Industrial Internet of Things ARP Virus Attack Detection Method Based on Improved CNN BiLSTM

被引:0
|
作者
Wang, Jianhua [1 ]
机构
[1] Northwest Minzu University, Gansu, Lanzhou,730030, China
来源
关键词
Feature Selection - Intrusion detection - Linear transformations - Medium access control - Network security - Photomapping;
D O I
10.13052/jcsm2245-1439.13516
中图分类号
学科分类号
摘要
In order to improve the performance of industrial Internet of Things ARP virus attack detection methods, this paper proposes an improved CNN BiLSTM based industrial Internet of Things ARP virus attack detection method. Firstly, analyze the data flow of normal data, construct an industrial Internet of Things ARP virus intrusion dataset, and obtain the sample distribution of the ETI dataset. Secondly, based on the domain knowledge of ETCN, a preliminary manual selection was performed on all extracted head features, and a feature correlation discrimination algorithm was designed to further screen the features. Then, the Pearson correlation coefficient is used to calculate its linear correlation, the distance correlation coefficient is used to calculate its nonlinear correlation, and a comprehensive calculation formula is designed based on the principle of maximum correlation and minimum redundancy to establish a comprehensive measurement coefficient. The value of the features selected in the first stage is ranked using this coefficient, and different feature subsets are constructed through sequential search. Effective features are selected based on the performance of the intrusion detection models trained on different feature subsets. Implement industrial Internet of Things (IoT) ARP feature extraction through feature extraction, data cleaning, feature transformation, and feature selection. Finally, an improved CNN BiLSTM structure is constructed by using CNN to filter out a large number of packets that are not related to the attack and have weak correlation in the data. Significant features are extracted from the data, and the feature data extracted by CNN is timestamped through timeDistribution. After flattening into one-dimensional data through the flat layer, it is used as input to the BILSTM layer. We used a bidirectional long short-term memory network (BILSTM) to train industrial IoT ARP virus attacks and output the final ARP virus attack detection results. The experimental results show that in the first 10 rounds of training, the training accuracy and validation accuracy of the model rapidly increase, indicating that the model learns a large amount of information in this stage of iteration. We achieved high F1 score (94.42%), high accuracy (94.58%), and low false alarm rate (5.33%) on the ETI dataset. The model consumed very little training time (8.0746s) and testing time (0.1664s). Verified the effectiveness of the design model. © 2024 River Publishers.
引用
收藏
页码:1173 / 1206
相关论文
共 50 条
  • [21] A Method for Network Intrusion Detection Based on GAN-CNN-BiLSTM
    Li, Shuangyuan
    Li, Qichang
    Li, Mengfan
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (05) : 507 - 515
  • [22] Research on Industrial Production Defect Detection Method Based on Machine Vision Technology in Industrial Internet of Things
    Jia, Limin
    Wang, Yang
    TRAITEMENT DU SIGNAL, 2022, 39 (06) : 2061 - 2068
  • [23] CNN-CNN: Dual Convolutional Neural Network Approach for Feature Selection and Attack Detection on Internet of Things Networks
    Alabsi, Basim Ahmad
    Anbar, Mohammed
    Rihan, Shaza Dawood Ahmed
    SENSORS, 2023, 23 (14)
  • [24] A Network Attack Detection Method Using SDA and Deep Neural Network Based on Internet of Things
    Jingwei Li
    Bo Sun
    International Journal of Wireless Information Networks, 2020, 27 : 209 - 214
  • [25] A Network Attack Detection Method Using SDA and Deep Neural Network Based on Internet of Things
    Li, Jingwei
    Sun, Bo
    INTERNATIONAL JOURNAL OF WIRELESS INFORMATION NETWORKS, 2020, 27 (02) : 209 - 214
  • [26] Internet of vulnerable things: New industrial attack vectors
    Rothschild, Michael
    Control Engineering, 2020, 67 (09) : 27 - 32
  • [27] Command Disaggregation Attack and Mitigation in Industrial Internet of Things
    Xun, Peng
    Zhu, Pei-Dong
    Hu, Yi-Fan
    Cui, Peng-Shuai
    Zhang, Yan
    SENSORS, 2017, 17 (10)
  • [28] A BiLSTM-Based DDoS Attack Detection Method for Edge Computing
    Zhang, Yiying
    Liu, Yiyang
    Guo, Xiaoyan
    Liu, Zhu
    Zhang, Xiankun
    Liang, Kun
    ENERGIES, 2022, 15 (21)
  • [29] An Improved Evolutionary Method for Social Internet of Things Service Provisioning Based on Community Detection
    Allakaram Tawfeeq, Bahar
    Masoud Rahmani, Amir
    Koochari, Abbas
    Jafari Navimipour, Nima
    IEEE ACCESS, 2024, 12 : 132939 - 132963
  • [30] A Novel CNN-LSTM Fusion-Based Intrusion Detection Method for Industrial Internet
    Song, Jinhai
    Zhang, Zhiyong
    Zhao, Kejing
    Xue, Qinhai
    Brij B Gupta
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2023, 17 (01)