A novel approach detection for IIoT attacks via artificial intelligence
The Industrial Internet of Things (IIoT) is a paradigm that enables the integration of cyber-physical systems in critical infrastructures, such as power grids, water distribution networks, and transportation systems. IIoT devices, such as sensors, actuators, and controllers, can provide various bene...
Gespeichert in:
Veröffentlicht in: | Cluster computing 2024-11, Vol.27 (8), p.10467-10485 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 10485 |
---|---|
container_issue | 8 |
container_start_page | 10467 |
container_title | Cluster computing |
container_volume | 27 |
creator | Karacayılmaz, Gökçe Artuner, Harun |
description | The Industrial Internet of Things (IIoT) is a paradigm that enables the integration of cyber-physical systems in critical infrastructures, such as power grids, water distribution networks, and transportation systems. IIoT devices, such as sensors, actuators, and controllers, can provide various benefits, such as performance optimization, efficiency improvement, and remote management. However, these devices also pose new security risks and challenges, as they can be targeted by malicious actors to disrupt the normal operation of the infrastructures they are connected to or to cause physical damage or harm. Therefore, it is essential to develop effective and intelligent solutions to detect and prevent attacks on IIoT devices and to ensure the security and resilience of critical infrastructures. In this paper, we present a comprehensive analysis of the types and impacts of attacks on IIoT devices based on a literature review and a data analysis of real-world incidents. We classify the attacks into four categories: denial-of-service, data manipulation, device hijacking, and physical tampering. We also discuss the potential consequences of these attacks on the safety, reliability, and availability of critical infrastructures. We then propose an expert system that can detect and prevent attacks on IIoT devices using artificial intelligence techniques, such as rule-based reasoning, anomaly detection, and reinforcement learning. We describe the architecture and implementation of our system, which consists of three main components: a data collector, a data analyzer, and a data actuator. We also present a table that summarizes the main features and capabilities of our system compared to existing solutions. We evaluate the performance and effectiveness of our system on a testbed consisting of programmable logic controllers (PLCs) and IIoT protocols, such as Modbus and MQTT. We simulate various attacks on IIoT devices and measure the accuracy, latency, and overhead of our system. Our results show that our system can successfully detect and mitigate different types of attacks on IIoT devices with high accuracy and low latency and overhead. We also demonstrate that our system can enhance the security and resilience of critical infrastructures by preventing or minimizing the impacts of attacks on IIoT devices. |
doi_str_mv | 10.1007/s10586-024-04529-w |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3102237812</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3102237812</sourcerecordid><originalsourceid>FETCH-LOGICAL-c314t-1c3cf7043918cb151bbf726ce603c3ea5d0a9c2e2307f97b3673dd10095f2fd93</originalsourceid><addsrcrecordid>eNp9kEFLAzEQhYMoWKt_wFPA82qS2Ww2x1K0LRS81HPIZpOauu7WJG3x3xtdwZunGZj33sx8CN1Sck8JEQ-REl5XBWFlQUrOZHE6QxPKBRSCl3Cee8hjUXNxia5i3BFCpGByghYz3A9H22G934dBm1fc2mRN8kOP3RDwajVssE5Jm7eIj15jHZJ33njdYd8n23V-a3tjr9GF0120N791il6eHjfzZbF-Xqzms3VhgJapoAaME6QESWvTUE6bxglWGVsRMGA1b4mWhlkGRDgpGqgEtG1-UXLHXCthiu7G3Hztx8HGpHbDIfR5pQJKGANRU5ZVbFSZMMQYrFP74N91-FSUqG9gagSmMjD1A0ydsglGU8zifmvDX_Q_ri-DUG4c</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3102237812</pqid></control><display><type>article</type><title>A novel approach detection for IIoT attacks via artificial intelligence</title><source>SpringerLink Journals - AutoHoldings</source><creator>Karacayılmaz, Gökçe ; Artuner, Harun</creator><creatorcontrib>Karacayılmaz, Gökçe ; Artuner, Harun</creatorcontrib><description>The Industrial Internet of Things (IIoT) is a paradigm that enables the integration of cyber-physical systems in critical infrastructures, such as power grids, water distribution networks, and transportation systems. IIoT devices, such as sensors, actuators, and controllers, can provide various benefits, such as performance optimization, efficiency improvement, and remote management. However, these devices also pose new security risks and challenges, as they can be targeted by malicious actors to disrupt the normal operation of the infrastructures they are connected to or to cause physical damage or harm. Therefore, it is essential to develop effective and intelligent solutions to detect and prevent attacks on IIoT devices and to ensure the security and resilience of critical infrastructures. In this paper, we present a comprehensive analysis of the types and impacts of attacks on IIoT devices based on a literature review and a data analysis of real-world incidents. We classify the attacks into four categories: denial-of-service, data manipulation, device hijacking, and physical tampering. We also discuss the potential consequences of these attacks on the safety, reliability, and availability of critical infrastructures. We then propose an expert system that can detect and prevent attacks on IIoT devices using artificial intelligence techniques, such as rule-based reasoning, anomaly detection, and reinforcement learning. We describe the architecture and implementation of our system, which consists of three main components: a data collector, a data analyzer, and a data actuator. We also present a table that summarizes the main features and capabilities of our system compared to existing solutions. We evaluate the performance and effectiveness of our system on a testbed consisting of programmable logic controllers (PLCs) and IIoT protocols, such as Modbus and MQTT. We simulate various attacks on IIoT devices and measure the accuracy, latency, and overhead of our system. Our results show that our system can successfully detect and mitigate different types of attacks on IIoT devices with high accuracy and low latency and overhead. We also demonstrate that our system can enhance the security and resilience of critical infrastructures by preventing or minimizing the impacts of attacks on IIoT devices.</description><identifier>ISSN: 1386-7857</identifier><identifier>EISSN: 1573-7543</identifier><identifier>DOI: 10.1007/s10586-024-04529-w</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Actuators ; Algorithms ; Anomalies ; Artificial intelligence ; Communication ; Computer Communication Networks ; Computer Science ; Critical infrastructure ; Cyber-physical systems ; Cybersecurity ; Damage detection ; Damage prevention ; Data analysis ; Datasets ; Deep learning ; Denial of service attacks ; Devices ; Effectiveness ; Embedded systems ; Expert systems ; Industrial applications ; Industrial Internet of Things ; Infrastructure ; Internet of Things ; Literature reviews ; Machine learning ; Network latency ; Neural networks ; Operating Systems ; Performance evaluation ; Processor Architectures ; Programmable logic controllers ; Remote sensors ; Resilience ; Smart cities ; Transportation systems ; Water distribution ; Water engineering ; Water treatment</subject><ispartof>Cluster computing, 2024-11, Vol.27 (8), p.10467-10485</ispartof><rights>The Author(s) 2024</rights><rights>The Author(s) 2024. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c314t-1c3cf7043918cb151bbf726ce603c3ea5d0a9c2e2307f97b3673dd10095f2fd93</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s10586-024-04529-w$$EPDF$$P50$$Gspringer$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s10586-024-04529-w$$EHTML$$P50$$Gspringer$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>Karacayılmaz, Gökçe</creatorcontrib><creatorcontrib>Artuner, Harun</creatorcontrib><title>A novel approach detection for IIoT attacks via artificial intelligence</title><title>Cluster computing</title><addtitle>Cluster Comput</addtitle><description>The Industrial Internet of Things (IIoT) is a paradigm that enables the integration of cyber-physical systems in critical infrastructures, such as power grids, water distribution networks, and transportation systems. IIoT devices, such as sensors, actuators, and controllers, can provide various benefits, such as performance optimization, efficiency improvement, and remote management. However, these devices also pose new security risks and challenges, as they can be targeted by malicious actors to disrupt the normal operation of the infrastructures they are connected to or to cause physical damage or harm. Therefore, it is essential to develop effective and intelligent solutions to detect and prevent attacks on IIoT devices and to ensure the security and resilience of critical infrastructures. In this paper, we present a comprehensive analysis of the types and impacts of attacks on IIoT devices based on a literature review and a data analysis of real-world incidents. We classify the attacks into four categories: denial-of-service, data manipulation, device hijacking, and physical tampering. We also discuss the potential consequences of these attacks on the safety, reliability, and availability of critical infrastructures. We then propose an expert system that can detect and prevent attacks on IIoT devices using artificial intelligence techniques, such as rule-based reasoning, anomaly detection, and reinforcement learning. We describe the architecture and implementation of our system, which consists of three main components: a data collector, a data analyzer, and a data actuator. We also present a table that summarizes the main features and capabilities of our system compared to existing solutions. We evaluate the performance and effectiveness of our system on a testbed consisting of programmable logic controllers (PLCs) and IIoT protocols, such as Modbus and MQTT. We simulate various attacks on IIoT devices and measure the accuracy, latency, and overhead of our system. Our results show that our system can successfully detect and mitigate different types of attacks on IIoT devices with high accuracy and low latency and overhead. We also demonstrate that our system can enhance the security and resilience of critical infrastructures by preventing or minimizing the impacts of attacks on IIoT devices.</description><subject>Actuators</subject><subject>Algorithms</subject><subject>Anomalies</subject><subject>Artificial intelligence</subject><subject>Communication</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Critical infrastructure</subject><subject>Cyber-physical systems</subject><subject>Cybersecurity</subject><subject>Damage detection</subject><subject>Damage prevention</subject><subject>Data analysis</subject><subject>Datasets</subject><subject>Deep learning</subject><subject>Denial of service attacks</subject><subject>Devices</subject><subject>Effectiveness</subject><subject>Embedded systems</subject><subject>Expert systems</subject><subject>Industrial applications</subject><subject>Industrial Internet of Things</subject><subject>Infrastructure</subject><subject>Internet of Things</subject><subject>Literature reviews</subject><subject>Machine learning</subject><subject>Network latency</subject><subject>Neural networks</subject><subject>Operating Systems</subject><subject>Performance evaluation</subject><subject>Processor Architectures</subject><subject>Programmable logic controllers</subject><subject>Remote sensors</subject><subject>Resilience</subject><subject>Smart cities</subject><subject>Transportation systems</subject><subject>Water distribution</subject><subject>Water engineering</subject><subject>Water treatment</subject><issn>1386-7857</issn><issn>1573-7543</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>C6C</sourceid><recordid>eNp9kEFLAzEQhYMoWKt_wFPA82qS2Ww2x1K0LRS81HPIZpOauu7WJG3x3xtdwZunGZj33sx8CN1Sck8JEQ-REl5XBWFlQUrOZHE6QxPKBRSCl3Cee8hjUXNxia5i3BFCpGByghYz3A9H22G934dBm1fc2mRN8kOP3RDwajVssE5Jm7eIj15jHZJ33njdYd8n23V-a3tjr9GF0120N791il6eHjfzZbF-Xqzms3VhgJapoAaME6QESWvTUE6bxglWGVsRMGA1b4mWhlkGRDgpGqgEtG1-UXLHXCthiu7G3Hztx8HGpHbDIfR5pQJKGANRU5ZVbFSZMMQYrFP74N91-FSUqG9gagSmMjD1A0ydsglGU8zifmvDX_Q_ri-DUG4c</recordid><startdate>20241101</startdate><enddate>20241101</enddate><creator>Karacayılmaz, Gökçe</creator><creator>Artuner, Harun</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>C6C</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>JQ2</scope></search><sort><creationdate>20241101</creationdate><title>A novel approach detection for IIoT attacks via artificial intelligence</title><author>Karacayılmaz, Gökçe ; Artuner, Harun</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c314t-1c3cf7043918cb151bbf726ce603c3ea5d0a9c2e2307f97b3673dd10095f2fd93</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Actuators</topic><topic>Algorithms</topic><topic>Anomalies</topic><topic>Artificial intelligence</topic><topic>Communication</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Critical infrastructure</topic><topic>Cyber-physical systems</topic><topic>Cybersecurity</topic><topic>Damage detection</topic><topic>Damage prevention</topic><topic>Data analysis</topic><topic>Datasets</topic><topic>Deep learning</topic><topic>Denial of service attacks</topic><topic>Devices</topic><topic>Effectiveness</topic><topic>Embedded systems</topic><topic>Expert systems</topic><topic>Industrial applications</topic><topic>Industrial Internet of Things</topic><topic>Infrastructure</topic><topic>Internet of Things</topic><topic>Literature reviews</topic><topic>Machine learning</topic><topic>Network latency</topic><topic>Neural networks</topic><topic>Operating Systems</topic><topic>Performance evaluation</topic><topic>Processor Architectures</topic><topic>Programmable logic controllers</topic><topic>Remote sensors</topic><topic>Resilience</topic><topic>Smart cities</topic><topic>Transportation systems</topic><topic>Water distribution</topic><topic>Water engineering</topic><topic>Water treatment</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Karacayılmaz, Gökçe</creatorcontrib><creatorcontrib>Artuner, Harun</creatorcontrib><collection>Springer Nature OA Free Journals</collection><collection>CrossRef</collection><collection>ProQuest Computer Science Collection</collection><jtitle>Cluster computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Karacayılmaz, Gökçe</au><au>Artuner, Harun</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A novel approach detection for IIoT attacks via artificial intelligence</atitle><jtitle>Cluster computing</jtitle><stitle>Cluster Comput</stitle><date>2024-11-01</date><risdate>2024</risdate><volume>27</volume><issue>8</issue><spage>10467</spage><epage>10485</epage><pages>10467-10485</pages><issn>1386-7857</issn><eissn>1573-7543</eissn><abstract>The Industrial Internet of Things (IIoT) is a paradigm that enables the integration of cyber-physical systems in critical infrastructures, such as power grids, water distribution networks, and transportation systems. IIoT devices, such as sensors, actuators, and controllers, can provide various benefits, such as performance optimization, efficiency improvement, and remote management. However, these devices also pose new security risks and challenges, as they can be targeted by malicious actors to disrupt the normal operation of the infrastructures they are connected to or to cause physical damage or harm. Therefore, it is essential to develop effective and intelligent solutions to detect and prevent attacks on IIoT devices and to ensure the security and resilience of critical infrastructures. In this paper, we present a comprehensive analysis of the types and impacts of attacks on IIoT devices based on a literature review and a data analysis of real-world incidents. We classify the attacks into four categories: denial-of-service, data manipulation, device hijacking, and physical tampering. We also discuss the potential consequences of these attacks on the safety, reliability, and availability of critical infrastructures. We then propose an expert system that can detect and prevent attacks on IIoT devices using artificial intelligence techniques, such as rule-based reasoning, anomaly detection, and reinforcement learning. We describe the architecture and implementation of our system, which consists of three main components: a data collector, a data analyzer, and a data actuator. We also present a table that summarizes the main features and capabilities of our system compared to existing solutions. We evaluate the performance and effectiveness of our system on a testbed consisting of programmable logic controllers (PLCs) and IIoT protocols, such as Modbus and MQTT. We simulate various attacks on IIoT devices and measure the accuracy, latency, and overhead of our system. Our results show that our system can successfully detect and mitigate different types of attacks on IIoT devices with high accuracy and low latency and overhead. We also demonstrate that our system can enhance the security and resilience of critical infrastructures by preventing or minimizing the impacts of attacks on IIoT devices.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s10586-024-04529-w</doi><tpages>19</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1386-7857 |
ispartof | Cluster computing, 2024-11, Vol.27 (8), p.10467-10485 |
issn | 1386-7857 1573-7543 |
language | eng |
recordid | cdi_proquest_journals_3102237812 |
source | SpringerLink Journals - AutoHoldings |
subjects | Actuators Algorithms Anomalies Artificial intelligence Communication Computer Communication Networks Computer Science Critical infrastructure Cyber-physical systems Cybersecurity Damage detection Damage prevention Data analysis Datasets Deep learning Denial of service attacks Devices Effectiveness Embedded systems Expert systems Industrial applications Industrial Internet of Things Infrastructure Internet of Things Literature reviews Machine learning Network latency Neural networks Operating Systems Performance evaluation Processor Architectures Programmable logic controllers Remote sensors Resilience Smart cities Transportation systems Water distribution Water engineering Water treatment |
title | A novel approach detection for IIoT attacks via artificial intelligence |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T07%3A06%3A57IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20novel%20approach%20detection%20for%20IIoT%20attacks%20via%20artificial%20intelligence&rft.jtitle=Cluster%20computing&rft.au=Karacay%C4%B1lmaz,%20G%C3%B6k%C3%A7e&rft.date=2024-11-01&rft.volume=27&rft.issue=8&rft.spage=10467&rft.epage=10485&rft.pages=10467-10485&rft.issn=1386-7857&rft.eissn=1573-7543&rft_id=info:doi/10.1007/s10586-024-04529-w&rft_dat=%3Cproquest_cross%3E3102237812%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3102237812&rft_id=info:pmid/&rfr_iscdi=true |