Optimized Ensemble Model Towards Secured Industrial IoT Devices (2401.05509v1)
Abstract: The continued growth in the deployment of Internet-of-Things (IoT) devices has been fueled by the increased connectivity demand, particularly in industrial environments. However, this has led to an increase in the number of network related attacks due to the increased number of potential attack surfaces. Industrial IoT (IIoT) devices are prone to various network related attacks that can have severe consequences on the manufacturing process as well as on the safety of the workers in the manufacturing plant. One promising solution that has emerged in recent years for attack detection is Machine learning (ML). More specifically, ensemble learning models have shown great promise in improving the performance of the underlying ML models. Accordingly, this paper proposes a framework based on the combined use of Bayesian Optimization-Gaussian Process (BO-GP) with an ensemble tree-based learning model to improve the performance of intrusion and attack detection in IIoT environments. The proposed framework's performance is evaluated using the Windows 10 dataset collected by the Cyber Range and IoT labs at University of New South Wales. Experimental results illustrate the improvement in detection accuracy, precision, and F-score when compared to standard tree and ensemble tree models.
- Cisco, “Cisco Predicts More IP Traffic in the Next Five Years Than in the History of the Internet,” Nov. 2018.
- Z. Alansari, S. Soomro, M. R. Belgaum, and S. Shamshirband, “The rise of internet of things (iot) in big healthcare data: review and open research issues,” in Progress in Advanced Computing and Intelligent Engineering. Springer, 2018, pp. 675–685.
- H. Arasteh, V. Hosseinnezhad, V. Loia, A. Tommasetti, O. Troisi, M. Shafie-khah, and P. Siano, “Iot-based smart cities: A survey,” in 2016 IEEE 16th International Conference on Environment and Electrical Engineering (EEEIC), 2016, pp. 1–6.
- I. Al Ridhawi, M. Aloqaily, B. Kantarci, Y. Jararweh, and H. T. Mouftah, “A continuous diversified vehicular cloud service availability framework for smart cities,” Computer Networks, vol. 145, pp. 207–218, 2018.
- Z. Doffman, “Cyberattacks on iot devices surge 300% in 2019,‘measured in billions,’report claims,” 2019.
- C. Crane, “20 surprising iot statistics you don’t already know,” 2019.
- Z. Bakhshi, A. Balador, and J. Mustafa, “Industrial iot security threats and concerns by considering cisco and microsoft iot reference models,” in 2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW), 2018, pp. 173–178.
- P. Varga, J. Peto, A. Franko, D. Balla, D. Haja, F. Janky, G. Soos, D. Ficzere, M. Maliosz, and L. Toka, “5g support for industrial iot applications—challenges, solutions, and research gaps,” Sensors, vol. 20, no. 3, p. 828, 2020.
- P. Kumar, A. Moubayed, A. Refaey, A. Shami, and J. Koilpillai, “Performance analysis of sdp for secure internal enterprises,” in 2019 IEEE Wireless Communications and Networking Conference (WCNC), Apr. 2019, pp. 1–6.
- H. Hindy, D. Brosset, E. Bayne, A. K. Seeam, C. Tachtatzis, R. Atkinson, and X. Bellekens, “A taxonomy of network threats and the effect of current datasets on intrusion detection systems,” IEEE Access, vol. 8, pp. 104 650–104 675, 2020.
- I. K. Nti, O. Narko-Boateng, A. F. Adekoya, and A. R. Somanathan, “Stacknet based decision fusion classifier for network intrusion detection,” International Arab Journal of Information Technology, vol. 19, no. 3 A, pp. 478–490, 2022.
- D. E. R. Muthiya, “Design and implementation of crypt analysis of cloud data intrusion management system,” International Arab Journal of Information Technology, vol. 17, pp. 895–905, 2020.
- A. Moubayed, “Optimization Modeling and Machine Learning Techniques Towards Smarter Systems and Processes,” Ph.D. dissertation, University of Western Ontario, Aug. 2018.
- A. Moubayed, E. Aqeeli, and A. Shami, “Ensemble-based feature selection and classification model for dns typo-squatting detection,” in 2020 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE), Aug. 2020.
- ——, “Detecting dns typo-squatting using ensemble-based feature selection classification models,” IEEE Canadian Journal of Electrical and Computer Engineering, pp. 1–11, 2021.
- M. Injadat, A. Moubayed, A. B. Nassif, and A. Shami, “Machine learning towards intelligent systems: applications, challenges, and opportunities,” Artificial Intelligence Review, pp. 1–50, 2021.
- M. Injadat, “Optimized Machine Learning Models Towards Intelligent Systems,” Ph.D. dissertation, University of Western Ontario, Jul. 2020.
- S. Aburakhia, T. Tayeh, R. Myers, and A. Shami, “A transfer learning framework for anomaly detection using model of normality,” in 2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), 2020, pp. 0055–0061.
- L. Yang and A. Shami, “On hyperparameter optimization of machine learning algorithms: Theory and practice,” Neurocomputing, 2020. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0925231220311693
- H. Y. Aydogmus, H. Erdal, O. Karakurt, E. Namli, Y. S. Turkan, and H. Erdal, “A comparative assessment of bagging ensemble models for modeling concrete slump flow,” Computers and Concrete, vol. 16, no. 5, pp. 741–757, 2015.
- S. Hoque, “Machine Learning for Mining Imbalanced Data,” Master’s thesis, United International University, Bangladesh, Feb. 2018.
- F. Salo, M. Injadat, A. B. Nassif, and A. Essex, “Data mining with big data in intrusion detection systems: A systematic literature review,” in 2019 International Symposium on Big Data Management and Analytics, 2019.
- M. Injadat, F. Salo, A. B. Nassif, A. Essex, and A. Shami, “Bayesian optimization with machine learning algorithms towards anomaly detection,” in 2018 IEEE Global Communications Conference (GLOBECOM), Dec 2018, pp. 1–6.
- M. Injadat, A. Moubayed, A. B. Nassif, and A. Shami, “Multi-stage optimized machine learning framework for network intrusion detection,” IEEE Transactions on Network and Service Management, pp. 1–1, Aug. 2020.
- L. Yang, A. Moubayed, I. Hamieh, and A. Shami, “Tree-based intelligent intrusion detection system in internet of vehicles,” in 2019 IEEE Global Communications Conference (GLOBECOM), Dec 2019, pp. 1–6.
- L. Yang, A. Moubayed, and A. Shami, “Mth-ids: A multi-tiered hybrid intrusion detection system for internet of vehicles,” IEEE Internet of Things Journal, pp. 1–1, 2021.
- F. Salo, M. Injadat, A. Moubayed, A. B. Nassif, and A. Essex, “Clustering enabled classification using ensemble feature selection for intrusion detection,” in 2019 International Conference on Computing, Networking and Communications (ICNC), 2019, pp. 276–281.
- A. Moubayed, M. Injadat, , and A. Shami, “Optimized Random Forest Model for Botnet Detection Based on DNS Queries,” in IEEE 32nd International Conference on Microelectronics, Dec. 2020.
- M. A. Teixeira, T. Salman, M. Zolanvari, R. Jain, N. Meskin, and M. Samaka, “Scada system testbed for cybersecurity research using machine learning approach,” Future Internet, vol. 10, no. 8, p. 76, 2018.
- E. Anthi, L. Williams, M. Słowińska, G. Theodorakopoulos, and P. Burnap, “A supervised intrusion detection system for smart home iot devices,” IEEE Internet of Things Journal, vol. 6, no. 5, pp. 9042–9053, 2019.
- M. Almiani, A. AbuGhazleh, A. Al-Rahayfeh, S. Atiewi, and A. Razaque, “Deep recurrent neural network for iot intrusion detection system,” Simulation Modelling Practice and Theory, vol. 101, p. 102031, 2020.
- M. Injadat, A. Moubayed, , and A. Shami, “Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach,” in IEEE 32nd International Conference on Microelectronics, Dec. 2020.
- A. Alsaedi, N. Moustafa, Z. Tari, A. Mahmood, and A. Anwar, “TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems,” IEEE Access, vol. 8, pp. 165 130–165 150, 2020.
- Joe Coco - Microsoft, “Build your IoT devices with Windows for IoT: a comprehensive platform for every device developer,” 2020, Available at: https://blogs.windows.com/windowsdeveloper/2020/05/26/build-your-iot-devices-with-windows-for-iot-a-comprehensive-platform-for-every-device-developer/.
- W. Li, B. Wang, J. Sheng, K. Dong, Z. Li, and Y. Hu, “A resource service model in the industrial iot system based on transparent computing,” Sensors, vol. 18, no. 4, p. 981, 2018.
- Microsoft, “Windows 10 for the Internet of Your Things,” 2017, Available at: https://azure.microsoft.com/en-us/services/windows-iot/.
- A. Driate, M. Minoufekr, and P. Plapper, “Knowledge management for manufacturing smes using industrial iot,” in 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), 2019, pp. 355–361.
- A. Sharma and R. Rani, “Classification of cancerous profiles using machine learning,” in International Conference on Machine Learning and Data Science (MLDS’17), Dec. 2017, pp. 31–36.
- C. Seiffert, T. M. Khoshgoftaar, J. Van Hulse, and A. Napolitano, “Rusboost: Improving classification performance when training data is skewed,” in 2008 19th International Conference on Pattern Recognition, 2008, pp. 1–4.
- MohammadNoor Injadat (12 papers)