2021
DOI: 10.14569/ijacsa.2021.0120411
|View full text |Cite
|
Sign up to set email alerts
|

Deep Learning Approaches for Intrusion Detection in IIoT Networks – Opportunities and Future Directions

Abstract: In recent years, the Industrial Internet of things (IIoT) is a fastest advancing innovative technology with a potential to digitize and interconnect many industries for huge business opportunities and development of global GDP. IIoT is used in diverse range of industries such as manufacturing, logistics, transportation, oil and gas, mining and metals, energy utilities and aviation. Although IIoT provides promising opportunities for the development of different industrial applications, they are prone to cyberat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 21 publications
(18 citation statements)
references
References 35 publications
0
18
0
Order By: Relevance
“…But it failed to apply the efficient machine learning technique for improving the accuracy of attack detection. A deep learning-based IDS method was developed in [15] for IIoT. However, securing IIoT network from various kinds of malicious activities was considered.…”
Section: Related Workmentioning
confidence: 99%
“…But it failed to apply the efficient machine learning technique for improving the accuracy of attack detection. A deep learning-based IDS method was developed in [15] for IIoT. However, securing IIoT network from various kinds of malicious activities was considered.…”
Section: Related Workmentioning
confidence: 99%
“…First, a sigmoid layer is implemented that sets the output of the cell state based on the values received. Equation (5). represents this operation.…”
Section: Figure 1 Simple Recurrent Neural Network With Loops Characte...mentioning
confidence: 99%
“…The wide range of sensors in the IIoT network creates a significant volume of data, which has caught the interest of hackers worldwide. When it comes to protecting IIoT applications from cyberattacks, the intrusion detection system (IDS), which monitors network traffic and identifies network behavior, is regarded as one of the most important security measures [5]. As the IoT network technology continues to advance, cyber-attack detection measures are becoming more important in assuring the security of IoT networks.…”
Section: Introductionmentioning
confidence: 99%
“…From Figure 2 , the identification of industrial IoT intrusion by this model mainly includes the following three steps: Data preprocessing: build an industrial IoT environment and capture real-time network data, including source address, target address, connection attributes, and other relevant information [ 24 , 25 ]. The data are preprocessed and transformed into a format that can be processed by the stacked noise reduction convolutional autoencoder.…”
Section: Intrusion Detection Model Of Iiotmentioning
confidence: 99%