A novel intrusion detection system based on a hybrid quantum support vector machine and improved Grey Wolf optimizer

EI Elsedimy, H Elhadidy, SMM Abohashish - Cluster Computing, 2024 - Springer
Abstract The Internet of Things (IoT) has grown significantly in recent years, allowing devices
with sensors to share data via the internet. Despite the growing popularity of IoT devices …

Deep learning based attack detection in IIoT using two-level intrusion detection system

K Raja, K Karthikeyan, B Abilash, K Dev, G Raja - 2021 - researchsquare.com
Abstract The Industrial Internet of Things (IIoT), also known as Industry 4.0, has brought a
revolution in the production and manufacturing sectors as it assists in the automation of …

Attack Detection and Mitigation in Industrial IoT: An Optimized Ensemble Approach

BB Behera, RK Mohanty, BK Pattanayak - Specialusis Ugdymas, 2022 - sumc.lt
The following four primary steps (a) pre-processing,(b) feature extraction,(c) attack detection,
and (d) attack mitigation) are used to create a unique IIOT attack detection and mitigation …

Detection of Attacks using Attention-based Conv-LSTM and Bi-LSTM in Industrial Internet of Things

DS Misbha - 2022 International Conference on Automation …, 2022 - ieeexplore.ieee.org
This research work proposes an attack detection algorithm for the industrial internet of things
(IIoT) which uses an attention-based Conv-LSTM and Bidirectional Long short-term memory …

Echo-guard: Acoustic-based anomaly detection system for smart manufacturing environments

CB Seo, G Lee, Y Lee, SH Seo - International Conference on Information …, 2021 - Springer
Abstract The Industrial Internet of Things (IIoT) provides intelligence to industrial systems by
linking sensors and devices with computer systems and software. However, it also increases …

Anti-Attack Intrusion Detection Model Based on MPNN and Traffic Spatiotemporal Characteristics

J Lu, J Lan, Y Huang, M Song, X Liu - Journal of Grid Computing, 2023 - Springer
Considering the robustness and accuracy of conventional intrusion detection models are
easily influenced by adversarial attacks, this work proposes an anti-attack intrusion detection …

[PDF][PDF] A Novel Approach for Network Vulnerability Analysis in IIoT.

K Sudhakar, S Senthilkumar - Computer Systems Science & …, 2023 - cdn.techscience.cn
Industrial Internet of Things (IIoT) offers efficient communication among business partners
and customers. With an enlargement of IoT tools connected through the internet, the ability …

Autoencoders and AutoML for intrusion detection

AF Glavan, V Croitoru - 2023 15th International Conference on …, 2023 - ieeexplore.ieee.org
Industrial internet of things and operational technology (IIoT/OT) lead the edge use case
implementations. 5G and multi-access edge computing (MEC) offer the means to implement …

A Review of Anomaly Intrusion Detection Systems in IoT using Deep Learning Techniques

MA Alsoufi, S Razak, MM Siraj, BA Al-rimy… - Advances in Data …, 2021 - World Scientific
The rise of the Internet of things (IoT) provides an intelligent environment. However, it
demands a higher security effort due to its vulnerabilities. A number of studies have …

[PDF][PDF] Zero-day Network Intrusion Detection using Machine Learning Approach

N Alam, M Ahmed - no. April, 2023 - researchgate.net
Zero-day network attacks are a growing global cybersecurity concern. Hackers exploit
vulnerabilities in network systems, making network traffic analysis crucial in detecting and …