Blockchain and Deep Learning-Based IDS for Securing SDN-Enabled Industrial IoT Environments
- URL: http://arxiv.org/abs/2401.00468v1
- Date: Sun, 31 Dec 2023 11:49:42 GMT
- Title: Blockchain and Deep Learning-Based IDS for Securing SDN-Enabled Industrial IoT Environments
- Authors: Samira Kamali Poorazad, Chafika Benzaıd, Tarik Taleb,
- Abstract summary: We propose an integrated method for better detecting and preventing security threats associated with software-defined networking (SDN)-based IIoT architectures.
The two components consist of a convolutional neural network-based Intrusion Detection System (IDS) implemented as an SDN application and a injection-based system (BS) to empower application layer and network layer security.
The proposed IDS exhibits superior classification accuracy in both binary and multiclass categories.
- Score: 11.04540520633849
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The industrial Internet of Things (IIoT) involves the integration of Internet of Things (IoT) technologies into industrial settings. However, given the high sensitivity of the industry to the security of industrial control system networks and IIoT, the use of software-defined networking (SDN) technology can provide improved security and automation of communication processes. Despite this, the architecture of SDN can give rise to various security threats. Therefore, it is of paramount importance to consider the impact of these threats on SDN-based IIoT environments. Unlike previous research, which focused on security in IIoT and SDN architectures separately, we propose an integrated method including two components that work together seamlessly for better detecting and preventing security threats associated with SDN-based IIoT architectures. The two components consist in a convolutional neural network-based Intrusion Detection System (IDS) implemented as an SDN application and a Blockchain-based system (BS) to empower application layer and network layer security, respectively. A significant advantage of the proposed method lies in jointly minimizing the impact of attacks such as command injection and rule injection on SDN-based IIoT architecture layers. The proposed IDS exhibits superior classification accuracy in both binary and multiclass categories.
Related papers
- C-RADAR: A Centralized Deep Learning System for Intrusion Detection in Software Defined Networks [0.0]
We propose the use of deep learning (DL) techniques for intrusion detection in Software Defined Networks (SDNs)
Our results show that the DL-based approach outperforms traditional methods in terms of detection accuracy and computational efficiency.
This technique can be trained to detect new attack patterns and improve the overall security of SDNs.
arXiv Detail & Related papers (2024-08-30T15:39:37Z) - A Systematic Mapping Study on SDN Controllers for Enhancing Security in IoT Networks [0.0]
We review the current body of knowledge on enhancing the security of IoT networks using SDN controllers.
We conclude that the SDN controller architecture commonly used for securing IoT networks is the centralized controller architecture.
arXiv Detail & Related papers (2024-08-02T14:44:15Z) - Sustainable Diffusion-based Incentive Mechanism for Generative AI-driven Digital Twins in Industrial Cyber-Physical Systems [65.22300383287904]
Industrial Cyber-Physical Systems (ICPSs) are an integral component of modern manufacturing and industries.
By digitizing data throughout the product life cycle, Digital Twins (DTs) in ICPSs enable a shift from current industrial infrastructures to intelligent and adaptive infrastructures.
mechanisms that leverage sensing Industrial Internet of Things (IIoT) devices to share data for the construction of DTs are susceptible to adverse selection problems.
arXiv Detail & Related papers (2024-08-02T10:47:10Z) - A Cutting-Edge Deep Learning Method For Enhancing IoT Security [0.0]
This paper proposes an innovative design of the Internet of Things (IoT) Environment Intrusion Detection System (or IDS) using Deep Learning-integrated Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) networks.
Our model, based on the CICIDS 2017 dataset, achieved an accuracy of 99.52% in classifying network traffic as either benign or malicious.
arXiv Detail & Related papers (2024-06-18T08:42:51Z) - Multiclass Classification Procedure for Detecting Attacks on MQTT-IoT
Protocol [0.0]
Intrusion detection systems (IDS) are used to protect IoT systems from the various anomalies and attacks at the network level.
Our work focuses on creating classification models that can feed an IDS using a dataset containing frames under attacks of an IoT system.
arXiv Detail & Related papers (2024-02-05T18:27:46Z) - Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-based Federated Learning [52.6706505729803]
We introduce Federated Learning (FL) to collaboratively train a decentralized shared model of Intrusion Detection Systems (IDS)
FLEKD enables a more flexible aggregation method than conventional model fusion techniques.
Experiment results show that the proposed approach outperforms local training and traditional FL in terms of both speed and performance.
arXiv Detail & Related papers (2024-01-22T14:16:37Z) - Multi-Tier Computing-Enabled Digital Twin in 6G Networks [50.236861239246835]
In Industry 4.0, industries such as manufacturing, automotive, and healthcare are rapidly adopting DT-based development.
The main challenges to date have been the high demands on communication and computing resources, as well as privacy and security concerns.
To achieve low latency and high security services in the emerging DT, multi-tier computing has been proposed by combining edge/fog computing and cloud computing.
arXiv Detail & Related papers (2023-12-28T13:02:53Z) - Causal Semantic Communication for Digital Twins: A Generalizable
Imitation Learning Approach [74.25870052841226]
A digital twin (DT) leverages a virtual representation of the physical world, along with communication (e.g., 6G), computing, and artificial intelligence (AI) technologies to enable many connected intelligence services.
Wireless systems can exploit the paradigm of semantic communication (SC) for facilitating informed decision-making under strict communication constraints.
A novel framework called causal semantic communication (CSC) is proposed for DT-based wireless systems.
arXiv Detail & Related papers (2023-04-25T00:15:00Z) - A Novel Online Incremental Learning Intrusion Prevention System [2.5234156040689237]
This paper proposes a novel Network Intrusion Prevention System that utilise a SelfOrganizing Incremental Neural Network along with a Support Vector Machine.
Due to its structure, the proposed system provides a security solution that does not rely on signatures or rules and is capable to mitigate known and unknown attacks in real-time with high accuracy.
arXiv Detail & Related papers (2021-09-20T13:30:11Z) - Safe RAN control: A Symbolic Reinforcement Learning Approach [62.997667081978825]
We present a Symbolic Reinforcement Learning (SRL) based architecture for safety control of Radio Access Network (RAN) applications.
We provide a purely automated procedure in which a user can specify high-level logical safety specifications for a given cellular network topology.
We introduce a user interface (UI) developed to help a user set intent specifications to the system, and inspect the difference in agent proposed actions.
arXiv Detail & Related papers (2021-06-03T16:45:40Z) - Deep Multi-Task Learning for Cooperative NOMA: System Design and
Principles [52.79089414630366]
We develop a novel deep cooperative NOMA scheme, drawing upon the recent advances in deep learning (DL)
We develop a novel hybrid-cascaded deep neural network (DNN) architecture such that the entire system can be optimized in a holistic manner.
arXiv Detail & Related papers (2020-07-27T12:38:37Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.