2023
DOI: 10.3390/s23187856
|View full text |Cite
|
Sign up to set email alerts
|

HIDM: Hybrid Intrusion Detection Model for Industry 4.0 Networks Using an Optimized CNN-LSTM with Transfer Learning

Umesh Kumar Lilhore,
Poongodi Manoharan,
Sarita Simaiya
et al.

Abstract: Industrial automation systems are undergoing a revolutionary change with the use of Internet-connected operating equipment and the adoption of cutting-edge advanced technology such as AI, IoT, cloud computing, and deep learning within business organizations. These innovative and additional solutions are facilitating Industry 4.0. However, the emergence of these technological advances and the quality solutions that they enable will also introduce unique security challenges whose consequence needs to be identifi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(7 citation statements)
references
References 34 publications
0
7
0
Order By: Relevance
“…Lilhore et al 45 2023 It is capable of detecting anomalous behavior in complex and evolving environments.…”
Section: Authors Year Advantages Limitationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Lilhore et al 45 2023 It is capable of detecting anomalous behavior in complex and evolving environments.…”
Section: Authors Year Advantages Limitationsmentioning
confidence: 99%
“…The security implementation phase helps to deploy the secure network infrastructure across multiple devices and systems. Lilhore et al 45 have discussed how the model is optimized by using convolutional neural network (CNN) and long short‐term memory (LSTM) architectures and transfer learning techniques. The optimized model accurately detects abnormal network behavior without relying on massive computational resources or additional data collection.…”
Section: Related Workmentioning
confidence: 99%
“…At the heart of our NIDS framework lies a DL model that operates in two critical dimensions: spatial feature extraction and temporal sequence processing. First, the CNN layers effectively capture spatial dependencies within individual data packets [27]. This process uses convolutional filters that slide across the input data to identify crucial features such as specific packet sizes or unusual protocol behavior that could signify an intrusion attempt.…”
Section: Architectural Overviewmentioning
confidence: 99%
“…PaaS builds on IaaS by offering technical tiers and management software instances, freeing developers to focus on creating apps rather than managing the underlying infrastructure. SaaS, on the other hand, does away with the need for local program installation by giving users access to fully functional software that can be accessed over the cloud [2][3][4][5][6][7].…”
Section: Literature Reviewmentioning
confidence: 99%