunde, R. G. Jimoh, S. O. Folorunso, E. A. Adeniyi, K. M. Abiodun, and O. O. Banjo, “Privacy and security concerns in IoT-based healthcare systems,” Internet of Things, pp. 105–134, 2021.

E. A. Adeniyi, R. O. Ogundokun, and J. B. Awotunde, “IoMT-based wearable body sensors network healthcare monitoring system,” in IoT in Healthcare and Ambient Assisted Living, pp. 103–121, Springer, Singapore, 2021.

K. Amit and C. Chinmay, “Artificial intelligence and Internet of Things based healthcare 4.0 monitoring system,” Wireless Personal Communications, pp. 1–14, 2021.

F. E. Ayo, S. O. Folorunso, A. A. Abayomi-Alli, A. O. Adekunle, and J. B. Awotunde, “Network intrusion detection based on deep learning model optimized with rule-based hybrid feature selection,” Information Security Journal: A Global Perspective, vol. 29, no. 6, pp. 267–283, 2020.

M. Abdulraheem, J. B. Awotunde, R. G. Jimoh, and I. D. Oladipo, “An efficient lightweight cryptographic algorithm for IoT security,” in Communications in Computer and Information Science, pp. 444–456, Springer, 2021.

A. Bakhtawar, R. J. Abdul, C. Chinmay, N. Jamel, R. Saira, and R. Muhammad, “Blockchain and ANFIS empowered IoMT application for privacy preserved contact tracing in COVID-19 pandemic,” Personal and Ubiquitous Computing, 2021.

A. H. Muna, N. Moustafa, and E. Sitnikova, “Identification of malicious activities in industrial internet of things based on deep learning models,” Journal of information security and applications, vol. 41, pp. 1–11, 2018.

E. Sitnikova, E. Foo, and R. B. Vaughn, “The power of hands-on exercises in SCADA cybersecurity education,” in Information Assurance and Security Education and Training, pp. 83–94, Springer, Berlin, Heidelberg, 2013.

S. Dash, C. Chakraborty, S. K. Giri, S. K. Pani, and J. Frnda, “BIFM: big-data driven intelligent forecasting model for COVID-19,” IEEE Access, vol. 9, pp. 97505–97517, 2021.

G. Tzokatziou, L. A. Maglaras, H. Janicke, and Y. He, “Exploiting SCADA vulnerabilities using a human interface device,” International Journal of Advanced Computer Science and Applications, vol. 6, no. 7, pp. 234–241, 2015.

D. Kushner, “The real story of stuxnet,” IEEE Spectrum, vol. 50, no. 3, pp. 48–53, 2013.

P. W. Khan and Y. Byun, “A blockchain-based secure image encryption scheme for the industrial Internet of Things,” Entropy, vol. 22, no. 2, p. 175, 2020.

Q. Yan and F. R. Yu, “Distributed denial of service attacks in software-defined networking with cloud computing,” IEEE Communications Magazine, vol. 53, no. 4, pp. 52–59, 2015.

A. C. Enache and V. Sgârciu, “Anomaly intrusions detection based on support vector machines with an improved bat algorithm,” in 2015 20th International Conference on Control Systems and Computer Science, pp. 317–321, Bucharest, Romania, May 2015.

O. Folorunso, F. E. Ayo, and Y. E. Babalola, “Ca-NIDS: a network intrusion detection system using combinatorial algorithm approach,” Journal of Information Privacy and Security, vol. 12, no. 4, pp. 181–196, 2016.

H. Zhang, D. D. Yao, N. Ramakrishnan, and Z. Zhang, “Causality reasoning about network events for detecting stealthy malware activities,” Computers & Security, vol. 58, pp. 180–198, 2016.

M. R. Kabir, A. R. Onik, and T. Samad, “A network intrusion detection framework based on Bayesian network using a wrapper approach,” International Journal of Computer Applications, vol. 166, no. 4, pp. 13–17, 2017.

Y. Hu, A. Yang, H. Li, Y. Sun, and L. Sun, “A survey of intrusion detection on industrial control systems,” International Journal of Distributed Sensor Networks, vol. 14, no. 8, 2018.

T. Cruz, L. Rosa, J. Proenca et al., “A cybersecurity detection framework for supervisory control and data acquisition systems,” IEEE Transactions on Industrial Informatics, vol. 12, no. 6, pp. 2236–2246, 2016.

J. Camacho, A. Pérez-Villegas, P. García-Teodoro, and G. Maciá-Fernández, “PCA-based multivariate statistical network monitoring for anomaly detection,” Computers & Security, vol. 59, pp. 118–137, 2016.

M. Grill, T. Pevný, and M. Rehak, “Reducing false positives of network anomaly detection by local adaptive multivariate smoothing,” Journal of Computer and System Sciences, vol. 83, no. 1, pp. 43–57, 2017.

L. A. Maglaras, J. Jiang, and T. J. Cruz, “Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems,” Journal of Information Security and Applications, vol. 30, pp. 15–26, 2016.

R. O. Ogundokun, J. B. Awotunde, E. A. Adeniyi, and F. E. Ayo, “Crypto-Stegno based model for securing medical information on IOMT platform,” Multimedia tools and applications, pp. 1–23, 2021.

J. Soto and M. Nogueira, “A framework for resilient and secure spectrum sensing on cognitive radio networks,” Computer Networks, vol. 115, pp. 130–138, 2017.

M. S. Abadeh, J. Habibi, and C. Lucas, “Intrusion detection using a fuzzy genetics-based learning algorithm,” Journal of Network and Computer Applications, vol. 30, no. 1, pp. 414–428, 2007.

M. Aazam and E. N. Huh, “Fog computing microdata center-based dynamic resource estimation and pricing model for IoT,” in 2015 IEEE 29th International Conference on Advanced Information Networking and Applications, pp. 687–694, Gwangju, Korea, March 2015.

C. Cecchinel, M. Jimenez, S. Mosser, and M. Riveill, “An architecture to support the collection of big data in the internet of things,” in 2014 IEEE World Congress on Services, pp. 442–449, Anchorage, AK, USA, June 2014.

N. Moustafa, J. Hu, and J. Slay, “A holistic review of network anomaly detection systems: a comprehensive survey,” Journal of Network and Computer Applications, vol. 128, pp. 33–55, 2019.

R. Gupta, S. Tanwar, S. Tyagi, and N. Kumar, “Machine learning models for secure data analytics: a taxonomy and threat model,” Computer Communications, vol. 153, pp. 406–440, 2020.

N. Moustafa and J. Slay, “The evaluation of Network Anomaly Detection Systems: statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set,” Information Security Journal: A Global Perspective, vol. 25, no. 1-3, pp. 18–31, 2016.

W. Shang, P. Zeng, M. Wan, L. Li, and P. An, “Intrusion detection algorithm based on OCSVM in industrial control system,” Security and Communication Networks, vol. 9, no. 10, p. 1049, 2016.

F. Coelho, A. Braga, and M. Verleysen. 2012. "Cluster homogeneity as a semisupervised principle for feature selection using mutual information." ESANN. Bruges, Belgium 2012

M. Belouch, S. El Hadaj, and M. Idhammad. 2018. "Performance evaluation of intrusion detection based on machine learning using Apache Spark." Procedia Computer Science 127 (2018): 1-6

R. Primartha, and B. Tama. 2017. "Anomaly detection using random forest: A performance revisited." Data and Software Engineering (ICoDSE), 2017 International Conference on. IEEE, Palembang Sumatra Selatan, Indonesia 2017

R. Vijayanand, D. Devaraj, and B. Kannapiran.2018. "Intrusion detection system for wireless mesh network using multiple support vector machine classifiers with genetic-algorithm-based feature selection." Computers & Security 77 (2018): 304-31.

P. Dahiya, and D. Srivastava. 2018. "Network Intrusion Detection in Big Dataset Using Spark." Procedia Computer Science 132 (2018): 253-262.

Z. Cui, F. Xue, X. Cai, Y. Cao, G. G. Wang, and J. Chen, “Detection of malicious code variants based on deep learning,” IEEE Transactions on Industrial Informatics, vol. 14, no. 7, pp. 3187–3196, 2018.

F. Ullah, H. Naeem, S. Jabbar et al., “Cyber security threats detection in internet of things using deep learning approach,” IEEE Access, vol. 7, pp. 124379–124389, 2019.

N. N. Hurrah, S. A. Parah, J. A. Sheikh, F. Al-Turjman, and K. Muhammad, “Secure data transmission framework for confidentiality in IoTs,” Ad Hoc Networks, vol. 95, p. 101989, 2019.

F. Al-Turjman, H. Zahmatkesh, and R. Shahroze, “An overview of security and privacy in smart cities’ IoT communications,” Transactions on Emerging Telecommunications Technologies, pp. 1–19, article e3677, 2019.

B. D. Deebak and F. Al-Turjman, “A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks,” Ad Hoc Networks, vol. 97, article 102022, 2020.

Dr. Govind Shah. (2017). An Efficient Traffic Control System and License Plate Detection Using Image Processing. International Journal of New Practices in Management and Engineering, 6(01), 20 - 25. Retrieved from http://ijnpme.org/index.php/IJNPME/article/view/52

Auma, G., Levi, S., Santos, M., Ji-hoon, P., & Tanaka, A. Predicting Stock Market Trends using Long Short-Term Memory Networks. Kuwait Journal of Machine Learning, 1(3). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/136

Aoudni, Y., Donald, C., Farouk, A., Sahay, K. B., Babu, D. V., Tripathi, V., & Dhabliya, D. (2022). Cloud security based attack detection using transductive learning integrated with hidden markov model. Pattern Recognition Letters, 157, 16-26. doi:10.1016/j.patrec.2022.02.012 Dhabliya, D. (2021). Delay-tolerant sensor network (DTN) implementation in cloud computing.

Downloads

Published

16.08.2023

How to Cite

Potnurwar, A. V. ., Bongirwar, V. K. ., Ajani, S. ., Shelke, N. ., Dhone, M. ., & Parati, N. . (2023). Deep Learning-Based Rule-Based Feature Selection for Intrusion Detection in Industrial Internet of Things Networks. International Journal of Intelligent Systems and Applications in Engineering, 11(10s), 23–35. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3231

Issue

Section

Research Article

Most read articles by the same author(s)