{"title":"利用深度信念网络与卷积神经网络的集成,在工业物联网上实现人工智能驱动的网络攻击检测系统","authors":"","doi":"10.1016/j.aej.2024.10.009","DOIUrl":null,"url":null,"abstract":"<div><div>In Industry 4.0, information and communication technology (ICT) was employed in numerous significant infrastructures, like financial networks, smart factories, and power plants, to automate and certify industrial systems. In power control systems, ICT technologies such as IIoT have improved automated monitoring, but legacy methods, originally autonomous, now connect with external networks. This progress has presented safety vulnerabilities from legacy ICT systems. Hence, various cybersecurity approaches are developed and examined to deal with cyberattacks and vulnerabilities. Utilizing new cybersecurity models in power control systems poses risks due to their uncertified safety. Ensuring their stability and efficiency is significant for maintaining reliable power delivery and incorporating these technologies into power control systems. Therefore, this study designs a Next–Generation Cybersecurity Attack Detection using an ensemble deep learning model (NGCAD-EDLM) technique in the IIoT environment. The main cause of the NGCAD-EDLM technique is the automatic recognition of cyber-attacks. In the NGCAD-EDLM approach, the primary data normalization phase utilizing min-max normalization is performed. Next, the honey-badger algorithm (HBA) approach selects the feature subsets. Furthermore, an ensemble deep learning (DL) of two methods, namely convolutional neural networks (CNNs) and deep belief networks (DBNs) methods, are employed for classification. In addition, the DL techniques' hyperparameter selection is accomplished using the lotus effect optimization algorithm (LEOA) method. A complete set of simulation validation is performed to establish the experimental analysis of the NGCAD-EDLM method. The performance validation of the NGCAD-EDLM method exhibited a superior accuracy value of 99.21 % over other existing techniques.</div></div>","PeriodicalId":7484,"journal":{"name":"alexandria engineering journal","volume":null,"pages":null},"PeriodicalIF":6.2000,"publicationDate":"2024-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Artificial intelligence driven cyberattack detection system using integration of deep belief network with convolution neural network on industrial IoT\",\"authors\":\"\",\"doi\":\"10.1016/j.aej.2024.10.009\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>In Industry 4.0, information and communication technology (ICT) was employed in numerous significant infrastructures, like financial networks, smart factories, and power plants, to automate and certify industrial systems. In power control systems, ICT technologies such as IIoT have improved automated monitoring, but legacy methods, originally autonomous, now connect with external networks. This progress has presented safety vulnerabilities from legacy ICT systems. Hence, various cybersecurity approaches are developed and examined to deal with cyberattacks and vulnerabilities. Utilizing new cybersecurity models in power control systems poses risks due to their uncertified safety. Ensuring their stability and efficiency is significant for maintaining reliable power delivery and incorporating these technologies into power control systems. Therefore, this study designs a Next–Generation Cybersecurity Attack Detection using an ensemble deep learning model (NGCAD-EDLM) technique in the IIoT environment. The main cause of the NGCAD-EDLM technique is the automatic recognition of cyber-attacks. In the NGCAD-EDLM approach, the primary data normalization phase utilizing min-max normalization is performed. Next, the honey-badger algorithm (HBA) approach selects the feature subsets. Furthermore, an ensemble deep learning (DL) of two methods, namely convolutional neural networks (CNNs) and deep belief networks (DBNs) methods, are employed for classification. In addition, the DL techniques' hyperparameter selection is accomplished using the lotus effect optimization algorithm (LEOA) method. A complete set of simulation validation is performed to establish the experimental analysis of the NGCAD-EDLM method. The performance validation of the NGCAD-EDLM method exhibited a superior accuracy value of 99.21 % over other existing techniques.</div></div>\",\"PeriodicalId\":7484,\"journal\":{\"name\":\"alexandria engineering journal\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":6.2000,\"publicationDate\":\"2024-10-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"alexandria engineering journal\",\"FirstCategoryId\":\"5\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1110016824011645\",\"RegionNum\":2,\"RegionCategory\":\"工程技术\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"ENGINEERING, MULTIDISCIPLINARY\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"alexandria engineering journal","FirstCategoryId":"5","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1110016824011645","RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, MULTIDISCIPLINARY","Score":null,"Total":0}
Artificial intelligence driven cyberattack detection system using integration of deep belief network with convolution neural network on industrial IoT
In Industry 4.0, information and communication technology (ICT) was employed in numerous significant infrastructures, like financial networks, smart factories, and power plants, to automate and certify industrial systems. In power control systems, ICT technologies such as IIoT have improved automated monitoring, but legacy methods, originally autonomous, now connect with external networks. This progress has presented safety vulnerabilities from legacy ICT systems. Hence, various cybersecurity approaches are developed and examined to deal with cyberattacks and vulnerabilities. Utilizing new cybersecurity models in power control systems poses risks due to their uncertified safety. Ensuring their stability and efficiency is significant for maintaining reliable power delivery and incorporating these technologies into power control systems. Therefore, this study designs a Next–Generation Cybersecurity Attack Detection using an ensemble deep learning model (NGCAD-EDLM) technique in the IIoT environment. The main cause of the NGCAD-EDLM technique is the automatic recognition of cyber-attacks. In the NGCAD-EDLM approach, the primary data normalization phase utilizing min-max normalization is performed. Next, the honey-badger algorithm (HBA) approach selects the feature subsets. Furthermore, an ensemble deep learning (DL) of two methods, namely convolutional neural networks (CNNs) and deep belief networks (DBNs) methods, are employed for classification. In addition, the DL techniques' hyperparameter selection is accomplished using the lotus effect optimization algorithm (LEOA) method. A complete set of simulation validation is performed to establish the experimental analysis of the NGCAD-EDLM method. The performance validation of the NGCAD-EDLM method exhibited a superior accuracy value of 99.21 % over other existing techniques.
期刊介绍:
Alexandria Engineering Journal is an international journal devoted to publishing high quality papers in the field of engineering and applied science. Alexandria Engineering Journal is cited in the Engineering Information Services (EIS) and the Chemical Abstracts (CA). The papers published in Alexandria Engineering Journal are grouped into five sections, according to the following classification:
• Mechanical, Production, Marine and Textile Engineering
• Electrical Engineering, Computer Science and Nuclear Engineering
• Civil and Architecture Engineering
• Chemical Engineering and Applied Sciences
• Environmental Engineering