A Novel Approach for Network Vulnerability Analysis in IIoT

被引:1
|
作者
Sudhakar, K. [1 ]
Senthilkumar, S. [1 ]
机构
[1] Univ Coll Engn, Dept Comp Sci & Engn, Rajamadam 614701, India
来源
关键词
Industrial internet of things (iiot); attack detection; features selection; maximum posterior dichotomous quadratic discriminant analysis; jaccardized rocchio emphasis boost classification; INDUSTRIAL INTERNET; INTRUSION DETECTION; SECURITY; IOT;
D O I
10.32604/csse.2023.029680
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Industrial Internet of Things (IIoT) offers efficient communication among business partners and customers. With an enlargement of IoT tools connected through the internet, the ability of web traffic gets increased. Due to the raise in the size of network traffic, discovery of attacks in IIoT and malicious traffic in the early stages is a very demanding issues. A novel technique called Maximum Posterior Dichotomous Quadratic Discriminant Jaccardized Rocchio Emphasis Boost Classification (MPDQDJREBC) is introduced for accurate attack detection with minimum time consumption in IIoT. The proposed MPDQDJREBC technique includes feature selection and categorization. First, the network traffic features are collected from the dataset. Then applying the Maximum Posterior Dichotomous Quadratic Discriminant analysis to find the significant features for accurate classification and minimize the time consumption. After the significant features selection, classification is performed using the Jaccardized Rocchio Emphasis Boost technique. Jaccardized Rocchio Emphasis Boost Classification technique combines the weak learner result into strong output. Jaccardized Rocchio classification technique is considered as the weak learners to identify the normal and attack. Thus, proposed MPDQDJREBC technique gives strong classification results through lessening the quadratic error. This assists for proposed MPDQDJREBC technique to get better the accuracy for attack detection with reduced time usage. Experimental assessment is carried out with UNSW_NB15 Dataset using different factors such as accuracy, precision, recall, F-measure and attack detection time. The observed results exhibit the MPDQDJREBC technique provides higher accuracy and lesser time consumption than the conventional techniques.
引用
收藏
页码:263 / 277
页数:15
相关论文
共 50 条
  • [41] Network Analysis: A Novel Approach to Understand Suicidal Behaviour
    de Beurs, Derek
    INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH, 2017, 14 (03):
  • [42] Performance Analysis of Physical-Layer Network Coding for IIoT Applications
    Yassin, Alaa A.
    Saeed, Rashid A.
    Yousif, Ebtihal H. G.
    Khalifa, Othman O.
    9TH INTERNATIONAL CONFERENCE ON MECHATRONICS ENGINEERING, ICOM 2024, 2024, : 374 - 379
  • [43] Vulnerability cloud: A novel approach to assess the vulnerability of critical infrastructure systems
    Meng, Lingpeng
    Yao, Xiaobo
    Chen, Qian
    Han, Chuanfeng
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (21):
  • [44] Vulnerability analysis of power communication network
    Fan, Bing
    Tang, Liangrui
    Zhongguo Dianji Gongcheng Xuebao/Proceedings of the Chinese Society of Electrical Engineering, 2014, 34 (07): : 1191 - 1197
  • [45] Vulnerability modelling for the analysis of network attacks
    Maggi, Paolo
    Pozza, Davide
    Sisto, Riccardo
    DEPCOS - RELCOMEX 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DEPENDABILITY OF COMPUTER SYSTEMS, 2008, : 15 - 22
  • [46] A Methodological Overview of Network Vulnerability Analysis
    Murray, Alan T.
    Matisziw, Timothy C.
    Grubesic, Tony H.
    GROWTH AND CHANGE, 2008, 39 (04) : 573 - 592
  • [47] Vulnerability Analysis of the Optical Network NMS
    Ma, Juntao
    Zhang, Lei
    Zhang, Shaokun
    Yao, Xinlei
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 1185 - 1187
  • [48] Computational complexity of network vulnerability analysis
    Berberler, Murat Ersen
    ACTA UNIVERSITATIS SAPIENTIAE INFORMATICA, 2022, 14 (02) : 199 - 207
  • [49] Vulnerability Analysis on the Cloud Network Topology
    Chen, Ke
    Zhang, Hua
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING 2015 (ICMMCCE 2015), 2015, 39 : 3007 - 3012
  • [50] Vulnerability Analysis of Intelligent Network System
    Yan, Danfeng
    Yang, Fangchun
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 282 - 285