Open Access iconOpen Access

ARTICLE

A Novel Approach for Network Vulnerability Analysis in IIoT

K. Sudhakar*, S. Senthilkumar

Department of Computer Science and Engineering, University College of Engineering, Pattukkottai, Rajamadam, 614701, India

* Corresponding Author: K. Sudhakar. Email: email

Computer Systems Science and Engineering 2023, 45(1), 263-277. https://doi.org/10.32604/csse.2023.029680

Abstract

Industrial Internet of Things (IIoT) offers efficient communication among business partners and customers. With an enlargement of IoT tools connected through the internet, the ability of web traffic gets increased. Due to the raise in the size of network traffic, discovery of attacks in IIoT and malicious traffic in the early stages is a very demanding issues. A novel technique called Maximum Posterior Dichotomous Quadratic Discriminant Jaccardized Rocchio Emphasis Boost Classification (MPDQDJREBC) is introduced for accurate attack detection with minimum time consumption in IIoT. The proposed MPDQDJREBC technique includes feature selection and categorization. First, the network traffic features are collected from the dataset. Then applying the Maximum Posterior Dichotomous Quadratic Discriminant analysis to find the significant features for accurate classification and minimize the time consumption. After the significant features selection, classification is performed using the Jaccardized Rocchio Emphasis Boost technique. Jaccardized Rocchio Emphasis Boost Classification technique combines the weak learner result into strong output. Jaccardized Rocchio classification technique is considered as the weak learners to identify the normal and attack. Thus, proposed MPDQDJREBC technique gives strong classification results through lessening the quadratic error. This assists for proposed MPDQDJREBC technique to get better the accuracy for attack detection with reduced time usage. Experimental assessment is carried out with UNSW_NB15 Dataset using different factors such as accuracy, precision, recall, F-measure and attack detection time. The observed results exhibit the MPDQDJREBC technique provides higher accuracy and lesser time consumption than the conventional techniques.

Keywords


Cite This Article

APA Style
Sudhakar, K., Senthilkumar, S. (2023). A novel approach for network vulnerability analysis in iiot. Computer Systems Science and Engineering, 45(1), 263-277. https://doi.org/10.32604/csse.2023.029680
Vancouver Style
Sudhakar K, Senthilkumar S. A novel approach for network vulnerability analysis in iiot. Comput Syst Sci Eng. 2023;45(1):263-277 https://doi.org/10.32604/csse.2023.029680
IEEE Style
K. Sudhakar and S. Senthilkumar, “A Novel Approach for Network Vulnerability Analysis in IIoT,” Comput. Syst. Sci. Eng., vol. 45, no. 1, pp. 263-277, 2023. https://doi.org/10.32604/csse.2023.029680



cc Copyright © 2023 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1155

    View

  • 762

    Download

  • 0

    Like

Share Link