Secure IIoT-enabled industry 4.0

The Industrial Internet of things (IIoT) is the main driving force behind smart manufacturing, industrial automation, and industry 4.0. Conversely, industrial IoT as the evolving technological paradigm is also becoming a compelling target for cyber adversaries. Particularly, advanced persistent thre...

Full description

Saved in:
Bibliographic Details
Main Authors: Zeeshan Hussain, Adnan Akhunzada, Javed Iqbal, Iram Bibi, Abdullah Gani
Format: Article
Language:English
English
Published: MDPI 2021
Subjects:
Online Access:https://eprints.ums.edu.my/id/eprint/33421/1/Secure%20IIoT-enabled%20industry%204.0.ABSTRACT.pdf
https://eprints.ums.edu.my/id/eprint/33421/2/Secure%20IIoT-enabled%20industry%204.0.pdf
https://eprints.ums.edu.my/id/eprint/33421/
https://www.mdpi.com/2071-1050/13/22/12384
https://doi.org/10.3390/su132212384
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Malaysia Sabah
Language: English
English
Description
Summary:The Industrial Internet of things (IIoT) is the main driving force behind smart manufacturing, industrial automation, and industry 4.0. Conversely, industrial IoT as the evolving technological paradigm is also becoming a compelling target for cyber adversaries. Particularly, advanced persistent threats (APT) and especially botnets are the foremost promising and potential attacks that may throw the complete industrial IoT network into chaos. IIoT-enabled botnets are highly scalable, technologically diverse, and highly resilient to classical and conventional detection mechanisms. Subsequently, we propose a deep learning (DL)-enabled novel hybrid architecture that can efficiently and timely tackle distributed, multivariant, lethal botnet attacks in industrial IoT. The proposed approach is thoroughly evaluated on a current state-of-the-art, publicly available dataset using standard performance evaluation metrics. Moreover, our proposed technique has been precisely verified with our constructed hybrid DL-enabled architectures and current benchmark DL algorithms. Our devised mechanism shows promising results in terms of high detection accuracy with a trivial trade-off in speed efficiency, assuring the proposed scheme as an optimal and legitimate cyber defense in prevalent IIoTs. Besides, we have cross-validated our results to show utterly unbiased performance