Real-Time Intrusion Detection For IIOT: Advancing Edge Computing Security with Machine Learning-Based Solutions
Keywords:
Industrial Internet of Things (IIoT), Intrusion Detection System (IDS), Machine Learning (ML), Deep Learning (DL), and Neighborhood Component Analysis (NCA).Abstract
The emergence of IIoT in vital industrial systems has heightened the demand for strong security frameworks as cyber threats become more sophisticated. However, the traditional security measures are usually inadequate, especially in real-time operational scenarios, making the industrial systems susceptible to disruptive attacks. This is the problem that this paper tries to solve by proposing a new Intrusion Detection System (IDS) for IIoT that uses Machine Learning (ML) and Deep Learning (DL) approaches, supplemented by Neighborhood Component Analysis (NCA) for improved feature selection. Our holistic method is based on pre-processing the dataset, which includes one-hot encoding and min-max normalization, applying NCA for the most critical features selection, and using a two-level classification strategy, where ensemble classifiers, standard classifiers, and deep neural networks are used. IIoT based IDS shows enhanced performance with the use of NCA in feature selection. NCA-optimized models deliver near perfect values of accuracy, precision, recall, F1-score, and AUC, which are close to 1, outperforming Without-NCA. Moreover, the NCA usage decreases both training and testing times significantly, making the system much more effective for real-time applications.
Downloads
References
Alotaibi, B. (2023). A survey on Industrial Internet of Things security: Requirements, attacks, AI based solutions, and edge computing opportunities. Sensors, 23(17), 7470. https://doi.org/10.3390/s23177470
Mirani, A. A., Velasco-Hernandez, G., Awasthi, A., & Walsh, J. (2022). Key challenges and emerging technologies in Industrial IoT architectures: A review. Sensors, 22(15), 5836. https://doi.org/10.3390/s22041586
Oladimeji, D., Gupta, K., Kose, N. A., Gundogan, K., Ge, L., & Liang, F. (2023). Smart transportation: An overview of technologies and applications. Sensors, 23(8), 3880. https://doi.org/10.3390/s23083880
Gupta, K., Oladimeji, D., Kose, N. A., Gundogan, K., Ge, L., & Liang, F. (2023). The role of Industrial IoT in manufacturing for implementation of smart industry. Sensors, 23(21), 8958. https://doi.org/10.3390/s23218958
Yao, H., Gao, P., Zhang, P., Wang, J., Jiang, C., & Lu, L. (2019). Hybrid Intrusion Detection System for Edge-Based IIoT Relying on Machine-Learning-Aided Detection. IEEE Network, 33, 75-81. https://doi.org/10.1109/MNET.001.1800479.
Eid, A., Nassif, A., Soudan, B., & Injadat, M. (2023). IIoT Network Intrusion Detection Using Machine Learning. 2023 6th International Conference on Intelligent Robotics and Control Engineering (IRCE), 196-201. https://doi.org/10.1109/IRCE59430.2023.10255088.
Zolanvari, M., Teixeira, M., Gupta, L., Khan, K., & Jain, R. (2019). Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things. IEEE Internet of Things Journal, 6, 6822-6834. https://doi.org/10.1109/JIOT.2019.2912022.
Guezzaz, A., Azrour, M., Benkirane, S., Mohy-Eddine, M., Attou, H., & Douiba, M. (2022). A Lightweight Hybrid Intrusion Detection Framework using Machine Learning for Edge-Based IIoT Security. Int. Arab J. Inf. Technol., 19, 822-830. https://doi.org/10.34028/iajit/19/5/14.
Ferrag, M., Friha, O., Hamouda, D., Maglaras, L., & Janicke, H. (2022). Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning. IEEE Access, PP, 1-1. https://doi.org/10.1109/ACCESS.2022.3165809.
Ullah, S., Boulila, W., Koubâa, A., & Ahmad, J. (2023). MAGRU-IDS: A Multi-Head Attention-Based Gated Recurrent Unit for Intrusion Detection in IIoT Networks. IEEE Access, 11, 114590-114601. https://doi.org/10.1109/ACCESS.2023.3324657.
Vaiyapuri, T., Sbai, Z., Alaskar, H., & Alaseem, N. (2021). Deep Learning Approaches for Intrusion Detection in IIoT Networks – Opportunities and Future Directions. International Journal of Advanced Computer Science and Applications, 12. https://doi.org/10.14569/IJACSA.2021.0120411.
Tang, W., Li, D., Fan, W., Liu, T., Chen, M., & Dib, O. (2023). An Intrusion Detection System Empowered by Deep Learning Algorithms. 2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), 1137-1142. https://doi.org/10.1109/DASC/PiCom/CBDCom/Cy59711.2023.10361315.
Rodríguez, D., Okey, O., Maidin, S., Udo, E., & Kleinschmidt, J. (2023). Attentive transformer deep learning algorithm for intrusion detection on IoT systems using automatic Xplainable feature selection. PLOS ONE, 18. https://doi.org/10.1371/journal.pone.0286652.
Saxena, A., Pant, B., Alanya-Beltran, J., Akram, S., Bhaskar, B., & Bansal, R. (2022). A Detailed Review of Implementation of Deep Learning Approaches for Industrial Internet of Things with the Different Opportunities and Challenges. 2022 5th International Conference on Contemporary Computing and Informatics (IC3I), 1370-1375. https://doi.org/10.1109/IC3I56241.2022.10072499.
I. Ullah and Q. H. Mahmoud, "A Scheme for Generating a Dataset for Anomalous Activity Detection in IoT Networks." In: Goutte C., Zhu X. (eds) Advances in Artificial Intelligence. Canadian AI 2020. Lecture Notes in Computer Science, vol 12109. Springer, Cham. https://doi.org/10.1007/978-3-030-47358-7_52
Daniel, L., Chen, P.-Y., Liu, S., Ko, C.-Y., Mohapatra, J., & Weng, T.-W. (2022). Revisiting contrastive learning through the lens of neighborhood component analysis: An integrated framework. Proceedings of the 39th International Conference on Machine Learning. https://proceedings.mlr.press/v162/ko22a.html
Ko, C.-Y., Mohapatra, J., Liu, S., Chen, P.-Y., Daniel, L., & Weng, T.-W. (2022). Revisiting contrastive learning through the lens of neighborhood component analysis: An integrated framework. MIT-IBM Watson AI Lab. Retrieved from https://mitibmwatsonailab.mit.edu/research/blog/revisiting-contrastive-learning-through-the-lens-of-neighborhood-component-analysis-an-integrated-framework/
Tsiapoki, S., Bahrami, O., Häckell, M., Lynch, J., & Rolfes, R. (2020). Combination of damage feature decisions with adaptive boosting for improving the detection performance of a structural health monitoring framework: Validation on an operating wind turbine. Structural Health Monitoring, 20, 637 - 660. https://doi.org/10.1177/1475921720909379.
Yu, H., Xu, C., Geng, G., & Jiang, Q. (2024). Multi-Time-Scale Shapelet-Based Feature Extraction for Non-Intrusive Load Monitoring. IEEE Transactions on Smart Grid, 15, 1116-1128. https://doi.org/10.1109/TSG.2023.3285117.
Chen, L., Dong, X., Wang, B., Shang, L., & Liu, C. (2024). An Edge Computing-Oriented Islanding Detection Using Differential Entropy and Multi-Support Vector Machines. IEEE Transactions on Smart Grid, 15, 191-202. https://doi.org/10.1109/TSG.2023.3288361.
Pujar, P., Kumar, A., & Kumar, V. (2024). Efficient plant leaf detection through machine learning approach based on corn leaf image classification. IAES International Journal of Artificial Intelligence (IJ-AI). https://doi.org/10.11591/ijai.v13.i1.pp1139-1148.
Wang, Y., Yan, Z., Sang, L., Hong, L., Hu, Q., Shahidehpour, M., & Xu, Q. (2024). Acceleration Framework and Solution Algorithm for Distribution System Restoration Based on End-to-End Optimization Strategy. IEEE Transactions on Power Systems, 39, 429-441. https://doi.org/10.1109/TPWRS.2023.3262189.
Nordin, S., Wah, Y., Haur, N., Hashim, A., Rambeli, N., & Jalil, N. (2024). Predicting automobile insurance fraud using classical and machine learning models. International Journal of Electrical and Computer Engineering (IJECE). https://doi.org/10.11591/ijece.v14i1.pp911-921.
Vaiyapuri, T., & Binbusayyis, A. (2024). Deep self-taught learning framework for intrusion detection in cloud computing environment. IAES International Journal of Artificial Intelligence (IJ-AI). https://doi.org/10.11591/ijai.v13.i1.pp747-755.
Alrahhal, M., & Supreethi K.P. (2020). Multimedia Image Retrieval System by Combining CNN With Handcraft Features in Three Different Similarity Measures. International Journal Of Computer Vision And Image Processing, 10(1), 1-23. DOI: 10.4018/ijcvip.2020010101.
Alrahhal, M., & K.P, S. (2021). Full Direction Local Neighbors Pattern (FDLNP). International Journal Of Advanced Computer Science And Applications, 12(1). DOI: 10.14569/ijacsa.2021.0120116.
Alrahhal, M., & K P, S. (2021). COVID-19 Diagnostic System Using Medical Image Classification and Retrieval: A Novel Method for Image Analysis. The Computer Journal. DOI: 10.1093/comjnl/bxab051.
Downloads
Published
How to Cite
Issue
Section
License
![Creative Commons License](http://i.creativecommons.org/l/by-sa/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.