Abstract

The Industrial-Internet of Things (I-IoT) stands out as one of the most dynamically evolving subfields within the expansive realm of the Internet of Things (IoT). Its exponential growth is reshaping industrial landscapes, bringing forth transformative innovations and advancements at an unprecedented pace, as the core of Industry 4.0. Among the formidable challenges faced by the Industrial-Internet of Things, cybersecurity stands out as a critical concern. Deep learning-based Intrusion Detection System (IDS) solutions showcase their steadfast ability to secure resource-limited, investigation-demanding, and complex I-IoT environments. However, their effectiveness hinges not only on the model but also on the dataset on which they are trained. While numerous literature studies delve into this field, existing proposed models often grapple with challenges. They are frequently trained on outdated, non-diverse datasets or lack specific features crucial for I-IoT networks. Recent efforts, thankfully, introduce more adequate datasets like Edge-IIoTset. Researchers leverage this extensive dataset to train models, focusing on detecting the 14 sophisticated attacks. These attacks predominantly target real I-IoT networks. Despite these efforts, none of the existing models proves entirely efficient. A review of literature solutions reveals that many models cannot detect all 15 classes in the dataset. Some are multi-staged or overly complex. In response to these challenges, this paper presents an End-to-End learning , non-complex CNN1D model tailored to the specific problem of detecting 14 sophisticated threats targeting I-IoT environments. Our proposed model demonstrated remarkable efficiency with an accuracy of 99.96%, successfully detecting all 15 classes in the Edge-IIoTset dataset with a minimal loss of 0.0011. Not only that, but our model was validated with k-fold cross-validation, demonstrating its efficiency in preserving the same performance on unseen data and its ability to be generalized for real-world I-IoT environments.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call