Abstract
The advancement of 5G technology has enabled the IIoT (Industrial Internet of Things) to integrate artificial intelligence, cloud computing, and edge computing in real-time, leading to an improvement in industrial procedures in terms of efficiency. Despite the benefits of 5G technology for the IIoT, it also introduces new security risks and complexity to the control systems used in these ecosystems. Recent cyber-attacks are increasingly targeting vulnerable IoT devices, highlighting the need for enhanced security and privacy measures. To address this issue, this study proposes a 5G-based system that utilizes the DL-SkLSTM (Deep Learning- Stacked Long Short-Term Memory) based architecture to detect and classify the cyber-attack on a publicly accessible IIoT dataset, namely the Edge-IIoTset. SkLSTM is used to differentiate various cyberattacks. Finally, conducting a comprehensive analysis and comparison, we have identified that the proposed system outperforms several state-of-the-art DL and machine learning techniques.
Similar content being viewed by others
References
Ahmad M, Ahmed I, Jeon G (2021) An IoT-enabled real-time overhead view person detection system based on Cascade-RCNN and transfer learning. J Real Time Image Proc 18:1129–1139
Moustafa N et al (2020) Federated TON_IoT Windows datasets for evaluating AI-based security applications. In: 2020 IEEE 19th international conference on trust, security, and privacy in computing and communications (TrustCom). IEEE
The internet of things 2020: here's what over 400 IoT decision-makers say about the future of enterprise connectivity and how iot companies can use it to grow revenue. https://www.businessinsider.com/internet-of-thingsreport?IR=T, https://www.fortunebusinessinsights.com/industry-reports/internet-of-things-iot-market-100307. Accessed 3 Jan 2022
Ahmed I et al (2022) A multilayer deep learning approach for malware classification in 5G-enabled IIoT. IEEE Trans Ind Inform 19(2):1495–1503
Karthic S, Manoj Kumar S, Senthil Prakash PN (2022) Grey wolf-based feature reduction for intrusion detection in WSN using LSTM. Int J Inf Technol 14(7):3719–3724
Pajouh HH et al (2016) A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans Emerg Top Comput 7(2):314–323
Roopak M, Tian GY, Chambers J (2019) Deep learning models for cyber security in IoT networks. In: 2019 IEEE 9th annual computing and communication workshop and conference (CCWC). IEEE
de Elias EM et al (2022) A hybrid CNN-LSTM model for IIoT edge privacy-aware intrusion detection. In: 2022 IEEE Latin-American conference on communications (LATINCOM). IEEE
Tareq I et al (2022) Analysis of ToN-IoT, UNW-NB15, and edge-IIoT datasets using DL in cybersecurity for IoT. Appl Sci 12(19):9572
Alsamiri J, Alsubhi K (2019) Internet of things cyber-attack detection using machine learning. Int J Adv Comput Sci Appl. https://doi.org/10.14569/IJACSA.2019.0101280
Al-Taleb N, Saqib NA (2022) Towards a hybrid machine learning model for intelligent cyber threat identification in smart city environments. Appl Sci 12(4):1863
Ferrag MA et al (2022) Edge-IIoTset: a new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning. IEEE Access 10:40281–40306
Ghourabi A (2022) A security model based on lightGBM and transformer to protect healthcare systems from cyberattacks. IEEE Access 10:48890–48903
Ullah I, Mahmoud QH (2022) An anomaly detection model for IoT networks based on flow and flag features using a feed-forward neural network. In: 2022 IEEE 19th annual consumer communications & networking conference (CCNC). IEEE
Kumar R et al (2021) SP2F: a secured privacy-preserving framework for smart agricultural unmanned aerial vehicles. Comput Netw 187:107819
Shahin M et al (2022) A novel fully convolutional neural network approach for detection and classification of attacks on industrial IoT devices in smart manufacturing systems. Int J Adv Manuf Technol 123:2017–2029
Khacha A et al (2022) Hybrid deep learning-based intrusion detection system for industrial internet of things. In: 2022 5th International symposium on informatics and its applications (ISIA). IEEE
Ashok Kumar D, Venugopalan SR (2019) A design of a parallel network anomaly detection algorithm based on classification. Int J Inf Technol 14:2079–2092
Hnamte V, Hussain J (2023) An efficient DDoS attack detection mechanism in SDN environment. Int J Inf Technol. https://doi.org/10.21203/rs.3.rs-2393388/v1
Sunkara S, Suresh T, Sathiyasuntharam V (2023) Red fox optimizer-based feature selection with optimal deep learning-based Intrusion detection for network security. Int J Inf Technol 15:4437–4447
AbdulRaheem M et al (2023) Machine learning assisted snort and zeek in detecting DDoS attacks in software-defined networking. Int J Inf Technol. https://doi.org/10.1007/s41870-023-01469-3
Usoh M et al (2023) A hybrid machine learning model for detecting cybersecurity threats in IoT applications. Int J Inf Technol 15(6):3359–3370
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors have no competing interests to declare that are relevant to the content of this article.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Rajak, A., Tripathi, R. DL-SkLSTM approach for cyber security threats detection in 5G enabled IIoT. Int. j. inf. tecnol. 16, 13–20 (2024). https://doi.org/10.1007/s41870-023-01651-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41870-023-01651-7