A novel approach detection for IIoT attacks via artificial intelligence

The Industrial Internet of Things (IIoT) is a paradigm that enables the integration of cyber-physical systems in critical infrastructures, such as power grids, water distribution networks, and transportation systems. IIoT devices, such as sensors, actuators, and controllers, can provide various bene...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Cluster computing 2024-11, Vol.27 (8), p.10467-10485
Hauptverfasser: Karacayılmaz, Gökçe, Artuner, Harun
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 10485
container_issue 8
container_start_page 10467
container_title Cluster computing
container_volume 27
creator Karacayılmaz, Gökçe
Artuner, Harun
description The Industrial Internet of Things (IIoT) is a paradigm that enables the integration of cyber-physical systems in critical infrastructures, such as power grids, water distribution networks, and transportation systems. IIoT devices, such as sensors, actuators, and controllers, can provide various benefits, such as performance optimization, efficiency improvement, and remote management. However, these devices also pose new security risks and challenges, as they can be targeted by malicious actors to disrupt the normal operation of the infrastructures they are connected to or to cause physical damage or harm. Therefore, it is essential to develop effective and intelligent solutions to detect and prevent attacks on IIoT devices and to ensure the security and resilience of critical infrastructures. In this paper, we present a comprehensive analysis of the types and impacts of attacks on IIoT devices based on a literature review and a data analysis of real-world incidents. We classify the attacks into four categories: denial-of-service, data manipulation, device hijacking, and physical tampering. We also discuss the potential consequences of these attacks on the safety, reliability, and availability of critical infrastructures. We then propose an expert system that can detect and prevent attacks on IIoT devices using artificial intelligence techniques, such as rule-based reasoning, anomaly detection, and reinforcement learning. We describe the architecture and implementation of our system, which consists of three main components: a data collector, a data analyzer, and a data actuator. We also present a table that summarizes the main features and capabilities of our system compared to existing solutions. We evaluate the performance and effectiveness of our system on a testbed consisting of programmable logic controllers (PLCs) and IIoT protocols, such as Modbus and MQTT. We simulate various attacks on IIoT devices and measure the accuracy, latency, and overhead of our system. Our results show that our system can successfully detect and mitigate different types of attacks on IIoT devices with high accuracy and low latency and overhead. We also demonstrate that our system can enhance the security and resilience of critical infrastructures by preventing or minimizing the impacts of attacks on IIoT devices.
doi_str_mv 10.1007/s10586-024-04529-w
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3102237812</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3102237812</sourcerecordid><originalsourceid>FETCH-LOGICAL-c314t-1c3cf7043918cb151bbf726ce603c3ea5d0a9c2e2307f97b3673dd10095f2fd93</originalsourceid><addsrcrecordid>eNp9kEFLAzEQhYMoWKt_wFPA82qS2Ww2x1K0LRS81HPIZpOauu7WJG3x3xtdwZunGZj33sx8CN1Sck8JEQ-REl5XBWFlQUrOZHE6QxPKBRSCl3Cee8hjUXNxia5i3BFCpGByghYz3A9H22G934dBm1fc2mRN8kOP3RDwajVssE5Jm7eIj15jHZJ33njdYd8n23V-a3tjr9GF0120N791il6eHjfzZbF-Xqzms3VhgJapoAaME6QESWvTUE6bxglWGVsRMGA1b4mWhlkGRDgpGqgEtG1-UXLHXCthiu7G3Hztx8HGpHbDIfR5pQJKGANRU5ZVbFSZMMQYrFP74N91-FSUqG9gagSmMjD1A0ydsglGU8zifmvDX_Q_ri-DUG4c</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3102237812</pqid></control><display><type>article</type><title>A novel approach detection for IIoT attacks via artificial intelligence</title><source>SpringerLink Journals - AutoHoldings</source><creator>Karacayılmaz, Gökçe ; Artuner, Harun</creator><creatorcontrib>Karacayılmaz, Gökçe ; Artuner, Harun</creatorcontrib><description>The Industrial Internet of Things (IIoT) is a paradigm that enables the integration of cyber-physical systems in critical infrastructures, such as power grids, water distribution networks, and transportation systems. IIoT devices, such as sensors, actuators, and controllers, can provide various benefits, such as performance optimization, efficiency improvement, and remote management. However, these devices also pose new security risks and challenges, as they can be targeted by malicious actors to disrupt the normal operation of the infrastructures they are connected to or to cause physical damage or harm. Therefore, it is essential to develop effective and intelligent solutions to detect and prevent attacks on IIoT devices and to ensure the security and resilience of critical infrastructures. In this paper, we present a comprehensive analysis of the types and impacts of attacks on IIoT devices based on a literature review and a data analysis of real-world incidents. We classify the attacks into four categories: denial-of-service, data manipulation, device hijacking, and physical tampering. We also discuss the potential consequences of these attacks on the safety, reliability, and availability of critical infrastructures. We then propose an expert system that can detect and prevent attacks on IIoT devices using artificial intelligence techniques, such as rule-based reasoning, anomaly detection, and reinforcement learning. We describe the architecture and implementation of our system, which consists of three main components: a data collector, a data analyzer, and a data actuator. We also present a table that summarizes the main features and capabilities of our system compared to existing solutions. We evaluate the performance and effectiveness of our system on a testbed consisting of programmable logic controllers (PLCs) and IIoT protocols, such as Modbus and MQTT. We simulate various attacks on IIoT devices and measure the accuracy, latency, and overhead of our system. Our results show that our system can successfully detect and mitigate different types of attacks on IIoT devices with high accuracy and low latency and overhead. We also demonstrate that our system can enhance the security and resilience of critical infrastructures by preventing or minimizing the impacts of attacks on IIoT devices.</description><identifier>ISSN: 1386-7857</identifier><identifier>EISSN: 1573-7543</identifier><identifier>DOI: 10.1007/s10586-024-04529-w</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Actuators ; Algorithms ; Anomalies ; Artificial intelligence ; Communication ; Computer Communication Networks ; Computer Science ; Critical infrastructure ; Cyber-physical systems ; Cybersecurity ; Damage detection ; Damage prevention ; Data analysis ; Datasets ; Deep learning ; Denial of service attacks ; Devices ; Effectiveness ; Embedded systems ; Expert systems ; Industrial applications ; Industrial Internet of Things ; Infrastructure ; Internet of Things ; Literature reviews ; Machine learning ; Network latency ; Neural networks ; Operating Systems ; Performance evaluation ; Processor Architectures ; Programmable logic controllers ; Remote sensors ; Resilience ; Smart cities ; Transportation systems ; Water distribution ; Water engineering ; Water treatment</subject><ispartof>Cluster computing, 2024-11, Vol.27 (8), p.10467-10485</ispartof><rights>The Author(s) 2024</rights><rights>The Author(s) 2024. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c314t-1c3cf7043918cb151bbf726ce603c3ea5d0a9c2e2307f97b3673dd10095f2fd93</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s10586-024-04529-w$$EPDF$$P50$$Gspringer$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s10586-024-04529-w$$EHTML$$P50$$Gspringer$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>Karacayılmaz, Gökçe</creatorcontrib><creatorcontrib>Artuner, Harun</creatorcontrib><title>A novel approach detection for IIoT attacks via artificial intelligence</title><title>Cluster computing</title><addtitle>Cluster Comput</addtitle><description>The Industrial Internet of Things (IIoT) is a paradigm that enables the integration of cyber-physical systems in critical infrastructures, such as power grids, water distribution networks, and transportation systems. IIoT devices, such as sensors, actuators, and controllers, can provide various benefits, such as performance optimization, efficiency improvement, and remote management. However, these devices also pose new security risks and challenges, as they can be targeted by malicious actors to disrupt the normal operation of the infrastructures they are connected to or to cause physical damage or harm. Therefore, it is essential to develop effective and intelligent solutions to detect and prevent attacks on IIoT devices and to ensure the security and resilience of critical infrastructures. In this paper, we present a comprehensive analysis of the types and impacts of attacks on IIoT devices based on a literature review and a data analysis of real-world incidents. We classify the attacks into four categories: denial-of-service, data manipulation, device hijacking, and physical tampering. We also discuss the potential consequences of these attacks on the safety, reliability, and availability of critical infrastructures. We then propose an expert system that can detect and prevent attacks on IIoT devices using artificial intelligence techniques, such as rule-based reasoning, anomaly detection, and reinforcement learning. We describe the architecture and implementation of our system, which consists of three main components: a data collector, a data analyzer, and a data actuator. We also present a table that summarizes the main features and capabilities of our system compared to existing solutions. We evaluate the performance and effectiveness of our system on a testbed consisting of programmable logic controllers (PLCs) and IIoT protocols, such as Modbus and MQTT. We simulate various attacks on IIoT devices and measure the accuracy, latency, and overhead of our system. Our results show that our system can successfully detect and mitigate different types of attacks on IIoT devices with high accuracy and low latency and overhead. We also demonstrate that our system can enhance the security and resilience of critical infrastructures by preventing or minimizing the impacts of attacks on IIoT devices.</description><subject>Actuators</subject><subject>Algorithms</subject><subject>Anomalies</subject><subject>Artificial intelligence</subject><subject>Communication</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Critical infrastructure</subject><subject>Cyber-physical systems</subject><subject>Cybersecurity</subject><subject>Damage detection</subject><subject>Damage prevention</subject><subject>Data analysis</subject><subject>Datasets</subject><subject>Deep learning</subject><subject>Denial of service attacks</subject><subject>Devices</subject><subject>Effectiveness</subject><subject>Embedded systems</subject><subject>Expert systems</subject><subject>Industrial applications</subject><subject>Industrial Internet of Things</subject><subject>Infrastructure</subject><subject>Internet of Things</subject><subject>Literature reviews</subject><subject>Machine learning</subject><subject>Network latency</subject><subject>Neural networks</subject><subject>Operating Systems</subject><subject>Performance evaluation</subject><subject>Processor Architectures</subject><subject>Programmable logic controllers</subject><subject>Remote sensors</subject><subject>Resilience</subject><subject>Smart cities</subject><subject>Transportation systems</subject><subject>Water distribution</subject><subject>Water engineering</subject><subject>Water treatment</subject><issn>1386-7857</issn><issn>1573-7543</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>C6C</sourceid><recordid>eNp9kEFLAzEQhYMoWKt_wFPA82qS2Ww2x1K0LRS81HPIZpOauu7WJG3x3xtdwZunGZj33sx8CN1Sck8JEQ-REl5XBWFlQUrOZHE6QxPKBRSCl3Cee8hjUXNxia5i3BFCpGByghYz3A9H22G934dBm1fc2mRN8kOP3RDwajVssE5Jm7eIj15jHZJ33njdYd8n23V-a3tjr9GF0120N791il6eHjfzZbF-Xqzms3VhgJapoAaME6QESWvTUE6bxglWGVsRMGA1b4mWhlkGRDgpGqgEtG1-UXLHXCthiu7G3Hztx8HGpHbDIfR5pQJKGANRU5ZVbFSZMMQYrFP74N91-FSUqG9gagSmMjD1A0ydsglGU8zifmvDX_Q_ri-DUG4c</recordid><startdate>20241101</startdate><enddate>20241101</enddate><creator>Karacayılmaz, Gökçe</creator><creator>Artuner, Harun</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>C6C</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>JQ2</scope></search><sort><creationdate>20241101</creationdate><title>A novel approach detection for IIoT attacks via artificial intelligence</title><author>Karacayılmaz, Gökçe ; Artuner, Harun</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c314t-1c3cf7043918cb151bbf726ce603c3ea5d0a9c2e2307f97b3673dd10095f2fd93</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Actuators</topic><topic>Algorithms</topic><topic>Anomalies</topic><topic>Artificial intelligence</topic><topic>Communication</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Critical infrastructure</topic><topic>Cyber-physical systems</topic><topic>Cybersecurity</topic><topic>Damage detection</topic><topic>Damage prevention</topic><topic>Data analysis</topic><topic>Datasets</topic><topic>Deep learning</topic><topic>Denial of service attacks</topic><topic>Devices</topic><topic>Effectiveness</topic><topic>Embedded systems</topic><topic>Expert systems</topic><topic>Industrial applications</topic><topic>Industrial Internet of Things</topic><topic>Infrastructure</topic><topic>Internet of Things</topic><topic>Literature reviews</topic><topic>Machine learning</topic><topic>Network latency</topic><topic>Neural networks</topic><topic>Operating Systems</topic><topic>Performance evaluation</topic><topic>Processor Architectures</topic><topic>Programmable logic controllers</topic><topic>Remote sensors</topic><topic>Resilience</topic><topic>Smart cities</topic><topic>Transportation systems</topic><topic>Water distribution</topic><topic>Water engineering</topic><topic>Water treatment</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Karacayılmaz, Gökçe</creatorcontrib><creatorcontrib>Artuner, Harun</creatorcontrib><collection>Springer Nature OA Free Journals</collection><collection>CrossRef</collection><collection>ProQuest Computer Science Collection</collection><jtitle>Cluster computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Karacayılmaz, Gökçe</au><au>Artuner, Harun</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A novel approach detection for IIoT attacks via artificial intelligence</atitle><jtitle>Cluster computing</jtitle><stitle>Cluster Comput</stitle><date>2024-11-01</date><risdate>2024</risdate><volume>27</volume><issue>8</issue><spage>10467</spage><epage>10485</epage><pages>10467-10485</pages><issn>1386-7857</issn><eissn>1573-7543</eissn><abstract>The Industrial Internet of Things (IIoT) is a paradigm that enables the integration of cyber-physical systems in critical infrastructures, such as power grids, water distribution networks, and transportation systems. IIoT devices, such as sensors, actuators, and controllers, can provide various benefits, such as performance optimization, efficiency improvement, and remote management. However, these devices also pose new security risks and challenges, as they can be targeted by malicious actors to disrupt the normal operation of the infrastructures they are connected to or to cause physical damage or harm. Therefore, it is essential to develop effective and intelligent solutions to detect and prevent attacks on IIoT devices and to ensure the security and resilience of critical infrastructures. In this paper, we present a comprehensive analysis of the types and impacts of attacks on IIoT devices based on a literature review and a data analysis of real-world incidents. We classify the attacks into four categories: denial-of-service, data manipulation, device hijacking, and physical tampering. We also discuss the potential consequences of these attacks on the safety, reliability, and availability of critical infrastructures. We then propose an expert system that can detect and prevent attacks on IIoT devices using artificial intelligence techniques, such as rule-based reasoning, anomaly detection, and reinforcement learning. We describe the architecture and implementation of our system, which consists of three main components: a data collector, a data analyzer, and a data actuator. We also present a table that summarizes the main features and capabilities of our system compared to existing solutions. We evaluate the performance and effectiveness of our system on a testbed consisting of programmable logic controllers (PLCs) and IIoT protocols, such as Modbus and MQTT. We simulate various attacks on IIoT devices and measure the accuracy, latency, and overhead of our system. Our results show that our system can successfully detect and mitigate different types of attacks on IIoT devices with high accuracy and low latency and overhead. We also demonstrate that our system can enhance the security and resilience of critical infrastructures by preventing or minimizing the impacts of attacks on IIoT devices.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s10586-024-04529-w</doi><tpages>19</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1386-7857
ispartof Cluster computing, 2024-11, Vol.27 (8), p.10467-10485
issn 1386-7857
1573-7543
language eng
recordid cdi_proquest_journals_3102237812
source SpringerLink Journals - AutoHoldings
subjects Actuators
Algorithms
Anomalies
Artificial intelligence
Communication
Computer Communication Networks
Computer Science
Critical infrastructure
Cyber-physical systems
Cybersecurity
Damage detection
Damage prevention
Data analysis
Datasets
Deep learning
Denial of service attacks
Devices
Effectiveness
Embedded systems
Expert systems
Industrial applications
Industrial Internet of Things
Infrastructure
Internet of Things
Literature reviews
Machine learning
Network latency
Neural networks
Operating Systems
Performance evaluation
Processor Architectures
Programmable logic controllers
Remote sensors
Resilience
Smart cities
Transportation systems
Water distribution
Water engineering
Water treatment
title A novel approach detection for IIoT attacks via artificial intelligence
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T07%3A06%3A57IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20novel%20approach%20detection%20for%20IIoT%20attacks%20via%20artificial%20intelligence&rft.jtitle=Cluster%20computing&rft.au=Karacay%C4%B1lmaz,%20G%C3%B6k%C3%A7e&rft.date=2024-11-01&rft.volume=27&rft.issue=8&rft.spage=10467&rft.epage=10485&rft.pages=10467-10485&rft.issn=1386-7857&rft.eissn=1573-7543&rft_id=info:doi/10.1007/s10586-024-04529-w&rft_dat=%3Cproquest_cross%3E3102237812%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3102237812&rft_id=info:pmid/&rfr_iscdi=true