Real-Time Intrusion Detection For IIOT: Advancing Edge Computing Security with Machine Learning-Based Solutions

Authors

  • Afnan Ziyad Alrubayyi, A. A. Abd El-Aziz, Osama Ouda

Keywords:

Industrial Internet of Things (IIoT), Intrusion Detection System (IDS), Machine Learning (ML), Deep Learning (DL), and Neighborhood Component Analysis (NCA).

Abstract

The emergence of IIoT in vital industrial systems has heightened the demand for strong security frameworks as cyber threats become more sophisticated. However, the traditional security measures are usually inadequate, especially in real-time operational scenarios, making the industrial systems susceptible to disruptive attacks. This is the problem that this paper tries to solve by proposing a new Intrusion Detection System (IDS) for IIoT that uses Machine Learning (ML) and Deep Learning (DL) approaches, supplemented by Neighborhood Component Analysis (NCA) for improved feature selection. Our holistic method is based on pre-processing the dataset, which includes one-hot encoding and min-max normalization, applying NCA for the most critical features selection, and using a two-level classification strategy, where ensemble classifiers, standard classifiers, and deep neural networks are used. IIoT based IDS shows enhanced performance with the use of NCA in feature selection. NCA-optimized models deliver near perfect values of accuracy, precision, recall, F1-score, and AUC, which are close to 1, outperforming Without-NCA. Moreover, the NCA usage decreases both training and testing times significantly, making the system much more effective for real-time applications.

Downloads

Download data is not yet available.

References

Alotaibi, B. (2023). A survey on Industrial Internet of Things security: Requirements, attacks, AI based solutions, and edge computing opportunities. Sensors, 23(17), 7470. https://doi.org/10.3390/s23177470

Mirani, A. A., Velasco-Hernandez, G., Awasthi, A., & Walsh, J. (2022). Key challenges and emerging technologies in Industrial IoT architectures: A review. Sensors, 22(15), 5836. https://doi.org/10.3390/s22041586

Oladimeji, D., Gupta, K., Kose, N. A., Gundogan, K., Ge, L., & Liang, F. (2023). Smart transportation: An overview of technologies and applications. Sensors, 23(8), 3880. https://doi.org/10.3390/s23083880

Gupta, K., Oladimeji, D., Kose, N. A., Gundogan, K., Ge, L., & Liang, F. (2023). The role of Industrial IoT in manufacturing for implementation of smart industry. Sensors, 23(21), 8958. https://doi.org/10.3390/s23218958

Yao, H., Gao, P., Zhang, P., Wang, J., Jiang, C., & Lu, L. (2019). Hybrid Intrusion Detection System for Edge-Based IIoT Relying on Machine-Learning-Aided Detection. IEEE Network, 33, 75-81. https://doi.org/10.1109/MNET.001.1800479.

Eid, A., Nassif, A., Soudan, B., & Injadat, M. (2023). IIoT Network Intrusion Detection Using Machine Learning. 2023 6th International Conference on Intelligent Robotics and Control Engineering (IRCE), 196-201. https://doi.org/10.1109/IRCE59430.2023.10255088.

Zolanvari, M., Teixeira, M., Gupta, L., Khan, K., & Jain, R. (2019). Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things. IEEE Internet of Things Journal, 6, 6822-6834. https://doi.org/10.1109/JIOT.2019.2912022.

Guezzaz, A., Azrour, M., Benkirane, S., Mohy-Eddine, M., Attou, H., & Douiba, M. (2022). A Lightweight Hybrid Intrusion Detection Framework using Machine Learning for Edge-Based IIoT Security. Int. Arab J. Inf. Technol., 19, 822-830. https://doi.org/10.34028/iajit/19/5/14.

Ferrag, M., Friha, O., Hamouda, D., Maglaras, L., & Janicke, H. (2022). Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning. IEEE Access, PP, 1-1. https://doi.org/10.1109/ACCESS.2022.3165809.

Ullah, S., Boulila, W., Koubâa, A., & Ahmad, J. (2023). MAGRU-IDS: A Multi-Head Attention-Based Gated Recurrent Unit for Intrusion Detection in IIoT Networks. IEEE Access, 11, 114590-114601. https://doi.org/10.1109/ACCESS.2023.3324657.

Vaiyapuri, T., Sbai, Z., Alaskar, H., & Alaseem, N. (2021). Deep Learning Approaches for Intrusion Detection in IIoT Networks – Opportunities and Future Directions. International Journal of Advanced Computer Science and Applications, 12. https://doi.org/10.14569/IJACSA.2021.0120411.

Tang, W., Li, D., Fan, W., Liu, T., Chen, M., & Dib, O. (2023). An Intrusion Detection System Empowered by Deep Learning Algorithms. 2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), 1137-1142. https://doi.org/10.1109/DASC/PiCom/CBDCom/Cy59711.2023.10361315.

Rodríguez, D., Okey, O., Maidin, S., Udo, E., & Kleinschmidt, J. (2023). Attentive transformer deep learning algorithm for intrusion detection on IoT systems using automatic Xplainable feature selection. PLOS ONE, 18. https://doi.org/10.1371/journal.pone.0286652.

Saxena, A., Pant, B., Alanya-Beltran, J., Akram, S., Bhaskar, B., & Bansal, R. (2022). A Detailed Review of Implementation of Deep Learning Approaches for Industrial Internet of Things with the Different Opportunities and Challenges. 2022 5th International Conference on Contemporary Computing and Informatics (IC3I), 1370-1375. https://doi.org/10.1109/IC3I56241.2022.10072499.

I. Ullah and Q. H. Mahmoud, "A Scheme for Generating a Dataset for Anomalous Activity Detection in IoT Networks." In: Goutte C., Zhu X. (eds) Advances in Artificial Intelligence. Canadian AI 2020. Lecture Notes in Computer Science, vol 12109. Springer, Cham. https://doi.org/10.1007/978-3-030-47358-7_52

Daniel, L., Chen, P.-Y., Liu, S., Ko, C.-Y., Mohapatra, J., & Weng, T.-W. (2022). Revisiting contrastive learning through the lens of neighborhood component analysis: An integrated framework. Proceedings of the 39th International Conference on Machine Learning. https://proceedings.mlr.press/v162/ko22a.html

Ko, C.-Y., Mohapatra, J., Liu, S., Chen, P.-Y., Daniel, L., & Weng, T.-W. (2022). Revisiting contrastive learning through the lens of neighborhood component analysis: An integrated framework. MIT-IBM Watson AI Lab. Retrieved from https://mitibmwatsonailab.mit.edu/research/blog/revisiting-contrastive-learning-through-the-lens-of-neighborhood-component-analysis-an-integrated-framework/

Tsiapoki, S., Bahrami, O., Häckell, M., Lynch, J., & Rolfes, R. (2020). Combination of damage feature decisions with adaptive boosting for improving the detection performance of a structural health monitoring framework: Validation on an operating wind turbine. Structural Health Monitoring, 20, 637 - 660. https://doi.org/10.1177/1475921720909379.

Yu, H., Xu, C., Geng, G., & Jiang, Q. (2024). Multi-Time-Scale Shapelet-Based Feature Extraction for Non-Intrusive Load Monitoring. IEEE Transactions on Smart Grid, 15, 1116-1128. https://doi.org/10.1109/TSG.2023.3285117.

Chen, L., Dong, X., Wang, B., Shang, L., & Liu, C. (2024). An Edge Computing-Oriented Islanding Detection Using Differential Entropy and Multi-Support Vector Machines. IEEE Transactions on Smart Grid, 15, 191-202. https://doi.org/10.1109/TSG.2023.3288361.

Pujar, P., Kumar, A., & Kumar, V. (2024). Efficient plant leaf detection through machine learning approach based on corn leaf image classification. IAES International Journal of Artificial Intelligence (IJ-AI). https://doi.org/10.11591/ijai.v13.i1.pp1139-1148.

Wang, Y., Yan, Z., Sang, L., Hong, L., Hu, Q., Shahidehpour, M., & Xu, Q. (2024). Acceleration Framework and Solution Algorithm for Distribution System Restoration Based on End-to-End Optimization Strategy. IEEE Transactions on Power Systems, 39, 429-441. https://doi.org/10.1109/TPWRS.2023.3262189.

Nordin, S., Wah, Y., Haur, N., Hashim, A., Rambeli, N., & Jalil, N. (2024). Predicting automobile insurance fraud using classical and machine learning models. International Journal of Electrical and Computer Engineering (IJECE). https://doi.org/10.11591/ijece.v14i1.pp911-921.

Vaiyapuri, T., & Binbusayyis, A. (2024). Deep self-taught learning framework for intrusion detection in cloud computing environment. IAES International Journal of Artificial Intelligence (IJ-AI). https://doi.org/10.11591/ijai.v13.i1.pp747-755.

Alrahhal, M., & Supreethi K.P. (2020). Multimedia Image Retrieval System by Combining CNN With Handcraft Features in Three Different Similarity Measures. International Journal Of Computer Vision And Image Processing, 10(1), 1-23. DOI: 10.4018/ijcvip.2020010101.

Alrahhal, M., & K.P, S. (2021). Full Direction Local Neighbors Pattern (FDLNP). International Journal Of Advanced Computer Science And Applications, 12(1). DOI: 10.14569/ijacsa.2021.0120116.

Alrahhal, M., & K P, S. (2021). COVID-19 Diagnostic System Using Medical Image Classification and Retrieval: A Novel Method for Image Analysis. The Computer Journal. DOI: 10.1093/comjnl/bxab051.

Downloads

Published

26.03.2024

How to Cite

Afnan Ziyad Alrubayyi. (2024). Real-Time Intrusion Detection For IIOT: Advancing Edge Computing Security with Machine Learning-Based Solutions. International Journal of Intelligent Systems and Applications in Engineering, 12(21s), 4176 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/6245

Issue

Section

Research Article