Amazing technological breakthrough possible @S-Logix pro@slogix.in

Office Address

  • #5, First Floor, 4th Street Dr. Subbarayan Nagar Kodambakkam, Chennai-600 024 Landmark : Samiyar Madam
  • pro@slogix.in
  • +91- 81240 01111

Social List

Identification of malicious activities in industrial internet of things based on deep learning models - 2018

Identification Of Malicious Activities In Industrial Internet Of Things Based On Deep Learning Models

Research Paper on Identification Of Malicious Activities In Industrial Internet Of Things Based On Deep Learning Models

Research Area:  Machine Learning

Abstract:

Internet Industrial Control Systems (IICSs) that connect technological appliances and services with physical systems have become a new direction of research as they face different types of cyber-attacks that threaten their success in providing continuous services to organizations. Such threats cause firms to suffer financial and reputational losses and the stealing of important information. Although Network Intrusion Detection Systems (NIDSs) have been proposed to protect against them, they have the difficult task of collecting information for use in developing an intelligent NIDS which can proficiently detect existing and new attacks. In order to address this challenge, this paper proposes an anomaly detection technique for IICSs based on deep learning models that can learn and validate using information collected from TCP/IP packets. It includes a consecutive training process executed using a deep auto-encoder and deep feedforward neural network architecture which is evaluated using two well-known network datasets, namely, the NSL-KDD and UNSW-NB15. As the experimental results demonstrate that this technique can achieve a higher detection rate and lower false positive rate than eight recently developed techniques, it could be implemented in real IICS environments.

Keywords:  
Malicious Activities
Industrial Internet Of Things
Deep Learning Models
Machine Learning

Author(s) Name:  MunaAL-Hawawreh,Nour Moustafa and Elena Sitnikova

Journal name:  Journal of Information Security and Applications

Conferrence name:  

Publisher name:  ELSEVIER

DOI:  10.1016/j.jisa.2018.05.002

Volume Information:  Volume 41, August 2018, Pages 1-11