26
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Intrusion Detection in Industrial Internet of Things Network-Based on Deep Learning Model with Rule-Based Feature Selection

      1 , 2 , 3
      Wireless Communications and Mobile Computing
      Hindawi Limited

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          The Industrial Internet of Things (IIoT) is a recent research area that links digital equipment and services to physical systems. The IIoT has been used to generate large quantities of data from multiple sensors, and the device has encountered several issues. The IIoT has faced various forms of cyberattacks that jeopardize its capacity to supply organizations with seamless operations. Such risks result in financial and reputational damages for businesses, as well as the theft of sensitive information. Hence, several Network Intrusion Detection Systems (NIDSs) have been developed to fight and protect IIoT systems, but the collections of information that can be used in the development of an intelligent NIDS are a difficult task; thus, there are serious challenges in detecting existing and new attacks. Therefore, the study provides a deep learning-based intrusion detection paradigm for IIoT with hybrid rule-based feature selection to train and verify information captured from TCP/IP packets. The training process was implemented using a hybrid rule-based feature selection and deep feedforward neural network model. The proposed scheme was tested utilizing two well-known network datasets, NSL-KDD and UNSW-NB15. The suggested method beats other relevant methods in terms of accuracy, detection rate, and FPR by 99.0%, 99.0%, and 1.0%, respectively, for the NSL-KDD dataset, and 98.9%, 99.9%, and 1.1%, respectively, for the UNSW-NB15 dataset, according to the results of the performance comparison. Finally, simulation experiments using various evaluation metrics revealed that the suggested method is appropriate for IIOT intrusion network attack classification.

          Related collections

          Most cited references90

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          A detailed analysis of the KDD CUP 99 data set

            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks

                Bookmark

                Author and article information

                Contributors
                (View ORCID Profile)
                (View ORCID Profile)
                (View ORCID Profile)
                Journal
                Wireless Communications and Mobile Computing
                Wireless Communications and Mobile Computing
                Hindawi Limited
                1530-8677
                1530-8669
                September 2 2021
                September 2 2021
                : 2021
                : 1-17
                Affiliations
                [1 ]Department of Computer Science, University of Ilorin, Ilorin, Nigeria
                [2 ]Department of Electronics and Communication Engineering, Birla Institute of Technology, Mesra, Jharkhand, India
                [3 ]Department of Computer Science, Landmark University, Omu-Aran, Nigeria
                Article
                10.1155/2021/7154587
                53964923-fb89-4924-a4f1-9c7979b75acd
                © 2021

                https://creativecommons.org/licenses/by/4.0/

                History

                Comments

                Comment on this article

                scite_
                0
                0
                0
                0
                Smart Citations
                0
                0
                0
                0
                Citing PublicationsSupportingMentioningContrasting
                View Citations

                See how this article has been cited at scite.ai

                scite shows how a scientific paper has been cited by providing the context of the citation, a classification describing whether it supports, mentions, or contrasts the cited claim, and a label indicating in which section the citation was made.

                Similar content177

                Cited by19

                Most referenced authors674