4.6 Article

Anomaly Detection in Industrial IoT Using Distributional Reinforcement Learning and Generative Adversarial Networks

期刊

SENSORS
卷 22, 期 21, 页码 -

出版社

MDPI
DOI: 10.3390/s22218085

关键词

Industrial Internet of Things; anomaly detection; DS2OS; Generative Adversarial Network; Distributional Reinforcement Learning; adversarial machine learning

向作者/读者索取更多资源

This study proposes a new mechanism using DRL and GAN to improve the efficiency and robustness of IDS system for anomaly detection in IIoT networks. By verifying the effectiveness of the algorithm and evaluating model performance on anomaly detection datasets, the results show that this approach outperforms traditional methods on various standard metrics.
Anomaly detection is one of the biggest issues of security in the Industrial Internet of Things (IIoT) due to the increase in cyber attack dangers for distributed devices and critical infrastructure networks. To face these challenges, the Intrusion Detection System (IDS) is suggested as a robust mechanism to protect and monitor malicious activities in IIoT networks. In this work, we suggest a new mechanism to improve the efficiency and robustness of the IDS system using Distributional Reinforcement Learning (DRL) and the Generative Adversarial Network (GAN). We aim to develop realistic and equilibrated distribution for a given feature set using artificial data in order to overcome the issue of data imbalance. We show how the GAN can efficiently assist the distributional RL-based-IDS in enhancing the detection of minority attacks. To assess the taxonomy of our approach, we verified the effectiveness of our algorithm by using the Distributed Smart Space Orchestration System (DS2OS) dataset. The performance of the normal DRL and DRL-GAN models in binary and multiclass classifications was evaluated based on anomaly detection datasets. The proposed models outperformed the normal DRL in the standard metrics of accuracy, precision, recall, and F1 score. We demonstrated that the GAN introduced in the training process of DRL with the aim of improving the detection of a specific class of data achieves the best results.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Engineering, Electrical & Electronic

Signaling game approach to improve the MAC protocol in the underwater wireless sensor networks

Mohammed Jouhari, Khalil Ibrahimi, Hamidou Tembine, Mohammed Benattou, Jalel Ben Othman

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2019)

Article Computer Science, Information Systems

Distributed CNN Inference on Resource-Constrained UAVs for Surveillance Systems: Design and Optimization

Mohammed Jouhari, Abdulla Khalid Al-Ali, Emna Baccour, Amr Mohamed, Aiman Erbad, Mohsen Guizani, Mounir Hamdi

Summary: The article proposes a method for distributing DNNs within UAVs to enable data classification on resource-constrained devices, and avoid delays introduced by server-based solutions. The simulation results showed that the optimization solution outperformed existing approaches.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Engineering, Electrical & Electronic

Robust Enhancement of Intrusion Detection Systems Using Deep Reinforcement Learning and Stochastic Game

Hafsa Benaddi, Khalil Ibrahimi, Abderrahim Benslimane, Mohammed Jouhari, Junaid Qadir

Summary: This paper proposes a DRL-based IDS for network traffics using MDP and analyzes the IDS behavior through modeling the interaction between the IDS and attacker players. The proposed DRL-IDS outperforms existing models in terms of detection rate, accuracy, and false alarms reduction.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2022)

Proceedings Paper Automation & Control Systems

Spreading Factor assisted LoRa Localization with Deep Reinforcement Learning

Yaya Etiabi, Mohammed Jouhari, Andreas Burg, El Mehdi Amhoud

Summary: In this paper, a novel LoRa RSSI fingerprinting approach considering the spreading factor (SF) is proposed. Performance evaluation using deep neural networks and deep reinforcement learning models shows significant improvement in localization accuracy for LoRa networks.

2023 IEEE 97TH VEHICULAR TECHNOLOGY CONFERENCE, VTC2023-SPRING (2023)

Proceedings Paper Computer Science, Information Systems

Adversarial Attacks Against IoT Networks using Conditional GAN based Learning

Hafsa Benaddi, Mohammed Jouhari, Khalil Ibrahimi, Abderrahim Benslimane, El Mehdi Amhoud

Summary: This paper proposes a method to improve the training process of intrusion detection systems (IDS) using conditional generative adversarial networks (cGANs) to handle unbalanced data and missing specific class samples. By applying adversarial training in experiments, the results show that this method can significantly improve the detection accuracy of theft attacks.

2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022) (2022)

Proceedings Paper Telecommunications

Analysis of Blockchain Selfish Mining: a Stochastic Game Approach

Boutaina Jebari, Khalil Ibrahimi, Mohammed Jouhari, Mounir Ghogho

Summary: This paper analyzes the profitability of selfish mining attacks using game theory and the monetary award as the evaluation criterion. It models the interactions between mining pools and discusses possible outcomes of the game, highlighting scenarios where the system could be compromised. To the best of our knowledge, this is the first work that models the selfish mining attack as a stochastic game.

IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022) (2022)

Article Acoustics

BDREA Betta and Dolphin Pods Routing via Energy Scarcity Aware Protocol for Underwater Acoustic Wireless Sensor Networks (UAWSNs)

Hamza Zradgui, Khalil Ibrahimi

Summary: This research proposes an energy scarcity-aware routing protocol for efficient underwater wireless sensor networks, aiming to improve energy efficiency and prolong network life. The proposed protocol shows significant improvements in performance parameters compared to other protocols.

ACOUSTICS (2022)

Proceedings Paper Engineering, Electrical & Electronic

Decentralized Autonomous Underwater Vehicles Distribution for IPv6-UWSN: A Study With Heuristic Methods

Hamza Zradgui, Mohammed Jouhari, Khalil Ibrahimi

Summary: This research focuses on underwater wireless sensor networks (UWSNs) and proposes introducing autonomous underwater vehicles (AUVs) with low energy consumption and a clustering protocol to enhance network efficiency.

2021 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGIES AND NETWORKING (COMMNET'21) (2021)

Proceedings Paper Computer Science, Information Systems

Securing IoT Transactions Against Double-Spending Attacks based on Signaling Game Approach

Hafsa Benaddi, Mohammed Jouhari, Khalil Ibrahimi, Abderrahim Benslimane

Summary: This study utilizes signaling game approach to address the impact of double-spending attacks on critical IoT applications like Bitcoin, with simulations showing that signaling game can reduce this impact.

2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM) (2021)

Proceedings Paper Computer Science, Information Systems

A Review: Collaborative Intrusion Detection for IoT integrating the Blockchain technologies

Hafsa Benaddi, Khalil Ibrahimi

2020 8TH INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM 2020) (2020)

Proceedings Paper Computer Science, Theory & Methods

Model to Improve the Forecast of the Content Caching based Time-Series Analysis at the Small Base Station

Khalil Ibrahimi, Ouafa Ould Cherif, Mohammed ELkoutbi, Imane Rouam

2019 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM) (2019)

Article Computer Science, Information Systems

Underwater Wireless Sensor Networks: A Survey on Enabling Technologies, Localization Protocols, and Internet of Underwater Things

Mohammed Jouhari, Khalil Ibrahimi, Hamidou Tembine, Jalel Ben-Othman

IEEE ACCESS (2019)

暂无数据