Matyas–Meyer Oseas based device profiling for anomaly detection via deep reinforcement learning (MMODPAD-DRL) in zero trust security network
The exposure of zero trust security in the Industrial Internet of Things (IIoT) increased in importance in the era where there is a huge risk of injection of malicious entities and owning the device by an unauthorized user. The gap in the existing approach of zero trust security is that continuous v...
Gespeichert in:
Veröffentlicht in: | Computing 2024-06, Vol.106 (6), p.1933-1962 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1962 |
---|---|
container_issue | 6 |
container_start_page | 1933 |
container_title | Computing |
container_volume | 106 |
creator | Dhanaraj, Rajesh Kumar Singh, Anamika Nayyar, Anand |
description | The exposure of zero trust security in the Industrial Internet of Things (IIoT) increased in importance in the era where there is a huge risk of injection of malicious entities and owning the device by an unauthorized user. The gap in the existing approach of zero trust security is that continuous verification of devices is a time-consuming process and adversely affects the promising nature of the zero-trust model. Every time the node enters, even if the node is a member of the network, authorization of the node is necessary to ensure authenticity. This verification section of zero trust hinders the seamless working of the IIoT infrastructure. Therefore, the main objective of this paper is to propose the solution for the above-mentioned problem by enabling “device profiling” via deep reinforcement learning so that the same device can be identified and permitted access without hindering the working of Industrial Internet of Things infrastructure. The overall proposed approach works in different phases including the compression function for ensuring data confidentiality and integrity, then the device profiling is performed based on the features a device possesses, and lastly, deep reinforcement learning for anomaly detection. To test and validate the proposed approach, extensive experimentations were performed using measures such as false positive rate, data confidentiality rate, data integrity rate, and network access time, and results showed that the proposed technique titled “MMODPAD-DRL” outperforms the existing approaches in false positive rate by 27%, data confidentiality rate by 4% and data integrity rate by 3%, in addition, lessen the network access time by 20%. |
doi_str_mv | 10.1007/s00607-024-01269-y |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3062305179</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3062305179</sourcerecordid><originalsourceid>FETCH-LOGICAL-c270t-7a3fa55e4baf5abf287e4aa4469479fcec420b86de5bdb87269f9262711db75b3</originalsourceid><addsrcrecordid>eNp9kMFuEzEQhi0EEqHwApwscYGDy9hrr3ePVdOWSolSVSBxs7y748ol8QbbSbU98QRc-oZ9EtwGiRun0Wi-f0bzEfKewzEH0J8TQA2agZAMuKhbNr0gMy6rmilQ-iWZAXBgslHfX5M3Kd0CgKiadkZ-L22ebHr89bDECSNdJbSJdjbhQAfc-x7pNo7Or324oW6M1IZxY9dTGWbssx8D3XtbOtzSiD4UpMcNhkzXaGN4Sn1cLlfzq5M5m18vPlEf6D3Gkea4S5km7HfR54kGzHdj_PGWvHJ2nfDd33pEvp2ffT39whari8vTkwXrhYbMtK2cVQplZ52ynRONRmmtlHUrdet67KWArqkHVN3QNboYca2oheZ86LTqqiPy4bC3PPdzhymb23EXQzlpKqhFBYrrtlDiQPVxTCmiM9voNzZOhoN58m4O3k3xbp69m6mEqkMoFTjcYPy3-j-pP1f_ibE</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3062305179</pqid></control><display><type>article</type><title>Matyas–Meyer Oseas based device profiling for anomaly detection via deep reinforcement learning (MMODPAD-DRL) in zero trust security network</title><source>SpringerLink Journals - AutoHoldings</source><creator>Dhanaraj, Rajesh Kumar ; Singh, Anamika ; Nayyar, Anand</creator><creatorcontrib>Dhanaraj, Rajesh Kumar ; Singh, Anamika ; Nayyar, Anand</creatorcontrib><description>The exposure of zero trust security in the Industrial Internet of Things (IIoT) increased in importance in the era where there is a huge risk of injection of malicious entities and owning the device by an unauthorized user. The gap in the existing approach of zero trust security is that continuous verification of devices is a time-consuming process and adversely affects the promising nature of the zero-trust model. Every time the node enters, even if the node is a member of the network, authorization of the node is necessary to ensure authenticity. This verification section of zero trust hinders the seamless working of the IIoT infrastructure. Therefore, the main objective of this paper is to propose the solution for the above-mentioned problem by enabling “device profiling” via deep reinforcement learning so that the same device can be identified and permitted access without hindering the working of Industrial Internet of Things infrastructure. The overall proposed approach works in different phases including the compression function for ensuring data confidentiality and integrity, then the device profiling is performed based on the features a device possesses, and lastly, deep reinforcement learning for anomaly detection. To test and validate the proposed approach, extensive experimentations were performed using measures such as false positive rate, data confidentiality rate, data integrity rate, and network access time, and results showed that the proposed technique titled “MMODPAD-DRL” outperforms the existing approaches in false positive rate by 27%, data confidentiality rate by 4% and data integrity rate by 3%, in addition, lessen the network access time by 20%.</description><identifier>ISSN: 0010-485X</identifier><identifier>EISSN: 1436-5057</identifier><identifier>DOI: 10.1007/s00607-024-01269-y</identifier><language>eng</language><publisher>Vienna: Springer Vienna</publisher><subject>Access time ; Anomalies ; Artificial Intelligence ; Computer Appl. in Administrative Data Processing ; Computer Communication Networks ; Computer Science ; Confidentiality ; Cybersecurity ; Data integrity ; Deep learning ; Depth profiling ; Industrial applications ; Industrial Internet of Things ; Information Systems Applications (incl.Internet) ; Internet of Things ; Machine learning ; Nodes ; Regular Paper ; Software Engineering</subject><ispartof>Computing, 2024-06, Vol.106 (6), p.1933-1962</ispartof><rights>The Author(s), under exclusive licence to Springer-Verlag GmbH Austria, part of Springer Nature 2024. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c270t-7a3fa55e4baf5abf287e4aa4469479fcec420b86de5bdb87269f9262711db75b3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s00607-024-01269-y$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s00607-024-01269-y$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>Dhanaraj, Rajesh Kumar</creatorcontrib><creatorcontrib>Singh, Anamika</creatorcontrib><creatorcontrib>Nayyar, Anand</creatorcontrib><title>Matyas–Meyer Oseas based device profiling for anomaly detection via deep reinforcement learning (MMODPAD-DRL) in zero trust security network</title><title>Computing</title><addtitle>Computing</addtitle><description>The exposure of zero trust security in the Industrial Internet of Things (IIoT) increased in importance in the era where there is a huge risk of injection of malicious entities and owning the device by an unauthorized user. The gap in the existing approach of zero trust security is that continuous verification of devices is a time-consuming process and adversely affects the promising nature of the zero-trust model. Every time the node enters, even if the node is a member of the network, authorization of the node is necessary to ensure authenticity. This verification section of zero trust hinders the seamless working of the IIoT infrastructure. Therefore, the main objective of this paper is to propose the solution for the above-mentioned problem by enabling “device profiling” via deep reinforcement learning so that the same device can be identified and permitted access without hindering the working of Industrial Internet of Things infrastructure. The overall proposed approach works in different phases including the compression function for ensuring data confidentiality and integrity, then the device profiling is performed based on the features a device possesses, and lastly, deep reinforcement learning for anomaly detection. To test and validate the proposed approach, extensive experimentations were performed using measures such as false positive rate, data confidentiality rate, data integrity rate, and network access time, and results showed that the proposed technique titled “MMODPAD-DRL” outperforms the existing approaches in false positive rate by 27%, data confidentiality rate by 4% and data integrity rate by 3%, in addition, lessen the network access time by 20%.</description><subject>Access time</subject><subject>Anomalies</subject><subject>Artificial Intelligence</subject><subject>Computer Appl. in Administrative Data Processing</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Confidentiality</subject><subject>Cybersecurity</subject><subject>Data integrity</subject><subject>Deep learning</subject><subject>Depth profiling</subject><subject>Industrial applications</subject><subject>Industrial Internet of Things</subject><subject>Information Systems Applications (incl.Internet)</subject><subject>Internet of Things</subject><subject>Machine learning</subject><subject>Nodes</subject><subject>Regular Paper</subject><subject>Software Engineering</subject><issn>0010-485X</issn><issn>1436-5057</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNp9kMFuEzEQhi0EEqHwApwscYGDy9hrr3ePVdOWSolSVSBxs7y748ol8QbbSbU98QRc-oZ9EtwGiRun0Wi-f0bzEfKewzEH0J8TQA2agZAMuKhbNr0gMy6rmilQ-iWZAXBgslHfX5M3Kd0CgKiadkZ-L22ebHr89bDECSNdJbSJdjbhQAfc-x7pNo7Or324oW6M1IZxY9dTGWbssx8D3XtbOtzSiD4UpMcNhkzXaGN4Sn1cLlfzq5M5m18vPlEf6D3Gkea4S5km7HfR54kGzHdj_PGWvHJ2nfDd33pEvp2ffT39whari8vTkwXrhYbMtK2cVQplZ52ynRONRmmtlHUrdet67KWArqkHVN3QNboYca2oheZ86LTqqiPy4bC3PPdzhymb23EXQzlpKqhFBYrrtlDiQPVxTCmiM9voNzZOhoN58m4O3k3xbp69m6mEqkMoFTjcYPy3-j-pP1f_ibE</recordid><startdate>20240601</startdate><enddate>20240601</enddate><creator>Dhanaraj, Rajesh Kumar</creator><creator>Singh, Anamika</creator><creator>Nayyar, Anand</creator><general>Springer Vienna</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20240601</creationdate><title>Matyas–Meyer Oseas based device profiling for anomaly detection via deep reinforcement learning (MMODPAD-DRL) in zero trust security network</title><author>Dhanaraj, Rajesh Kumar ; Singh, Anamika ; Nayyar, Anand</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c270t-7a3fa55e4baf5abf287e4aa4469479fcec420b86de5bdb87269f9262711db75b3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Access time</topic><topic>Anomalies</topic><topic>Artificial Intelligence</topic><topic>Computer Appl. in Administrative Data Processing</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Confidentiality</topic><topic>Cybersecurity</topic><topic>Data integrity</topic><topic>Deep learning</topic><topic>Depth profiling</topic><topic>Industrial applications</topic><topic>Industrial Internet of Things</topic><topic>Information Systems Applications (incl.Internet)</topic><topic>Internet of Things</topic><topic>Machine learning</topic><topic>Nodes</topic><topic>Regular Paper</topic><topic>Software Engineering</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Dhanaraj, Rajesh Kumar</creatorcontrib><creatorcontrib>Singh, Anamika</creatorcontrib><creatorcontrib>Nayyar, Anand</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Dhanaraj, Rajesh Kumar</au><au>Singh, Anamika</au><au>Nayyar, Anand</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Matyas–Meyer Oseas based device profiling for anomaly detection via deep reinforcement learning (MMODPAD-DRL) in zero trust security network</atitle><jtitle>Computing</jtitle><stitle>Computing</stitle><date>2024-06-01</date><risdate>2024</risdate><volume>106</volume><issue>6</issue><spage>1933</spage><epage>1962</epage><pages>1933-1962</pages><issn>0010-485X</issn><eissn>1436-5057</eissn><abstract>The exposure of zero trust security in the Industrial Internet of Things (IIoT) increased in importance in the era where there is a huge risk of injection of malicious entities and owning the device by an unauthorized user. The gap in the existing approach of zero trust security is that continuous verification of devices is a time-consuming process and adversely affects the promising nature of the zero-trust model. Every time the node enters, even if the node is a member of the network, authorization of the node is necessary to ensure authenticity. This verification section of zero trust hinders the seamless working of the IIoT infrastructure. Therefore, the main objective of this paper is to propose the solution for the above-mentioned problem by enabling “device profiling” via deep reinforcement learning so that the same device can be identified and permitted access without hindering the working of Industrial Internet of Things infrastructure. The overall proposed approach works in different phases including the compression function for ensuring data confidentiality and integrity, then the device profiling is performed based on the features a device possesses, and lastly, deep reinforcement learning for anomaly detection. To test and validate the proposed approach, extensive experimentations were performed using measures such as false positive rate, data confidentiality rate, data integrity rate, and network access time, and results showed that the proposed technique titled “MMODPAD-DRL” outperforms the existing approaches in false positive rate by 27%, data confidentiality rate by 4% and data integrity rate by 3%, in addition, lessen the network access time by 20%.</abstract><cop>Vienna</cop><pub>Springer Vienna</pub><doi>10.1007/s00607-024-01269-y</doi><tpages>30</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0010-485X |
ispartof | Computing, 2024-06, Vol.106 (6), p.1933-1962 |
issn | 0010-485X 1436-5057 |
language | eng |
recordid | cdi_proquest_journals_3062305179 |
source | SpringerLink Journals - AutoHoldings |
subjects | Access time Anomalies Artificial Intelligence Computer Appl. in Administrative Data Processing Computer Communication Networks Computer Science Confidentiality Cybersecurity Data integrity Deep learning Depth profiling Industrial applications Industrial Internet of Things Information Systems Applications (incl.Internet) Internet of Things Machine learning Nodes Regular Paper Software Engineering |
title | Matyas–Meyer Oseas based device profiling for anomaly detection via deep reinforcement learning (MMODPAD-DRL) in zero trust security network |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T20%3A17%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Matyas%E2%80%93Meyer%20Oseas%20based%20device%20profiling%20for%20anomaly%20detection%20via%20deep%20reinforcement%20learning%20(MMODPAD-DRL)%20in%20zero%20trust%20security%20network&rft.jtitle=Computing&rft.au=Dhanaraj,%20Rajesh%20Kumar&rft.date=2024-06-01&rft.volume=106&rft.issue=6&rft.spage=1933&rft.epage=1962&rft.pages=1933-1962&rft.issn=0010-485X&rft.eissn=1436-5057&rft_id=info:doi/10.1007/s00607-024-01269-y&rft_dat=%3Cproquest_cross%3E3062305179%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3062305179&rft_id=info:pmid/&rfr_iscdi=true |