Skip to main content
Top
Published in: The Journal of Supercomputing 6/2021

26-11-2020

An evolutionary multi-hidden Markov model for intelligent threat sensing in industrial internet of things

Authors: Mohammad Ayoub Khan, Khaled Ali Abuhasel

Published in: The Journal of Supercomputing | Issue 6/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Threat problem has become more complex in the industrial environment due to the need to secure a large number of devices from attack while maintaining system reliability and real-time response to threats. In such scenario detection of threat in Industrial Internet of things (IIoT) devices becomes an important factor to avoid injection by malicious IIoT devices. The techniques based on the Hidden Markov Models (HMM) are probably the most popular in detecting threat of detection. However, HMM requires extensive training of the models and computational resources. Also, HMM has the drawback of convergence to a local optimum while using Baum–Welch algorithm for parameter estimation. In order to optimize the HMM parameters, global search techniques can be used. This work proposes Genetic algorithms (GA) for optimizing HMM parameters. The other difficulty in threat detection is the dynamic nature of the attack. Several new threats are emerging with many variants which are created from existing attacks, making threat modeling an arduous task. As a result, good features are critical to model traffic and provide an efficient way to detect known and possibly unknown attacks to detect. To achieve a better feature extraction from the network traffic, we propose a dynamic sliding window \(W\) which has a width of \(w\). The proposed multiple-HMM performs well to detect threats. The simulation results are compared to the results obtained by the Baum–Welch algorithm based approach showing higher accuracy and convergences.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
2.
7.
go back to reference Aazam M, Zeadally S, Harras KA (2018) Deploying fog computing in industrial internet of things and industry 4.0. IEEE Trans Indust Inf 14(10):4674–4682CrossRef Aazam M, Zeadally S, Harras KA (2018) Deploying fog computing in industrial internet of things and industry 4.0. IEEE Trans Indust Inf 14(10):4674–4682CrossRef
12.
go back to reference Ahmed A, Krishnan VVG, Foroutan SA, Touhiduzzaman M, Rublein C, Srivastava A, Wu Y, Hahn A, Suresh S (2019) Cyber physical security analytics for anomalies in transmission protection systems. IEEE Trans Ind Appl 55(6):6313–6323CrossRef Ahmed A, Krishnan VVG, Foroutan SA, Touhiduzzaman M, Rublein C, Srivastava A, Wu Y, Hahn A, Suresh S (2019) Cyber physical security analytics for anomalies in transmission protection systems. IEEE Trans Ind Appl 55(6):6313–6323CrossRef
17.
go back to reference Abomhara M (2015) Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. J Cyber Secur Mobility 4(1):65–88CrossRef Abomhara M (2015) Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. J Cyber Secur Mobility 4(1):65–88CrossRef
19.
go back to reference Rabiner LR, Juang BH (1986) An introduction to hidden markov models. In: IEEE ASSP MAGAZINE, pp 4–16 Rabiner LR, Juang BH (1986) An introduction to hidden markov models. In: IEEE ASSP MAGAZINE, pp 4–16
22.
go back to reference Korayem M, Badr A, Farag I (2007a) Optimizing hidden markov models using genetic algorithms and artificial immune 651 systems. Comput Inf Syst 11(2):1–7 Korayem M, Badr A, Farag I (2007a) Optimizing hidden markov models using genetic algorithms and artificial immune 651 systems. Comput Inf Syst 11(2):1–7
24.
go back to reference Kuncheva L (2014) Combining pattern classifiers: methods and algorithms, 2nd edn. Wiley, HobokenMATH Kuncheva L (2014) Combining pattern classifiers: methods and algorithms, 2nd edn. Wiley, HobokenMATH
25.
go back to reference Korayem M, Badr A, Farag I (2007b) Optimizing hidden markov models using genetic algorithms and artificial immune systems. Comput Inf Syst 11(2):1–7 Korayem M, Badr A, Farag I (2007b) Optimizing hidden markov models using genetic algorithms and artificial immune systems. Comput Inf Syst 11(2):1–7
27.
go back to reference Qayyum A, Islam MH, Jamil M (2005) Taxonomy of statistical based anomaly detection techniques for intrusion detection. Emerg Technol IEEE 1:270–276 Qayyum A, Islam MH, Jamil M (2005) Taxonomy of statistical based anomaly detection techniques for intrusion detection. Emerg Technol IEEE 1:270–276
Metadata
Title
An evolutionary multi-hidden Markov model for intelligent threat sensing in industrial internet of things
Authors
Mohammad Ayoub Khan
Khaled Ali Abuhasel
Publication date
26-11-2020
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 6/2021
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-020-03513-6

Other articles of this Issue 6/2021

The Journal of Supercomputing 6/2021 Go to the issue

Premium Partner