Skip to main content
Erschienen in: Automatic Control and Computer Sciences 8/2023

01.12.2023

Cyberattack Detection in the Industrial Internet of Things Based on the Computation Model of Hierarchical Temporal Memory

verfasst von: V. M. Krundyshev, G. A. Markov, M. O. Kalinin, P. V. Semyanov, A. G. Busygin

Erschienen in: Automatic Control and Computer Sciences | Ausgabe 8/2023

Einloggen, um Zugang zu erhalten

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This study considers the problem of detecting network anomalies caused by computer attacks in the networks of the industrial Internet of things. To detect anomalies, a new method is proposed, built using a hierarchical temporal memory (HTM) computation model based on the neocortex model. An experimental study of the developed method of detecting computer attacks based on the HTM model showed the superiority of the developed solution over the LSTM analog. The developed prototype of the anomaly detection system provides continuous training on unlabeled data sets in real time, takes into account the current network context, and applies the accumulated experience by supporting the memory mechanism.
Literatur
1.
Zurück zum Zitat Cho, H., Andreev, A., Kalinin, M., Moskvin, D., and Zegzhda, D., Mismatch-resistant intrusion detection with bioinspired suffix tree algorithm, Algorithms and Solutions Based on Computer Technology, Jahn, C., Ungvári, L., and Ilin, I., Eds., Lecture Notes in Networks and Systems, vol. 387, Cham: Springer, 2022, pp. 1–16. https://doi.org/10.1007/978-3-030-93872-7_1 Cho, H., Andreev, A., Kalinin, M., Moskvin, D., and Zegzhda, D., Mismatch-resistant intrusion detection with bioinspired suffix tree algorithm, Algorithms and Solutions Based on Computer Technology, Jahn, C., Ungvári, L., and Ilin, I., Eds., Lecture Notes in Networks and Systems, vol. 387, Cham: Springer, 2022, pp. 1–16. https://​doi.​org/​10.​1007/​978-3-030-93872-7_​1
2.
Zurück zum Zitat Petrenko, S.A., Petrenko, A.A., and Kostyukov, A.D., Cyber resilience of digital ecosystems, Zashch. Inf. Insaid, 2021, no. 4, pp. 17–23. Petrenko, S.A., Petrenko, A.A., and Kostyukov, A.D., Cyber resilience of digital ecosystems, Zashch. Inf. Insaid, 2021, no. 4, pp. 17–23.
3.
Zurück zum Zitat Fatin, A.D. and Pavlenko, E.Yu., Protection against network attacks on cyberphysical systems based on neuroevolution algorithms, Informatsionnaya bezopasnost’ regionov Rossii (IBRR-2021). Materialy XII Sankt-Peterburgskoi mezhregional'noi konferentsii (Information Security of Russian Regions: Proc. 12th St. Petersburg Interregional Conf.), Sovetov, B.Ya., Yusupov, R.M. and Kasatkin, V.V., Eds., St. Petersburg, 2021, pp. 345–346. Fatin, A.D. and Pavlenko, E.Yu., Protection against network attacks on cyberphysical systems based on neuroevolution algorithms, Informatsionnaya bezopasnost’ regionov Rossii (IBRR-2021). Materialy XII Sankt-Peterburgskoi mezhregional'noi konferentsii (Information Security of Russian Regions: Proc. 12th St. Petersburg Interregional Conf.), Sovetov, B.Ya., Yusupov, R.M. and Kasatkin, V.V., Eds., St. Petersburg, 2021, pp. 345–346.
5.
Zurück zum Zitat Hawkins, J. and Blakeslee, S., On Intelligence, New York: Times Books, 2004. Hawkins, J. and Blakeslee, S., On Intelligence, New York: Times Books, 2004.
7.
Zurück zum Zitat Problems that fit htm, Numenta, Tech. Rep., 2006. Problems that fit htm, Numenta, Tech. Rep., 2006.
8.
Zurück zum Zitat Hawkins, J., Hierarchical temporal memory including cortical learning algorithms. Technical report, Numenta, Inc. Ver. 0.2.1, 2011. Hawkins, J., Hierarchical temporal memory including cortical learning algorithms. Technical report, Numenta, Inc. Ver. 0.2.1, 2011.
9.
Zurück zum Zitat Moustafa, N. and Slay, J., UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set), 2015 Military Communications and Information Systems Conference (MilCIS), Canberra, Australia, 2015, IEEE, 2015, pp. 1–6. https://doi.org/10.1109/milcis.2015.7348942 Moustafa, N. and Slay, J., UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set), 2015 Military Communications and Information Systems Conference (MilCIS), Canberra, Australia, 2015, IEEE, 2015, pp. 1–6. https://​doi.​org/​10.​1109/​milcis.​2015.​7348942
10.
Zurück zum Zitat Belenko, V., Krundyshev, V., and Kalinin, M., Synthetic datasets generation for intrusion detection in VANET, Proc. 11th Int. Conf. on Security of Information and Networks, Cardiff, UK, 2018, New York: Association for Computing Machinery, 2018, p. 9. https://doi.org/10.1145/3264437.3264479 Belenko, V., Krundyshev, V., and Kalinin, M., Synthetic datasets generation for intrusion detection in VANET, Proc. 11th Int. Conf. on Security of Information and Networks, Cardiff, UK, 2018, New York: Association for Computing Machinery, 2018, p. 9. https://​doi.​org/​10.​1145/​3264437.​3264479
12.
Zurück zum Zitat Singh, A., Anomaly detection for temporal data using long short-term memory (LSTM), MSc Thesis, Stockholm: KTH Royal Institute of Technology, 2017. Singh, A., Anomaly detection for temporal data using long short-term memory (LSTM), MSc Thesis, Stockholm: KTH Royal Institute of Technology, 2017.
14.
Zurück zum Zitat Haddad, J. and Piehl, C., Unsupervised anomaly detection in time series with recurrent neural networks, Student Thesis, Stockholm: KTH Royal Institute of Technology, 2019. https://urn.kb.se/resolve?urn=urn%3Anbn% 3Ase%3Akth%3Adiva-259655. Haddad, J. and Piehl, C., Unsupervised anomaly detection in time series with recurrent neural networks, Student Thesis, Stockholm: KTH Royal Institute of Technology, 2019. https://​urn.​kb.​se/​resolve?​urn=​urn%3Anbn% 3Ase%3Akth%3Adiva-259655.
Metadaten
Titel
Cyberattack Detection in the Industrial Internet of Things Based on the Computation Model of Hierarchical Temporal Memory
verfasst von
V. M. Krundyshev
G. A. Markov
M. O. Kalinin
P. V. Semyanov
A. G. Busygin
Publikationsdatum
01.12.2023
Verlag
Pleiades Publishing
Erschienen in
Automatic Control and Computer Sciences / Ausgabe 8/2023
Print ISSN: 0146-4116
Elektronische ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411623080114

Weitere Artikel der Ausgabe 8/2023

Automatic Control and Computer Sciences 8/2023 Zur Ausgabe

Neuer Inhalt