Robust Attack Detection Approach for IIoT Using Ensemble Classifier
- URL: http://arxiv.org/abs/2102.01515v1
- Date: Sat, 30 Jan 2021 07:21:44 GMT
- Title: Robust Attack Detection Approach for IIoT Using Ensemble Classifier
- Authors: V. Priya, I. Sumaiya Thaseen, Thippa Reddy Gadekallu, Mohamed K.
Aboudaif, Emad Abouel Nasr
- Abstract summary: The objective is to develop a two-phase anomaly detection model to enhance the reliability of an IIoT network.
The proposed model is tested on standard IoT attack outliers such as WUSTL_IIOT-2018, N_BaIoT, and Bot_IoT.
The results also demonstrate that the proposed model outperforms traditional techniques and thus improves the reliability of an IIoT network.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Generally, the risks associated with malicious threats are increasing for the
IIoT and its related applications due to dependency on the Internet and the
minimal resource availability of IoT devices. Thus, anomaly-based intrusion
detection models for IoT networks are vital. Distinct detection methodologies
need to be developed for the IIoT network as threat detection is a significant
expectation of stakeholders. Machine learning approaches are considered to be
evolving techniques that learn with experience, and such approaches have
resulted in superior performance in various applications, such as pattern
recognition, outlier analysis, and speech recognition. Traditional techniques
and tools are not adequate to secure IIoT networks due to the use of various
protocols in industrial systems and restricted possibilities of upgradation. In
this paper, the objective is to develop a two-phase anomaly detection model to
enhance the reliability of an IIoT network. In the first phase, SVM and Naive
Bayes are integrated using an ensemble blending technique. K-fold
cross-validation is performed while training the data with different training
and testing ratios to obtain optimized training and test sets. Ensemble
blending uses a random forest technique to predict class labels. An Artificial
Neural Network (ANN) classifier that uses the Adam optimizer to achieve better
accuracy is also used for prediction. In the second phase, both the ANN and
random forest results are fed to the model's classification unit, and the
highest accuracy value is considered the final result. The proposed model is
tested on standard IoT attack datasets, such as WUSTL_IIOT-2018, N_BaIoT, and
Bot_IoT. The highest accuracy obtained is 99%. The results also demonstrate
that the proposed model outperforms traditional techniques and thus improves
the reliability of an IIoT network.
Related papers
- A Conditional Tabular GAN-Enhanced Intrusion Detection System for Rare Attacks in IoT Networks [1.1970409518725493]
Internet of things (IoT) networks, boosted by 6G technology, are transforming various industries.
Their widespread adoption introduces significant security risks, particularly in detecting rare but potentially damaging cyber-attacks.
Traditional IDS often struggle with detecting rare attacks due to severe class imbalances in IoT data.
arXiv Detail & Related papers (2025-02-09T21:13:11Z) - Enhanced Intrusion Detection in IIoT Networks: A Lightweight Approach with Autoencoder-Based Feature Learning [0.0]
Intrusion Detection Systems (IDS) are essential for identifying and preventing abnormal network behaviors and malicious activities.
This research implements six innovative approaches to enhance IDS performance, including leveraging an autoencoder for dimensional reduction.
We are the first to deploy our model on a Jetson Nano, achieving inference times of 0.185 ms for binary classification and 0.187 ms for multiclass classification.
arXiv Detail & Related papers (2025-01-25T16:24:18Z) - FedMSE: Federated learning for IoT network intrusion detection [0.0]
The rise of IoT has expanded the cyber attack surface, making traditional centralized machine learning methods insufficient due to concerns about data availability, computational resources, transfer costs, and especially privacy preservation.
A semi-supervised federated learning model was developed to overcome these issues, combining the Shrink Autoencoder and Centroid one-class classifier (SAE-CEN)
This approach enhances the performance of intrusion detection by effectively representing normal network data and accurately identifying anomalies in the decentralized strategy.
arXiv Detail & Related papers (2024-10-18T02:23:57Z) - Enhancing Intrusion Detection in IoT Environments: An Advanced Ensemble Approach Using Kolmogorov-Arnold Networks [3.1309870454820277]
This paper introduces a hybrid Intrusion Detection System (IDS) that combines Kolmogorov-Arnold Networks (KANs) with the XGBoost algorithm.
Our proposed IDS leverages the unique capabilities of KANs, which utilize learnable activation functions to model complex relationships within data, alongside the powerful ensemble learning techniques of XGBoost.
Experimental evaluations demonstrate that our hybrid IDS achieves an impressive detection accuracy exceeding 99% in distinguishing between benign and malicious activities.
arXiv Detail & Related papers (2024-08-28T15:58:49Z) - TWINS: A Fine-Tuning Framework for Improved Transferability of
Adversarial Robustness and Generalization [89.54947228958494]
This paper focuses on the fine-tuning of an adversarially pre-trained model in various classification tasks.
We propose a novel statistics-based approach, Two-WIng NormliSation (TWINS) fine-tuning framework.
TWINS is shown to be effective on a wide range of image classification datasets in terms of both generalization and robustness.
arXiv Detail & Related papers (2023-03-20T14:12:55Z) - Leveraging a Probabilistic PCA Model to Understand the Multivariate
Statistical Network Monitoring Framework for Network Security Anomaly
Detection [64.1680666036655]
We revisit anomaly detection techniques based on PCA from a probabilistic generative model point of view.
We have evaluated the mathematical model using two different datasets.
arXiv Detail & Related papers (2023-02-02T13:41:18Z) - A Dependable Hybrid Machine Learning Model for Network Intrusion
Detection [1.222622290392729]
We propose a new hybrid model that combines machine learning and deep learning to increase detection rates while securing dependability.
Our method produces excellent results when tested on two datasets, KDDCUP'99 and CIC-MalMem-2022.
arXiv Detail & Related papers (2022-12-08T20:19:27Z) - Distributed Adversarial Training to Robustify Deep Neural Networks at
Scale [100.19539096465101]
Current deep neural networks (DNNs) are vulnerable to adversarial attacks, where adversarial perturbations to the inputs can change or manipulate classification.
To defend against such attacks, an effective approach, known as adversarial training (AT), has been shown to mitigate robust training.
We propose a large-batch adversarial training framework implemented over multiple machines.
arXiv Detail & Related papers (2022-06-13T15:39:43Z) - Adaptive Anomaly Detection for Internet of Things in Hierarchical Edge
Computing: A Contextual-Bandit Approach [81.5261621619557]
We propose an adaptive anomaly detection scheme with hierarchical edge computing (HEC)
We first construct multiple anomaly detection DNN models with increasing complexity, and associate each of them to a corresponding HEC layer.
Then, we design an adaptive model selection scheme that is formulated as a contextual-bandit problem and solved by using a reinforcement learning policy network.
arXiv Detail & Related papers (2021-08-09T08:45:47Z) - Uncertainty-Aware Deep Calibrated Salient Object Detection [74.58153220370527]
Existing deep neural network based salient object detection (SOD) methods mainly focus on pursuing high network accuracy.
These methods overlook the gap between network accuracy and prediction confidence, known as the confidence uncalibration problem.
We introduce an uncertaintyaware deep SOD network, and propose two strategies to prevent deep SOD networks from being overconfident.
arXiv Detail & Related papers (2020-12-10T23:28:36Z) - Towards Accurate Knowledge Transfer via Target-awareness Representation
Disentanglement [56.40587594647692]
We propose a novel transfer learning algorithm, introducing the idea of Target-awareness REpresentation Disentanglement (TRED)
TRED disentangles the relevant knowledge with respect to the target task from the original source model and used as a regularizer during fine-tuning the target model.
Experiments on various real world datasets show that our method stably improves the standard fine-tuning by more than 2% in average.
arXiv Detail & Related papers (2020-10-16T17:45:08Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.