Deep-IFS: Intrusion Detection Approach for Industrial Internet of Things Traffic in Fog Environment

Mohamed Abdel-Basset, Victor Chang*, Hossam Hawash, Ripon K. Chakrabortty, Michael Ryan

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

The extensive propagation of industrial Internet of Things (IIoT) technologies has encouraged intruders to initiate a variety of attacks that need to be identified to maintain the security of end-user data and the safety of services offered by service providers. Deep learning (DL), especially recurrent approaches, has been applied successfully to the analysis of IIoT forensics but their key challenge of recurrent DL models is that they struggle with long traffic sequences and cannot be parallelized. Multihead attention (MHA) tried to address this shortfall but failed to capture the local representation of IIoT traffic sequences. In this article, we propose a forensics-based DL model (called Deep-IFS) to identify intrusions in IIoT traffic. The model learns local representations using local gated recurrent unit (LocalGRU), and introduces an MHA layer to capture and learn global representation (i.e., long-range dependencies). A residual connection between layers is designed to prevent information loss. Another challenge facing the current IIoT forensics frameworks is their limited scalability, limiting performance in handling Big IIoT traffic data produced by IIoT devices. This challenge is addressed by deploying and training the proposed Deep-IFS in a fog computing environment. The intrusion identification becomes scalable by distributing the computation and the IIoT traffic data across worker fog nodes for training the model. The master fog node is responsible for sharing training parameters and aggregating worker node output. The aggregated classification output is subsequently passed to the cloud platform for mitigating attacks. Empirical results on the Bot-IIoT dataset demonstrate that the developed distributed Deep-IFS can effectively handle Big IIoT traffic data compared with the present centralized DL-based forensics techniques. Further, the results validate the robustness of the proposed Deep-IFS across various evaluation measures.

Original languageEnglish
Pages (from-to)7704-7715
Number of pages12
JournalIEEE Transactions on Industrial Informatics
Volume17
Issue number11
Early online date22 Sept 2020
DOIs
Publication statusPublished - 1 Nov 2021

Bibliographical note

© 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

Keywords

  • Deep learning (DL)
  • Forensics
  • Industrial Internet of Things (IIoT)
  • Intrusion detection

Fingerprint

Dive into the research topics of 'Deep-IFS: Intrusion Detection Approach for Industrial Internet of Things Traffic in Fog Environment'. Together they form a unique fingerprint.

Cite this