Preview

Scientific and Technical Journal of Information Technologies, Mechanics and Optics

Advanced search

Anomaly detection for IIoT: analyzing Edge-IIoTset dataset with varied class distributions

https://doi.org/10.17586/2226-1494-2025-25-5-876-887

Abstract

In the context of the Industrial Internet of Things (IIoT), cybersecurity refers to preventing unauthorized access, attacks, and vulnerabilities to interconnected devices, networks, and data. Given the inherent interconnectedness of IIoT devices, ensuring security is of paramount importance to mitigate potential disruptions, data breaches, and malicious activities. As IIoT systems continue to proliferate, the significance of robust security measures, effective intrusion detection, and intelligent detection techniques escalates to safeguard critical infrastructure and sensitive data from cyber threats. This work aims to contribute towards establishing a secure and resilient industrial environment through the utilization of a hybrid model: Convolutional Neural Network with Deep Neural Network, accommodating distinct class distributions. The recent “Edge IIoTset” dataset is harnessed to enhance the model efficacy. Throughout the evaluation process, diverse metrics are employed, encompassing Accuracy, Precision, Recall, and the F1-score. By applying thorough preprocessing and using various class distribution scenarios (2, 6, 9, 10, and 15 classes), the model achieved excellent classification results. Notably, the 9-class configuration reached an Accuracy of 99.13 %, while the 6-class and 10-class setups also delivered strong performance at 97.13 % and 96.11 %, respectively. Our architecture effectively combines feature extraction and deep classification layers, resulting in a robust solution adaptable to complex IIoT traffic.

About the Authors

W. Ferhi
University of Abu Bekr Belkai
Algeria

Wafaa Ferhi — PhD Student, Assistant

sc 58480659800

Tlemcen, 13000



D. Moussaoui
University of Abu Bekr Belkai
Algeria

Djilali Moussaoui — Lecturer

sc 56360232600

Tlemcen, 13000



M. Hadjila
University of Abu Bekr Belkai
Algeria

Mourad Hadjila — Lecturer

sc 56440246000

Tlemcen, 13000



A. B. Bouidaine
University of Abu Bekr Belkai
Algeria

Al Baraa Bouidaine — PhD Student, Assistant

sc 58482050500

Tlemcen, 13000



References

1. Jaidka H., Sharma N., Singh R. Evolution of IoT to IIoT: applications & challenges. Proc. of the International Conference on Innovative Computing & Communications (ICICC), 2020, pp. 1–6. https://doi.org/10.2139/ssrn.3603739

2. Farhan L., Kharel R., Kaiwartya O., Quiroz-Castellanos M., Alissa A., Abdulsalam M. A concise review on internet of things (IoT)problems, challenges and opportunities. Proc. of the 11th International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP), 2018, pp. 1–6. https://doi.org/10.1109/CSNDSP.2018.8471762

3. Chalishazar T. Peerbits exploring the applications of IoT in different industries, 2023. Available at: https://www.peerbits.com/blog/iotapplications-in-different-industries.html (accessed: 24.06.2023)

4. Qiu T., Chi J., Zhou X., Ning Z., Atiquzzaman M., Wu D.O. Edge computing in Industrial Internet of Things: architecture, advances and challenges. IEEE Communications Surveys & Tutorials, 2020, vol. 22, no. 4, pp. 2462–2488. https://doi.org/10.1109/COMST.2020.3009103

5. Alguliyev R., Imamverdiyev Y., Sukhostat L. Cyber-physical systems and their security issues. Computers in Industry, 2018, vol. 100, no. 1, pp. 212–223.

6. Mohamed N., Al-Jaroodi J., Jawhar I. Cyber–physical systems forensics: today and tomorrow. Journal of Sensor and Actuator Networks, 2020, vol. 9, no. 3, pp. 37. https://doi.org/10.3390/jsan9030037

7. Javaid M., Haleem A., Singh R.P., Suman R., Gonzalez E.S. Understanding the adoption of industry 4.0 technologies in improving environmental sustainability. Sustainable Operations and Computers, 2022, vol. 3, pp. 203–217. https://doi.org/10.1016/j.susoc.2022.01.008

8. Mirani A.A., Velasco-Hernandez G., Awasthi A., Walsh J. Key challenges and emerging technologies in industrial iot architectures: A review. Sensors, 2022, vol. 22, no. 15, pp. 5836. https://doi.org/10.3390/s22155836

9. Younan M., Houssein E.H., Elhoseny M., Ali A.A. Challenges and recommended technologies for the industrial internet of things: A comprehensive review. Measurement, 2020, vol. 151, pp. 107198. https://doi.org/10.1016/j.measurement.2019.107198

10. Gebremichael T., Ledwaba L.P., Eldefrawy M.H., Hancke G.P., Pereira N., Gidlund M., Akerberg J. Security and privacy in the industrial internet of things: current standards and future challenges. IEEE Access, 2020, vol. 8, pp. 152351–152366. https://doi.org/10.1109/ACCESS.2020.3016937

11. Madhuri G.S., Rani M.U. Anomaly detection techniques. Proc. of the IADS International Conference on Computing, Communications & Data Engineering (CCODE), 2018, pp. 1–6.

12. Munir M., Chattha M.A., Dengel A., Ahmed S. A comparative analysis of traditional and deep learning-based anomaly detection methods for streaming data. Proc. of the 18th IEEE International Conference on Machine Learning and Applications (ICMLA), 2019, pp. 561–566. https://doi.org/10.1109/icmla.2019.00105

13. Du J., Yang K., Hu Y., Jiang L. NIDS-CNNLSTM: Network intrusion detection classification model based on deep learning. IEEE Access, 2023, vol. 11, pp. 24808–24821. https://doi.org/10.1109/ACCESS.2023.3254915

14. Kandhro I.A., Alanazi S.M., Ali F., Kehar A., Fatima K., Uddin M. Detection of real-time malicious intrusions and attacks in IoT empowered cybersecurity infrastructures. IEEE Access, 2023, vol. 11, pp. 9136– 9148. https://doi.org/10.1109/ACCESS.2023.3238664

15. Alrowaily M., Alenezi F., Lu Z. Effectiveness of machine learning based intrusion detection systems. Lecture Notes in Computer Science, 2019, vol. 11611, pp. 277–288. https://doi.org/10.1007/978-3-030-24907-6_21

16. Cam N.T., Trung N.G. An intelligent approach to improving the performance of threat detection in IoT. IEEE Access, 2023, vol. 11, pp. 44319–44334. https://doi.org/10.1109/ACCESS.2023.3273160

17. Al-Abassi A., Karimipour H., Dehghantanha A., Pariz R.M. An ensemble deep learning-based cyber-attack detection in industrial control system. IEEE Access, 2020, vol. 8, pp. 83965– 83973. https://doi.org/10.1109/ACCESS.2020.2992249

18. Shone N., Ngoc T.N., Phai V.D., Shi Q. A deep learning approach to network intrusion detection. IEEE Transactions on Emerging Topics in Computational Intelligence, 2018, vol. 2, no. 1, pp. 41–50. https://doi.org/10.1109/TETCI.2017.2772792

19. Ullah I., Mahmoud Q.H. Design and development of a deep learningbased model for anomaly detection in IoT networks. IEEE Access, 2021, vol. 9, pp. 103906–103926. https://doi.org/10.1109/ACCESS.2021.3094024

20. Gümüşbaş D., Yıldırım T., Genovese A., Scotti F. A comprehensive survey of databases and deep learning methods for cybersecurity and intrusion detection systems. IEEE Systems Journal, 2020, vol. 15, no. 2, pp. 1717–1731. https://doi.org/10.1109/JSYST.2020.2992966

21. Ashraf E., Areed N.F., Salem H., Salem H., Abdelhady E., Farouk A. IoT based intrusion detection systems from the perspective of machine and deep learning: a survey and comparative study. Delta University Scientific Journal, 2022, vol. 5, no. 2, pp. 367–386. https://doi.org/10.21608/dusj.2022.275552

22. Thakkar A., Lohiya R. A review of the advancement in intrusion detection datasets. Procedia Computer Science, 2020, vol. 167, pp. 636–645. https://doi.org/10.1016/j.procs.2020.03.330

23. Mishra N., Pandya S. Internet of Things applications, security challenges, attacks, intrusion detection, and future visions: A systematic review. IEEE Access, 2021, vol. 9, pp. 59353–59377. https://doi.org/10.1109/ACCESS.2021.3073408

24. Liu L., Wang P., Lin J., Liu L. Intrusion detection of imbalanced network traffic based on machine learning and deep learning. IEEE Access, 2020, vol. 9, pp. 7550–7563. https://doi.org/10.1109/ACCESS.2020.3048198

25. Ito A., Saito K., Ueno R., Homma N. Imbalanced data problems in deep learning-based side-channel attacks: Analysis and solution. IEEE Transactions on Information Forensics and Security, 2021, vol. 16, pp. 3790–3802. https://doi.org/10.1109/TIFS.2021.3092050

26. Goyal P., Pandey S., Jain K. Deep Learning for Natural Language Processing: Creating Neural Networks with Python. Apress, 2018, 294 p.

27. Chinnathambi R.A., Plathottam S.J., Hossen T., Nair A.S., Ranganathan P. Deep neural networks (DNN) for day-ahead electricity price markets. Proc. of the IEEE electrical power and energy conference (EPEC), 2018, pp. 1–6. https://doi.org/10.1109/EPEC.2018.8598327

28. Rosenblatt F. The perceptron: a probabilistic model for information storage and organization in the brain. Psychological Review, 1958, vol. 65, no. 6, pp. 386–408. https://doi.org/10.1037/h0042519

29. LeCun Y., Boser B., Denker J.S., Henderson D., Howard R.E., Hubbard W., Jackel L.D. Backpropagation applied to handwritten zip code recognition. Neural Computation, 1989, vol. 1, no. 4, pp. 541–551. https://doi.org/10.1162/neco.1989.1.4.541

30. Hubel D.H., Wiesel T.N. Receptive fields and functional architecture of monkey striate cortex. The Journal of Physiology, 1968, vol. 195, no. 1, pp. 215–243. https://doi.org/10.1113/jphysiol.1968.sp008455

31. Yamashita R., Nishio M., Do R.K.G., Togashi K. Convolutional neural networks: an overview and application in radiology. Insights into Imaging, 2018, vol. 9, pp. 611–629. https://doi.org/10.1007/s13244-018-0639-9

32. Ferrag M.A., Friha O., Hamouda D., Maglaras L., Janicke H. EdgeIIoTset: a new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning. IEEE Access, 2022, vol. 10, pp. 40281–40306. https://doi.org/10.1109/access.2022.3165809

33. Khacha A., Saadouni R., Harbi Y., Aliouat Z. Hybrid deep learningbased intrusion detection system for industrial Internet of Things. Proc. of the 5th International Symposium on Informatics and its empowered cybersecurity infrastructures // IEEE Access. 2023. V. 11. P. 9136– 9148. https://doi.org/10.1109/ACCESS.2023.3238664


Review

For citations:


Ferhi W., Moussaoui D., Hadjila M., Bouidaine A.B. Anomaly detection for IIoT: analyzing Edge-IIoTset dataset with varied class distributions. Scientific and Technical Journal of Information Technologies, Mechanics and Optics. 2025;25(5):876-887. https://doi.org/10.17586/2226-1494-2025-25-5-876-887

Views: 33


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2226-1494 (Print)
ISSN 2500-0373 (Online)