Jahanzaib Malik , Adnan Akhunzada , Ahmad Sami Al-Shamayleh , Sherali Zeadally , Ahmad Almogren
{"title":"Hybrid deep learning based threat intelligence framework for Industrial IoT systems","authors":"Jahanzaib Malik , Adnan Akhunzada , Ahmad Sami Al-Shamayleh , Sherali Zeadally , Ahmad Almogren","doi":"10.1016/j.jii.2025.100846","DOIUrl":null,"url":null,"abstract":"<div><div>The exponential growth of Industrial Internet of Things (IIoT) is a major driving force behind Industry 4.0. Besides complete automation and transformation, industrial IoT has so far created plenty of opportunities in several sectors 1.3such as smart manufacturing, energy, healthcare, smart agriculture, retail, supply chain, and transportation. However, the increased pervasiveness, reduced human involvement, resource-constrained nature of underlying IoT devices, dynamic and shared spectrum of 4G/5G communication, and reliance on the cloud for outsourced massive storage and computation bring novel security challenges and concerns. A significant challenge currently confronting the Industrial Internet of Things (IIoT) is the increasing prevalence of sophisticated IoT malware threats and attacks. To address this, the authors propose a hybrid threat intelligence framework that is not only highly scalable but also incorporates self-optimizing capabilities, enabling it to counteract a wide range of persistent cyber threats and attacks targeting IIoT systems. For a comprehensive evaluation, the authors utilized the state-of-the-art TON_IIoT dataset, which includes over 3 million instances representing various adversarial patterns and threat vectors. In addition, both standard and extended performance evaluation metrics were employed to ensure a thorough assessment. The proposed approach was also compared against several contemporary deep learning-based architectures and existing benchmark algorithms. The results indicate that the proposed method achieves superior detection accuracy, with only a minimal compromise in speed efficiency. Finally, a 10-fold cross-validation was conducted to provide an unbiased evaluation of the framework’s performance.</div></div>","PeriodicalId":55975,"journal":{"name":"Journal of Industrial Information Integration","volume":"45 ","pages":"Article 100846"},"PeriodicalIF":10.4000,"publicationDate":"2025-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Industrial Information Integration","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2452414X25000706","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS","Score":null,"Total":0}
引用次数: 0
Abstract
The exponential growth of Industrial Internet of Things (IIoT) is a major driving force behind Industry 4.0. Besides complete automation and transformation, industrial IoT has so far created plenty of opportunities in several sectors 1.3such as smart manufacturing, energy, healthcare, smart agriculture, retail, supply chain, and transportation. However, the increased pervasiveness, reduced human involvement, resource-constrained nature of underlying IoT devices, dynamic and shared spectrum of 4G/5G communication, and reliance on the cloud for outsourced massive storage and computation bring novel security challenges and concerns. A significant challenge currently confronting the Industrial Internet of Things (IIoT) is the increasing prevalence of sophisticated IoT malware threats and attacks. To address this, the authors propose a hybrid threat intelligence framework that is not only highly scalable but also incorporates self-optimizing capabilities, enabling it to counteract a wide range of persistent cyber threats and attacks targeting IIoT systems. For a comprehensive evaluation, the authors utilized the state-of-the-art TON_IIoT dataset, which includes over 3 million instances representing various adversarial patterns and threat vectors. In addition, both standard and extended performance evaluation metrics were employed to ensure a thorough assessment. The proposed approach was also compared against several contemporary deep learning-based architectures and existing benchmark algorithms. The results indicate that the proposed method achieves superior detection accuracy, with only a minimal compromise in speed efficiency. Finally, a 10-fold cross-validation was conducted to provide an unbiased evaluation of the framework’s performance.
期刊介绍:
The Journal of Industrial Information Integration focuses on the industry's transition towards industrial integration and informatization, covering not only hardware and software but also information integration. It serves as a platform for promoting advances in industrial information integration, addressing challenges, issues, and solutions in an interdisciplinary forum for researchers, practitioners, and policy makers.
The Journal of Industrial Information Integration welcomes papers on foundational, technical, and practical aspects of industrial information integration, emphasizing the complex and cross-disciplinary topics that arise in industrial integration. Techniques from mathematical science, computer science, computer engineering, electrical and electronic engineering, manufacturing engineering, and engineering management are crucial in this context.