Design of Industrial IoT Intrusion Security Detection System Based on LightGBM Feature Algorithm and Multi-layer Perception Network

Authors

  • Yongsheng Deng College of Information Engineering, Chongqing Vocational and Technical University of Mechatronics, Bishan, 402760, Chongqing, China

DOI:

https://doi.org/10.13052/jcsm2245-1439.1327

Keywords:

LightGBM, multi-layer perception network, industrial IoT, intrusion detection, feature selection

Abstract

Continuous improvement of machine learning technology has provided more support for intrusion security detection in the industrial Internet of Things (IoT). The intrusion security detection system based on LightGBM feature algorithm and multi-layer perception network fusion provides more options for improving security detection, further enhancing the effectiveness of industrial IoT intrusion security detection. By comparing the applications of different models in the security detection process, the model constructed based on the LightGBM feature algorithm can achieve higher accuracy and precision in industrial IoT intrusion security detection, as well as higher F1-score and AUC values; A more reasonable detection time also lays the foundation for improving the overall efficiency of industrial IoT intrusion security detection. Therefore, in the field of industrial IoT intrusion security detection, the detection model constructed in this article can provide more support for further improvement and improvement of IoT intrusion security detection performance.

Downloads

Download data is not yet available.

Author Biography

Yongsheng Deng, College of Information Engineering, Chongqing Vocational and Technical University of Mechatronics, Bishan, 402760, Chongqing, China

Yongsheng Deng was born in Bazhong, Sichuan, P.R. China, in 1978, he received the Master degree from Chongqing University, P.R. China. Now, he works in College of Information Engineering, Chongqing Vocational and Technical University of Mechatronics. His research interests include Internet of Things technology application, network security detection, big data application development, etc.

References

Zhang, Z. Analysis of Network Security Countermeasures From the Perspective of Improved FS Algorithm and ICT Convergence. Journal of Cyber Security and Mobility, 2023, 12(01), 1–24.

Yingle Y. Big data network security defense mode of deep learning algorithm[J]. Open Computer Science, 2022, 12(1):345–356.

Zhao, Yan, Hu, et al. A secure and flexible edge computing scheme for AI-driven industrial IoT[J]. Cluster Computing, 2021, 26(1):1–19.

Shantanu P, Zahra J. Analysis of Security Issues and Countermeasures for the Industrial Internet of Things[J]. Applied Sciences, 2021, 11(20):93–102.

Thilagavathi, B., and Suthendran, K. Boosting Based Implementation of Biometric Authentication in IoT. Journal of Cyber Security and Mobility, 2018, 7(1–2), 131–144.

Aron L, Waseem A, Yevgeniy V, et al. Integrating redundancy, diversity, and hardening to improve security of industrial internet of things[J]. Cyber-Physical Systems, 2020, 6(1):1–32.

Alshathri S, Sayed E A, Shafai E W, et al. An Efficient Intrusion Detection Framework for Industrial Internet of Things Security[J]. Computer Systems Science and Engineering, 2023, 46(1):819–834.

Kollipara, V. N. H., Kalakota, S. K., Chamarthi, S., Ramani, S., Malik, P., and Karuppiah, M. Timestamp Based OTP and Enhanced RSA Key Exchange Scheme with SIT Encryption to Secure IoT Devices. Journal of Cyber Security and Mobility, 2023, 12(01), 77–102.

Zayed S, Gamal A, Ayman S E, et al. An Efficient Fault Diagnosis Framework for Digital Twins Using Optimized Machine Learning Models in Smart Industrial Control Systems[J]. International Journal of Computational Intelligence Systems, 2023, 16(1):63–84.

Alzahrani A, Aldhyani H H T. Design of Efficient Based Artificial Intelligence Approaches for Sustainable of Cyber Security in Smart Industrial Control System[J]. Sustainability, 2023, 15(10):123–135.

Xinyi Q, Min L, Lu Z, et al. Structural protein fold recognition based on secondary structure and evolutionary information using machine learning algorithms[J]. Computational Biology and Chemistry, 2021, 91.

Meng W, Kejun S, Caiwang T, et al. Research on fault diagnosis system for belt conveyor based on internet of things and the LightGBM model.[J]. PloS one, 2023, 18(3):23–39.

Xie B, Li F, Li H, et al. Enhanced Internet of Things Security Situation Assessment Model with Feature Optimization and Improved SSA-LightGBM[J]. Mathematics, 2023, 11(16):212–234.

Lv Z. A novel LightGBM-based industrial internet intrusion detection method[J]. International Journal of Computer Applications in Technology, 2023, 71(3):208–216.

Qingmin Y, Xin G, Yong Z, et al. The missing data filling method of the industrial internet platform based on rules and LightGBM[J]. IFAC PapersOnLine, 2020, 53(5):152–157.

Leevy L J, Khoshgoftaar M T, Hancock J. Feature evaluation for IoT botnet traffic classification[J]. International Journal of Internet of Things and Cyber-Assurance, 2022, 2(1):87–102.

Prajisha C, Vasudevan A R. An efficient intrusion detection system for MQTT-IoT using enhanced chaotic salp swarm algorithm and LightGBM[J]. International Journal of Information Security, 2022, 21(6):1263–1282.

Meng D, Dai H, Sun Q, et al. Novel Wireless Sensor Network Intrusion Detection Method Based on LightGBM Model[J]. IAENG International Journal of Applied Mathematics, 2022, 52(4):654–668.

Diana Lopez-Soto, Francisco Angel-Bello Soumaya Yacout. A multi-start algorithm to design a multi-class classifier for a multi-criteria ABC inventory classification problem[J]. Expert System with Applications, 2017, 81(C):12–21.

Zhao K, Wang D. Research on Speech Recognition Method in Multi-Layer Perceptual Network Environment[J]. International Journal of Circuits, Systems and Signal Processing, 2021, 15(8):996–1004.

Huang X, Gao L, Crosbie S R, et al. Groundwater Recharge Prediction Using Linear Regression, Multi-Layer Perception Network, and Deep Learning[J]. Water, 2019, 11(9):457–469.

Zamil A H G M, Samarah S, Rawashdeh M, et al. Multimedia-oriented action recognition in Smart City-based IoT using multilayer perceptron[J]. Multimedia Tools and Applications, 2019, 78(21):315–329.

Mahmoud H, Sayed Y M, Galal A I, et al. Smart Cognitive IoT Devices Using Multi-Layer Perception Neural Network on Limited Microcontroller[J]. Sensors, 2022, 22(14):142–163.

Sankaran K S, Kim B-H. Deep learning based energy efficient optimal RMC-CNN model for secured data transmission and anomaly detection in industrial IOT[J]. Sustainable Energy Technologies and Assessments, 2023, 56(5):89–103.

Kalinin M O, Krundyshev V M, Sinyapkin B G. Development of the Intrusion Detection System for the Internet of Things Based on a Sequence Alignment Algorithm[J]. Automatic Control and Computer Sciences, 2021, 54(8):993–1000.

Huang Zhaojun, Zeng Mingru. Hierarchical ICS Intrusion Detection Algorithm Based on RVM Combined with GSA-SVM[J]. Control Engineering of China, 2022, 29(7):1323–1329.

Doynikova E., Fedorchenko, A., and Kotenko, I. A Semantic Model for Security Evaluation of Information Systems. Journal of Cyber Security and Mobility, 202,9(2), 301–330.

Knowles W, Prince D, Hutchison D, et al. A Survey of Cyber Security Management in Industrial Control Systems[J]. International Journal of Critical Infrastructure Protection, 2015, 9(3):52–80.

Liu Jin, Zhao Jing, Feng Yingmin. Power Load Forecasting in Power Internet of Things Based on Gradient Boosting Decision Tree[J]. Power Planning, 2022, 50(8):46–53.

Shen Yeming, Li Beibei, Liu Xiaojie, Ou Yangyuankai. Research on Active Learning-based Intrusion Detection Approach for Industrial Internet[J]. 2023, 21(1):80–87.

Bagui S, Wang X, Bagui S. Machine Learning Based Intrusion Detection for IoT Botnet[J]. International Journal of Machine Learning and Computing, 2021, 11(6):122–136.

Downloads

Published

2024-02-12

How to Cite

1.
Deng Y. Design of Industrial IoT Intrusion Security Detection System Based on LightGBM Feature Algorithm and Multi-layer Perception Network. JCSANDM [Internet]. 2024 Feb. 12 [cited 2024 Jul. 6];13(02):327-48. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/23947

Issue

Section

Cyber Security Issues and Solutions