dc.contributor.author | Shukla, Amit, K. | |
dc.contributor.author | Srivastav, Shubham | |
dc.contributor.author | Kumar, Sandeep | |
dc.contributor.author | Muhuri, Pranab, K. | |
dc.date.accessioned | 2023-02-08T05:36:21Z | |
dc.date.available | 2023-02-08T05:36:21Z | |
dc.date.issued | 2023 | |
dc.identifier.citation | Shukla, A., Srivastav, S., Kumar, S., & Muhuri, P. (2023). UInDeSI4.0 : An efficient Unsupervised Intrusion Detection System for network traffic flow in Industry 4.0 ecosystem. <i>Engineering Applications of Artificial Intelligence</i>, <i>120</i>, Article 105848. <a href="https://doi.org/10.1016/j.engappai.2023.105848" target="_blank">https://doi.org/10.1016/j.engappai.2023.105848</a> | |
dc.identifier.other | CONVID_176577639 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/85389 | |
dc.description.abstract | In an Industry 4.0 ecosystem, all the essential components are digitally interconnected, and automation is integrated for higher productivity. However, it invites the risk of increasing cyber-attacks amid the current cyber explosion. The identification and monitoring of these malicious cyber-attacks and intrusions need efficient threat intelligence techniques or intrusion detection systems (IDSs). Reducing the false positive rate in detecting cyber threats is an important step for a safer and reliable environment in any industrial ecosystem. Available approaches for intrusion detection often suffer from high computational costs due to large number of feature instances. Therefore, this paper proposes a novel unsupervised IDS for Industry 4.0 which we term as: Unsupervised Intrusion Detection System for Industry 4.0 (UInDeSI4.0). We have substantiated the proposed UInDeSI4.0 approach through its experimentation on the well-known UNSW-NB15 Industry 4.0 dataset. The proposed UInDeSI4.0 employs feature selection approaches to obtain minimal and optimal features. These features are then used to train isolation forest to detect network traffic threats in an unsupervised manner. Accordingly, the proposed UInDeSI4.0 approach can efficiently differentiate between the normal events and the attacks or intrusions in environments with no label information. Experimental results show that the proposed UInDeSI4.0 provides better accuracy (63%) and a minimal feature set (nine) compared to traditional IDSs. In contrast to deep learning approaches, UInDeSI4.0 generates faster results with minimum features. In conclusion, we establish the superiority of UInDeSI4.0 approach as an accurate and computationally efficient IDS for Industry 4.0. | en |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Elsevier BV | |
dc.relation.ispartofseries | Engineering Applications of Artificial Intelligence | |
dc.rights | CC BY 4.0 | |
dc.subject.other | isolation forest | |
dc.subject.other | industry 4.0 | |
dc.subject.other | intrusion detection | |
dc.subject.other | ICA | |
dc.subject.other | random forest | |
dc.subject.other | principal component analysis | |
dc.title | UInDeSI4.0 : An efficient Unsupervised Intrusion Detection System for network traffic flow in Industry 4.0 ecosystem | |
dc.type | research article | |
dc.identifier.urn | URN:NBN:fi:jyu-202302081669 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Computing, Information Technology and Mathematics | fi |
dc.contributor.oppiaine | Laskennallinen tiede | fi |
dc.contributor.oppiaine | Computing, Information Technology and Mathematics | en |
dc.contributor.oppiaine | Computational Science | en |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | |
dc.type.coar | http://purl.org/coar/resource_type/c_2df8fbb1 | |
dc.description.reviewstatus | peerReviewed | |
dc.relation.issn | 0952-1976 | |
dc.relation.volume | 120 | |
dc.type.version | publishedVersion | |
dc.rights.copyright | © 2023 The Author(s). Published by Elsevier Ltd. | |
dc.rights.accesslevel | openAccess | fi |
dc.type.publication | article | |
dc.subject.yso | kyberturvallisuus | |
dc.subject.yso | verkkohyökkäykset | |
dc.subject.yso | älytekniikka | |
dc.subject.yso | valvontajärjestelmät | |
dc.subject.yso | tuotantotekniikka | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p26189 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p27466 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p27260 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p13003 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p19050 | |
dc.rights.url | https://creativecommons.org/licenses/by/4.0/ | |
dc.relation.doi | 10.1016/j.engappai.2023.105848 | |
dc.type.okm | A1 | |