Skip to main content
Erschienen in: Automatic Control and Computer Sciences 8/2020

01.12.2020

Identification of Cyber Threats in Networks of Industrial Internet of Things Based on Neural Network Methods Using Memory

verfasst von: V. M. Krundyshev

Erschienen in: Automatic Control and Computer Sciences | Ausgabe 8/2020

Einloggen, um Zugang zu erhalten

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

It is proposed to use modern artificial neural networks to identify cyber threats in networks of the Industrial Internet of Things. The modeling of an industrial system under the influence of cyberattacks was carried out. As a result of the experiments, the optimal configuration parameters of the recurrent LSTM network with a confirmed number of layers and states have been determined.
Literatur
1.
Zurück zum Zitat Schwab, K., The Fourth Industrial Revolution, Penguin UK, 2017. Schwab, K., The Fourth Industrial Revolution, Penguin UK, 2017.
2.
Zurück zum Zitat World Economic Forum The Fourth Industrial Revolution, Davos, 2016. https://www.weforum.org/agenda/2016/01/the-fourth-industrial-revolution-what-itmeans-and-how-to-respond. Accessed February 5, 2020. World Economic Forum The Fourth Industrial Revolution, Davos, 2016. https://​www.​weforum.​org/​agenda/​2016/​01/​the-fourth-industrial-revolution-what-itmeans-and-how-to-respond.​ Accessed February 5, 2020.
3.
Zurück zum Zitat Vasiliev, Y.S., Zegzhda, P.D., and Kuvshinov, V.I., Modern problems of cybersecurity, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2014, vol. 17, no. 3, pp. 210–214. Vasiliev, Y.S., Zegzhda, P.D., and Kuvshinov, V.I., Modern problems of cybersecurity, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2014, vol. 17, no. 3, pp. 210–214.
5.
Zurück zum Zitat Malyshev, E.V., Moskvin, D.A., and Zegzhda, D.P., Application of an artificial neural network for detection of attacks in VANETs, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 889–894.CrossRef Malyshev, E.V., Moskvin, D.A., and Zegzhda, D.P., Application of an artificial neural network for detection of attacks in VANETs, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 889–894.CrossRef
6.
Zurück zum Zitat Ovasapyan, T.D., Moskvin, D.A., and Kalinin, M.O., Using neural networks to detect internal intruders in VANETs, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 954–958.CrossRef Ovasapyan, T.D., Moskvin, D.A., and Kalinin, M.O., Using neural networks to detect internal intruders in VANETs, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 954–958.CrossRef
7.
Zurück zum Zitat Kalinin, M., Demidov, R., and Zegzhda, P., Hybrid neural network model for protection of dynamic cyber infrastructure, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 4, pp. 375–382. Kalinin, M., Demidov, R., and Zegzhda, P., Hybrid neural network model for protection of dynamic cyber infrastructure, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 4, pp. 375–382.
8.
Zurück zum Zitat Demidov, R.A., Pechenkin, A.I., Zegzhda, P.D., and Kalinin, M.O., Application model of modern artificial neural network methods for the analysis of information systems security, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 965–970.CrossRef Demidov, R.A., Pechenkin, A.I., Zegzhda, P.D., and Kalinin, M.O., Application model of modern artificial neural network methods for the analysis of information systems security, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 965–970.CrossRef
9.
Zurück zum Zitat Demidov, R.A., Zegzhda, P.D., and Kalinin, M.O., Threat analysis of cyber security in wireless adhoc networks using hybrid neural network model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 971–976.CrossRef Demidov, R.A., Zegzhda, P.D., and Kalinin, M.O., Threat analysis of cyber security in wireless adhoc networks using hybrid neural network model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 971–976.CrossRef
11.
Zurück zum Zitat Kalinin, M.O., Lavrova, D.S., and Yarmak, A.V., Detection of threats in cyberphysical systems based on deep learning methods using multidimensional time series, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 912–917.CrossRef Kalinin, M.O., Lavrova, D.S., and Yarmak, A.V., Detection of threats in cyberphysical systems based on deep learning methods using multidimensional time series, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 912–917.CrossRef
12.
Zurück zum Zitat Lavrova, D.S., Alekseev, I.V., and Shtyrkina, A.A., Security analysis based on controlling dependences of network traffic parameters by wavelet transformation, Autom. Control Comput. Sci., 2018, Vol, no. 8, pp. 931–935. Lavrova, D.S., Alekseev, I.V., and Shtyrkina, A.A., Security analysis based on controlling dependences of network traffic parameters by wavelet transformation, Autom. Control Comput. Sci., 2018, Vol, no. 8, pp. 931–935.
13.
Zurück zum Zitat Ivanov, D.V. and Moskvin, D.A., Application of fractal methods to ensure the cyber-resilience of self-organizing networks, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 4, pp. 336–341. Ivanov, D.V. and Moskvin, D.A., Application of fractal methods to ensure the cyber-resilience of self-organizing networks, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 4, pp. 336–341.
14.
Zurück zum Zitat Poltavtseva, M.A. and Kalinin, M.O., Modeling big data management systems in information security, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 895–902.CrossRef Poltavtseva, M.A. and Kalinin, M.O., Modeling big data management systems in information security, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 895–902.CrossRef
15.
Zurück zum Zitat Kalinin, M.O. and Minin, A.A., Security evaluation of a wireless ad-hoc network with dynamic topology, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 899–901.CrossRef Kalinin, M.O. and Minin, A.A., Security evaluation of a wireless ad-hoc network with dynamic topology, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 899–901.CrossRef
17.
Zurück zum Zitat Poltavtseva, M.A. and Kalinin, M.O., Conceptual data modeling using aggregates to ensure large-scale distributed data management systems security, Stud. Comput. Intell., 2020, vol. 868, pp. 41–47. Poltavtseva, M.A. and Kalinin, M.O., Conceptual data modeling using aggregates to ensure large-scale distributed data management systems security, Stud. Comput. Intell., 2020, vol. 868, pp. 41–47.
18.
Zurück zum Zitat Zegzhda, P., Zegzhda, D., Kalinin, M., Pechenkin, A., Minin, A., and Lavrova, D., Safe integration of SIEM systems with Internet of Things: Data aggregation, integrity control, and bioinspired safe routing, ACM International Conference Proceeding Series, 2016, pp. 81–87. Zegzhda, P., Zegzhda, D., Kalinin, M., Pechenkin, A., Minin, A., and Lavrova, D., Safe integration of SIEM systems with Internet of Things: Data aggregation, integrity control, and bioinspired safe routing, ACM International Conference Proceeding Series, 2016, pp. 81–87.
19.
Zurück zum Zitat Aydogan, E., et al., A central intrusion detection system for RPL-based industrial Internet of Things, 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS), 2019, pp. 1–5. Aydogan, E., et al., A central intrusion detection system for RPL-based industrial Internet of Things, 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS), 2019, pp. 1–5.
20.
Zurück zum Zitat Belenko, V., Krundyshev, V., and Kalinin, M., Synthetic datasets generation for intrusion detection in VANET, Proceedings of the 11th International Conference on Security of Information and Networks, 2018, pp. 1–6. Belenko, V., Krundyshev, V., and Kalinin, M., Synthetic datasets generation for intrusion detection in VANET, Proceedings of the 11th International Conference on Security of Information and Networks, 2018, pp. 1–6.
22.
Zurück zum Zitat Azzouni, A. and Pujole, G., A Long Short-Term Memory Recurrent Neural Network for Network Traffic Matrix Prediction, 2017. arXiv:1705.05690v3 [cs.NI]. Azzouni, A. and Pujole, G., A Long Short-Term Memory Recurrent Neural Network for Network Traffic Matrix Prediction, 2017. arXiv:1705.05690v3 [cs.NI].
23.
Zurück zum Zitat Bouaziz, M., et al., Parallel Long Short-Term Memory for Multi-Stream Classification, 2017. arXiv:1702.03402v1 [cs.LG]. Bouaziz, M., et al., Parallel Long Short-Term Memory for Multi-Stream Classification, 2017. arXiv:1702.03402v1 [cs.LG].
24.
Zurück zum Zitat Danihelka, I., Wayne, G., Uria, B., and Kalchbrenner, N., Associative Long Short-Term Memory, 2016. arXiv:1602.03032v2 [cs.NE]. Danihelka, I., Wayne, G., Uria, B., and Kalchbrenner, N., Associative Long Short-Term Memory, 2016. arXiv:1602.03032v2 [cs.NE].
25.
Zurück zum Zitat Fu, X., et al., Long short-term memory network over rhetorical structure theory for sentence-level sentiment analysis, JMLR: Workshop and Conference Proceedings, 2016, vol. 63, pp. 17–32. Fu, X., et al., Long short-term memory network over rhetorical structure theory for sentence-level sentiment analysis, JMLR: Workshop and Conference Proceedings, 2016, vol. 63, pp. 17–32.
26.
Zurück zum Zitat Henaff, M., Szlam, A., and LeCun, Y., Recurrent Orthogonal Networks and Long-Memory Tasks, 2017. arXiv:1602.06662v2 [cs.NE]. Henaff, M., Szlam, A., and LeCun, Y., Recurrent Orthogonal Networks and Long-Memory Tasks, 2017. arXiv:1602.06662v2 [cs.NE].
27.
Zurück zum Zitat Graves, A., et al., A novel connectionist system for improved unconstrained handwriting recognition, IEEE Trans. Pattern Anal. Mach. Intell., 2009, vol. 31, no. 5, pp. 855–868.CrossRef Graves, A., et al., A novel connectionist system for improved unconstrained handwriting recognition, IEEE Trans. Pattern Anal. Mach. Intell., 2009, vol. 31, no. 5, pp. 855–868.CrossRef
28.
Zurück zum Zitat Graves, A., Abdel-rahman, M., and Geoffre, H., Speech recognition with deep recurrent neural networks, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Vancouver, 2013, pp. 6645–6649. Graves, A., Abdel-rahman, M., and Geoffre, H., Speech recognition with deep recurrent neural networks, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Vancouver, 2013, pp. 6645–6649.
29.
Zurück zum Zitat With QuickType, Apple wants to do more than guess your next text. It wants to give you an AI. https://www.wired.com/2016/06/apple-bringing-ai-revolution-iphone/. Accessed February 5, 2020. With QuickType, Apple wants to do more than guess your next text. It wants to give you an AI. https://​www.​wired.​com/​2016/​06/​apple-bringing-ai-revolution-iphone/​.​ Accessed February 5, 2020.
30.
Zurück zum Zitat Xiong, W., et al., The Microsoft 2017 Conversational Speech Recognition System [Technical Report]. https://www.microsoft.com/en-us/research/publication/microsoft-2017-conversational-speech-recognition-system/. Accessed February 5, 2020. Xiong, W., et al., The Microsoft 2017 Conversational Speech Recognition System [Technical Report]. https://​www.​microsoft.​com/​en-us/​research/​publication/​microsoft-2017-conversational-speech-recognition-system/​.​ Accessed February 5, 2020.
31.
Zurück zum Zitat NS-3 Open source network simulator. https://www.nsnam.org/. Accessed February 5, 2020. NS-3 Open source network simulator. https://​www.​nsnam.​org/​.​ Accessed February 5, 2020.
32.
Zurück zum Zitat Tensorflow. https://www.tensorflow.org/. Accessed February 5, 2020. Tensorflow. https://​www.​tensorflow.​org/​.​ Accessed February 5, 2020.
33.
Zurück zum Zitat Keras. https://keras.io/. Accessed February 5, 2020. Keras. https://​keras.​io/​.​ Accessed February 5, 2020.
Metadaten
Titel
Identification of Cyber Threats in Networks of Industrial Internet of Things Based on Neural Network Methods Using Memory
verfasst von
V. M. Krundyshev
Publikationsdatum
01.12.2020
Verlag
Pleiades Publishing
Erschienen in
Automatic Control and Computer Sciences / Ausgabe 8/2020
Print ISSN: 0146-4116
Elektronische ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411620080180

Weitere Artikel der Ausgabe 8/2020

Automatic Control and Computer Sciences 8/2020 Zur Ausgabe

Neuer Inhalt