2023
DOI: 10.32604/csse.2023.026712
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly Detection for Industrial Internet of Things Cyberattacks

Abstract: The evolution of the Internet of Things (IoT) has empowered modern industries with the capability to implement large-scale IoT ecosystems, such as the Industrial Internet of Things (IIoT). The IIoT is vulnerable to a diverse range of cyberattacks that can be exploited by intruders and cause substantial reputational and financial harm to organizations. To preserve the confidentiality, integrity, and availability of IIoT networks, an anomaly-based intrusion detection system (IDS) can be used to provide secure, r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(12 citation statements)
references
References 36 publications
0
12
0
Order By: Relevance
“…Compared with Al-Hawawreh et al [25], the proposed model improved the accuracy rate by 0.25%. Our proposed clustering model also outperformed a recently proposed method by Alanazi et al [24], who used the minimum redundancy maximum relevance (MRMR) method with the decision tree algorithm, the proposed method enhanced the accuracy rate by 0.21%. In addition, the proposed model improved accuracy by 7.4% when compared to Ludwig [29], who used the neural network ensemble method.…”
Section: Comparative Analysismentioning
confidence: 60%
See 2 more Smart Citations
“…Compared with Al-Hawawreh et al [25], the proposed model improved the accuracy rate by 0.25%. Our proposed clustering model also outperformed a recently proposed method by Alanazi et al [24], who used the minimum redundancy maximum relevance (MRMR) method with the decision tree algorithm, the proposed method enhanced the accuracy rate by 0.21%. In addition, the proposed model improved accuracy by 7.4% when compared to Ludwig [29], who used the neural network ensemble method.…”
Section: Comparative Analysismentioning
confidence: 60%
“…Several related works have been proposed for anomaly-based IDS in the IoT/IIoT networks. A study by [24] proposed anomaly-based IDS to overcome cyberattacks in industrial IoT networks. To improve the classifier techniques, the proposed method used two feature selection techniques called minimum redundancy maximum relevance and neighborhood components analysis.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Heavy metals are an important indicator for the detection of pollutants. The main methods for detecting heavy metals in water include electrochemical methods, removal of chemical voltammetry, atomic emission spectrometry, ultraviolet-visible detection, and induction plasma techniques [6]. Electrochemical sensors are used to detect more accurate data related to water contaminants.…”
Section: Principle Of Water Quality Anomaly Detectionmentioning
confidence: 99%
“…Ectopic location of the thyroid gland is a rare event, with a reported prevalence of 1:100,000 to 1:300,000 in the general population. 1 This anomaly is due to the embryological development of the thyroid gland from the base of the tongue to its normal eutopic location in the lower third of the neck, just anterior to the trachea. 1 Ectopic location in the trachea, thorax, and abdomen has also been reported.…”
Section: Accompanying Textmentioning
confidence: 99%