2022
DOI: 10.3390/electronics11050742
|View full text |Cite
|
Sign up to set email alerts
|

An Intelligent System to Detect Advanced Persistent Threats in Industrial Internet of Things (I-IoT)

Abstract: The Industrial Internet of Things (I-IoT) is a manifestation of an extensive industrial network that interconnects various sensors and wireless devices to integrate cyber and physical systems. While I-IoT provides a considerable advantage to large-scale industrial enterprises, it is prone to significant security challenges in the form of sophisticated attacks such as Advanced Persistent Threat (APT). APT is a serious security challenge to all kinds of networks, including I-IoT. It is a stealthy threat actor, c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 37 publications
(22 citation statements)
references
References 44 publications
0
22
0
Order By: Relevance
“…Table 4 lists the experimental results of the proposed system on a five selected test sequences. It indicates that the proposed system has achieved 99% accuracy, precision, recall, and F1 score [26][27][28][29][30]. For a complete dataset, the overall accuracy of the proposed system is 97%.…”
Section: Experimental Analysismentioning
confidence: 83%
“…Table 4 lists the experimental results of the proposed system on a five selected test sequences. It indicates that the proposed system has achieved 99% accuracy, precision, recall, and F1 score [26][27][28][29][30]. For a complete dataset, the overall accuracy of the proposed system is 97%.…”
Section: Experimental Analysismentioning
confidence: 83%
“…One of the most common AI detection solutions used in the literature is AI techniques. Many AI techniques involving machine learning (ML) and deep learning (DL) that have been proposed by various researchers are either network-centric [1,3,6,7,79,[82][83][84][90][91][92][93]103,107,[111][112][113]116,118,121,125,130,131,[133][134][135][136][137][139][140][141][142][143][144][145][146][147][148][149][150][151][152], device behavior-centric [105,109,138], application-centric [5,86,110,…”
Section: Rq2: What Are the Proposed Defensive Mechanisms Available To...mentioning
confidence: 99%
“…e input parameters for the ABPNN and SVM algorithms are listed in Tables 3 and 4, respectively [50][51][52]. Tables 5 and 6 show the confusion matrix of ABPNN during the training and testing phase, respectively.…”
Section: Mathematical Problems In Engineeringmentioning
confidence: 99%