A Novel Approach for Network Vulnerability Analysis in IIoT

被引:1
|
作者
Sudhakar, K. [1 ]
Senthilkumar, S. [1 ]
机构
[1] Univ Coll Engn, Dept Comp Sci & Engn, Rajamadam 614701, India
来源
关键词
Industrial internet of things (iiot); attack detection; features selection; maximum posterior dichotomous quadratic discriminant analysis; jaccardized rocchio emphasis boost classification; INDUSTRIAL INTERNET; INTRUSION DETECTION; SECURITY; IOT;
D O I
10.32604/csse.2023.029680
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Industrial Internet of Things (IIoT) offers efficient communication among business partners and customers. With an enlargement of IoT tools connected through the internet, the ability of web traffic gets increased. Due to the raise in the size of network traffic, discovery of attacks in IIoT and malicious traffic in the early stages is a very demanding issues. A novel technique called Maximum Posterior Dichotomous Quadratic Discriminant Jaccardized Rocchio Emphasis Boost Classification (MPDQDJREBC) is introduced for accurate attack detection with minimum time consumption in IIoT. The proposed MPDQDJREBC technique includes feature selection and categorization. First, the network traffic features are collected from the dataset. Then applying the Maximum Posterior Dichotomous Quadratic Discriminant analysis to find the significant features for accurate classification and minimize the time consumption. After the significant features selection, classification is performed using the Jaccardized Rocchio Emphasis Boost technique. Jaccardized Rocchio Emphasis Boost Classification technique combines the weak learner result into strong output. Jaccardized Rocchio classification technique is considered as the weak learners to identify the normal and attack. Thus, proposed MPDQDJREBC technique gives strong classification results through lessening the quadratic error. This assists for proposed MPDQDJREBC technique to get better the accuracy for attack detection with reduced time usage. Experimental assessment is carried out with UNSW_NB15 Dataset using different factors such as accuracy, precision, recall, F-measure and attack detection time. The observed results exhibit the MPDQDJREBC technique provides higher accuracy and lesser time consumption than the conventional techniques.
引用
收藏
页码:263 / 277
页数:15
相关论文
共 50 条
  • [1] A New Approach for Network Vulnerability Analysis
    Vu, Hai L.
    Khaw, Kenneth K.
    Chen, Tsong Yueh
    COMPUTER JOURNAL, 2015, 58 (04): : 878 - 891
  • [2] A New Approach for Network Vulnerability Analysis
    Vu, Hai L.
    Khaw, Kenneth K.
    Chen, T. Y.
    Kuo, Fei-Ching
    2008 IEEE 33RD CONFERENCE ON LOCAL COMPUTER NETWORKS, VOLS 1 AND 2, 2008, : 189 - +
  • [3] Vulnerability survival analysis: A novel approach to vulnerability management
    Farris, Katheryn A.
    Sullivan, John
    Cybenko, George
    SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C3I) TECHNOLOGIES FOR HOMELAND SECURITY, DEFENSE, AND LAW ENFORCEMENT APPLICATIONS XVI, 2017, 10184
  • [4] The stochastic approach in road network vulnerability analysis
    Bil, Michal
    Vodak, Rostislav
    SAFETY AND RELIABILITY: METHODOLOGY AND APPLICATIONS, 2015, : 929 - 932
  • [5] Worldwide aviation network vulnerability analysis: a complex network approach
    Q. H. Anh Tran
    Akira Namatame
    Evolutionary and Institutional Economics Review, 2015, 12 (2) : 349 - 373
  • [6] Worldwide aviation network vulnerability analysis: a complex network approach
    Tran, Q. H. Anh
    Namatame, Akira
    EVOLUTIONARY AND INSTITUTIONAL ECONOMICS REVIEW, 2015, 12 (02) : 349 - 373
  • [7] A Survey of IIoT Protocols: A Measure of Vulnerability Risk Analysis Based on CVSS
    Figueroa-Lorenzo, Santiago
    Anorga, Javier
    Arrizabalaga, Saioa
    ACM COMPUTING SURVEYS, 2020, 53 (02)
  • [8] A novel approach based on adaptive online analysis of encrypted traffic for identifying Malware in IIoT
    Niu, Zequn
    Xue, Jingfeng
    Qu, Dacheng
    Wang, Yong
    Zheng, Jun
    Zhu, Hongfei
    INFORMATION SCIENCES, 2022, 601 : 162 - 174
  • [9] A Novel Approach of Latency and Energy Efficiency Analysis of IIoT With SQL and NoSQL Databases Communication
    Kenitar, Soukaina Bakhat
    Arioua, Mounir
    Yahyaoui, Mohammed
    IEEE ACCESS, 2023, 11 : 129247 - 129257
  • [10] A Continuum Modeling Approach for Network Vulnerability Analysis at Regional Scale
    Ho, H. W.
    Sumalee, Agachai
    Lam, William H. K.
    Szeto, W. Y.
    20TH INTERNATIONAL SYMPOSIUM ON TRANSPORTATION AND TRAFFIC THEORY (ISTTT 2013), 2013, 80 : 846 - 859