IDEAS home Printed from https://ideas.repec.org/a/igg/jisp00/v16y2022i1p1-29.html
   My bibliography  Save this article

Deep Ensemble Model for Detecting Attacks in Industrial IoT

Author

Listed:
  • Bibhuti Bhusana Behera

    (Department of Computer Science and Engineering)

  • Binod Kumar Pattanayak

    (Department of Computer Science and Engineering)

  • Rajani Kanta Mohanty

    (Department of CSE-SP, FET Jain University, Bangalore, India)

Abstract

In this research work, a novel IIoT attack detection framework is designed by following four major phases: pre-processing, imbalance processing, feature extraction, and attack detection. The attack detection is carried out using the projected ensemble classification framework. The projected ensemble classification framework encapsulates the recurrent neural network, CNN, and optimized bi-directional long short-term memory (BI-LSTM). The RNN and CNN in the ensemble classification framework is trained with the extracted features. The outcome acquired from RNN and CNN is utilized for training the optimized BI-LSTM model. The final outcome regarding the presence/absence of attacks in the industrial IoT is portrayed by the optimized BI-LSTM model. Therefore, the weight of BI-LSTM model is fine-tuned using the newly projected hybrid optimization model referred as cat mouse updated slime mould algorithm (CMUSMA). The projected hybrids the concepts of both the standard slime mould algorithm (SMA) and cat and mouse-based optimizer(CMBO), respectively.

Suggested Citation

  • Bibhuti Bhusana Behera & Binod Kumar Pattanayak & Rajani Kanta Mohanty, 2022. "Deep Ensemble Model for Detecting Attacks in Industrial IoT," International Journal of Information Security and Privacy (IJISP), IGI Global, vol. 16(1), pages 1-29, January.
  • Handle: RePEc:igg:jisp00:v:16:y:2022:i:1:p:1-29
    as

    Download full text from publisher

    File URL: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJISP.311467
    Download Restriction: no
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jisp00:v:16:y:2022:i:1:p:1-29. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.