Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models

被引:3
|
作者
Casajus-Setien, Jorge [1 ]
Bielza, Concha [1 ]
Larranaga, Pedro [1 ]
机构
[1] Univ Politecn Madrid, Computat Intelligence Grp, Madrid, Spain
关键词
D O I
10.1109/CSR57506.2023.10224965
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increase of device connectivity in Industry 4.0, securing industrial networks to defend them against cyberattacks has become a primary concern. Motivated by the huge data generated by devices in industrial environments, artificial intelligence has emerged as a promising complement to traditional cybersecurity. In order to gain insight about the possibility of cyberattacks, we propose a novel methodology to analyze industrial network traffic in real time exploiting the sequence modelling capabilities of the transformer architecture, widely used by the GPT model family for sequential language generation. We demonstrate that our method provides state-of-the art performance with promising explainability potential.
引用
收藏
页码:72 / 77
页数:6
相关论文
共 50 条
  • [41] Generating Datasets for Anomaly-Based Intrusion Detection Systems in IoT and Industrial IoT Networks
    Essop, Ismael
    Ribeiro, Jose C.
    Papaioannou, Maria
    Zachos, Georgios
    Mantas, Georgios
    Rodriguez, Jonathan
    SENSORS, 2021, 21 (04) : 1 - 31
  • [42] Anomaly-based Network Intrusion Detection using Ensemble Machine Learning Approach
    Das, Abhijit
    Pramod
    Sunitha, B. S.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (02) : 635 - 645
  • [43] Accuracy improvement of anomaly-based intrusion detection system using Taguchi method
    Konno, T
    Tateoka, M
    2005 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2005, : 90 - 93
  • [44] Personal anomaly-based intrusion detection smart card using behavioural analysis
    Rossudowski, A. M.
    Venter, H. S.
    Eloff, J. H. P.
    NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS, 2007, 232 : 217 - +
  • [45] Adaptive anomaly-based intrusion detection system using genetic algorithm and profiling
    Alves Resende, Paulo Angelo
    Drummond, Andre Costa
    SECURITY AND PRIVACY, 2018, 1 (04):
  • [46] Incremental Anomaly-based Intrusion Detection System Using Limited Labeled Data
    Alaei, Parisa
    Noorbehbahani, Fakhroddin
    2017 3RD INTERNATIONAL CONFERENCE ON WEB RESEARCH (ICWR), 2017, : 178 - 184
  • [47] Combining Passive Autoconfiguration and Anomaly-based Intrusion Detection in Ad-hoc Networks
    Schuhmann, Stephan
    Voelker, Lars
    ASWN 2008: EIGHTH INTERNATIONAL WORKSHOP ON APPLICATIONS AND SERVICES IN WIRELESS NETWORKS, PROCEEDINGS, 2008, : 87 - +
  • [48] Anomaly-based intrusion detection using mobility profiles of public transportation users
    Hall, J
    Barbeau, M
    Kranakis, E
    WIMOB'2005: IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, VOL 2, PROCEEDINGS: MOBILE NETWORKING, 2005, : 17 - 24
  • [49] Anomaly-based Network Intrusion Detection Model using Deep Learning in Airports
    Sczari, Behrooz
    Moller, Dietmar P. F.
    Deutschmann, Andreas
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1725 - 1729
  • [50] Anomaly-based intrusion monitoring using a dynamic honeypot
    Hieb, J
    Graham, JH
    PROCEEDINGS OF THE ISCA 20TH INTERNATIONAL CONFERENCE ON COMPUTERS AND THEIR APPLICATIONS, 2005, : 184 - 189