Abstract
The rapid growth of the Internet of Things (IoT) and digital industrial devices has significantly impacted various aspects of life, underscoring the importance of the Industrial Internet of Things (IIoT). Given its importance in industrial contexts that affect human life, the IIoT represents a key subset of the broader IoT landscape. Due to the proliferation of sensors in smart devices, which are viewed as points of contact, as the gathering of data and information regarding the IIoT systems and devices operating on the IoT, there is an urgent requirement for developing effective security methods to counter such threats as well as protecting IIoT systems. In this study, we develop and evaluate a well-optimized intrusion detection system (IDS) based on deep learning (DL) and machine learning (ML) techniques to enhance IIoT security. Leveraging the Edge-IIoTset dataset, specifically designed for IIoT cybersecurity evaluations, we focus on detecting and mitigating 14 distinct attack types targeting IIoT and IoT protocols. These attacks are categorized into five threat groups: information collection, malware, DDoS, man-in-the-middle attacks, and injection attacks. We conducted experiments using machine learning algorithms (k-nearest neighbors, decision tree) and a neural network on the KNIME platform, achieving a remarkable 100% accuracy with the decision tree model. This high accuracy demonstrates the effectiveness of our approach in protecting industrial IoT networks.
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.