Abstract
The rapid development of Internet of Things (IoT) platforms provides the industrial domain with many critical solutions, such as joint venture virtual production systems. However, the extensive interconnection of industrial systems with corporate systems in industrial Internet of Things (IIoT) networks exposes the industrial domain to severe cyber risks. Because of many proprietary multilevel protocols, limited upgrade opportunities, heterogeneous communication infrastructures, and a very large trust boundary, conventional IT security fails to prevent cyberattacks against IIoT networks. Recent secure protocols, such as secure distributed network protocol (DNP 3.0), are limited to weak hash functions for critical response time requirements. As a complementary, we propose an adaptive trust boundary protection for IIoT networks using a deep-learning, feature-extraction-based semisupervised model. Our proposed approach is novel in that it is compatible with multilevel protocols of IIoT. The proposed approach does not require any manual effort to update the attack databases and can learn the rapidly changing natures of unknown attack models using unsupervised learnings and unlabeled data from the wild. Therefore, the proposed approach is resilient to emerging cyberattacks and their dynamic nature. The proposed approach has been verified using a real IIoT testbed. Extensive experimental analysis of the attack models and results shows that the proposed approach significantly improves the identification of attacks over conventional security control techniques.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.