{"title":"Robust Attack Detection Framework Using Pretrained CNN Model for the Edge Industrial IoT Networks","authors":"Ibtihal A. Alablani, Mohammed J. F. Alenazi","doi":"10.1002/cpe.70206","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>The rapid expansion of edge industrial Internet of things (Edge-IIoT) has transformed industrial operations while introducing critical security challenges at the network edge. The growing sophistication of cyber attacks targeting Edge-IIoT networks, particularly in resource-constrained industrial environments, necessitates advanced detection mechanisms capable of identifying and classifying diverse attack patterns at the edge. This article presents a comprehensive edge-centric attack detection framework leveraging pretrained deep learning models for securing Edge-IIoT networks. Our methodology uses five state-of-the-art pretrained models, GoogleNet, AlexNet, EfficientNetB0, ResNet50, and MobileNet, evaluated on the Edge-IIoTset dataset comprising 2,219,201 network flow samples across 15 distinct attack classes. The framework efficiently processes many input features extracted from edge network traffic, including basic network characteristics, protocol headers, and industrial application-level attributes specific to Edge-IIoT environments. The experimental results demonstrate that GoogleNet achieves the highest accuracy of 97% and lowest performance degradation compared to other pretrained models with AlexNet at 96.85%, EfficientNetB0 at 96.81%, ResNet50 at 96.7%, and MobileNet at 96.42% in edge environments. Furthermore, our proposed approach significantly outperforms existing Edge-IIoT security studies using the same dataset by up to 4.2%.</p>\n </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 21-22","pages":""},"PeriodicalIF":1.5000,"publicationDate":"2025-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Concurrency and Computation-Practice & Experience","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/cpe.70206","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, SOFTWARE ENGINEERING","Score":null,"Total":0}
引用次数: 0
Abstract
The rapid expansion of edge industrial Internet of things (Edge-IIoT) has transformed industrial operations while introducing critical security challenges at the network edge. The growing sophistication of cyber attacks targeting Edge-IIoT networks, particularly in resource-constrained industrial environments, necessitates advanced detection mechanisms capable of identifying and classifying diverse attack patterns at the edge. This article presents a comprehensive edge-centric attack detection framework leveraging pretrained deep learning models for securing Edge-IIoT networks. Our methodology uses five state-of-the-art pretrained models, GoogleNet, AlexNet, EfficientNetB0, ResNet50, and MobileNet, evaluated on the Edge-IIoTset dataset comprising 2,219,201 network flow samples across 15 distinct attack classes. The framework efficiently processes many input features extracted from edge network traffic, including basic network characteristics, protocol headers, and industrial application-level attributes specific to Edge-IIoT environments. The experimental results demonstrate that GoogleNet achieves the highest accuracy of 97% and lowest performance degradation compared to other pretrained models with AlexNet at 96.85%, EfficientNetB0 at 96.81%, ResNet50 at 96.7%, and MobileNet at 96.42% in edge environments. Furthermore, our proposed approach significantly outperforms existing Edge-IIoT security studies using the same dataset by up to 4.2%.
期刊介绍:
Concurrency and Computation: Practice and Experience (CCPE) publishes high-quality, original research papers, and authoritative research review papers, in the overlapping fields of:
Parallel and distributed computing;
High-performance computing;
Computational and data science;
Artificial intelligence and machine learning;
Big data applications, algorithms, and systems;
Network science;
Ontologies and semantics;
Security and privacy;
Cloud/edge/fog computing;
Green computing; and
Quantum computing.