Multilayer Perceptron-Based Defense Mechanisms for Securing Industrial IoT in Industry 4.0 Environments
Abstract
In the Industry 4.0 era, the Industrial Internet of Things (IIoT) has transformed manufacturing by facilitating seamless connectivity and real-time data exchange between physical devices and systems. This transformation has bolstered efficiency, productivity, and decision-making in industrial settings. However, the increased connectivity also brings heightened cybersecurity risks. Securing the IIoT environment is critical to safeguard critical infrastructure, data, and operations against cyber threats. As IIoT adoption expands across sectors, ensuring system security and resilience becomes imperative to maintain operational continuity and preserve trust. This paper proposes a deep learning-based approach, leveraging the CIDDS, BOT-IoT, and Edge_IIoTset datasets, to fortify IIoT and manufacturing systems against cyber threats. Multilayer Perceptron (MLP) is identified as the top-performing model, achieving an accuracy of 99.26%, precision of 98.74%, and recall of 98.86% on the CIDDS dataset. Similar superior performance was observed on the BOT-IoT (99.52%, 99.52%, and 99.99%) and Edge_IIoTset (99.93%, 99.93%, and 99.99%) datasets, making MLP a robust solution for anomaly detection in industrial IoT environments.
Full Text:
PDFReferences
A. Arun Kumar and R. Krishna Karne, “IIoT-IDS Network using Inception CNN Model,” JTCSST, vol. 4, no. 3, pp. 126–138, Aug. 2022, doi: 10.36548/jtcsst.2022.3.002.
J. Du, K. Yang, Y. Hu, and L. Jiang, “NIDS-CNNLSTM: Network Intrusion Detection Classification Model Based on Deep Learning,” IEEE Access, vol. 11, pp. 24808–24821, 2023, doi: 10.1109/ACCESS.2023.3254915.
G. Czeczot, I. Rojek, D. Mikołajewski, and B. Sangho, “AI in IIoT Management of Cybersecurity for Industry 4.0 and Industry 5.0 Purposes,” Electronics, vol. 12, no. 18, p. 3800, Sep. 2023, doi: 10.3390/electronics12183800.
L. Idouglid, S. Tkatek, K. Elfayq, and A. Guezzaz, “A NOVEL ANOMALY DETECTION MODEL FOR THE INDUSTRIAL INTERNET OF THINGS USING MACHINE LEARNING TECHNIQUES,” no. 1, 2024, doi: doi: 10.32620/reks.2024.1.12.
M. Al-Ambusaidi, Z. Yinjun, Y. Muhammad, and A. Yahya, “ML-IDS: an efficient ML-enabled intrusion detection system for securing IoT networks and applications,” Soft Comput, Dec. 2023, doi: 10.1007/s00500-023-09452-7.
I. Farhadian Dehkordi, K. Manochehri, and V. Aghazarian, “Internet of Things (IoT) Intrusion Detection by Machine Learning (ML): A Review,” APJITM, vol. 12, no. 01, pp. 13–38, Jun. 2023, doi: 10.17576/apjitm-2023-1201-02.
H. Yao, P. Gao, P. Zhang, J. Wang, C. Jiang, and L. Lu, “Hybrid Intrusion Detection System for Edge-Based IIoT Relying on Machine-Learning-Aided Detection,” IEEE Network, vol. 33, no. 5, pp. 75–81, Sep. 2019, doi: 10.1109/MNET.001.1800479.
S. Haque, F. El-Moussa, N. Komninos, and R. Muttukrishnan, “A Systematic Review of Data-Driven Attack Detection Trends in IoT,” Sensors, vol. 23, no. 16, p. 7191, Aug. 2023, doi: 10.3390/s23167191.
R. Alghamdi and M. Bellaiche, “An ensemble deep learning based IDS for IoT using Lambda architecture,” Cybersecurity, vol. 6, no. 1, p. 5, Mar. 2023, doi: 10.1186/s42400-022-00133-w.
S. Latif et al., “Deep Learning for the Industrial Internet of Things (IIoT): A Comprehensive Survey of Techniques, Implementation Frameworks, Potential Applications, and Future Directions,” Sensors, vol. 21, no. 22, p. 7518, Nov. 2021, doi: 10.3390/s21227518.
L. Idouglid, S. Tkatek, K. Elfayq, and A. Guezzaz, “Next-gen security in IIoT: integrating intrusion detection systems with machine learning for industry 4.0 resilience,” IJECE, vol. 14, no. 3, p. 3512, Jun. 2024, doi: 10.11591/ijece.v14i3.pp3512-3521.
“IOT THREATS & IMPLEMENTATION OF AI/ML TO ADDRESS EMERGING CYBER SECURITY ISSUES IN IOT WITH CLOUD COMPUTING,” IRJMETS, Jan. 2023, doi: 10.56726/IRJMETS32866.
M. Bagaa, T. Taleb, J. B. Bernabe, and A. Skarmeta, “A Machine Learning Security Framework for Iot Systems,” IEEE Access, vol. 8, pp. 114066–114077, 2020, doi: 10.1109/ACCESS.2020.2996214.
C. Hazman, A. Guezzaz, S. Benkirane, and M. Azrour, “lIDS-SIoEL: intrusion detection framework for IoT-based smart environments security using ensemble learning,” Cluster Comput, vol. 26, no. 6, pp. 4069–4083, Dec. 2023, doi: 10.1007/s10586-022-03810-0.
I. Idrissi, M. Azizi, and O. Moussaoui, “A Lightweight Optimized Deep Learning-based Host-Intrusion Detection System Deployed on the Edge for IoT,” IJCDS, vol. 11, no. 1, pp. 209–216, Jan. 2022, doi: 10.12785/ijcds/110117.
A. Guezzaz, M. Azrour, S. Benkirane, M. Mohy-Eddine, H. Attou, and M. Douiba, “A Lightweight Hybrid Intrusion Detection Framework using Machine Learning for Edge-Based IIoT Security,” IAJIT, vol. 19, no. 5, 2022, doi: 10.34028/iajit/19/5/14.
H. Alasmary, “RDAF-IIoT: Reliable Device-Access Framework for the Industrial Internet of Things,” Mathematics, vol. 11, no. 12, p. 2710, Jun. 2023, doi: 10.3390/math11122710.
S. Alshathri, A. El-Sayed, W. El-Shafai, and E. El-Din Hemdan, “An Efficient Intrusion Detection Framework for Industrial Internet of Things Security,” Computer Systems Science and Engineering, vol. 46, no. 1, pp. 819–834, 2023, doi: 10.32604/csse.2023.034095.
M. Al-Ambusaidi, Z. Yinjun, Y. Muhammad, and A. Yahya, “ML-IDS: an efficient ML-enabled intrusion detection system for securing IoT networks and applications,” Soft Comput, Dec. 2023, doi: 10.1007/s00500-023-09452-7.
R. Mahmoud, T. Yousuf, F. Aloul, and I. Zualkernan, “Internet of things (IoT) security: Current status, challenges and prospective measures,” in 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), London, United Kingdom: IEEE, Dec. 2015, pp. 336–341. doi: 10.1109/ICITST.2015.7412116.
Bhupal Naik D. S., V. Dondeti, and S. Balakrishna, “Comparative Analysis of Machine Learning-Based Algorithms for Detection of Anomalies in IIoT:,” International Journal of Information Retrieval Research, vol. 12, no. 1, pp. 1–55, May 2022, doi: 10.4018/IJIRR.298647.
A. Angelopoulos et al., “Tackling Faults in the Industry 4.0 Era—A Survey of Machine-Learning Solutions and Key Aspects,” Sensors, vol. 20, no. 1, p. 109, Dec. 2019, doi: 10.3390/s20010109.
S. Tamy, H. Belhadaoui, N. Rabbah, and M. Rifi, “CYBER SECURITY BASED MACHINE LEARNING ALGORITHMS APPLIED TO INDUSTRY 4.0 APPLICATION CASE: DEVELOPMENT OF NETWORK INTRUSION DETECTION SYSTEM USING HYBRID METHOD,” . Vol., no. 12, 2005.
S. Alkadi, S. Al-Ahmadi, and M. M. Ben Ismail, “Toward Improved Machine Learning-Based Intrusion Detection for Internet of Things Traffic,” Computers, vol. 12, no. 8, p. 148, Jul. 2023, doi: 10.3390/computers12080148.
X. Zhang, O. Upton, N. L. Beebe, and K.-K. R. Choo, “IoT Botnet Forensics: A Comprehensive Digital Forensic Case Study on Mirai Botnet Servers,” Forensic Science International: Digital Investigation, vol. 32, p. 300926, Apr. 2020, doi: 10.1016/j.fsidi.2020.300926.
M. A. Ferrag, O. Friha, D. Hamouda, L. Maglaras, and H. Janicke, “Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning,” IEEE Access, vol. 10, pp. 40281–40306, 2022, doi: 10.1109/ACCESS.2022.3165809.
J. Carneiro, N. Oliveira, N. Sousa, E. Maia, and I. Praça, “Machine Learning for Network-based Intrusion Detection Systems: an Analysis of the CIDDS-001 Dataset,” Jul. 02, 2021, arXiv: arXiv:2107.02753. Accessed: Sep. 30, 2023. [Online]. Available: http://arxiv.org/abs/2107.02753
D. Powers, “Evaluation: From Precision, Recall and F-Factor to ROC, Informedness, Markedness & Correlation”.
T. Wu et al., “DiscrimLoss: A Universal Loss for Hard Samples and Incorrect Samples Discrimination,” Aug. 21, 2022, arXiv: arXiv:2208.09884. Accessed: May 29, 2024. [Online]. Available: http://arxiv.org/abs/2208.09884
U. Itai and N. Katz, “Goodness of Fit Metrics for Multi-class Predictor,” Aug. 11, 2022, arXiv: arXiv:2208.05651. Accessed: May 29, 2024. [Online]. Available: http://arxiv.org/abs/2208.05651
DOI: https://doi.org/10.31449/inf.v49i33.6944

This work is licensed under a Creative Commons Attribution 3.0 License.