Dissemination control in dynamic data clustering for dense IIoT against false data injection attack

IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS
Carlos Pedroso, Aldri Santos
{"title":"Dissemination control in dynamic data clustering for dense IIoT against false data injection attack","authors":"Carlos Pedroso,&nbsp;Aldri Santos","doi":"10.1002/nem.2201","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>The Internet of Things (IoT) has made possible the development of increasingly driven services, like industrial Industrial Internet of Things (IIoT) services, that often deal with massive amounts of data. Meantime, as IIoT networks grow, the threats are even greater, and false data injection (FDI) attacks stand out as being one of the most aggressive. The majority of current solutions to handle this attack do not take into account the data validation, especially on the data clustering service. Aiming to advance on the issue, this work introduces <i><b>CON</b></i>sensus Based Data <i><b>FI</b></i><i>lteri</i><i><b>N</b></i>g for I<i><b>I</b></i>o<i><b>T</b></i> (CONFINIT), an intrusion detection system for mitigating FDI attacks on the data dissemination service performing in dense IIoT networks. CONFINIT combines watchdog surveillance and collaborative consensus strategies for assertively excluding various FDI attacks. The simulations showed that CONFINIT compared with Dynamic Data-aware Firefly-based Clustering (DDFC) increased by up to 35%–40% the number of clusters without attackers in a gas pressure IIoT environment. CONFINIT achieved attack detection rates (DRs) of 99%, accuracy of 90, and F1 score of 0.81 in multiple IIoT scenarios, with only up to 3.2% and 3.6% of false negatives and positives rates, respectively. Moreover, under two variants of FDI attacks, called Churn and Sensitive attacks, CONFINIT achieved DRs of 100%, accuracy of 99, and F1 of 0.93 with less than 2% of false positives and negatives rates.</p>\n </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"32 5","pages":""},"PeriodicalIF":1.5000,"publicationDate":"2022-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Network Management","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/nem.2201","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 3

Abstract

The Internet of Things (IoT) has made possible the development of increasingly driven services, like industrial Industrial Internet of Things (IIoT) services, that often deal with massive amounts of data. Meantime, as IIoT networks grow, the threats are even greater, and false data injection (FDI) attacks stand out as being one of the most aggressive. The majority of current solutions to handle this attack do not take into account the data validation, especially on the data clustering service. Aiming to advance on the issue, this work introduces CONsensus Based Data FIlteriNg for IIoT (CONFINIT), an intrusion detection system for mitigating FDI attacks on the data dissemination service performing in dense IIoT networks. CONFINIT combines watchdog surveillance and collaborative consensus strategies for assertively excluding various FDI attacks. The simulations showed that CONFINIT compared with Dynamic Data-aware Firefly-based Clustering (DDFC) increased by up to 35%–40% the number of clusters without attackers in a gas pressure IIoT environment. CONFINIT achieved attack detection rates (DRs) of 99%, accuracy of 90, and F1 score of 0.81 in multiple IIoT scenarios, with only up to 3.2% and 3.6% of false negatives and positives rates, respectively. Moreover, under two variants of FDI attacks, called Churn and Sensitive attacks, CONFINIT achieved DRs of 100%, accuracy of 99, and F1 of 0.93 with less than 2% of false positives and negatives rates.

面向密集工业物联网的动态数据聚类传播控制,防范虚假数据注入攻击
物联网(IoT)使越来越多的驱动服务的发展成为可能,例如工业工业物联网(IIoT)服务,这些服务通常处理大量数据。与此同时,随着工业物联网网络的发展,威胁甚至更大,虚假数据注入(FDI)攻击是最具侵略性的攻击之一。目前处理这种攻击的大多数解决方案都没有考虑数据验证,特别是在数据集群服务上。为了推进这一问题,本工作引入了基于共识的工业物联网数据过滤(CONFINIT),这是一种入侵检测系统,用于减轻对密集工业物联网网络中执行的数据传播服务的FDI攻击。CONFINIT结合了监督监督和协作共识战略,以果断地排除各种FDI攻击。仿真结果表明,与动态数据感知萤火虫集群(DDFC)相比,CONFINIT在气体压力IIoT环境中无攻击者的集群数量增加了35%-40%。在多种工业物联网场景下,CONFINIT的攻击检测率(dr)达到99%,准确率为90,F1得分为0.81,假阴性和假阳性率分别高达3.2%和3.6%。此外,在FDI攻击的两种变体(即“干扰攻击”和“敏感攻击”)下,CONFINIT的dr值为100%,准确率为99,F1值为0.93,假阳性和假阴性率均低于2%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
International Journal of Network Management
International Journal of Network Management COMPUTER SCIENCE, INFORMATION SYSTEMS-TELECOMMUNICATIONS
CiteScore
5.10
自引率
6.70%
发文量
25
审稿时长
>12 weeks
期刊介绍: Modern computer networks and communication systems are increasing in size, scope, and heterogeneity. The promise of a single end-to-end technology has not been realized and likely never will occur. The decreasing cost of bandwidth is increasing the possible applications of computer networks and communication systems to entirely new domains. Problems in integrating heterogeneous wired and wireless technologies, ensuring security and quality of service, and reliably operating large-scale systems including the inclusion of cloud computing have all emerged as important topics. The one constant is the need for network management. Challenges in network management have never been greater than they are today. The International Journal of Network Management is the forum for researchers, developers, and practitioners in network management to present their work to an international audience. The journal is dedicated to the dissemination of information, which will enable improved management, operation, and maintenance of computer networks and communication systems. The journal is peer reviewed and publishes original papers (both theoretical and experimental) by leading researchers, practitioners, and consultants from universities, research laboratories, and companies around the world. Issues with thematic or guest-edited special topics typically occur several times per year. Topic areas for the journal are largely defined by the taxonomy for network and service management developed by IFIP WG6.6, together with IEEE-CNOM, the IRTF-NMRG and the Emanics Network of Excellence.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信