R. Vijay Anand, G. Magesh, I. Alagiri, Madala Guru Brahmam, C. Senthil Kumar, M. Kesavan, Azween Bin Abdullah
{"title":"Industrial Internet of Things Cyber Threats Detection Through Deep Feature Learning and Stacked Sparse Autoencoder Based Classification","authors":"R. Vijay Anand, G. Magesh, I. Alagiri, Madala Guru Brahmam, C. Senthil Kumar, M. Kesavan, Azween Bin Abdullah","doi":"10.1002/ett.70224","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>In recent times, the industrial system has integrated with industrial Internet of Things (IoT) applications to enable the ease of production process and ensure worker safety. Security is a major concern in the industrial Internet of Things (IIoT) environment owing to the distributed nature of architecture and dynamic traffic flows. Generally, the cyber-attack detection model is classified as misuse and anomaly detection. The misuse detection method is employed based on the concept of signature matching, and the anomaly method is based on the detection of known and unknown attacks. Present security models have realized the issue of over-fitting, low classification accuracy, and a high false positive rate when given a massive volume of network traffic data. The proposed work focused on “IIoT cyber-attack detection using lightweight hybrid deep learning algorithm” to identify intrusion. At first, the data imbalance problem is resolved through the Euclidean-based synthetic minority oversampling technique (EbSmoT) to prevent the model from becoming biased toward one class. Then, the Information Gain and Fisher score-based technique (IG-FST) is employed to eliminate redundant features and avoid overfitting problems during training. Moreover, the Bi-LSTM ResNet-based convolutional autoencoder (BR-CAE) is executed to obtain higher-level feature representation. Finally, a Stacked Sparse autoencoder-based Particle Swarm Probabilistic Neural Network (SAE-PSPNN) is used for attack detection and classification. The performance of the proposed method can be evaluated using several performance metrics through two different datasets, such as the UNSW-NB15 dataset and the ToN_IoT dataset. The proposed framework achieved an accuracy of 99.86% on the ToN_IoT dataset and 99.62% on the UNSW-NB15 dataset.</p>\n </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 9","pages":""},"PeriodicalIF":2.5000,"publicationDate":"2025-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Transactions on Emerging Telecommunications Technologies","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/ett.70224","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0
Abstract
In recent times, the industrial system has integrated with industrial Internet of Things (IoT) applications to enable the ease of production process and ensure worker safety. Security is a major concern in the industrial Internet of Things (IIoT) environment owing to the distributed nature of architecture and dynamic traffic flows. Generally, the cyber-attack detection model is classified as misuse and anomaly detection. The misuse detection method is employed based on the concept of signature matching, and the anomaly method is based on the detection of known and unknown attacks. Present security models have realized the issue of over-fitting, low classification accuracy, and a high false positive rate when given a massive volume of network traffic data. The proposed work focused on “IIoT cyber-attack detection using lightweight hybrid deep learning algorithm” to identify intrusion. At first, the data imbalance problem is resolved through the Euclidean-based synthetic minority oversampling technique (EbSmoT) to prevent the model from becoming biased toward one class. Then, the Information Gain and Fisher score-based technique (IG-FST) is employed to eliminate redundant features and avoid overfitting problems during training. Moreover, the Bi-LSTM ResNet-based convolutional autoencoder (BR-CAE) is executed to obtain higher-level feature representation. Finally, a Stacked Sparse autoencoder-based Particle Swarm Probabilistic Neural Network (SAE-PSPNN) is used for attack detection and classification. The performance of the proposed method can be evaluated using several performance metrics through two different datasets, such as the UNSW-NB15 dataset and the ToN_IoT dataset. The proposed framework achieved an accuracy of 99.86% on the ToN_IoT dataset and 99.62% on the UNSW-NB15 dataset.
期刊介绍:
ransactions on Emerging Telecommunications Technologies (ETT), formerly known as European Transactions on Telecommunications (ETT), has the following aims:
- to attract cutting-edge publications from leading researchers and research groups around the world
- to become a highly cited source of timely research findings in emerging fields of telecommunications
- to limit revision and publication cycles to a few months and thus significantly increase attractiveness to publish
- to become the leading journal for publishing the latest developments in telecommunications