Skip to main content
Log in

DL-SkLSTM approach for cyber security threats detection in 5G enabled IIoT

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

The advancement of 5G technology has enabled the IIoT (Industrial Internet of Things) to integrate artificial intelligence, cloud computing, and edge computing in real-time, leading to an improvement in industrial procedures in terms of efficiency. Despite the benefits of 5G technology for the IIoT, it also introduces new security risks and complexity to the control systems used in these ecosystems. Recent cyber-attacks are increasingly targeting vulnerable IoT devices, highlighting the need for enhanced security and privacy measures. To address this issue, this study proposes a 5G-based system that utilizes the DL-SkLSTM (Deep Learning- Stacked Long Short-Term Memory) based architecture to detect and classify the cyber-attack on a publicly accessible IIoT dataset, namely the Edge-IIoTset. SkLSTM is used to differentiate various cyberattacks. Finally, conducting a comprehensive analysis and comparison, we have identified that the proposed system outperforms several state-of-the-art DL and machine learning techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Algorithm 1:
Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Ahmad M, Ahmed I, Jeon G (2021) An IoT-enabled real-time overhead view person detection system based on Cascade-RCNN and transfer learning. J Real Time Image Proc 18:1129–1139

    Article  Google Scholar 

  2. Moustafa N et al (2020) Federated TON_IoT Windows datasets for evaluating AI-based security applications. In: 2020 IEEE 19th international conference on trust, security, and privacy in computing and communications (TrustCom). IEEE

  3. The internet of things 2020: here's what over 400 IoT decision-makers say about the future of enterprise connectivity and how iot companies can use it to grow revenue. https://www.businessinsider.com/internet-of-thingsreport?IR=T, https://www.fortunebusinessinsights.com/industry-reports/internet-of-things-iot-market-100307. Accessed 3 Jan 2022

  4. Ahmed I et al (2022) A multilayer deep learning approach for malware classification in 5G-enabled IIoT. IEEE Trans Ind Inform 19(2):1495–1503

    Article  MathSciNet  Google Scholar 

  5. Karthic S, Manoj Kumar S, Senthil Prakash PN (2022) Grey wolf-based feature reduction for intrusion detection in WSN using LSTM. Int J Inf Technol 14(7):3719–3724

    Google Scholar 

  6. Pajouh HH et al (2016) A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans Emerg Top Comput 7(2):314–323

    Article  Google Scholar 

  7. Roopak M, Tian GY, Chambers J (2019) Deep learning models for cyber security in IoT networks. In: 2019 IEEE 9th annual computing and communication workshop and conference (CCWC). IEEE

  8. de Elias EM et al (2022) A hybrid CNN-LSTM model for IIoT edge privacy-aware intrusion detection. In: 2022 IEEE Latin-American conference on communications (LATINCOM). IEEE

  9. Tareq I et al (2022) Analysis of ToN-IoT, UNW-NB15, and edge-IIoT datasets using DL in cybersecurity for IoT. Appl Sci 12(19):9572

    Article  Google Scholar 

  10. Alsamiri J, Alsubhi K (2019) Internet of things cyber-attack detection using machine learning. Int J Adv Comput Sci Appl. https://doi.org/10.14569/IJACSA.2019.0101280

    Article  Google Scholar 

  11. Al-Taleb N, Saqib NA (2022) Towards a hybrid machine learning model for intelligent cyber threat identification in smart city environments. Appl Sci 12(4):1863

    Article  Google Scholar 

  12. Ferrag MA et al (2022) Edge-IIoTset: a new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning. IEEE Access 10:40281–40306

    Article  Google Scholar 

  13. Ghourabi A (2022) A security model based on lightGBM and transformer to protect healthcare systems from cyberattacks. IEEE Access 10:48890–48903

    Article  Google Scholar 

  14. Ullah I, Mahmoud QH (2022) An anomaly detection model for IoT networks based on flow and flag features using a feed-forward neural network. In: 2022 IEEE 19th annual consumer communications & networking conference (CCNC). IEEE

  15. Kumar R et al (2021) SP2F: a secured privacy-preserving framework for smart agricultural unmanned aerial vehicles. Comput Netw 187:107819

    Article  Google Scholar 

  16. Shahin M et al (2022) A novel fully convolutional neural network approach for detection and classification of attacks on industrial IoT devices in smart manufacturing systems. Int J Adv Manuf Technol 123:2017–2029

    Article  Google Scholar 

  17. Khacha A et al (2022) Hybrid deep learning-based intrusion detection system for industrial internet of things. In: 2022 5th International symposium on informatics and its applications (ISIA). IEEE

  18. Ashok Kumar D, Venugopalan SR (2019) A design of a parallel network anomaly detection algorithm based on classification. Int J Inf Technol 14:2079–2092

    Google Scholar 

  19. Hnamte V, Hussain J (2023) An efficient DDoS attack detection mechanism in SDN environment. Int J Inf Technol. https://doi.org/10.21203/rs.3.rs-2393388/v1

    Article  Google Scholar 

  20. Sunkara S, Suresh T, Sathiyasuntharam V (2023) Red fox optimizer-based feature selection with optimal deep learning-based Intrusion detection for network security. Int J Inf Technol 15:4437–4447

    Google Scholar 

  21. AbdulRaheem M et al (2023) Machine learning assisted snort and zeek in detecting DDoS attacks in software-defined networking. Int J Inf Technol. https://doi.org/10.1007/s41870-023-01469-3

    Article  Google Scholar 

  22. Usoh M et al (2023) A hybrid machine learning model for detecting cybersecurity threats in IoT applications. Int J Inf Technol 15(6):3359–3370

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anjali Rajak.

Ethics declarations

Conflict of interest

The authors have no competing interests to declare that are relevant to the content of this article.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rajak, A., Tripathi, R. DL-SkLSTM approach for cyber security threats detection in 5G enabled IIoT. Int. j. inf. tecnol. 16, 13–20 (2024). https://doi.org/10.1007/s41870-023-01651-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41870-023-01651-7

Keywords

Navigation