Optimized Ensemble Model Towards Secured Industrial IoT Devices
- URL: http://arxiv.org/abs/2401.05509v1
- Date: Wed, 10 Jan 2024 19:06:39 GMT
- Title: Optimized Ensemble Model Towards Secured Industrial IoT Devices
- Authors: MohammadNoor Injadat
- Abstract summary: This paper proposes a framework based on the combined use of Bayesian Optimization-Gaussian Process (BO-GP) with an ensemble tree-based learning model to improve the performance of intrusion and attack detection in IIoT environments.
The proposed framework's performance is evaluated using the Windows 10 dataset collected by the Cyber Range and IoT labs at University of New South Wales.
- Score: 0.1813006808606333
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The continued growth in the deployment of Internet-of-Things (IoT) devices
has been fueled by the increased connectivity demand, particularly in
industrial environments. However, this has led to an increase in the number of
network related attacks due to the increased number of potential attack
surfaces. Industrial IoT (IIoT) devices are prone to various network related
attacks that can have severe consequences on the manufacturing process as well
as on the safety of the workers in the manufacturing plant. One promising
solution that has emerged in recent years for attack detection is Machine
learning (ML). More specifically, ensemble learning models have shown great
promise in improving the performance of the underlying ML models. Accordingly,
this paper proposes a framework based on the combined use of Bayesian
Optimization-Gaussian Process (BO-GP) with an ensemble tree-based learning
model to improve the performance of intrusion and attack detection in IIoT
environments. The proposed framework's performance is evaluated using the
Windows 10 dataset collected by the Cyber Range and IoT labs at University of
New South Wales. Experimental results illustrate the improvement in detection
accuracy, precision, and F-score when compared to standard tree and ensemble
tree models.
Related papers
- Task-Oriented Real-time Visual Inference for IoVT Systems: A Co-design Framework of Neural Networks and Edge Deployment [61.20689382879937]
Task-oriented edge computing addresses this by shifting data analysis to the edge.
Existing methods struggle to balance high model performance with low resource consumption.
We propose a novel co-design framework to optimize neural network architecture.
arXiv Detail & Related papers (2024-10-29T19:02:54Z) - Beyond Detection: Leveraging Large Language Models for Cyber Attack Prediction in IoT Networks [4.836070911511429]
This paper proposes a novel network intrusion prediction framework that combines Large Language Models (LLMs) with Long Short Term Memory (LSTM) networks.
Our framework, evaluated on the CICIoT2023 IoT attack dataset, demonstrates a significant improvement in predictive capabilities, achieving an overall accuracy of 98%.
arXiv Detail & Related papers (2024-08-26T06:57:22Z) - Extending Network Intrusion Detection with Enhanced Particle Swarm Optimization Techniques [0.0]
The present research investigates how to improve Network Intrusion Detection Systems (NIDS) by combining Machine Learning (ML) and Deep Learning (DL) techniques.
The study uses the CSE-CIC-IDS 2018 and LITNET-2020 datasets to compare ML methods (Decision Trees, Random Forest, XGBoost) and DL models (CNNs, RNNs, DNNs) against key performance metrics.
The Decision Tree model performed better across all measures after being fine-tuned with Enhanced Particle Swarm Optimization (EPSO), demonstrating the model's ability to detect network breaches effectively.
arXiv Detail & Related papers (2024-08-14T17:11:36Z) - Sustainable Diffusion-based Incentive Mechanism for Generative AI-driven Digital Twins in Industrial Cyber-Physical Systems [65.22300383287904]
Industrial Cyber-Physical Systems (ICPSs) are an integral component of modern manufacturing and industries.
By digitizing data throughout the product life cycle, Digital Twins (DTs) in ICPSs enable a shift from current industrial infrastructures to intelligent and adaptive infrastructures.
mechanisms that leverage sensing Industrial Internet of Things (IIoT) devices to share data for the construction of DTs are susceptible to adverse selection problems.
arXiv Detail & Related papers (2024-08-02T10:47:10Z) - Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-based Federated Learning [52.6706505729803]
We introduce Federated Learning (FL) to collaboratively train a decentralized shared model of Intrusion Detection Systems (IDS)
FLEKD enables a more flexible aggregation method than conventional model fusion techniques.
Experiment results show that the proposed approach outperforms local training and traditional FL in terms of both speed and performance.
arXiv Detail & Related papers (2024-01-22T14:16:37Z) - Harris Hawks Feature Selection in Distributed Machine Learning for
Secure IoT Environments [8.690178186919635]
Internet of Things (IoT) applications can collect and transfer sensitive data.
It is necessary to develop new methods to detect hacked IoT devices.
This paper proposes a Feature Selection (FS) model based on Harris Hawks Optimization (HHO) and Random Weight Network (RWN) to detect IoT botnet attacks.
arXiv Detail & Related papers (2023-02-20T09:38:12Z) - A Generative Approach for Production-Aware Industrial Network Traffic
Modeling [70.46446906513677]
We investigate the network traffic data generated from a laser cutting machine deployed in a Trumpf factory in Germany.
We analyze the traffic statistics, capture the dependencies between the internal states of the machine, and model the network traffic as a production state dependent process.
We compare the performance of various generative models including variational autoencoder (VAE), conditional variational autoencoder (CVAE), and generative adversarial network (GAN)
arXiv Detail & Related papers (2022-11-11T09:46:58Z) - Multi-Edge Server-Assisted Dynamic Federated Learning with an Optimized
Floating Aggregation Point [51.47520726446029]
cooperative edge learning (CE-FL) is a distributed machine learning architecture.
We model the processes taken during CE-FL, and conduct analytical training.
We show the effectiveness of our framework with the data collected from a real-world testbed.
arXiv Detail & Related papers (2022-03-26T00:41:57Z) - Federated Learning with Unreliable Clients: Performance Analysis and
Mechanism Design [76.29738151117583]
Federated Learning (FL) has become a promising tool for training effective machine learning models among distributed clients.
However, low quality models could be uploaded to the aggregator server by unreliable clients, leading to a degradation or even a collapse of training.
We model these unreliable behaviors of clients and propose a defensive mechanism to mitigate such a security risk.
arXiv Detail & Related papers (2021-05-10T08:02:27Z) - Detecting Botnet Attacks in IoT Environments: An Optimized Machine
Learning Approach [8.641714871787595]
Machine learning (ML) has emerged as one potential solution due to the abundance of data generated and available for IoT devices and networks.
This paper proposes an optimized ML-based framework to detect attacks on IoT devices in an effective and efficient manner.
Experimental results show that the proposed optimized framework has a high detection accuracy, precision, recall, and F-score.
arXiv Detail & Related papers (2020-12-16T16:39:55Z) - Enhancing network forensics with particle swarm and deep learning: The
particle deep framework [4.797216015572358]
The popularity of IoT smart things is rising, due to the automation they provide and its effects on productivity.
It has been proven that IoT devices are vulnerable to both well established and new IoT-specific attack vectors.
In this paper, we propose a new network forensic framework for IoT networks that utilised Particle Deep Framework.
arXiv Detail & Related papers (2020-05-02T06:39:33Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.