2023
DOI: 10.26599/bdma.2022.9020032
|View full text |Cite
|
Sign up to set email alerts
|

An Ensemble Learning Based Intrusion Detection Model for Industrial IoT Security

Abstract: Industrial Internet of Things (IIoT) represents the expansion of the Internet of Things (IoT) in industrial sectors. It is designed to implicate embedded technologies in manufacturing fields to enhance their operations.However, IIoT involves some security vulnerabilities that are more damaging than those of IoT. Accordingly, Intrusion Detection Systems (IDSs) have been developed to forestall inevitable harmful intrusions. IDSs survey the environment to identify intrusions in real time. This study designs an in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 26 publications
(2 citation statements)
references
References 63 publications
0
0
0
Order By: Relevance
“…An approach using EL is demonstrated by Arya and Gupta [19] , where they leveraged Pearson Correlation Coefficient (PCC) and Isolation Forest to select the most appropriate features, testing the built IDS performance using the Random Forest classifier and Bot-IoT e NF-UNSW-NB15-v2 datasets. Additionally, Mohy-Eddine et al propose EL utilization for feature selection employing four reducing irrelevant features techniques [20] . Consequently, two reduced feature groups were generated using union and intersection techniques.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…An approach using EL is demonstrated by Arya and Gupta [19] , where they leveraged Pearson Correlation Coefficient (PCC) and Isolation Forest to select the most appropriate features, testing the built IDS performance using the Random Forest classifier and Bot-IoT e NF-UNSW-NB15-v2 datasets. Additionally, Mohy-Eddine et al propose EL utilization for feature selection employing four reducing irrelevant features techniques [20] . Consequently, two reduced feature groups were generated using union and intersection techniques.…”
Section: Related Workmentioning
confidence: 99%
“…This model is also centered on industrial environment where IIoT is used, which can only be seen in the research of Zolanvari, Teixeira and Jain [17] , Khan et al [24] , and Teixeiraeet al [13] ; despite dealing with the industrial scenario, these studies do not have the development of the model as their main proposal. The present proposal also uses ML, as can be seen in the works of Apruzzese et al [14] , Teixeira et al [17] , Pajouh et al [18] , Khoei et al [22] , Liang et al [23] , and Shafinet al [15] , but specifically, using EL to train a more robust model can only be seen in the study of Mohy-Eddine et al [20] . To reduce the model training time, there is still a reduction in the feature size while analyzing the optimization of model training time and possible model retraining without losing performance in predicting attacks on network flows.…”
Section: Khan Et Al Investigated An Ids Model Termed Federated-simple...mentioning
confidence: 99%