Matyas–Meyer Oseas based device profiling for anomaly detection via deep reinforcement learning (MMODPAD-DRL) in zero trust security network

The exposure of zero trust security in the Industrial Internet of Things (IIoT) increased in importance in the era where there is a huge risk of injection of malicious entities and owning the device by an unauthorized user. The gap in the existing approach of zero trust security is that continuous v...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computing 2024-06, Vol.106 (6), p.1933-1962
Hauptverfasser: Dhanaraj, Rajesh Kumar, Singh, Anamika, Nayyar, Anand
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1962
container_issue 6
container_start_page 1933
container_title Computing
container_volume 106
creator Dhanaraj, Rajesh Kumar
Singh, Anamika
Nayyar, Anand
description The exposure of zero trust security in the Industrial Internet of Things (IIoT) increased in importance in the era where there is a huge risk of injection of malicious entities and owning the device by an unauthorized user. The gap in the existing approach of zero trust security is that continuous verification of devices is a time-consuming process and adversely affects the promising nature of the zero-trust model. Every time the node enters, even if the node is a member of the network, authorization of the node is necessary to ensure authenticity. This verification section of zero trust hinders the seamless working of the IIoT infrastructure. Therefore, the main objective of this paper is to propose the solution for the above-mentioned problem by enabling “device profiling” via deep reinforcement learning so that the same device can be identified and permitted access without hindering the working of Industrial Internet of Things infrastructure. The overall proposed approach works in different phases including the compression function for ensuring data confidentiality and integrity, then the device profiling is performed based on the features a device possesses, and lastly, deep reinforcement learning for anomaly detection. To test and validate the proposed approach, extensive experimentations were performed using measures such as false positive rate, data confidentiality rate, data integrity rate, and network access time, and results showed that the proposed technique titled “MMODPAD-DRL” outperforms the existing approaches in false positive rate by 27%, data confidentiality rate by 4% and data integrity rate by 3%, in addition, lessen the network access time by 20%.
doi_str_mv 10.1007/s00607-024-01269-y
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3062305179</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3062305179</sourcerecordid><originalsourceid>FETCH-LOGICAL-c270t-7a3fa55e4baf5abf287e4aa4469479fcec420b86de5bdb87269f9262711db75b3</originalsourceid><addsrcrecordid>eNp9kMFuEzEQhi0EEqHwApwscYGDy9hrr3ePVdOWSolSVSBxs7y748ol8QbbSbU98QRc-oZ9EtwGiRun0Wi-f0bzEfKewzEH0J8TQA2agZAMuKhbNr0gMy6rmilQ-iWZAXBgslHfX5M3Kd0CgKiadkZ-L22ebHr89bDECSNdJbSJdjbhQAfc-x7pNo7Or324oW6M1IZxY9dTGWbssx8D3XtbOtzSiD4UpMcNhkzXaGN4Sn1cLlfzq5M5m18vPlEf6D3Gkea4S5km7HfR54kGzHdj_PGWvHJ2nfDd33pEvp2ffT39whari8vTkwXrhYbMtK2cVQplZ52ynRONRmmtlHUrdet67KWArqkHVN3QNboYca2oheZ86LTqqiPy4bC3PPdzhymb23EXQzlpKqhFBYrrtlDiQPVxTCmiM9voNzZOhoN58m4O3k3xbp69m6mEqkMoFTjcYPy3-j-pP1f_ibE</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3062305179</pqid></control><display><type>article</type><title>Matyas–Meyer Oseas based device profiling for anomaly detection via deep reinforcement learning (MMODPAD-DRL) in zero trust security network</title><source>SpringerLink Journals - AutoHoldings</source><creator>Dhanaraj, Rajesh Kumar ; Singh, Anamika ; Nayyar, Anand</creator><creatorcontrib>Dhanaraj, Rajesh Kumar ; Singh, Anamika ; Nayyar, Anand</creatorcontrib><description>The exposure of zero trust security in the Industrial Internet of Things (IIoT) increased in importance in the era where there is a huge risk of injection of malicious entities and owning the device by an unauthorized user. The gap in the existing approach of zero trust security is that continuous verification of devices is a time-consuming process and adversely affects the promising nature of the zero-trust model. Every time the node enters, even if the node is a member of the network, authorization of the node is necessary to ensure authenticity. This verification section of zero trust hinders the seamless working of the IIoT infrastructure. Therefore, the main objective of this paper is to propose the solution for the above-mentioned problem by enabling “device profiling” via deep reinforcement learning so that the same device can be identified and permitted access without hindering the working of Industrial Internet of Things infrastructure. The overall proposed approach works in different phases including the compression function for ensuring data confidentiality and integrity, then the device profiling is performed based on the features a device possesses, and lastly, deep reinforcement learning for anomaly detection. To test and validate the proposed approach, extensive experimentations were performed using measures such as false positive rate, data confidentiality rate, data integrity rate, and network access time, and results showed that the proposed technique titled “MMODPAD-DRL” outperforms the existing approaches in false positive rate by 27%, data confidentiality rate by 4% and data integrity rate by 3%, in addition, lessen the network access time by 20%.</description><identifier>ISSN: 0010-485X</identifier><identifier>EISSN: 1436-5057</identifier><identifier>DOI: 10.1007/s00607-024-01269-y</identifier><language>eng</language><publisher>Vienna: Springer Vienna</publisher><subject>Access time ; Anomalies ; Artificial Intelligence ; Computer Appl. in Administrative Data Processing ; Computer Communication Networks ; Computer Science ; Confidentiality ; Cybersecurity ; Data integrity ; Deep learning ; Depth profiling ; Industrial applications ; Industrial Internet of Things ; Information Systems Applications (incl.Internet) ; Internet of Things ; Machine learning ; Nodes ; Regular Paper ; Software Engineering</subject><ispartof>Computing, 2024-06, Vol.106 (6), p.1933-1962</ispartof><rights>The Author(s), under exclusive licence to Springer-Verlag GmbH Austria, part of Springer Nature 2024. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c270t-7a3fa55e4baf5abf287e4aa4469479fcec420b86de5bdb87269f9262711db75b3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s00607-024-01269-y$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s00607-024-01269-y$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>Dhanaraj, Rajesh Kumar</creatorcontrib><creatorcontrib>Singh, Anamika</creatorcontrib><creatorcontrib>Nayyar, Anand</creatorcontrib><title>Matyas–Meyer Oseas based device profiling for anomaly detection via deep reinforcement learning (MMODPAD-DRL) in zero trust security network</title><title>Computing</title><addtitle>Computing</addtitle><description>The exposure of zero trust security in the Industrial Internet of Things (IIoT) increased in importance in the era where there is a huge risk of injection of malicious entities and owning the device by an unauthorized user. The gap in the existing approach of zero trust security is that continuous verification of devices is a time-consuming process and adversely affects the promising nature of the zero-trust model. Every time the node enters, even if the node is a member of the network, authorization of the node is necessary to ensure authenticity. This verification section of zero trust hinders the seamless working of the IIoT infrastructure. Therefore, the main objective of this paper is to propose the solution for the above-mentioned problem by enabling “device profiling” via deep reinforcement learning so that the same device can be identified and permitted access without hindering the working of Industrial Internet of Things infrastructure. The overall proposed approach works in different phases including the compression function for ensuring data confidentiality and integrity, then the device profiling is performed based on the features a device possesses, and lastly, deep reinforcement learning for anomaly detection. To test and validate the proposed approach, extensive experimentations were performed using measures such as false positive rate, data confidentiality rate, data integrity rate, and network access time, and results showed that the proposed technique titled “MMODPAD-DRL” outperforms the existing approaches in false positive rate by 27%, data confidentiality rate by 4% and data integrity rate by 3%, in addition, lessen the network access time by 20%.</description><subject>Access time</subject><subject>Anomalies</subject><subject>Artificial Intelligence</subject><subject>Computer Appl. in Administrative Data Processing</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Confidentiality</subject><subject>Cybersecurity</subject><subject>Data integrity</subject><subject>Deep learning</subject><subject>Depth profiling</subject><subject>Industrial applications</subject><subject>Industrial Internet of Things</subject><subject>Information Systems Applications (incl.Internet)</subject><subject>Internet of Things</subject><subject>Machine learning</subject><subject>Nodes</subject><subject>Regular Paper</subject><subject>Software Engineering</subject><issn>0010-485X</issn><issn>1436-5057</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNp9kMFuEzEQhi0EEqHwApwscYGDy9hrr3ePVdOWSolSVSBxs7y748ol8QbbSbU98QRc-oZ9EtwGiRun0Wi-f0bzEfKewzEH0J8TQA2agZAMuKhbNr0gMy6rmilQ-iWZAXBgslHfX5M3Kd0CgKiadkZ-L22ebHr89bDECSNdJbSJdjbhQAfc-x7pNo7Or324oW6M1IZxY9dTGWbssx8D3XtbOtzSiD4UpMcNhkzXaGN4Sn1cLlfzq5M5m18vPlEf6D3Gkea4S5km7HfR54kGzHdj_PGWvHJ2nfDd33pEvp2ffT39whari8vTkwXrhYbMtK2cVQplZ52ynRONRmmtlHUrdet67KWArqkHVN3QNboYca2oheZ86LTqqiPy4bC3PPdzhymb23EXQzlpKqhFBYrrtlDiQPVxTCmiM9voNzZOhoN58m4O3k3xbp69m6mEqkMoFTjcYPy3-j-pP1f_ibE</recordid><startdate>20240601</startdate><enddate>20240601</enddate><creator>Dhanaraj, Rajesh Kumar</creator><creator>Singh, Anamika</creator><creator>Nayyar, Anand</creator><general>Springer Vienna</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20240601</creationdate><title>Matyas–Meyer Oseas based device profiling for anomaly detection via deep reinforcement learning (MMODPAD-DRL) in zero trust security network</title><author>Dhanaraj, Rajesh Kumar ; Singh, Anamika ; Nayyar, Anand</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c270t-7a3fa55e4baf5abf287e4aa4469479fcec420b86de5bdb87269f9262711db75b3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Access time</topic><topic>Anomalies</topic><topic>Artificial Intelligence</topic><topic>Computer Appl. in Administrative Data Processing</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Confidentiality</topic><topic>Cybersecurity</topic><topic>Data integrity</topic><topic>Deep learning</topic><topic>Depth profiling</topic><topic>Industrial applications</topic><topic>Industrial Internet of Things</topic><topic>Information Systems Applications (incl.Internet)</topic><topic>Internet of Things</topic><topic>Machine learning</topic><topic>Nodes</topic><topic>Regular Paper</topic><topic>Software Engineering</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Dhanaraj, Rajesh Kumar</creatorcontrib><creatorcontrib>Singh, Anamika</creatorcontrib><creatorcontrib>Nayyar, Anand</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Dhanaraj, Rajesh Kumar</au><au>Singh, Anamika</au><au>Nayyar, Anand</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Matyas–Meyer Oseas based device profiling for anomaly detection via deep reinforcement learning (MMODPAD-DRL) in zero trust security network</atitle><jtitle>Computing</jtitle><stitle>Computing</stitle><date>2024-06-01</date><risdate>2024</risdate><volume>106</volume><issue>6</issue><spage>1933</spage><epage>1962</epage><pages>1933-1962</pages><issn>0010-485X</issn><eissn>1436-5057</eissn><abstract>The exposure of zero trust security in the Industrial Internet of Things (IIoT) increased in importance in the era where there is a huge risk of injection of malicious entities and owning the device by an unauthorized user. The gap in the existing approach of zero trust security is that continuous verification of devices is a time-consuming process and adversely affects the promising nature of the zero-trust model. Every time the node enters, even if the node is a member of the network, authorization of the node is necessary to ensure authenticity. This verification section of zero trust hinders the seamless working of the IIoT infrastructure. Therefore, the main objective of this paper is to propose the solution for the above-mentioned problem by enabling “device profiling” via deep reinforcement learning so that the same device can be identified and permitted access without hindering the working of Industrial Internet of Things infrastructure. The overall proposed approach works in different phases including the compression function for ensuring data confidentiality and integrity, then the device profiling is performed based on the features a device possesses, and lastly, deep reinforcement learning for anomaly detection. To test and validate the proposed approach, extensive experimentations were performed using measures such as false positive rate, data confidentiality rate, data integrity rate, and network access time, and results showed that the proposed technique titled “MMODPAD-DRL” outperforms the existing approaches in false positive rate by 27%, data confidentiality rate by 4% and data integrity rate by 3%, in addition, lessen the network access time by 20%.</abstract><cop>Vienna</cop><pub>Springer Vienna</pub><doi>10.1007/s00607-024-01269-y</doi><tpages>30</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0010-485X
ispartof Computing, 2024-06, Vol.106 (6), p.1933-1962
issn 0010-485X
1436-5057
language eng
recordid cdi_proquest_journals_3062305179
source SpringerLink Journals - AutoHoldings
subjects Access time
Anomalies
Artificial Intelligence
Computer Appl. in Administrative Data Processing
Computer Communication Networks
Computer Science
Confidentiality
Cybersecurity
Data integrity
Deep learning
Depth profiling
Industrial applications
Industrial Internet of Things
Information Systems Applications (incl.Internet)
Internet of Things
Machine learning
Nodes
Regular Paper
Software Engineering
title Matyas–Meyer Oseas based device profiling for anomaly detection via deep reinforcement learning (MMODPAD-DRL) in zero trust security network
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T20%3A17%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Matyas%E2%80%93Meyer%20Oseas%20based%20device%20profiling%20for%20anomaly%20detection%20via%20deep%20reinforcement%20learning%20(MMODPAD-DRL)%20in%20zero%20trust%20security%20network&rft.jtitle=Computing&rft.au=Dhanaraj,%20Rajesh%20Kumar&rft.date=2024-06-01&rft.volume=106&rft.issue=6&rft.spage=1933&rft.epage=1962&rft.pages=1933-1962&rft.issn=0010-485X&rft.eissn=1436-5057&rft_id=info:doi/10.1007/s00607-024-01269-y&rft_dat=%3Cproquest_cross%3E3062305179%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3062305179&rft_id=info:pmid/&rfr_iscdi=true