Robust Attack Detection Approach for IIoT Using Ensemble Classifier

Generally, the risks associated with malicious threats are increasing for the Internet of Things (IoT) and its related applications due to dependency on the Internet and the minimal resource availability of IoT devices. Thus, anomaly-based intrusion detection models for IoT networks are vital. Distinct detection methodologies need to be developed for the Industrial Internet of Things (IIoT) network as threat detection is a significant expectation of stakeholders. Machine learning approaches are considered to be evolving techniques that learn with experience, and such approaches have resulted in superior performance in various applications, such as pattern recognition, outlier analysis, and speech recognition. Traditional techniques and tools are not adequate to secure IIoT networks due to the use of various protocols in industrial systems and restricted possibilities of upgradation. In this paper, the objective is to develop a two-phase anomaly detection model to enhance the reliability of an IIoT network. In the first phase, SVM and Naïve Bayes, are integrated using an ensemble blending technique. K-fold cross-validation is performed while training the data with different training and testing ratios to obtain optimized training and test sets. Ensemble blending uses a random forest technique to predict class labels. An Artificial Neural Network (ANN) classifier that uses the Adam optimizer to achieve better accuracy is also used for prediction. In the second phase, both the ANN and random forest results are fed to the model’s classification unit, and the highest accuracy value is considered the final result. The proposed model is tested on standard IoT attack datasets, such as WUSTL_IIOT-2018, N_BaIoT, and Bot_IoT. The highest accuracy obtained is 99%. A comparative analysis of the proposed model using state-of-the-art ensemble techniques is performed to demonstrate the superiority of the results. The results also demonstrate that the proposed model outperforms traditional techniques and thus improves the reliability of an IIoT network.

[1]  Ken Ferens,et al.  Network Intrusion Detection Using Machine Learning , 2016 .

[2]  Ali Balador,et al.  Machine learning-based recommendation trust model for machine-to-machine communication , 2018, 2018 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT).

[3]  Yuval Elovici,et al.  N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders , 2018, IEEE Pervasive Computing.

[4]  Joe Cunningham,et al.  The industrial internet of things (IIoT): An analysis framework , 2018, Comput. Ind..

[5]  Chunhua Wang,et al.  Machine Learning and Deep Learning Methods for Cybersecurity , 2018, IEEE Access.

[6]  Vijay Varadharajan,et al.  A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection , 2019, IEEE Communications Surveys & Tutorials.

[7]  M. Sugumaran,et al.  Machine Learning Techniques for Intrusion Detection: A Comparative Analysis , 2016, ICIA.

[8]  Gisung Kim,et al.  A novel hybrid intrusion detection method integrating anomaly detection with misuse detection , 2014, Expert Syst. Appl..

[9]  Abbas Javed,et al.  RNN-ABC: A New Swarm Optimization Based Technique for Anomaly Detection , 2019, Comput..

[10]  Praveen Kumar Reddy Maddikunta,et al.  A Novel PCA-Firefly Based XGBoost Classification Model for Intrusion Detection in Networks Using GPU , 2020, Electronics.

[11]  Abdullah Al-Barakati,et al.  DeepDCA: Novel Network-Based Detection of IoT Attacks Using Artificial Immune System , 2020, Applied Sciences.

[12]  Ying Gao,et al.  A Distributed Network Intrusion Detection System for Distributed Denial of Service Attacks in Vehicular Ad Hoc Network , 2019, IEEE Access.

[13]  Elena Sitnikova,et al.  Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset , 2018, Future Gener. Comput. Syst..

[14]  Mansour Sheikhan,et al.  Intrusion detection using reduced-size RNN based on feature grouping , 2010, Neural Computing and Applications.

[15]  Kalamullah Ramli,et al.  Study on implementation of machine learning methods combination for improving attacks detection accuracy on Intrusion Detection System (IDS) , 2015, 2015 International Conference on Quality in Research (QiR).

[16]  Ahmed Ahmim,et al.  A Novel Hierarchical Intrusion Detection System Based on Decision Tree and Rules-Based Models , 2018, 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS).

[17]  Praveen Kumar Reddy Maddikunta,et al.  An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture , 2020, Comput. Commun..

[18]  Jonathan Oliver,et al.  Mining Malware to Detect Variants , 2014, 2014 Fifth Cybercrime and Trustworthy Computing Conference.

[19]  Dharmaraj R. Patil,et al.  Implementation of network intrusion detection system using variant of decision tree algorithm , 2015, 2015 International Conference on Nascent Technologies in the Engineering Field (ICNTE).

[20]  K. P. Soman,et al.  Deep Learning Approach for Intelligent Intrusion Detection System , 2019, IEEE Access.

[21]  K. A. Taher,et al.  Network Intrusion Detection using Supervised Machine Learning Technique with Feature Selection , 2019, 2019 International Conference on Robotics,Electrical and Signal Processing Techniques (ICREST).

[22]  K. Raghuveer,et al.  Intrusion detection technique by using k-means, fuzzy neural network and SVM classifiers , 2013, 2013 International Conference on Computer Communication and Informatics.

[23]  Abdulrahman Al-Ahmari,et al.  Computational System to Classify Cyber Crime Offenses using Machine Learning , 2020, Sustainability.

[24]  Kim-Kwang Raymond Choo,et al.  Detecting Internet of Things attacks using distributed deep learning , 2020, J. Netw. Comput. Appl..

[25]  S. Thamarai Selvi,et al.  DDoS detection and analysis in SDN-based environment using support vector machine classifier , 2014, 2014 Sixth International Conference on Advanced Computing (ICoAC).

[26]  Mahdi Aiash,et al.  Machine Learning Based Botnet Identification Traffic , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.

[27]  P. J. García-Nieto,et al.  Review: machine learning techniques applied to cybersecurity , 2019, International Journal of Machine Learning and Cybernetics.

[28]  Farrukh Aslam Khan,et al.  A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection , 2018, Cluster Computing.

[29]  Yuefei Zhu,et al.  A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.

[30]  Weihai Chen,et al.  Industrial IoT in 5G environment towards smart manufacturing , 2018, J. Ind. Inf. Integr..

[31]  Kijun Han,et al.  Cyber Threat Detection Based on Artificial Neural Networks Using Event Profiles , 2019, IEEE Access.

[32]  Riri Fitri Sari,et al.  Intrusion Detection in IoT Networks Using Deep Learning Algorithm , 2020, Inf..

[33]  Manas Ranjan Patra,et al.  NETWORK INTRUSION DETECTION USING NAÏVE BAYES , 2007 .

[34]  Joarder Kamruzzaman,et al.  A novel Ensemble of Hybrid Intrusion Detection System for Detecting Internet of Things Attacks , 2019, Electronics.

[35]  K. P. Soman,et al.  Applying convolutional neural network for network intrusion detection , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[36]  Xue Wang,et al.  Comparison deep learning method to traditional methods using for network intrusion detection , 2016, 2016 8th IEEE International Conference on Communication Software and Networks (ICCSN).