Trustworthy Network Anomaly Detection Based on an Adaptive Learning Rate and Momentum in IIoT

While the industrial Internet of Things (IIoT) brings convenience to the industry, it also brings security problems. Due to the massive amount of data generated by the surge of IIoT devices, it is impossible to ensure whether these data contain an attack or untrustworthy data, therefore, how to ensure the security and trustworthiness of IIoT devices has become an urgent problem to solve. In this article, we design a new hinge classification algorithm based on mini-batch gradient descent with an adaptive learning rate and momentum (HCA-MBGDALRM) to minimize the effects of security attacks. The algorithm significantly improves the performance of deep network training compared with traditional neural networks, decision trees and logistic regression in terms of scale and speed. In addition, we have solved the data skew problem in the shuffle phase, and we implement a parallel framework for HCA-MBGDALRM to accelerate the processing speed of very large traffic data sets.

[1]  Christian Esposito,et al.  Securing Collaborative Deep Learning in Industrial Applications Within Adversarial Scenarios , 2018, IEEE Transactions on Industrial Informatics.

[2]  Shigeru Katagiri,et al.  Confusion-Matrix-Based Kernel Logistic Regression for Imbalanced Data Classification , 2017, IEEE Transactions on Knowledge and Data Engineering.

[3]  Baojiang Cui,et al.  A Method of Information Protection for Collaborative Deep Learning under GAN Model Attack , 2019, IEEE/ACM Transactions on Computational Biology and Bioinformatics.

[4]  Xinyu Yang,et al.  A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.

[5]  Tao Zhang,et al.  Fog and IoT: An Overview of Research Opportunities , 2016, IEEE Internet of Things Journal.

[6]  Banu Diri,et al.  Machine learning based phishing detection from URLs , 2019, Expert Syst. Appl..

[7]  Andrew W. Moore,et al.  Bayesian Neural Networks for Internet Traffic Classification , 2007, IEEE Transactions on Neural Networks.

[8]  Melody Moh,et al.  Collaborative Ensemble-Learning Based Intrusion Detection Systems for Clouds , 2016, 2016 International Conference on Collaboration Technologies and Systems (CTS).

[9]  Cheng Zhang,et al.  Blockchain Empowered Arbitrable Data Auditing Scheme for Network Storage as a Service , 2020, IEEE Transactions on Services Computing.

[10]  Yang Xu,et al.  An adaptive and configurable protection framework against android privilege escalation threats , 2019, Future Gener. Comput. Syst..

[11]  Radu Dogaru,et al.  A comparison of several classifiers for eye detection on emotion expressing faces , 2013, 2013 4th International Symposium on Electrical and Electronics Engineering (ISEEE).

[12]  Yang Xu,et al.  A Blockchain-Based Nonrepudiation Network Computing Service Scheme for Industrial IoT , 2019, IEEE Transactions on Industrial Informatics.

[13]  Latifur Khan,et al.  A Machine Learning Approach to Android Malware Detection , 2012, 2012 European Intelligence and Security Informatics Conference.

[14]  Baojiang Cui,et al.  Hinge Classification Algorithm Based on Asynchronous Gradient Descent , 2017, BWCCA.

[15]  Yang Xu,et al.  Towards Secure Network Computing Services for Lightweight Clients Using Blockchain , 2018, Wirel. Commun. Mob. Comput..

[16]  Lalu Banoth,et al.  A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2017 .

[17]  Blaine Nelson,et al.  Support Vector Machines Under Adversarial Label Noise , 2011, ACML.

[18]  Quoc V. Le,et al.  Sequence to Sequence Learning with Neural Networks , 2014, NIPS.

[19]  Jie Wu,et al.  Dependable Structural Health Monitoring Using Wireless Sensor Networks , 2015, IEEE Transactions on Dependable and Secure Computing.

[20]  Jian Ma,et al.  A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering , 2010, Expert Syst. Appl..

[21]  Lovekesh Vig,et al.  Long Short Term Memory Networks for Anomaly Detection in Time Series , 2015, ESANN.

[22]  Jun Zhang,et al.  Network Traffic Classification Using Correlation Information , 2013, IEEE Transactions on Parallel and Distributed Systems.

[23]  Geoffrey E. Hinton,et al.  Large scale distributed neural network training through online distillation , 2018, ICLR.

[24]  Marc'Aurelio Ranzato,et al.  Large Scale Distributed Deep Networks , 2012, NIPS.

[25]  Sebastian Zander,et al.  A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification , 2006, CCRV.

[26]  Andrzej J. Kasinski,et al.  Supervised Learning in Spiking Neural Networks with ReSuMe: Sequence Learning, Classification, and Spike Shifting , 2010, Neural Computation.

[27]  Viktor K. Prasanna,et al.  Accelerating Decision Tree Based Traffic Classification on FPGA and Multicore Platforms , 2017, IEEE Transactions on Parallel and Distributed Systems.

[28]  Jie Wu,et al.  Sensing and Decision Making in Cyber-Physical Systems: The Case of Structural Event Monitoring , 2016, IEEE Transactions on Industrial Informatics.

[29]  Fadi A. Thabtah,et al.  Phishing detection: A recent intelligent machine learning comparison based on models content and features , 2017, 2017 IEEE International Conference on Intelligence and Security Informatics (ISI).