4.8 Article

A New Explainable Deep Learning Framework for Cyber Threat Discovery in Industrial IoT Networks

Journal

IEEE INTERNET OF THINGS JOURNAL
Volume 9, Issue 13, Pages 11604-11613

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2021.3130156

Keywords

Feature extraction; Time series analysis; Industrial Internet of Things; Security; Convolutional neural networks; Intrusion detection; Task analysis; Anomaly detection; Industrial Internet of Things (IIoT); industrial networks; time series

Ask authors/readers for more resources

The Industrial Internet of Things (IIoT) and Industry 4.0 enable interrelation among manufacturing processes, industrial machines, and utility services. However, the integrity and accuracy of data in IIoT networks can be compromised by malicious events, highlighting the need for effective anomaly detection and explanation methods to ensure quality services and data security.
Industrial Internet of Things (IIoT) and Industry 4.0 empower interrelation among manufacturing processes, industrial machines, and utility services. The time-critical data collected from heterogeneous sensing devices are usually communicated to processing points for analysis and aggregation as the basis of IIoT. The IIoTs' service quality typically depends on data integrity and accuracy, which could be exploited by injecting malicious events, such as false data injection and data poisoning attacks. Thus, effective anomaly recognition and explanation are critical for ensuring quality services and empowering security administrators to interpret the causal reasoning of prediction decisions and underlying data evidence. This study proposes an autoencoder-based detection framework using convolutional and recurrent networks to discover cyber threats in IIoT networks and explain the model. A two-step sliding window (SW) is applied to learn the latent representations of data features better. Malicious points from the raw time series are transformed into fixed-length series through the first-step SW. Every series is converted into continuous-time-reliant subseries via another smaller SW to learn latent representations of malicious events. Fully connected networks use the extracted temporal and spatial features for the classification and explanation of attack events. The empirical results revealed that this framework effectively extracts features that include contexts of malicious patterns. This demonstrated that the proposed framework is robust in detecting malicious events using multiple evaluation metrics and outperforming the contemporary state-of-the-art methods, indicating its suitability as an operative application method in real-world IIoT-based networks.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available