2021
DOI: 10.1109/access.2021.3104113
|View full text |Cite
|
Sign up to set email alerts
|

An Advanced Intrusion Detection System for IIoT Based on GA and Tree Based Algorithms

Abstract: The evolution of the Internet and cloud-based technologies have empowered several organizations with the capacity to implement large-scale Internet of Things (IoT)-based ecosystems, such as Industrial IoT (IIoT). The IoT and, by virtue, the IIoT, are vulnerable to new types of threats and intrusions because of the nature of their networks. So it is crucial to develop Intrusion Detection Systems (IDSs) that can provide the security, privacy, and integrity of IIoT networks. In this research, we propose an IDS fo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
72
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 93 publications
(72 citation statements)
references
References 48 publications
0
72
0
Order By: Relevance
“…Compared with Ludwig [21], our proposed approach enhanced the accuracy rate by 7.09% while significantly reducing the FPR by 14.31%. Our anomaly-based IDS method also outperformed a recently proposed method by Kasongo [19], who used the GA algorithm for feature selection and the RF model as the detection model. Our method improved the accuracy rate by 11.97%.…”
Section: Resultsmentioning
confidence: 78%
See 2 more Smart Citations
“…Compared with Ludwig [21], our proposed approach enhanced the accuracy rate by 7.09% while significantly reducing the FPR by 14.31%. Our anomaly-based IDS method also outperformed a recently proposed method by Kasongo [19], who used the GA algorithm for feature selection and the RF model as the detection model. Our method improved the accuracy rate by 11.97%.…”
Section: Resultsmentioning
confidence: 78%
“…The proposed work employed two feature selection techniques to reduce data dimensionality, improve computational resources, and improve detection performance. We used a set of machine learning techniques in the classification phase to determine whether a given flow of traffic was Ludwig [21] 92.49% 14.71% Kasongo [19] 87.61% N/A Muna et al [17] 98.6% 1.8% Ali et al [34] 99.54% N/A Awotunde et al [22] 98.9% 1.1% Proposed Method 99.58% 0.4% normal or an attack. We evaluated, analyzed, and validated the proposed work using the X-IIoTID, the most recent and comprehensive data set for IIoT environments.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…One of the areas in which ML has been successfully applied to S&P is intrusion (anomaly, signature or hybrid) detection. ML can utilize the enormous amount of data generated by the IoT devices to identify inherent patterns and behaviours of the data (establish a norm in the system) and hence predict and detect vulnerabilities/threats/attacks (deviations from established norm/alien patterns and behaviour) in IoTbased systems; thereby flagging new trends of attacks (Hussain et al, 2020;Thamilarasu et al, 2020;Kasongo, 2021). Traditional means usually involve human intervention to set rules to which the system will live by to address threats that may arise.…”
Section: *Corresponding Authormentioning
confidence: 99%
“…The IIoT has the potential to boost efficiency, production, and operational efficiency in a variety of sectors. The existing services are initially improved by IIoT with the ultimate goal of creating entirely intelligent and enhanced services and products [6][7][8][9][10]. This has enabled most of the organization to grab knowledge about how and where IIoT innovations and solutions have to lead to transformations in the organization, enhanced goods, and services quality.…”
Section: ░ 1 Introductionmentioning
confidence: 99%