2023
DOI: 10.1109/access.2023.3323573
|View full text |Cite
|
Sign up to set email alerts
|

An Explainable Ensemble Deep Learning Approach for Intrusion Detection in Industrial Internet of Things

Mousa'B Mohammad Shtayat,
Mohammad Kamrul Hasan,
Rossilawati Sulaiman
et al.

Abstract: Ensuring the security of critical Industrial Internet of Things (IIoT) systems is of utmost importance, with a primary focus on identifying cyber-attacks using Intrusion Detection Systems (IDS). Deep learning (DL) techniques are frequently utilized in the anomaly detection components of IDSs. However, these models often generate high false-positive rates, and their decision-making rationale remains opaque, even to experts. Gaining insights into the reasons behind an IDS's decision to block a specific packet ca… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2025
2025

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 11 publications
(1 citation statement)
references
References 56 publications
0
1
0
Order By: Relevance
“…Attack graphs combined with other methods, such as game theory and machine learning, help assess the vulnerability of IoT networks [103]. Recent research focuses on using deep learning methods to design malware detection systems [104]. HSAS-MD Analyzer [105] employs a combination of modelchecking technique (MCT) and deep learning (DL), particularly a convolutional neural network (CNN) model, to analyze and detect potential threats for IoT applications, which shows the best performance compared with other security analysis systems.…”
Section: ) Attack Assessment and Detectionmentioning
confidence: 99%
“…Attack graphs combined with other methods, such as game theory and machine learning, help assess the vulnerability of IoT networks [103]. Recent research focuses on using deep learning methods to design malware detection systems [104]. HSAS-MD Analyzer [105] employs a combination of modelchecking technique (MCT) and deep learning (DL), particularly a convolutional neural network (CNN) model, to analyze and detect potential threats for IoT applications, which shows the best performance compared with other security analysis systems.…”
Section: ) Attack Assessment and Detectionmentioning
confidence: 99%