Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Automated cyberattack detection using optimal ensemble deep learning model

Published: 14 November 2023 Publication History

Abstract

In recent times, the Industrial Internet of Things (IIoT) has developed significantly. In the application of automation, and intelligence, industrial digitalization introduced cyber risks, and the varied and complex industrial IoT platform presented a novel attack surface for network invaders. Several Intrusion Detection Systems (IDS) were advanced recently as many computer networks exposure to privacy and security threats. Availability, Data confidentiality, and integrity, the damage will happen in case of IDS prevention failure. Traditional methods were ineffective in dealing with advanced attacks. Advanced deep learning (DL) methods were designed for automatic ID and abnormal behavior detection of networks. Therefore, this article focuses on the design of Improved Reptile Search Optimization with Ensemble Deep Learning based Cybersecurity (IRSO‐EDLCS) technique in the IIoT environment. The major aim of the IRSO‐EDLCS technique lies in the accurate identification of cyberattacks in the IIoT environment. To accomplish this, the presented IRSO‐EDLCS technique performs IRSO algorithm‐based feature selection (IRSO‐FS) technique. In addition, the IRSO‐EDLCS technique performs an ensemble of three DL models namely deep belief network (DBN), bidirectional gated recurrent unit (BiGRU), and autoencoder (AE). The hyperparameter tuning process is performed by a modified gray wolf optimizer (MGWO) to enhance detection process. To exhibit the improved performance of the IRSO‐EDLCS algorithm, a wide range of simulations were performed on the benchmark database. The experimental outcomes depict the betterment of the IRSO‐EDLCS technique over other existing models.

Graphical Abstract

Traditional security methods have proven ineffective in dealing with advanced cyberattacks. As a response to these evolving threats, advanced deep learning techniques have been designed for automatic intrusion detection and abnormal behavior analysis within networks. This article is focused on the development of an innovative cybersecurity solution called Improved Reptile Search Optimization with Ensemble Deep Learning for Cybersecurity in the IIoT Environment. The primary objective of the proposed model is to accurately identify and mitigate cyberattacks in the IIoT environment. The experimental results clearly indicate that the proposed algorithm outperforms existing models in accurately identifying and mitigating cyber threats within the IIoT environment.

References

[1]
Corallo A, Lazoi M, Lezzi M, Luperto A. Cybersecurity awareness in the context of the industrial internet of things: a systematic literature review. Comput Ind. 2022;137:103614.
[2]
Raimundo RJ, Rosário AT. Cybersecurity in the internet of things in industrial management. Appl Sci. 2022;12(3):1598.
[3]
Abdullahi M, Baashar Y, Alhussian H, et al. Detecting cybersecurity attacks in internet of things using artificial intelligence methods: a systematic literature review. Electronics. 2022;11(2):198.
[4]
Rudenko R, Pires IM, Oliveira P, Barroso J, Reis A. A brief review on internet of things, industry 4.0 and cybersecurity. Electronics. 2022;11(11):1742.
[5]
Ghimire B, Rawat DB. Recent advances on federated learning for cybersecurity and cybersecurity for federated learning for internet of things. IEEE Internet Things J. 2022;9:8229‐8249.
[6]
Ahmad W, Rasool A, Javed AR, Baker T, Jalil Z. Cyber security in iot‐based cloud computing: a comprehensive survey. Electronics. 2022;11(1):16.
[7]
Ferrag MA, Friha O, Maglaras L, Janicke H, Shu L. Federated deep learning for cyber security in the internet of things: concepts, applications, and experimental analysis. IEEE Access. 2021;9:138509‐138542.
[8]
Bresniker K, Gavrilovska A, Holt J, Milojicic D, Tran T. Grand challenge: applying artificial intelligence and machine learning to cybersecurity. Computer. 2019;52(12):45‐52.
[9]
Lackner M, Markl E, Aburaia M. Cybersecurity management for (industrial) internet of things–challenges and opportunities. J Informat Technol Software Eng. 2018;8(5):1‐9.
[10]
Gardašević G, Berbakov L, Mastilović A. Cybersecurity of industrial internet of things. Cyber Security of Industrial Control Systems in the Future Internet Environment. IGI Global; 2020:47‐68.
[11]
Kim HM, Lee KH. IIoT malware detection using edge computing and deep learning for cybersecurity in smart factories. Appl Sci. 2022;12(15):7679.
[12]
Ullah F, Naeem H, Jabbar S, et al. Cyber security threats detection in internet of things using deep learning approach. IEEE Access. 2019;7:124379‐124389.
[13]
Vijayakumaran C, Muthusenthil B, Manickavasagam B. A reliable next generation cyber security architecture for industrial internet of things environment. Int J Electric Comput Eng. 2020;10(1):387.
[14]
Ferrag MA, Friha O, Hamouda D, Maglaras L, Janicke H. Edge‐IIoTset: a new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning. IEEE Access. 2022;10:40281‐40306.
[15]
Lucio YIL, Villalba KM, Donado SA. Adaptive blockchain technology for a cybersecurity framework in IIoT. IEEE Rev Iberoam de Tecnol del Aprendiz. 2022;17(2):178‐184.
[16]
Sánchez J, Mallorquí A, Briones A, Zaballos A, Corral G. An integral pedagogical strategy for teaching and learning IoT cybersecurity. Sensors. 2020;20(14):3970.
[17]
Huma ZE, Latif S, Ahmad J, et al. A hybrid deep random neural network for cyberattack detection in the industrial internet of things. IEEE Access. 2021;9:55595‐55605.
[18]
Khan MK, Zafar MH, Rashid S, Mansoor M, Moosavi SKR, Sanfilippo F. Improved reptile search optimization algorithm: application on regression and classification problems. Appl Sci. 2023;13(2):945.
[19]
Nandakumar P, Narayan S. Cardiac disease detection using cuckoo search enabled deep belief network. Intell Syst Appl. 2022;16:200131.
[20]
Khandelwal A, Ramya RS, Ayushi S, et al. Tropical Cyclone Tracking and Forecasting Using BiGRU [TCTFB]. 2022.
[21]
Lian J, Dong P, Zhang Y, Pan J. A novel deep learning approach for tropical cyclone track prediction based on auto‐encoder and gated recurrent unit networks. Appl Sci. 2020;10(11):3965.
[22]
Arafat MY, Pan S, Bak E. Distributed energy‐efficient clustering and routing for wearable IoT enabled wireless body area networks. IEEE Access. 2023;11:5047‐5061.
[23]
Tharewal S, Ashfaque MW, Banu SS, Uma P, Hassen SM, Shabaz M. Intrusion detection system for industrial internet of things based on deep reinforcement learning. Wireless Commun Mobile Comput. 2022;2022:2022.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Transactions on Emerging Telecommunications Technologies
Transactions on Emerging Telecommunications Technologies  Volume 35, Issue 4
April 2024
1096 pages
EISSN:2161-3915
DOI:10.1002/ett.v35.4
Issue’s Table of Contents

Publisher

John Wiley & Sons, Inc.

United States

Publication History

Published: 14 November 2023

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 29 Nov 2024

Other Metrics

Citations

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media