Open Access iconOpen Access

ARTICLE

crossmark

An Efficient Intrusion Detection Framework for Industrial Internet of Things Security

by Samah Alshathri1, Ayman El-Sayed2, Walid El-Shafai3,4,*, Ezz El-Din Hemdan2

1 Department of Information Technology, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O.Box 84428, Riyadh, 11671, Saudi Arabia
2 Department of Computer Science and Engineering, Faculty of Electronic Engineering, Menoufia University, Menouf, 32952, Egypt
3 Security Engineering Lab, Computer Science Department, Prince Sultan University, Riyadh, 11586, Saudi Arabia
4 Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, Menouf, 32952, Egypt

* Corresponding Author: Walid El-Shafai. Email: email

Computer Systems Science and Engineering 2023, 46(1), 819-834. https://doi.org/10.32604/csse.2023.034095

Abstract

Recently, the Internet of Things (IoT) has been used in various applications such as manufacturing, transportation, agriculture, and healthcare that can enhance efficiency and productivity via an intelligent management console remotely. With the increased use of Industrial IoT (IIoT) applications, the risk of brutal cyber-attacks also increased. This leads researchers worldwide to work on developing effective Intrusion Detection Systems (IDS) for IoT infrastructure against any malicious activities. Therefore, this paper provides effective IDS to detect and classify unpredicted and unpredictable severe attacks in contradiction to the IoT infrastructure. A comprehensive evaluation examined on a new available benchmark TON_IoT dataset is introduced. The data-driven IoT/IIoT dataset incorporates a label feature indicating classes of normal and attack-targeting IoT/IIoT applications. Correspondingly, this data involves IoT/IIoT services-based telemetry data that involves operating systems logs and IoT-based traffic networks collected from a realistic medium-scale IoT network. This is to classify and recognize the intrusion activity and provide the intrusion detection objectives in IoT environments in an efficient fashion. Therefore, several machine learning algorithms such as Logistic Regression (LR), Linear Discriminant Analysis (LDA), K-Nearest Neighbors (KNN), Gaussian Naive Bayes (NB), Classification and Regression Tree (CART), Random Forest (RF), and AdaBoost (AB) are used for the detection intent on thirteen different intrusion datasets. Several performance metrics like accuracy, precision, recall, and F1-score are used to estimate the proposed framework. The experimental results show that the CART surpasses the other algorithms with the highest accuracy values like 0.97, 1.00, 0.99, 0.99, 1.00, 1.00, and 1.00 for effectively detecting the intrusion activities on the IoT/IIoT infrastructure on most of the employed datasets. In addition, the proposed work accomplishes high performance compared to other recent related works in terms of different security and detection evaluation parameters.

Keywords


Cite This Article

APA Style
Alshathri, S., El-Sayed, A., El-Shafai, W., Hemdan, E.E. (2023). An efficient intrusion detection framework for industrial internet of things security. Computer Systems Science and Engineering, 46(1), 819-834. https://doi.org/10.32604/csse.2023.034095
Vancouver Style
Alshathri S, El-Sayed A, El-Shafai W, Hemdan EE. An efficient intrusion detection framework for industrial internet of things security. Comput Syst Sci Eng. 2023;46(1):819-834 https://doi.org/10.32604/csse.2023.034095
IEEE Style
S. Alshathri, A. El-Sayed, W. El-Shafai, and E. E. Hemdan, “An Efficient Intrusion Detection Framework for Industrial Internet of Things Security,” Comput. Syst. Sci. Eng., vol. 46, no. 1, pp. 819-834, 2023. https://doi.org/10.32604/csse.2023.034095



cc Copyright © 2023 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1553

    View

  • 618

    Download

  • 0

    Like

Share Link