Protection of Network Hacking and Threats in Industry 5.0 Based on DL Intrusion Detection System

Authors

  • K. Jayabharathi Associate Professor, ECE Department, Misrimal Navajee Munoth Jain Engineering College
  • Rohini. C Assistant Professor, CSE Department, Velammal Engineering College
  • Nalajam Geethanjali Assistant professor, Department of CSE- AI, Madanapalli Institute of Technology & Science
  • S.K. Rajesh Kanna Professor, Mechanical Engineering Department, Rajalakshmi Institute of Technology
  • S. Sharanyaa Assistant Professor, Department of Information Technology, Panimalar Engineering College, Chennai 600 123

Keywords:

Industry 5.0: Intrusion Detection System (IDS): Threat protection: Deep Learning

Abstract

Industry 5.0, or the fifth industrial revolution, has been viewed as an important development. Their goal is to create manufacturing techniques that are further user-friendly and environmentally conscious than those of Industry 4.0 by merging the creative abilities of human experts with productive, natural, and prominent technology.  Owing to the every day responsibilities we accomplish online, which involve e-banking, e-education, and e-commerce, the Internet has grown to be a vital component of our lives. As a consequence, there is currently an increasing threat from attackers and hackers. Devices or software applications referred to as intrusion detection systems (IDS) investigate a network and/or network activity for illegal conduct or policy alterations. An IDS has been mandatory to detect these particular kinds of hostile endeavors. Tragically, the majority of commercial intrusion detection systems focuses solely on consumption and has been built to determine known crimes. Thus this intrusion detection is proposed in this paper for the detection of hackers and attackers and for protecting the wireless or wired network with advanced security. Therefore the Industries 5.0 version will be effective and give the enhanced revenue and productivity for the industrial owners.

Downloads

Download data is not yet available.

References

Maciá-Pérez, F., Mora-Gimeno, F. J., Marcos-Jorquera, D., Gil-Martínez-Abarca, J. A., Ramos-Morillo, H., & Lorenzo-Fonseca, I. (2010). Network intrusion detection system embedded on a smart sensor. IEEE Transactions on Industrial Electronics, 58(3), 722-732.

Kaliappan, J., Thiagarajan, R., & Sundararajan, K. (2015). Fusion of heterogeneous intrusion detection systems for network attack detection. The Scientific World Journal, 2015.

Selim, S., Hashem, M., & Nazmy, T. M. (2011). Hybrid multi-level intrusion detection system. International Journal of Computer Science and Information Security, 9(5), 23.

Cao, B., Li, C., Song, Y., & Fan, X. (2022). Network intrusion detection technology based on convolutional neural network and BiGRU. Computational Intelligence and Neuroscience, 2022.

Man, J., & Sun, G. (2021). A residual learning-based network intrusion detection system. Security and Communication Networks, 2021, 1-9.

Chen, L., Kuang, X., Xu, A., Suo, S., & Yang, Y. (2020, December). A novel network intrusion detection system based on CNN. In 2020 eighth international conference on advanced cloud and big data (CBD) (pp. 243-247). IEEE.

Hu, J., Liu, C., & Cui, Y. (2021). An improved CNN approach for network intrusion detection system. Int. J. Netw. Secur, 23(4), 569-575.

Halbouni, A., Gunawan, T. S., Habaebi, M. H., Halbouni, M., Kartiwi, M., & Ahmad, R. (2022). CNN-LSTM: hybrid deep neural network for network intrusion detection system. IEEE Access, 10, 99837-99849.

Rababah, B., & Srivastava, S. (2020). Hybrid model for intrusion detection systems. arXiv preprint arXiv:2003.08585.

Kim, W., Lee, J., Lee, Y., Kim, Y., Chung, J., & Woo, S. (2022). Vehicular Multilevel Data Arrangement-Based Intrusion Detection System for In-Vehicle CAN. Security and Communication Networks, 2022, 1-11.

Zhang, J., Zulkernine, M., & Haque, A. (2008). Random-forests-based network intrusion detection systems. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 38(5), 649-659.

Javeed, D., Gao, T., Kumar, P., & Jolfaei, A. (2023). An Explainable and Resilient Intrusion Detection System for Industry 5.0. IEEE Transactions on Consumer Electronics.

Kocher, G., & Kumar, G. (2021). Machine learning and deep learning methods for intrusion detection systems: recent developments and challenges. Soft Computing, 25(15), 9731-9763.

Otoum, Y., Liu, D., & Nayak, A. (2022). DL‐IDS: a deep learning–based intrusion detection framework for securing IoT. Transactions on Emerging Telecommunications Technologies, 33(3), e3803.

Downloads

Published

27.12.2023

How to Cite

Jayabharathi, K. ., C, R. ., Geethanjali, N. ., Kanna, S. R. ., & Sharanyaa, S. . (2023). Protection of Network Hacking and Threats in Industry 5.0 Based on DL Intrusion Detection System. International Journal of Intelligent Systems and Applications in Engineering, 12(9s), 104–111. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4209

Issue

Section

Research Article