Detecting Cyber-attacks in the Industrial Internet of Things using a Hybrid Deep Random Neural Network

Main Article Content

Mrunal K. Pathak, Arti Bang, Ranjit M. Gawande, Archana S. Banait, G. B. Sambare, Ashfaq Amir Shaikh

Abstract

Critical infrastructure now faces greater vulnerabilities and a higher risk of cyberattacks as a result of the (IIoT) quick expansion. The security and dependability of industrial systems must be ensured by identifying and thwarting these threats. In this paper, we use a hybrid approach of deep learning and RNN called hybrid deep random neural network (HDRNN) to offer a novel method of identifying cyber-attacks in the IIoT.The proposed HDRNN model combines the benefits of random neural networks with deep learning to improve the detection of IIoT cyberattacks. The deep learning component makes use of deep neural networks' capacity to extract intricate features from unstructured data, while the random neural network component offers robustness and adaptability to manage changing attack patterns.Realistic threats and benchmark datasets such as UNSW-NB15and DS2OS are used in experimental evaluations. High accuracy, precision, and recall rates are attained by the model, which successfully detects a variety of assaults including infiltration, data manipulation, and denial of service.The suggested HDRNN model offers a promising approach for improving the security of IIoT systems by precisely identifying cyber-attacks in real-time. The model's hybrid nature enables enhanced detection capabilities, adaptability to changing attack patterns, and a reduction in false positives, enabling efficient threat mitigation and protecting crucial infrastructure in the IIoT context.

Article Details

Section
Articles
Author Biography

Mrunal K. Pathak, Arti Bang, Ranjit M. Gawande, Archana S. Banait, G. B. Sambare, Ashfaq Amir Shaikh

Dr. Mrunal K. Pathak

2Arti Bang

3Dr. Ranjit M. Gawande

4Prof. Archana S. Banait

5Dr. G. B. Sambare

6Dr Ashfaq  Amir Shaikh

Assistant Professor, Department of Information Technology, AISSMS Institute of Information Technology, Savitribai Phule Pune University, Pune, India, mrunal.pathak@aissmsioit.org.

2Department of Electronics and Telecommunication, Vishwakarma Institute of Information Technology, Pune, Maharashtra, India. Email: arti.bang@viit.ac.in

3Asst. Prof., Department of Computer Engineering, Matoshri College of Engineering & Research Centre Nashik, affiliated to Savitribai Phule Pune University., M.S. India, Email: ranjitgawande@gmail.com

4Department of Computer Engineering, MET's Institute of Engineering, Bhujbal Knowledge City, Nashik (SPPU), Maharashtra, India. Email: ar.ugale@gmail.com

5Pimpri Chinchwad College of Engineering, Pune, Maharashtra, India. Email: santosh.sambare@pccoepune.org

6PhD Computer Engineering, Assistant Professor Information Technology, M. H. Saboo Siddik College of Engineering, Mumbai, India. Email: ashfaq.shaikh@mjssce.ac.in

References

S. Latif, Z. Zou, Z. Idrees, and J. Ahmad, ‘‘A novel attack detection scheme for the industrial Internet of Things using a lightweight random neural network,’’ IEEE Access, vol. 8, pp. 89337–89350, 2020.

M.-O. Pahl and F.-X. Aubet. (2018). Ds2os Traffic Traces IoT Traffic Traces Gathered in a the Ds2Os IoT Environment.

[Online]. Available: https://www.kaggle.com/francoisxa/ds2ostraffictraces

M.-O. Pahl and F.-X. Aubet, ‘‘All eyes on you: Distributed multidimensional iotmicroservice anomaly detection,’’ in Proc. 14th Int. Conf. Netw. Service Manage. (CNSM), Nov. 2018, pp. 72–80

N. Moustafa and J. Slay, ‘‘The evaluation of network anomaly detection systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set,’’ Inf. Secur. J., Global Perspective, vol. 25, nos. 1–3, pp. 18–31, Apr. 2016.

A. Tahir, J. Ahmad, G. Morison, H. Larijani, R. M. Gibson, andD. A. Skelton, ‘‘HRNN4F: Hybrid deep random neural network for multichannel fall activity detection,’’ Probab. Eng. Informational Sci., vol. 35,pp. 1–14, Aug. 2019

E. Sisinni, A. Saifullah, S. Han, U. Jennehag, and M. Gidlund, ‘‘Industrial Internet of Things: Challenges, opportunities, and directions,’’ IEEE Trans. Ind. Informat., vol. 14, no. 11, pp. 4724–4734, Nov. 2018.

Y. Luo, Y. Duan, W. Li, P. Pace, and G. Fortino, ‘‘A novel mobile and hierarchical data transmission architecture for smart factories,’’ IEEE Trans. Ind. Informat., vol. 14, no. 8, pp. 3534–3546, Apr. 2018.

S. Huda, J. Yearwood, M. M. Hassan, and A. Almogren, ‘‘Securing the operations in SCADA-IoT platform based industrial control system using ensemble of deep belief networks,’’ Appl. Soft Comput., vol. 71, pp. 66–77, Oct. 2018.

K. A. P. da Costa, J. P. Papa, C. O. Lisboa, R. Munoz, and V. H. C. de Albuquerque, ‘‘Internet of Things: A survey on machine learning-based intrusion detection approaches,’’ Comput. Netw., vol. 151, pp. 147–157, Mar. 2019.

N. Moustafa, B. Turnbull, and K.-K.-R. Choo, ‘‘An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of Internet of Things,’’ IEEE Internet Things J., vol. 6, no. 3, pp. 4815–4830, Jun. 2019.

S. Aljawarneh, M. Aldwairi, and M. B. Yassein, ‘‘Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model,’’ J. Comput. Sci., vol. 25, pp. 152–160, Mar. 2018.

H. Karimipour, A. Dehghantanha, R. M. Parizi, K.-K.-R. Choo, and H. Leung, ‘‘A deep and scalable unsupervised machine learning system for cyber-attack detection in large-scale smart grids,’’ IEEE Access, vol. 7, pp. 80778–80788, 2019.

Y. Li, Y. Xu, Z. Liu, H. Hou, Y. Zheng, Y. Xin, Y. Zhao, and L. Cui, ‘‘Robust detection for network intrusion of industrial IoT based on multiCNN fusion,’’ Measurement, vol. 154, Mar. 2020, Art. no. 107450.

M. M. Hassan, A. Gumaei, A. Alsanad, M. Alrubaian, and G. Fortino, ‘‘A hybrid deep learning model for efficient intrusion detection in big data environment,’’ Inf. Sci., vol. 513, pp. 386–396, Mar. 2020.

M. Zolanvari, M. A. Teixeira, L. Gupta, K. M. Khan, and R. Jain, ‘‘Machine learning-based network vulnerability analysis of industrial Internet of Things,’’ IEEE Internet Things J., vol. 6, no. 4, pp. 6822–6834, Aug. 2019

D. Li, L. Deng, M. Lee, and H. Wang, ‘‘IoT data feature extraction and intrusion detection system for smart cities based on deep migration learning,’’ Int. J. Inf. Manage., vol. 49, pp. 533–545, Dec. 2019.

Y. Zhang, P. Li, and X. Wang, ‘‘Intrusion detection for IoT based on improved genetic algorithm and deep belief network,’’ IEEE Access, vol. 7, pp. 31711–31722, 2019.

J. Arshad, M. A. Azad, M. M. Abdeltaif, and K. Salah, ‘‘An intrusion detection framework for energy constrained IoT devices,’’ Mech. Syst. Signal Process., vol. 136, Feb. 2020, Art. no. 106436.

D. Vasan, M. Alazab, S. Venkatraman, J. Akram, and Z. Qin, ‘‘MTHAEL: Cross-architecture IoT malware detection based on neural network advanced ensemble learning,’’ IEEE Trans. Comput., vol. 69, no. 11, pp. 1654–1667, Nov. 2020.

M. M. Hassan, A. Gumaei, S. Huda, and A. Almogren, ‘‘Increasing the trustworthiness in the industrial IoT networks through a reliable cyberattack detection model,’’ IEEE Trans. Ind. Informat., vol. 16, no. 9, pp. 6154–6162, Sep. 2020.

S. J. Lee, P. D. Yoo, A. T. Asyhari, Y. Jhi, L. Chermak, C. Y. Yeun, and K. Taha, ‘‘IMPACT: Impersonation attack detection via edge computing using deep autoencoder and feature abstraction,’’ IEEE Access, vol. 8, pp. 65520–65529, 2020.

M. Saharkhizan, A. Azmoodeh, A. Dehghantanha, K.-K.-R. Choo, and R. M. Parizi, ‘‘An ensemble of deep recurrent neural networks for detecting IoT cyber attacks using network traffic,’’ IEEE Internet Things J., vol. 7, no. 9, pp. 8852–8859, Sep. 2020.

C. A. de Souza, C. B. Westphall, R. B. Machado, J. B. M. Sobral, and G. D. S. Vieira, ‘‘Hybrid approach to intrusion detection in fog-based IoT environments,’’ Comput. Netw., vol. 180, Oct. 2020, Art. no. 10741

Z. Zhang, Q. Liu, S. Qiu, S. Zhou and C. Zhang, "Unknown Attack Detection Based on Zero-Shot Learning", IEEE Access, vol. 8, pp. 193981-193991, 2020.

L. N. Tidjon, M. Frappier and A. Mammar, "Intrusion Detection Systems: A Cross-Domain Overview", IEEE Communications Surveys & Tutorials, vol. 21, no. 4, pp. 3639-3681, 2019.

A. S. Alzahrani, R. A. Shah, Y. Qian and M. Ali, "A novel method for feature learning and network intrusion classification", Alexandria Engineering Journal, vol. 59, no. 3, pp. 1159-1169, 2020.

H. Liu and B. Lang, "Machine learning and deep learning methods for intrusion detection systems: A survey", Applied Sciences (Switzerland), vol. 9, no. 20, 2019.

M. Hasan, M. M. Islam, M. I. I. Zarif and M. M. A. Hashem, "Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches", Internet of Things (Netherlands), vol. 7, pp. 100059, 2019.

N. Chouhan, A. Khan, H. Ur and R. Khan, "Network anomaly detection using channel boosted and residual learning based deep convolutional neural network", Applied Soft Computing Journal, vol. 83, pp. 105612, 2019.