A Novel Approach for Network Vulnerability Analysis in IIoT

被引:1
|
作者
Sudhakar, K. [1 ]
Senthilkumar, S. [1 ]
机构
[1] Univ Coll Engn, Dept Comp Sci & Engn, Rajamadam 614701, India
来源
关键词
Industrial internet of things (iiot); attack detection; features selection; maximum posterior dichotomous quadratic discriminant analysis; jaccardized rocchio emphasis boost classification; INDUSTRIAL INTERNET; INTRUSION DETECTION; SECURITY; IOT;
D O I
10.32604/csse.2023.029680
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Industrial Internet of Things (IIoT) offers efficient communication among business partners and customers. With an enlargement of IoT tools connected through the internet, the ability of web traffic gets increased. Due to the raise in the size of network traffic, discovery of attacks in IIoT and malicious traffic in the early stages is a very demanding issues. A novel technique called Maximum Posterior Dichotomous Quadratic Discriminant Jaccardized Rocchio Emphasis Boost Classification (MPDQDJREBC) is introduced for accurate attack detection with minimum time consumption in IIoT. The proposed MPDQDJREBC technique includes feature selection and categorization. First, the network traffic features are collected from the dataset. Then applying the Maximum Posterior Dichotomous Quadratic Discriminant analysis to find the significant features for accurate classification and minimize the time consumption. After the significant features selection, classification is performed using the Jaccardized Rocchio Emphasis Boost technique. Jaccardized Rocchio Emphasis Boost Classification technique combines the weak learner result into strong output. Jaccardized Rocchio classification technique is considered as the weak learners to identify the normal and attack. Thus, proposed MPDQDJREBC technique gives strong classification results through lessening the quadratic error. This assists for proposed MPDQDJREBC technique to get better the accuracy for attack detection with reduced time usage. Experimental assessment is carried out with UNSW_NB15 Dataset using different factors such as accuracy, precision, recall, F-measure and attack detection time. The observed results exhibit the MPDQDJREBC technique provides higher accuracy and lesser time consumption than the conventional techniques.
引用
收藏
页码:263 / 277
页数:15
相关论文
共 50 条
  • [21] An approach for modeling vulnerability of the network of networks
    Zhang, Jianhua
    Song, Bo
    Zhang, Zhaojun
    Liu, Haikuan
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2014, 412 : 127 - 136
  • [22] Large-scale road network vulnerability analysis: a sensitivity analysis based approach
    Luathep, Paramet
    Sumalee, Agachai
    Ho, H. W.
    Kurauchi, Fumitaka
    TRANSPORTATION, 2011, 38 (05) : 799 - 817
  • [23] Large-scale road network vulnerability analysis: a sensitivity analysis based approach
    Paramet Luathep
    Agachai Sumalee
    H. W. Ho
    Fumitaka Kurauchi
    Transportation, 2011, 38 : 799 - 817
  • [24] Novel Approach for Vulnerability Analysis in Pilot Smart Power Grid System
    Yadav, Dharmendra
    Mahajan, Anjali
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (07): : 48 - 53
  • [25] Vulnerability Analysis of the Financial Network
    Khabazian, Aein
    Peng, Jiming
    MANAGEMENT SCIENCE, 2019, 65 (07) : 3302 - 3321
  • [26] A Novel Network Modeling and Evaluation Approach for Security Vulnerability Quantification in Substation Automation Systems
    Ko, Jongbin
    Lee, Seokjun
    Lim, Yong-hun
    Ju, Seong-ho
    Shon, Taeshik
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2013, E96D (09): : 2021 - 2025
  • [27] A framework for network vulnerability analysis
    Qu, GZ
    Rudraraju, J
    Modukuri, R
    Hariri, S
    Raghavendra, CS
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INTERNET, AND INFORMATION TECHNOLOGY, 2002, : 289 - 294
  • [28] A Novel Deep Reinforcement Approach for IIoT Microgrid Energy Management Systems
    Dridi, Aicha
    Afifi, Hossam
    Moungla, Hassine
    Badosa, Jordi
    IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, 2022, 6 (01): : 148 - 159
  • [29] A Novel Approach for Software Vulnerability Classification
    Li, Xiaodan
    Chang, Xiaolin
    Board, John A.
    Trivedi, Kishor S.
    2017 ANNUAL RELIABILITY AND MAINTAINABILITY SYMPOSIUM, 2017,
  • [30] Network vulnerability: An approach to reliability analysis at the level of national strategic transport networks
    D'Este, GM
    Taylor, MAP
    NETWORK RELIABILITY OF TRANSPORT, PROCEEDINGS, 2003, : 23 - 44