Robust Attack Detection Approach for IIoT Using Ensemble Classifier
- URL: http://arxiv.org/abs/2102.01515v1
- Date: Sat, 30 Jan 2021 07:21:44 GMT
- Title: Robust Attack Detection Approach for IIoT Using Ensemble Classifier
- Authors: V. Priya, I. Sumaiya Thaseen, Thippa Reddy Gadekallu, Mohamed K.
Aboudaif, Emad Abouel Nasr
- Abstract summary: The objective is to develop a two-phase anomaly detection model to enhance the reliability of an IIoT network.
The proposed model is tested on standard IoT attack outliers such as WUSTL_IIOT-2018, N_BaIoT, and Bot_IoT.
The results also demonstrate that the proposed model outperforms traditional techniques and thus improves the reliability of an IIoT network.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Generally, the risks associated with malicious threats are increasing for the
IIoT and its related applications due to dependency on the Internet and the
minimal resource availability of IoT devices. Thus, anomaly-based intrusion
detection models for IoT networks are vital. Distinct detection methodologies
need to be developed for the IIoT network as threat detection is a significant
expectation of stakeholders. Machine learning approaches are considered to be
evolving techniques that learn with experience, and such approaches have
resulted in superior performance in various applications, such as pattern
recognition, outlier analysis, and speech recognition. Traditional techniques
and tools are not adequate to secure IIoT networks due to the use of various
protocols in industrial systems and restricted possibilities of upgradation. In
this paper, the objective is to develop a two-phase anomaly detection model to
enhance the reliability of an IIoT network. In the first phase, SVM and Naive
Bayes are integrated using an ensemble blending technique. K-fold
cross-validation is performed while training the data with different training
and testing ratios to obtain optimized training and test sets. Ensemble
blending uses a random forest technique to predict class labels. An Artificial
Neural Network (ANN) classifier that uses the Adam optimizer to achieve better
accuracy is also used for prediction. In the second phase, both the ANN and
random forest results are fed to the model's classification unit, and the
highest accuracy value is considered the final result. The proposed model is
tested on standard IoT attack datasets, such as WUSTL_IIOT-2018, N_BaIoT, and
Bot_IoT. The highest accuracy obtained is 99%. The results also demonstrate
that the proposed model outperforms traditional techniques and thus improves
the reliability of an IIoT network.
Related papers
- FedMSE: Federated learning for IoT network intrusion detection [0.0]
The rise of IoT has expanded the cyber attack surface, making traditional centralized machine learning methods insufficient due to concerns about data availability, computational resources, transfer costs, and especially privacy preservation.
A semi-supervised federated learning model was developed to overcome these issues, combining the Shrink Autoencoder and Centroid one-class classifier (SAE-CEN)
This approach enhances the performance of intrusion detection by effectively representing normal network data and accurately identifying anomalies in the decentralized strategy.
arXiv Detail & Related papers (2024-10-18T02:23:57Z) - Enhancing Intrusion Detection in IoT Environments: An Advanced Ensemble Approach Using Kolmogorov-Arnold Networks [3.1309870454820277]
This paper introduces a hybrid Intrusion Detection System (IDS) that combines Kolmogorov-Arnold Networks (KANs) with the XGBoost algorithm.
Our proposed IDS leverages the unique capabilities of KANs, which utilize learnable activation functions to model complex relationships within data, alongside the powerful ensemble learning techniques of XGBoost.
Experimental evaluations demonstrate that our hybrid IDS achieves an impressive detection accuracy exceeding 99% in distinguishing between benign and malicious activities.
arXiv Detail & Related papers (2024-08-28T15:58:49Z) - Efficient Intrusion Detection: Combining $χ^2$ Feature Selection with CNN-BiLSTM on the UNSW-NB15 Dataset [2.239394800147746]
Intrusion Detection Systems (IDSs) have played a significant role in the detection and prevention of cyber-attacks in traditional computing systems.
The limited computational resources available on Internet of Things (IoT) devices pose a challenge for deploying conventional computing-based IDSs.
We present an effective IDS model that addresses this issue by combining a lightweight Convolutional Neural Network (CNN) with bidirectional Long Short-Term Memory (BiLSTM)
arXiv Detail & Related papers (2024-07-20T17:41:16Z) - Malware Detection in IOT Systems Using Machine Learning Techniques [0.0]
This study introduces a CNN-LSTM hybrid model for IoT malware identification and evaluates its performance against established methods.
The proposed approach achieved 95.5% accuracy, surpassing existing methods.
arXiv Detail & Related papers (2023-12-29T17:02:54Z) - TWINS: A Fine-Tuning Framework for Improved Transferability of
Adversarial Robustness and Generalization [89.54947228958494]
This paper focuses on the fine-tuning of an adversarially pre-trained model in various classification tasks.
We propose a novel statistics-based approach, Two-WIng NormliSation (TWINS) fine-tuning framework.
TWINS is shown to be effective on a wide range of image classification datasets in terms of both generalization and robustness.
arXiv Detail & Related papers (2023-03-20T14:12:55Z) - Leveraging a Probabilistic PCA Model to Understand the Multivariate
Statistical Network Monitoring Framework for Network Security Anomaly
Detection [64.1680666036655]
We revisit anomaly detection techniques based on PCA from a probabilistic generative model point of view.
We have evaluated the mathematical model using two different datasets.
arXiv Detail & Related papers (2023-02-02T13:41:18Z) - A Dependable Hybrid Machine Learning Model for Network Intrusion
Detection [1.222622290392729]
We propose a new hybrid model that combines machine learning and deep learning to increase detection rates while securing dependability.
Our method produces excellent results when tested on two datasets, KDDCUP'99 and CIC-MalMem-2022.
arXiv Detail & Related papers (2022-12-08T20:19:27Z) - Distributed Adversarial Training to Robustify Deep Neural Networks at
Scale [100.19539096465101]
Current deep neural networks (DNNs) are vulnerable to adversarial attacks, where adversarial perturbations to the inputs can change or manipulate classification.
To defend against such attacks, an effective approach, known as adversarial training (AT), has been shown to mitigate robust training.
We propose a large-batch adversarial training framework implemented over multiple machines.
arXiv Detail & Related papers (2022-06-13T15:39:43Z) - Adaptive Anomaly Detection for Internet of Things in Hierarchical Edge
Computing: A Contextual-Bandit Approach [81.5261621619557]
We propose an adaptive anomaly detection scheme with hierarchical edge computing (HEC)
We first construct multiple anomaly detection DNN models with increasing complexity, and associate each of them to a corresponding HEC layer.
Then, we design an adaptive model selection scheme that is formulated as a contextual-bandit problem and solved by using a reinforcement learning policy network.
arXiv Detail & Related papers (2021-08-09T08:45:47Z) - Uncertainty-Aware Deep Calibrated Salient Object Detection [74.58153220370527]
Existing deep neural network based salient object detection (SOD) methods mainly focus on pursuing high network accuracy.
These methods overlook the gap between network accuracy and prediction confidence, known as the confidence uncalibration problem.
We introduce an uncertaintyaware deep SOD network, and propose two strategies to prevent deep SOD networks from being overconfident.
arXiv Detail & Related papers (2020-12-10T23:28:36Z) - Towards Accurate Knowledge Transfer via Target-awareness Representation
Disentanglement [56.40587594647692]
We propose a novel transfer learning algorithm, introducing the idea of Target-awareness REpresentation Disentanglement (TRED)
TRED disentangles the relevant knowledge with respect to the target task from the original source model and used as a regularizer during fine-tuning the target model.
Experiments on various real world datasets show that our method stably improves the standard fine-tuning by more than 2% in average.
arXiv Detail & Related papers (2020-10-16T17:45:08Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.