Next Article in Journal
Enhancing Diagnosis of Rotating Elements in Roll-to-Roll Manufacturing Systems through Feature Selection Approach Considering Overlapping Data Density and Distance Analysis
Next Article in Special Issue
ROAST-IoT: A Novel Range-Optimized Attention Convolutional Scattered Technique for Intrusion Detection in IoT Networks
Previous Article in Journal
Collaborative Perception—The Missing Piece in Realizing Fully Autonomous Driving
Previous Article in Special Issue
Optimized Visual Internet of Things for Video Streaming Enhancement in 5G Sensor Network Devices
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

HIDM: Hybrid Intrusion Detection Model for Industry 4.0 Networks Using an Optimized CNN-LSTM with Transfer Learning

1
Department of Computer Science and Engineering, Chandigarh University, Gharuan, Mohali 140413, India
2
College of Science and Engineering, Hamad Bin Khalifa University, Qatar Foundation, Doha P.O Box 5825, Qatar
3
Apex Institute of Technology (CSE), Chandigarh University, Gharuan, Mohali 140413, India
4
Department of Computer Science, College of Computers and Information Technology, Taif University, P.O. Box 11099, Taif 21944, Saudi Arabia
5
Department of Information Technology, College of Computers and Information Technology, Taif University, P.O. Box 11099, Taif 21974, Saudi Arabia
6
Amity School of Engineering and Technology, Amity University, Gurugram 122412, India
7
Department of Computer Engineering and Applications, GLA University, Mathura 281406, India
8
Data Science and Artificial Intelligence Program, College of Information Sciences and Technology, Penn State University, State College, PA 16801, USA
9
School of Optometry and Vision Science, Faculty of Science, University of Waterloo, 200 University, Waterloo, ON N2L3G1, Canada
10
Faculty of Engineering, University of Waterloo, 200 University Ave W., Waterloo, ON N2L3G1, Canada
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(18), 7856; https://doi.org/10.3390/s23187856
Submission received: 6 March 2023 / Revised: 13 April 2023 / Accepted: 25 April 2023 / Published: 13 September 2023
(This article belongs to the Special Issue Machine Learning for Wireless Sensor Network and IoT Security)

Abstract

:
Industrial automation systems are undergoing a revolutionary change with the use of Internet-connected operating equipment and the adoption of cutting-edge advanced technology such as AI, IoT, cloud computing, and deep learning within business organizations. These innovative and additional solutions are facilitating Industry 4.0. However, the emergence of these technological advances and the quality solutions that they enable will also introduce unique security challenges whose consequence needs to be identified. This research presents a hybrid intrusion detection model (HIDM) that uses OCNN-LSTM and transfer learning (TL) for Industry 4.0. The proposed model utilizes an optimized CNN by using enhanced parameters of the CNN via the grey wolf optimizer (GWO) method, which fine-tunes the CNN parameters and helps to improve the model’s prediction accuracy. The transfer learning model helps to train the model, and it transfers the knowledge to the OCNN-LSTM model. The TL method enhances the training process, acquiring the necessary knowledge from the OCNN-LSTM model and utilizing it in each next cycle, which helps to improve detection accuracy. To measure the performance of the proposed model, we conducted a multi-class classification analysis on various online industrial IDS datasets, i.e., ToN-IoT and UNW-NB15. We have conducted two experiments for these two datasets, and various performance-measuring parameters, i.e., precision, F-measure, recall, accuracy, and detection rate, were calculated for the OCNN-LSTM model with and without TL and also for the CNN and LSTM models. For the ToN-IoT dataset, the OCNN-LSTM with TL model achieved a precision of 92.7%; for the UNW-NB15 dataset, the precision was 94.25%, which is higher than OCNN-LSTM without TL.

1. Introduction

Industry 4.0 promotes digitizing conventional industrial production and working practices through intelligent technologies that facilitate machine-to-machine connectivity. In industrial automation, all of the production, job processing, and operation mechanisms are automated using advanced IoT strategies and instruments [1]. An IoT technique in industrial automation is called “IIoT” (Industrial Internet of Things). This industrial automation principle also takes on machine-to-machine (M-M) and human-to-machine (H-M) communications.
Recently, IoT technology has been increasingly accepted by numerous industrial sectors, which include medical services, the energy sector, healthcare, the manufacturing and supply chain, and home appliance makers [2]. In IR 4.0 architectures, the key techniques that are widely used are virtualization, automation, ML and DL methods, artificial intelligence techniques, and IoT. In IR 4.0, these latest advancements are blended into various sectors of smart manufacturing and communication. In all of these sectors, data are available on cloud servers or remote platforms, which may cause intrusion attacks; thus, information security is always demanding in IR 4.0. IR 4.0 utilizes devices and networks for communication and data transmission, which increases the security risk. Any smart device connected to a public communication network can offer an easy entrance for intruders and cybercriminals to accomplish malicious activities, which can lead to huge data losses for an organization and can financially affect them.
The rapid utilization of IoT in industrial assignments has enhanced industry working processes and workers’ livelihoods. With the help of cutting-edge innovations such as data transmission techniques, software solutions, remote monitoring, networking, sensors, and embedded technology, IoT technology transforms a primary standard physical object into an intelligent entity.
In the IR 4.0 environment, the data flow among private and public networks for various purposes, increasing the demand for secure IoT network communications [3]. Figure 1 presents the significant components of IIoT under Industry 4.0;it mainly includes the Internet of Things (IoT), Internet of Data (IoD), Internet of People (IoP), and Internet of Services (IoS) technologies.
In IIoT communication, many appliances can directly accept and process any communication data in the IIoT network without checking for the security. These issues make the devices more sensitive to confidentiality and security risks and may endanger their IIoT solutions and automation implementations [4].
Due to the rapid evolution of IIoT, several security issues have arisen; to deal with these issues in the existing research, various conventional AI methods have beenutilized, which have been unable to resolve them properly. In the existing research, deep learning methods were found to be accurate and had numerous benefits that could be implemented to handle Industry IoT cyber threats [5]. These attacks have significant safety-related repercussions and adversely influence the system’s functions. Therefore, intrusion attacks are one of the most crucial challenges in Industry 4.0. In the IR 4.0 ecosystem, every day, various cyberattacks occur, which may result in monetary and non-monetary losses. Therefore, it is critical to recognize these threats and enhance and maintain IR 4.0 network security [6].
This research uses deep learning algorithms to develop a security model for detecting intrusions in IIoT networks under Industry 4.0 environments. The motivation and critical contribution of this study includes the following:
  • This research presents a hybrid intrusion detection model using an optimized CNN and transfer learning for cyber threat detection in Industry 4.0.
  • In the proposed model, the parameters of the CNN model were optimized using the GWO method, which fine-tunes the CNN parameters, i.e., pooling size, kernel size, number of filters, number of epochs, and batch size, which helps to enhance the model’s prediction accuracy.
  • Using multi-class classification, the proposed hybrid model, existing OCNN-LSTM [1], and the CNN and LSTM model were tested on two popular IIoT datasets, ToN-IoT and UNW-NB15.
  • An experimental analysis was performed using various performance-measuring parameters, i.e., precision, F-measure, recall, accuracy, and detection rate; a comparison analysis was performed betweenthe existing OCNN-LSTM model and the proposed HIDM model.
  • In the experimental results, the proposed HIDM model achieved a precision of 92.7% for the ToN-IoT dataset and 94.25% for the UNW-NB15 dataset.
The complete article is divided into several sections, which are organized as follows. Section 2 covers the literature review of the existing research and cybersecurity risk factors in Industry 4.0. Section 3 covers the materials and methods related to the present study, the processes of the proposed HIDM architecture, and the dataset description. Section 4 covers the experimental results and discussion. Section 5 covers the conclusion and future work.

2. Related Work

This section analyzes deep and machinelearning-based research for ID detection in IR 4.0. Furthermore, it covers existing methods and IDS design patterns for identifying security breaches in IIoT networks.
The principle of IIoT has popped up due to the application of IoT in the production industry for unique and memorable activities predicated on emerging technology advances. An IIoT system comprises an actuator, sensor, control system communication channels, integration interface, cutting-edge surveillance systems, automotive communications networks, and intelligent appliances [7]. Everything in IIoT can be monitored via anonline platform. Using Industry 4.0 in several industries has enhanced the capabilities of many sectors, including equipment performance standards, consumer safety, monitoring solutions, and supply chain systems, and its use has substantially increased labor production efficiency. Moreover, the IIoT network enables a network area to become fully interactive by authorizing various applications, transmission modules, and quality assurance [8].
A framework for preventing cyberattacks on IIoT equipment using CNN was discussed in [9]. An auto-encoder cleaned up the statistics in the two models, ensuring a decent projection. A deep convolutional neural network was used to empower intrusion detection and classification. The suggested model was evaluated using the dataset, ISOT, and X-IIoTID. Another research that used the X-IIoTID data source introduced a highly reliable approach fordata communication;the presented system relies on deep learning. Deep neural networks were used to put the developed framework into the experiment. Based on the findings, a maximum accuracy value was accomplished [10].
A new approach for limiting and maintaining security streams to organizational and outsourced production line equipment, in addition to perimeter protection, is a necessary first step in securing industrial production as it adopts Industry 4.0 practices [11]. In research using UNSW-NB15 and KDD99 datasets, a comparative procedure was performedusing different strategies, including CNN and ANN. The research analyzed the data using performance measures such as false alarm frequency and precision value [12].
In the KDD-99 dataset, anticipation maximization had a precision of 792.6% and a false alarm percentage of 22.9%. An ID for IIoTwas suggested in another research study. A genetic algorithm (GA) was used to specify characteristics throughout the proposed model. The GA fitness value was accomplished using the random forest method [13]. A classification process achieved an under-the-curve area of 0.91 and a validation accuracy of 86.69% when using a UNSW-NB15 industry IDS dataset [14]. The GA-RM model that produced these outcomes had 16 characteristics. An IoT-based ID system utilizing deep learning for industry IoT networks was addressed in [13]. The feature extraction throughout this proposed model was conductedusing an optimization technique. The support vector machine (SVM) model was chosen for the intrusion classifier. The particle swarm optimization (PSO) method used in this study was predicated on a “Light Gradient Boosting” (Light-GB) technique [15].
Ref. [16] proposed a variation of a long short-term memory-based system for IIoTtechnology in the manufacturing industry. The attributes were rebuilt throughout the proposed IDS. After that, a selection criterion was operated among all of the completely new attributes. The features were determined using an auto-encoder method;this method extracts features from massive, complicated sample data [17]. Throughout this application, the investigators have used UNSW-NB15 samples. Another research developed an ensemble learning-based IDS for Industry 4.0 networks [18]. A principal responsive function was used for feature reduction in this method. The attributes of the responsive correlation coefficients that were decided upon were addressed to the transfer learning for categorization. The proposed framework was tested throughout the NSL-KDD and UNSW-NB15 datasets [19].
Furthermore, the multi-class classifiers method was carried out across both samples. A deep learning-based IDS system for IIoT was discussed in [20]. The suggested IDS was tested using samples from the X-IIoT-ID and ToN-IoT industrial datasets. The precision, F1-score, and accuracy were measured for the proposed model and compared with the existing ANN model [21]. Table 1 presents a comparative analysis of the existing IDS research.

3. Materials and Methods

This section presents the materials and methods related to the research.

3.1. Dataset Details

This research utilized the UNW-NB15 and ToN-IoT industrial datasets. The detailed descriptions of these datasets are as follows.

3.1.1. UNW-NB15

This dataset was released in 2015 by the Central Australian Core for Cyber Lab and is widely used by academic researchers. The researchers utilized raw data packets created by the IXIA perfect combination system for the UNSW-NB15 time series. This dataset is ideal for IIoT attack analyses [22]. Table 2 presents the description of the UNW-NB15 dataset, and Table 3 presents the complete details of the UNW-NB15 dataset. The dataset is divided into an 80:20 ratio for training and testing.
The UNB dataset contains normal, back-door, worms, reconnaissance, fuzzers, DoS, shell code, exploits, and generic data attributes [23]. The dataset includes 38,500 normal records, 950 back-doors, 174 worms, 978 reconnaissance, 7500 fuzzers, 4800 DoS, 978 shellcode, 12,440 exploits, and 18,554 generic. The detailed description of UNW-NB15 is represented in Figure 2 and Figure 3. Figure 2 presents the training and testing dataset, and Figure 3 presents the visual representation of the training and testing dataset.

3.1.2. ToN-IoT

This dataset is designed to accumulate and examine mashed datasets from the Industrial IoT, including diversified data, such as sensor data from the IoT, system logs, and network traffic details. A feasible network creates the IoT for industry [24]. The ToN-IoT dataset connects several virtual servers, cloud nodes, and physical devices. It includes assessing the precision and effectiveness of numerous machine intelligence information security implementations.
This dataset contains industrial cyber attacks. The tests used various aspects, including Win-7, Win-10, network samples, transmission detail, and IoT training models and their respective attacks. TheToN-IoT dataset contains normal, denialofservice, back-door, distributed denialofservice, MITM, injections, ransomware, scanning, cross-site scripting, and password records [25].
The ToN-IoT dataset contains attack classes and the numbers of instances for each class, wherethe details are as follows: normal, 79,638; denialofservice, 33,753; back-door, 50,811; distributed denialofservice, 61,650; MITM, 105; injections, 45,265; ransomware, 7280; scanning, 71,401; cross-site scripting, 21,089; and password, 17,185. Table 3 presents a detailed description of the ToN-IoT dataset.

3.2. Proposed HIDM

This research presents a hybrid intrusion detection model for an IIoT network for I4.0. The proposed model utilizes an optimized CNN with transfer learning. The proposed model uses the quality of transfer learning in the training and operates it in the CNN. A TL algorithm takes a framework trained on a massive volume of data and applies its expertise to a relatively small database. We freeze the network’s initial CNN architecture for classification tasks and only train the final few layers that help to make a final prediction [26].
Figure 4 presents the architecture of the proposed HIDM model. The complete architecture is divided into three sections: optimized CNN, LSTM, and transfer learning. To enhance the CNN performance, we utilize fine-tuned parameters, i.e., learning rate, epoch, and weight; these all help optimize the CNN. The increased number of epochs in CNN helps to enhance the accuracy. The proposed model utilizes a GWO method [27] to optimize CNN hyperparameters.

3.2.1. Optimized CNN usingthe GWO Method

In the proposed model, the existing CNN method is optimized by using the GWO method (Algorithm 1). GWO is used to tune the hyperparameters of the CNN method. Hyperparameters heavily influence the precision and efficiency of CNN. The selection of the network’s hyperparameters seems critical and is determined by the activity where the CNN is utilized. The hyperparameter for the CNN learning model includes “Batch size, Number of epochs, Pooling size, Number of Filters, and Kernel size.” The learning algorithm controls the gradient descent method’s performance, and the speed determines how much updating the earlier weights affects the updating of subsequent weights [28].
A frequency of epochs controls how frequently the learning algorithm updates the connection weights following the training sample. The overfitting problem in the connection is resolved via the regularization process as discussed in Algorithm 1. To handle all of these variables, adjusting these hyperparameters is essential to assist the network in producing the most detailed findings [29].
Algorithm 1: GWO method for hyperparameter optimization for CNN
Input: input population, Batch size Bc, Agents Ag, dimension Dn, Hyper-parameters H1, H2, H3, and H4, n is the number of iterations, Hyperparameter function Hfd,
Initialization of population P1, P2 and P3
Output: Optimized hyper-parameter
 Select a data sample for training from batch input
For the number of optimization, n
 For search desire agent
                Determine the optimized fitness function
                Select the best search agents A1, A2, and A3.
                Update the position of each agent by
P o s _ i n = k = 0 n n k A 1 k a A n n k
                       where n is the number of iterations and k position change
end for
Update P1, P2 and P3
               End
       Sigmoid function (H1, H2, H3,H4, Hfd)
End

3.2.2. OCNN-LSTM with Transfer Learning

An OCNN-LSTM blended module was used in this proposed HIDM model. After the pre-processing, the CNN needed information from various sources, i.e., the local patterns in data again. Because the convolution kernels proceed in a fixed direction to dynamically extract the unobserved characteristics in the flow directions, the one-dimensional CNN performs very well in time-series network traffic workloads.
The CNN-LSTM framework includes CNN layers for extracting features on training datasets with long short-term memory for sequence learning. CNN-LSTMs are created to solve IDS prediction of Industry 4.0intrusiondetectionproblems and to generate explanations from observation sequences in IIoT datasets. We perform the CNN architecture with each input and send the outcome to the LSTM in a continuous sampling interval.
Transfer learning, as applied to the proposed HIDS, is just moving the weights of the CNN-LSTM model that have been trained over the IDS dataset to some other. Several data processing activities have benefited from the TL approach. This happens because the feature sequences that are primarily obtained by the bottom levels of the CNN architectures usually generate heavy features that can be applied to various applications, whereas only the top layers learn vital characteristics for a given dataset. As a result, the bottom levels of convolutional networks can be immediately applied to a broad variety activity. Fine-tuning can be employed in the TL procedure of learning algorithms to enhance the efficiency of TL [30,31,32,33,34,35,36].

3.3. Performance-Measuring Parameters

We utilize five broadly utilized specifications analyzing the model’s performance: precision (PC), accuracy (AC), true positive rate (TPR), false positive rate (FPR), and F1-score [30,31].
A C = ( T P + T N ) ( T P + T N + F P + F N ) 100
T P R = T P ( T P + F N ) 100
F P R = F P ( F P + T N ) 100
P r e c i s i o n = T P ( T P + F P ) 100
R e c a l l = T P ( T P + F N ) 100
F 1 = 2 ( P r e c i s i o n R e c a l l ) ( P r e c i s i o n + R e c a l l ) 100

4. Experimental Results

This section covers the experimental scenario, setup, parameters, and result comparisons.

4.1. Dataset and Data Pre-Processing

This research utilizedthe popular ToN-IoT and UNW-NB15 Industrial IoT datasets. These data samples include numerous problems, such as missing values, excessive features, redundancy, and behavioral duplicates, whichdegrade model performance. We used class weights to counterbalance the data and improve the classifier performance. From each attack subclass category and its general behavior and vulnerability condition, a ranked column is incorporated within the ToN-IoT samples. The dataset was presented in the CSV file format. This dataset mainly contains nine key attack classes. The attack samples in UNSWB-15 were separated among nine classes in a CSV format called “normal class” and “attack class.” We identified and eliminated records with incomplete data, i.e., the NaNclass.
Categorical data in the dataset must be transformed into numerical values because DL techniques only work on numeric data. The Label Encoder class from the sklearn package was utilized for this conversion. Each attribute value was assigned a numerical value. The dataset contains properties measured at different levels in the specimen. The sample data must be expressed in a consistent specific metric to accurately assess these specimens employing DL techniques. With this aim, by using the Standard Scaler class within the sklearn public library, the results of the observations in the dataset were normalized well with the Z-Score normalization technique with just a mean average of zero as well as a normal deviation of one.
Additionally, we added regular vectors towards the “NaNclass,” changed the “NaNclass” variables to zero, and eliminated fixed attributes that served no purpose (e.g., dsport, srcip, dstip, and sport). When applying a feature-based strategy, independent of the duration of the attack, it is critical to “know” the properties of all previous windows. Each window is transmitted in a single packet to detect whether previous transmissions triggered an attack more on the current datagram.

4.2. Experimental Details

The proposed HIDS model and existing OCNN-LSTM model [1], CNN, and LSTM models were implemented using Python programming and tested on two popular online datasets, ToN-IoT and UNW-NB15. The performance of the proposed method was tested in two experiments. The first experiment was performed on the ToN-IoT dataset, and the second was performed on the UNW-NB15 dataset.

4.2.1. Experiment1 for TON-IoT Dataset

The ToN-IoT dataset discussed in Section 3 includes diverse statistics collectedfrom various platforms utilized in Industrial IoT; it includesWin-7, Win-10, network samples, transmission details, andIoT.
In this experiment, the proposed HIDM model (OCNN-LSTM with transfer learning) and the existing OCNN-LSTM [1] model were used in a multi-class context to measure their effectiveness. The dataset was divided into 70:30 ratios for training and testing. The tests used various aspects, includingWin-7, Win-10, network samples, transmission detail, andIoT training models. The results were calculated for epoch 50 and epoch 100. Table 4 presents the outcome of the proposed model for the TON-IoT dataset.
The first experiment calculates various simulation results for OCNN-LSTM [1] and the proposed OCNN-LSTM with transfer learning. Figure 5, Figure 6, Figure 7 and Figure 8 present the simulation results for Experiment 1 of the proposed model for the ToN-IoT dataset. Figure 5 presents the simulation results of the confusion matrix for the proposed HIDM model. Figure 6 presents the results for the ROC Curve (TPR vs. FPR), Figure 7 presents the simulation results of the training and validation accuracy, and Figure 8 presents the simulation results of the training and validation loss of the proposed model for the ToN-IoT dataset.
Table 5 presents the simulation results of the experiment of the proposed model and the existing CNN-LSTM, simple CNN and LSTM models for the ToN-IoT dataset. The existing CNN-LSTM [1] model achieved a precision of 89.1%, recall of 49.6%, accuracy of 87.3%, and F1-score of 48.6%. The existing CNN model acquired a precision of 81.1%, recall of 48.1%, accuracy of 73.1%, and F1-score of 42.1%, and the similar existing LSTM model achieved a precision of 85.1%, recall of 47.1%, accuracy of 78.1%, and F1-score of 44.1%. The existing CNN and LSTM models have less accuracy.
We applied the transfer learning method with an optimized CNN and LSTM in the proposed model. The optimized CNN fine-tuned the hyperparameters, and the TL method enhanced the prediction accuracy by using knowledge transformation. The proposed model achieved a precision of 92.7%, recall of 52.39%, accuracy of 94.4%, and F1-score of 56.6%. This experimental analysis has proven that after applying the TL method, the performance of the CNN-LSTM model is slightly increased. The proposed model presents better results.

4.2.2. Experiment2 for UNW-NB15 Dataset

The UNW-NB-15 dataset discussed in the sub-sections of Section 3 includes diverse statistics collected from various platforms that are utilized in Industrial IoT. The dataset contains ten classes of multiple attacks and forty-three features.
In this experiment, the proposed HIDM model (OCNN-LSTM with transfer learning) and existing OCNN-LSTM [1] model were used in a multi-class context to measure its effectiveness. The dataset was divided into 80:20 ratios for training and testing. The results were calculated for epoch 50 and epoch 100. Table 5 presents the outcome of the proposed model for the UNW-NB-15 dataset.
The second experiment calculates different simulation results for OCNN-LSTM [1] and OCNN-LSTM with transfer learning (proposed model). Figure 9, Figure 10, Figure 11, Figure 12, Figure 13 and Figure 14 present the simulation results for Experiment 2 of the proposed model for the ToN-IoT dataset. Figure 9 presents the simulation results for the confusion matrix of the proposed model, Figure 10 presents the loss function evolution during training, Figure 11 presents the accuracy evolution during training, Figure 12 presents the precision evolution during training, and Figure 13 presents the recall curve for training of the proposed model for UNW-NB15. Figure 14 presents the ROC curve for TPR vs. FPR in the proposed model for UNW-NB15.
Table 6 presents the simulation results of the experiment of the proposed model and the existing OCNN-LSTM, CNN, and LSTM models for the UNW-NB15 dataset. The existing CNN-LSTM [1] model achieved a precision of 90.91%, recall of 51.66%, accuracy of 91.02%, and F1-score of 46.31%. We applied the transfer learning method with an optimized CNN and LSTM in the proposed model. The optimized CNN fine-tuned the hyperparameters, and the TL method enhanced the prediction accuracy by using the knowledge transformation.
The proposed model achieves a precision of 94.2%, recall of 55.01%, accuracy of 92.71%, and F1-score of 45.12%. This experimental analysis has proven that, after applying the TL method, the performance of the CNN-LSTM model is slightly increased. The proposed model presents better results for the UNW-NB-15 dataset.

5. Discussion and Conclusions

This research presented a hybrid intrusion detection model using OCNN-LSTM with transfer learning for IIoT networks in Industry 4.0. This research utilizes the popular IIoT datasets ToN-IoT and UNW-NB15. The proposed HIDM and existing CNN models were implemented on these two datasets. The proposed model uses transfer learning, which helps to enhance the prediction accuracy. The TL method transfers the training model knowledge into the OCNN-LSTM model, which allows for this model to more efficiently and precisely predict the attack classes from datasets. We applied the transfer learning method with an optimized CNN and LSTM in the proposed model. The optimized CNN fine-tuned the hyperparameters, and the TL method enhanced the prediction accuracy by using the knowledge transformation. The proposed HIDM model achieved a precision of 92.7% for the ToN-IoT dataset and a precision of 94.25%for the UNW-NB15 dataset, which proves the proposed model’s strength.
Memory and processing time are the two critical issues experienced when conducting this research, so we utilized class weights in place of scores, wherein the proposed HIDM was constrained by CPU capabilities such as storage, exaction memory, and testing and training time. We will overcome the training and validation loss in a future work. We will implement the proposed model in a real-time I4.0 environment to monitor and detect live data and will also try to compare it with more profound learning models.

Author Contributions

Conceptualization, M.A.; methodology, U.K.L. and S.S.; validation, P.M., A.M.B. and S.D.; formal analysis, A.S.; investigation, U.K.L., S.D. and K.R.; resources, P.M., S.S., R.A. and M.A.; data curation, A.S.; writing—original draft, R.A. and A.M.B.; supervision, M.A. All authors contributed equally to this research. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Taif University.

Institutional Review Board Statement

Not Applicable.

Informed Consent Statement

Not Applicable.

Data Availability Statement

Not Applicable.

Acknowledgments

The authors thank the Deanship of Scientific Research, Taif University, for funding this work.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are utilized in this research.
AbbreviationDetails
DLDeep learning
TLTransfer learning
IDSIntrusion detection system
CNNConvolution neural network
LSTMLong short-term memory
DoSDenial of service attack
DDoSDistributed denial of service attack
IoTInternet of Things
IIoTIndustrial Internet of Things
OCNNOptimized CNN
GWOGrey wolf optimizer
HIDMHybrid intrusion detection model
H-MHuman-to-machine
M-MMachine-to-machine
MLMachine learning
ANNArtificial neural network
GAGenetic algorithm
SVMSupport vector machine
PSOParticle swarm optimization
Light-GBLight gradient boosting
IoDInternet of Data
IoPInternet of People
IoSInternet of Services

References

  1. Abid, H.; Javaid, M.; Singh, R.P.; Rab, S.; Suman, R. Perspectives of cybersecurity for ameliorative Industry 4.0 era: A review-based framework. Ind. Robot. Int. J. Robot. Res. Appl. 2022. online ahead of print. [Google Scholar]
  2. Muhammad, A.; Sadiq, S.; Alluhaidan, A.S.; Umer, M.; Ullah, S.; Nappi, M. Industry 4.0 technologies and their applications in fighting COVID-19 pandemic using deep learning techniques. Comput. Biol. Med. 2022, 145, 105418. [Google Scholar]
  3. Valentin, M.; Sondi, P.; Ramat, E. A review of cybersecurity guidelines for manufacturing factories in industry 4.0. IEEE Access 2021, 9, 23235–23263. [Google Scholar]
  4. Fraga-Lamas, P.; Lopes, S.I.; Tiago; Fernández-Caramés, M. Emerging Paradigms and Architectures for Industry 4.0 Applications. Appl. Sci. 2022, 12, 9546. [Google Scholar] [CrossRef]
  5. Kumar, A.A.; Karne, R.K. IIoT-IDS Network using Inception CNN Model. J. Trends Comput. Sci. Smart Technol. 2022, 4, 126–138. [Google Scholar] [CrossRef]
  6. Varghese, S.; Remya, S. Dog Breed Classification Using CNN. In Security Issues and Privacy Concerns in Industry 4.0 Applications; Wiley Online Library: Hoboken, NJ, USA, 2021; pp. 195–205. [Google Scholar]
  7. Sawik, T. A linear model for optimal cybersecurity investment in Industry 4.0 supply chains. Int. J. Prod. Res. 2022, 60, 1368–1385. [Google Scholar] [CrossRef]
  8. Holger, F.; Schriegel, S.; Jasperneite, J.; Trsek, H.; Adamczyk, H. Analysis of the Cyber-Security of industry 4.0 technologies based on RAMI 4.0 and identification of requirements. In Proceedings of the 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA), Berlin, Germany, 1–6 September 2016; pp. 1–4. [Google Scholar]
  9. Fernández-Caramés, T.M.; Fraga-Lamas, P. Use case-based blended teaching of IIoT cybersecurity in the industry 4.0 era. Appl. Sci. 2017, 10, 5607. [Google Scholar] [CrossRef]
  10. Sklyar, V.; Kharchenko, V. ENISA documents in cybersecurity assurance for industry 4.0: IIoT threats and attacks scenarios. In Proceedings of the 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Metz, France, 18–21 September 2019; Volume 2, pp. 1046–1049. [Google Scholar]
  11. Minh-Quang, T.; Elsisi, M.; Mahmoud, K.; Liu, M.K.; Lehtonen, M.; Darwish, M.M.F. Experimental setup for online fault diagnosis of induction machines via promising IoT and machine learning: Towards industry 4.0 empowerment. IEEE Access 2021, 9, 115429–115441. [Google Scholar]
  12. Umit, H.; Sevgilioglu, G. The evolving role of automated systems and its cyber-security issue for global business operations in Industry 4.0. Int. J. Bus. Ecosyst. Strategy 2019, 1, 1–11. [Google Scholar]
  13. Sumeyye, C.F.; Karakose, M. Comparative Analysis of Cyber Security Approaches Using Machine Learning in Industry 4.0. In Proceedings of the 2020 IEEE International Symposium on Systems Engineering (ISSE), Virtual, 12 October–12 November 2020; pp. 1–5. [Google Scholar]
  14. Kebande, V.R. Industrial Internet of things (IIoT) forensics: The forgotten concept in the race towards industry 4.0. Forensic Sci. Int. Rep. 2022, 5, 100257. [Google Scholar] [CrossRef]
  15. Jiewu, L.; Ye, S.; Zhou, M.; Zhao, J.L.; Liu, Q.; Guo, W.; Cao, W.; Fu, L. Blockchain-secured smart manufacturing in industry 4.0: A survey. IEEE Trans. Syst. ManCybern. Syst. 2020, 51, 237–252. [Google Scholar]
  16. Dimitrios, T.; Maniatakos, M. Open platform systems under scrutiny: A cybersecurity analysis of the device tree. In Proceedings of the 2018 25th IEEE International Conference on Electronics, Circuits and Systems (ICECS), Bordeaux, France, 9–12 December 2018; pp. 477–480. [Google Scholar]
  17. Laković, L.; Ognjanović, I.; Šendelj, R.; Injac, O. Semantically enhanced cyber security model for industry 4.0: Methodological framework. In Proceedings of the 2021 25th International Conference on Information Technology (IT), Zabljak, Montenegro, 16–20 February 2021; pp. 1–4. [Google Scholar]
  18. Wahid, A.; Breslin, J.G.; Intizar, M.A. Prediction of Machine Failure in Industry 4.0: A Hybrid OCNN-LSTM Framework. Appl. Sci. 2022, 12, 4221. [Google Scholar] [CrossRef]
  19. Yibo, H.; Zhang, D.; Cao, G.; Pan, Q. Network data analysis and anomaly detection using CNN technique for industrial control systems security. In Proceedings of the 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC), Bari, Italy, 6–9 October 2019; pp. 593–597. [Google Scholar]
  20. Miškuf, M.; Zolotová, I. Comparison between multi-class classifiers and deep learning with focus on industry 4.0. In Proceedings of the 2016 Cybernetics & Informatics (K&I), Levoca, Slovakia, 2–5 February 2016; pp. 1–5. [Google Scholar]
  21. Marianna, L.; Lazoi, M.; Corallo, A. Cybersecurity for Industry 4.0 in the current literature: A reference framework. Comput. Ind. 2018, 103, 97–110. [Google Scholar]
  22. Giovanna, C.; Fattori, F.; Podrecca, M.; Sartor, M. Addressing industry 4.0 cybersecurity challenges. IEEE Eng. Manag. Rev. 2019, 47, 79–86. [Google Scholar]
  23. Ahmed, R.S.; Ahmed, E.S.A.; Saeed, R.A. Machine learning in cyber-physical systems in industry 4.0. In Artificial Intelligence Paradigms for Smart Cyber-Physical Systems; IGI Global: Hershey, PN, USA, 2021; pp. 20–41. [Google Scholar]
  24. Elsisi, M.; Tran, M.Q.; Mahmoud, K.; Lehtonen, M.; Darwish, M.M. Deep learning-based industry 4.0 and internet of things towards effective energy management for smart buildings. Sensors 2021, 21, 1038. [Google Scholar] [CrossRef]
  25. Angelo, C.; Lazoi, M.; Lezzi, M. Cybersecurity in the context of industry 4.0: A structured classification of critical assets and business impacts. Comput. Ind. 2020, 114, 103165. [Google Scholar]
  26. Kumar, L.U.; Simaiya, S.; Kaur, A.; Prasad, D.; Khurana, M.; Verma, D.K.; Hassan, A. Impact of deep learning and machine learning in Industry 4.0: Impact of deep learning. In Cyber-Physical, IoT, and Autonomous Systems in Industry 4.0; CRC Press: Boca Raton, FL, USA, 2021; pp. 179–197. [Google Scholar]
  27. Xihua, Z.; Goyal, S.B.; Tesfayohanis, M.; Verma, C. Blockchain-Based Privacy-Preserving Approach Using SVML for Encrypted Smart City Data in the Era of IR 4.0. J. Nanomater. 2022, 2022, 7463513. [Google Scholar] [CrossRef]
  28. Kumar, L.U.; Simaiya, S.; Sandhu, J.K.; Trivedi, N.K.; Garg, A.; Moudgil, A. Deep Learning-Based Predictive Model for Defect Detection and Classification in Industry 4.0. In Proceedings of the 2022 International Conference on Emerging Smart Computing and Informatics (ESCI), Pune, India, 9–11 March 2022; pp. 1–5. [Google Scholar]
  29. Khan, R.U.; Zhang, X.; Alazab, M.; Kumar, R. An improved convolutional neural network model for intrusion detection in networks. In Proceedings of the 2019 Cybersecurity and Cyber Forensics Conference (CCC), Melbourne, Australia, 8–9 May 2019; pp. 74–77. [Google Scholar]
  30. Ferrag, M.A.; Maglaras, L.; Moschoyiannis, S.; Janicke, H. Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. J. Inf. Secur. Appl. 2020, 50, 102419. [Google Scholar] [CrossRef]
  31. Hui, W.; Cao, Z.; Hong, B. A network intrusion detection system based on convolutional neural network. J. Intell. Fuzzy Syst. 2020, 38, 7623–7637. [Google Scholar]
  32. Rathore, M.S.; Poongodi, M.; Saurabh, P.; Lilhore, U.K.; Bourouis, S.; Alhakami, W.; Hamdi, M. A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography. Comput. Electr. Eng. 2022, 102, 108205. [Google Scholar] [CrossRef]
  33. Gupta, S.; Iyer, S.; Agarwal, G.; Manoharan, P.; Algarni, A.D.; Aldehim, G.; Raahemifar, K. Efficient Prioritization and Processor Selection Schemes for HEFT Algorithm: A Makespan Optimizer for Task Scheduling in Cloud Environment. Electronics 2022, 11, 2557. [Google Scholar] [CrossRef]
  34. Balyan, A.K.; Ahuja, S.; Lilhore, U.K.; Sharma, S.K.; Manoharan, P.; Algarni, A.D.; Raahemifar, K. A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method. Sensors 2022, 22, 5986. [Google Scholar] [CrossRef] [PubMed]
  35. Poongodi, M.; Bourouis, S.; Ahmed, A.N.; Vijayaragavan, M.; Venkatesan KG, S.; Alhakami, W.; Hamdi, M. A novel secured multi-access edge computing based vanet with neuro-fuzzy systems based blockchain framework. Comput. Commun. 2022, 192, 48–56. [Google Scholar]
  36. Manoharan, P.; Walia, R.; Iwendi, C.; Ahanger, T.A.; Suganthi, S.T.; Kamruzzaman, M.M.; Hamdi, M. SVM-based generative adverserial networks for federated learning and edge computing attack model and outpoising. Expert Syst. 2022, 20, e13072. [Google Scholar] [CrossRef]
Figure 1. IIoT key components under the IR 4.0 environment.
Figure 1. IIoT key components under the IR 4.0 environment.
Sensors 23 07856 g001
Figure 2. Visual representation of the UNW-NB15 training dataset.
Figure 2. Visual representation of the UNW-NB15 training dataset.
Sensors 23 07856 g002
Figure 3. Visual representation of UNW-NB15 testing dataset.
Figure 3. Visual representation of UNW-NB15 testing dataset.
Sensors 23 07856 g003
Figure 4. Architecture of the proposed model.
Figure 4. Architecture of the proposed model.
Sensors 23 07856 g004
Figure 5. Confusion matrix for the proposed HIDM model for the ToN-IoT dataset.
Figure 5. Confusion matrix for the proposed HIDM model for the ToN-IoT dataset.
Sensors 23 07856 g005
Figure 6. ROC Curve (TPR vs. FPR) of the proposed model for the ToN-IoT dataset.
Figure 6. ROC Curve (TPR vs. FPR) of the proposed model for the ToN-IoT dataset.
Sensors 23 07856 g006
Figure 7. Training and validation accuracy of the proposed model for the ToN-IoT dataset.
Figure 7. Training and validation accuracy of the proposed model for the ToN-IoT dataset.
Sensors 23 07856 g007
Figure 8. Training and validation loss of the proposed model for the ToN-IoT dataset.
Figure 8. Training and validation loss of the proposed model for the ToN-IoT dataset.
Sensors 23 07856 g008
Figure 9. Confusion matrix of the proposed model for UNW-NB15.
Figure 9. Confusion matrix of the proposed model for UNW-NB15.
Sensors 23 07856 g009
Figure 10. Loss function evolution during training of the proposed model for UNW-NB15.
Figure 10. Loss function evolution during training of the proposed model for UNW-NB15.
Sensors 23 07856 g010
Figure 11. Accuracy evolution during training of the proposed model for UNW-NB15.
Figure 11. Accuracy evolution during training of the proposed model for UNW-NB15.
Sensors 23 07856 g011
Figure 12. Precision evolution during training of the proposed model for UNW-NB15.
Figure 12. Precision evolution during training of the proposed model for UNW-NB15.
Sensors 23 07856 g012
Figure 13. Recall curve for training of the proposed model for UNW-NB15.
Figure 13. Recall curve for training of the proposed model for UNW-NB15.
Sensors 23 07856 g013
Figure 14. ROC-Curve for TPR vs. FPR of the proposed model for UNW-NB15.
Figure 14. ROC-Curve for TPR vs. FPR of the proposed model for UNW-NB15.
Sensors 23 07856 g014
Table 1. Comparative analysis of the existing IDS research.
Table 1. Comparative analysis of the existing IDS research.
Reference Model UsedDatasetOutcome
[7]Machine and deep learning algorithmsX-IIoTIDDeep learning methods achieved higher accuracy.
[8]Federated learning and edge devicesX-IIoTIDBinary classification achieved 97.89% accuracy.
[9]Deep neural networkISOT, NSL-KDD, and X-IIoTIDDNN achieves high accuracy.
[10]Clustering algorithm, expectation max, and ANNUNSW-NB15 and KDD99Expectation max achieves an accuracy of 81.25%.
[11]GA-LR (Genetic algorithm with Logistic Regression)UNSW-NB15Accuracy of 89.87%.
[12]Light gradient boosting machineUNSW-NB15Accuracy of 87.48%.
[13]Variation of long short-term memory (VLSTM)UNSW-NB15, ToN-IoTPrecision 98.58%.
[14]Extreme learning machine (ELM)-based IDSNSL-KDD and UNSW-NB15Accuracy 91.87%.
[15]Deep neural networksUNSW-NB15, Kyoto, KDD-Cup99, CICIDS, NSL-KDD, and WSN-DSThe precision of 94.81%.
[16]ANN for binary classificationUNSW-NB15Accuracy 87.29%.
[17]Two-stage TABU search
(TS-TS) algorithm
UNSW-NB15Precision 84.23%.
[18]Xgboost with linear regressionUNSW-NB15 and ToN-IoTAccuracy 79.59%.
[19]LTSM with RNNUNSW-NB15Accuracy 88.31%.
[20]Deep auto-encoder with LSTMUNSW-NB15Accuracy 91.81%.
[21]Machine learningToN-IoT and X-IIoTIDPrecision 87.84%.
Hybrid ModelOptimized CNN with transfer learningUNW-NB15 and ToN-IoT92.7%precision for ToN-IoT and 94.2% for the UNW-NB15 dataset.
Table 2. UNW-NB15 dataset descriptions.
Table 2. UNW-NB15 dataset descriptions.
Data Based on EventsTotal Records
Normal38,500
Back-door950
Worms174
Reconnaissance978
Fuzzers7500
DoS4800
Shellcode978
Exploits12,440
Generic18,554
Table 3. ToN-IoT dataset descriptions.
Table 3. ToN-IoT dataset descriptions.
Data Based on EventsTotal Records
Normal79,638
Denial of service (DoS)33,753
Back-door50,811
Distributed denialofservice (DDoS)61,650
MITM105
Injections45,265
Ransomware7280
Scanning71,401
Cross-site scripting (XSS)21,089
Password17,185
Table 4. The outcome of the proposed model for the TON-IoT dataset.
Table 4. The outcome of the proposed model for the TON-IoT dataset.
Model TypeParameters Source Type
Win-7Win-10Win-10 NetworkNetwork type
OCNN-LSTM [1]Training23,78929,87898,91451,854,791
Testing 68978178325,1475,478,985
Epoch 50304742
OCNN-LSTM with Transfer LearningTraining23,78929,878989,1451,854,791
Testing 68978178325,1475,478,985
Epoch 50344563
Table 5. The outcome of the proposed model for the ToN-IoT dataset.
Table 5. The outcome of the proposed model for the ToN-IoT dataset.
Model TypeParameters Class Type
NormalDoSDDoSBack-DoorMITMInjectionsRansomwareScanningPasswordXSSAverage
Existing OCNN-LSTM [1]Precision10.780.860.890.890.890.890.880.920.910.891
Recall10.080.070.060.910.610.450.780.350.650.496
Accuracy10.850.870.710.910.810.890.880.940.870.873
F1-Score10.080.070.060.910.610.450.780.250.650.486
Existing CNNPrecision10.710.790.850.810.8120.820.8020.8120.800.81
Recall10.060.050.050.80.550.400.700.320.600.48
Accuracy10.810.760.630.810.710.790.780.740.770.73
F1-Score10.070.060.050.810.540.410.710.210.610.42
Existing LSTM Precision10.730.810.860.840.850.860.850.870.850.85
Recall10.070.060.060.850.590.410.700.310.620.47
Accuracy10.820.770.660.850.760.810.820.790.790.78
F1-Score10.0710.0620.0500.820.520.400.710.210.600.44
Proposed OCNN-LSTM with Transfer LearningPrecision10.910.90.9250.9320.9180.910.890.930.950.927
Recall10.0810.0740.0650.940.6890.510.790.410.680.5239
Accuracy10.970.980.910.930.960.940.890.950.910.944
F1-Score10.0910.0870.0980.940.780.560.870.450.780.566
Table 6. The outcome of the existing and proposed models for the UNW-NB15dataset.
Table 6. The outcome of the existing and proposed models for the UNW-NB15dataset.
Model TypeParametersClass Type
NormalBack-DoorWormsReconnaissance FuzzersDoSShellCode ExploitsGenericAverage
Existing OCNN-LSTM [1]Precision10.870.890.910.920.910.9010.8670.9140.909
Recall10.0780.0890.0780.950.780.550.670.450.516
Accuracy10.890.870.910.90.870.9140.890.950.910
F1-Score10.660.450.550.0870.0740.0560.840.450.463
OCNN-LSTM with Transfer LearningPrecision10.910.940.930.940.930.950.930.950.942
Recall10.0850.09010.08450.960.8120.650.7120.5560.550
Accuracy10.910.860.920.930.9140.9230.9230.960.927
F1-Score10.0670.540.650.0860.0870.0660.890.670.451
Existing CNNPrecision10.810.820.820.820.810.8010.8270.8140.809
Recall10.0680.0790.0680.850.680.450.570.410.456
Accuracy10.8090.8070.8010.810.810.8140.8090.820.810
F1-Score10.5660.400.450.0770.0700.0460.740.350.413
Existing LSTMPrecision10.840.830.840.830.830.8210.8470.8240.829
Recall10.0710.0750.0710.880.720.520.590.460.48
Accuracy10.8290.8270.8310.8310.8410.8540.8390.8520.850
F1-Score10.5960.460.4650.0870.0800.0560.840.450.483
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Lilhore, U.K.; Manoharan, P.; Simaiya, S.; Alroobaea, R.; Alsafyani, M.; Baqasah, A.M.; Dalal, S.; Sharma, A.; Raahemifar, K. HIDM: Hybrid Intrusion Detection Model for Industry 4.0 Networks Using an Optimized CNN-LSTM with Transfer Learning. Sensors 2023, 23, 7856. https://doi.org/10.3390/s23187856

AMA Style

Lilhore UK, Manoharan P, Simaiya S, Alroobaea R, Alsafyani M, Baqasah AM, Dalal S, Sharma A, Raahemifar K. HIDM: Hybrid Intrusion Detection Model for Industry 4.0 Networks Using an Optimized CNN-LSTM with Transfer Learning. Sensors. 2023; 23(18):7856. https://doi.org/10.3390/s23187856

Chicago/Turabian Style

Lilhore, Umesh Kumar, Poongodi Manoharan, Sarita Simaiya, Roobaea Alroobaea, Majed Alsafyani, Abdullah M. Baqasah, Surjeet Dalal, Ashish Sharma, and Kaamran Raahemifar. 2023. "HIDM: Hybrid Intrusion Detection Model for Industry 4.0 Networks Using an Optimized CNN-LSTM with Transfer Learning" Sensors 23, no. 18: 7856. https://doi.org/10.3390/s23187856

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop