Enhancing Cybersecurity in Industrial Through AI-Based Traffic Monitoring IoT Networks and Classification
DOI:
https://doi.org/10.63282/3050-9262.IJAIDSML-V3I3P108Keywords:
Industrial IoT (IIoT), Cybersecurity, Intrusion Detection, LSTM, Deep Learning, Traffic Classification, Bot-IoT Dataset, Machine Learning, Anomaly DetectionAbstract
Industrial Internet of Things (IIoT) networks are very important to modern industry because they make it possible to watch, manage, and improve processes as they happen. As IoT systems are connected to each other, they can be attacked online, have system failures, and have trouble talking to each other. This paper proposes an AI-based traffic monitoring and classification framework to enhance cybersecurity in IIoT environments. Utilizing Bot-IoT datasets, the proposed system applies a Long Short-Term Memory (LSTM) model for real-time intrusion detection and threat classification. The methodology includes comprehensive data preprocessing techniques such as data cleaning, timestamp handling, one-hot encoding, feature selection, and normalization to ensure model robustness and accuracy. The LSTM model does better in experiments than common predictors like Random Forest and Naïve Bayes, with an F1-score of 99.87%, an accuracy of 99.74%, a precision of 99.99%, a recall of 99.75%, and an actual accuracy of 99.74%. These outcomes validate the effectiveness of deep learning in identifying and mitigating cyber threats in IIoT networks. The proposed model lays the groundwork for integrating intelligent cybersecurity mechanisms into future IIoT infrastructures to improve resilience and operational safety
References
[1] H. Chen, M. Hu, H. Yan, and P. Yu, “Research on industrial internet of things security architecture and protection strategy,” in Proceedings - 2019 International Conference on Virtual Reality and Intelligent Systems, ICVRIS 2019, 2019. doi: 10.1109/ICVRIS.2019.00095.
[2] Y. N. Soe, Y. Feng, P. I. Santosa, R. Hartanto, and K. Sakurai, “Rule Generation for Signature Based Detection Systems of Cyber Attacks in IoT Environments,” Bull. Networking, Comput. Syst. Softw., 2019.
[3] S. S. S. Neeli, “The Significance of NoSQL Databases: Strategic Business Approaches and Management Techniques,” J. Adv. Dev. Res., vol. 10, no. 1, p. 11, 2019.
[4] O. Ibitoye, O. Shafiq, and A. Matrawy, “Analyzing adversarial attacks against deep learning for intrusion detection in IoT networks,” in Proceedings - IEEE Global Communications Conference, GLOBECOM, 2019. doi: 10.1109/GLOBECOM38437.2019.9014337.
[5] A. Immadisetty, “Edge Analytics vs. Cloud Analytics: Tradeoffs in Real-Time Data Processing,” J. Recent Trends Comput. Sci. Eng., vol. 13, no. 1, pp. 42–52, 2016.
[6] S. S. S. Neeli, “Serverless Databases : A Cost-Effective and Scalable Solution,” IJIRMPS, vol. 7, no. 6, 2019.
[7] M. Shafiq, X. Yu, A. K. Bashir, H. N. Chaudhry, and D. Wang, “A machine learning approach for feature selection traffic classification using security analysis,” J. Supercomput., 2018, doi: 10.1007/s11227-018-2263-3.
[8] J. Q. Gandhi Krishna, “Implementation Problems Facing Network Function Virtualization and Solutions,” IARIA, pp. 70–76, 2018.
[9] A. Dawoud, S. Shahristani, and C. Raun, “Deep learning for network anomalies detection,” in Proceedings - International Conference on Machine Learning and Data Engineering, iCMLDE 2018, 2019. doi: 10.1109/iCMLDE.2018.00035.
[10] A. Nagisetty and G. P. Gupta, “Framework for detection of malicious activities in IoT networks using keras deep learning library,” in Proceedings of the 3rd International Conference on Computing Methodologies and Communication, ICCMC 2019, 2019. doi: 10.1109/ICCMC.2019.8819688.
[11] M. Zolanvari, M. A. Teixeira, and R. Jain, “Effect of imbalanced datasets on security of industrial IoT using machine learning,” in 2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018, 2018. doi: 10.1109/ISI.2018.8587389.
[12] Y. Jin, W. Xu, P. Wang, and J. Yan, “SAE Network: A Deep Learning Method for Traffic Flow Prediction,” in 2018 International Conference on Information, Cybernetics, and Computational Social Systems, ICCSS 2018, 2018. doi: 10.1109/ICCSS.2018.8572451.
[13] P. Kaushik, S. Singh, and P. Yadav, “Traffic Prediction in Telecom Systems Using Deep Learning,” in 2018 7th International Conference on Reliability, Infocom Technologies and Optimization: Trends and Future Directions, ICRITO 2018, 2018. doi: 10.1109/ICRITO.2018.8748386.
[14] C. W. Huang, C. T. Chiang, and Q. Li, “A study of deep learning networks on mobile traffic forecasting,” in IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, 2017. doi: 10.1109/PIMRC.2017.8292737.
[15] O. Alkadi, N. Moustafa, B. Turnbull, and K. K. R. Choo, “Mixture localization-based outliers models for securing data migration in cloud centers,” IEEE Access, 2019, doi: 10.1109/ACCESS.2019.2935142.
[16] A. Khraisat, I. Gondal, P. Vamplew, J. Kamruzzaman, and A. Alazab, “A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks,” Electron., 2019, doi: 10.3390/electronics8111210.
[17] J. Alsamiri and K. Alsubhi, “Internet of things cyber attacks detection using machine learning,” Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 12, pp. 627–634, 2019, doi: 10.14569/ijacsa.2019.0101280.
[18] Kalla, D., Kuraku, D. S., & Samaah, F. (2021). Enhancing cyber security by predicting malwares using supervised machine learning models. International Journal of Computing and Artificial Intelligence, 2(2), 55-62.