Trustworthy and Reliable Deep-Learning-Based Cyberattack Detection in Industrial IoT

Fazlullah Khan, Ryan Alturki, Md Arafatur Rahman, Spyridon Mastorakis, Imran Razzak, Syed Tauhidullah Shah

Research output: Journal PublicationArticlepeer-review

19 Citations (Scopus)

Abstract

A fundamental expectation of the stakeholders from the Industrial Internet of Things (IIoT) is its trustworthiness and sustainability to avoid the loss of human lives in performing a critical task. A trustworthy IIoT-enabled network encompasses fundamental security characteristics, such as trust, privacy, security, reliability, resilience, and safety. The traditional security mechanisms and procedures are insufficient to protect these networks owing to protocol differences, limited update options, and older adaptations of the security mechanisms. As a result, these networks require novel approaches to increase trust-level and enhance security and privacy mechanisms. Therefore, in this article, we propose a novel approach to improve the trustworthiness of IIoT-enabled networks. We propose an accurate and reliable supervisory control and data acquisition (SCADA) network-based cyberattack detection in these networks. The proposed scheme combines the deep-learning-based pyramidal recurrent units (PRU) and decision tree (DT) with SCADA-based IIoT networks. We also use an ensemble-learning method to detect cyberattacks in SCADA-based IIoT networks. The nonlinear learning ability of PRU and the ensemble DT address the sensitivity of irrelevant features, allowing high detection rates. The proposed scheme is evaluated on 15 datasets generated from SCADA-based networks. The experimental results show that the proposed scheme outperforms traditional methods and machine learning-based detection approaches. The proposed scheme improves the security and associated measure of trustworthiness in IIoT-enabled networks.

Original languageEnglish
Pages (from-to)1030-1038
Number of pages9
JournalIEEE Transactions on Industrial Informatics
Volume19
Issue number1
DOIs
Publication statusPublished - 1 Jan 2023
Externally publishedYes

Keywords

  • Cybersecurity
  • Industrial Internet of Things (IIoT)
  • data acquisition networks
  • deep learning
  • supervisory control
  • trustworthiness

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Information Systems
  • Computer Science Applications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Trustworthy and Reliable Deep-Learning-Based Cyberattack Detection in Industrial IoT'. Together they form a unique fingerprint.

Cite this