A Novel Classifier for Cyber Attack Detection System in Industrial Internet of Things

Fathe Jeribi
{"title":"A Novel Classifier for Cyber Attack Detection System in Industrial Internet of Things","authors":"Fathe Jeribi","doi":"10.5455/jeas.2022110103","DOIUrl":null,"url":null,"abstract":"The usage of the Internet of Things (IoT) conception in the industrial sector along with applications is referred to as the Industrial Internet of Things (IIoT). Various applications have been subsumed in the IIoT. Nevertheless, cybercriminals mostly target these systems. Thus, here, a novel methodology of Cyber Attack Detection (CAD) system has been proposed in IIoT to overcome the aforementioned issue. UNSW-NB2015 and DS2OS are the two IIoT datasets utilized in this work. Initially, in both datasets, the missing values are replaced; subsequently, the feature extraction is performed. Next, by utilizing Poisson Distribution-based Naked Mole Rat Optimization Algorithm (PD-NMROA), the significant features are selected as of both datasets. After that, by employing MaHalanobis distance-based K-Means (MaH-KMeans) algorithm, the features extracted as of the datasets are normalized along with clustered. Eventually, to classify the data, the clustered features are inputted to the TanSwish - Restricted Boltzmann Dense Machines (TS-RBDMs). The experiential outcomes displayed that the proposed methodology obtained higher efficacy in contrast to the prevailing systems.","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"3 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Engineering and Applied Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5455/jeas.2022110103","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The usage of the Internet of Things (IoT) conception in the industrial sector along with applications is referred to as the Industrial Internet of Things (IIoT). Various applications have been subsumed in the IIoT. Nevertheless, cybercriminals mostly target these systems. Thus, here, a novel methodology of Cyber Attack Detection (CAD) system has been proposed in IIoT to overcome the aforementioned issue. UNSW-NB2015 and DS2OS are the two IIoT datasets utilized in this work. Initially, in both datasets, the missing values are replaced; subsequently, the feature extraction is performed. Next, by utilizing Poisson Distribution-based Naked Mole Rat Optimization Algorithm (PD-NMROA), the significant features are selected as of both datasets. After that, by employing MaHalanobis distance-based K-Means (MaH-KMeans) algorithm, the features extracted as of the datasets are normalized along with clustered. Eventually, to classify the data, the clustered features are inputted to the TanSwish - Restricted Boltzmann Dense Machines (TS-RBDMs). The experiential outcomes displayed that the proposed methodology obtained higher efficacy in contrast to the prevailing systems.
工业物联网网络攻击检测系统的分类器
物联网(IoT)概念在工业领域的使用以及应用被称为工业物联网(IIoT)。工业物联网中包含了各种应用。然而,网络犯罪分子主要针对这些系统。因此,本文在IIoT中提出了一种新的网络攻击检测(CAD)系统方法来克服上述问题。UNSW-NB2015和ds20s是本工作中使用的两个工业物联网数据集。最初,在两个数据集中,缺失的值被替换;随后,进行特征提取。接下来,利用基于泊松分布的裸鼹鼠优化算法(PD-NMROA),选择两个数据集的显著特征。然后,采用MaHalanobis基于距离的K-Means (MaH-KMeans)算法,对提取的数据集特征进行归一化聚类。最后,为了对数据进行分类,将聚类特征输入到TanSwish - Restricted Boltzmann Dense Machines (ts - rbdm)中。经验结果表明,与现行系统相比,所提出的方法获得了更高的功效。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信