Комплексирование механизмов искусственных иммунных систем в составе интегрированной системы обнаружения атак на промышленный Интернет вещей
Работая с нашим сайтом, вы даете свое согласие на использование файлов cookie. Это необходимо для нормального функционирования сайта, показа целевой рекламы и анализа трафика. Статистика использования сайта отправляется в «Яндекс» и «Google»
Научный журнал Моделирование, оптимизация и информационные технологииThe scientific journal Modeling, Optimization and Information Technology
Online media
issn 2310-6018

Joint application of artificial immune system mechanisms in the integrated system for detecting attacks on Industrial Internet of Things

Vasilyev V.I.,  idVulfin A.M., Gvozdev V.E.,  idShamsutdinov R.R.

UDC 004.056
DOI: 10.26102/2310-6018/2022.39.4.001

  • Abstract
  • List of references
  • About authors

The article considers the issue of detecting network attacks on the Industrial Internet of Things (IIoT) systems. The widespread use of such systems causes an increase in the vulnerability of corporate networks due to the low security of smart devices, the distributed architecture of IIoT networks, and the heterogeneous nature of IIoT devices. The article proposes to employ an advanced artificial immune system aimed at intrusion detection in the IIoT network. The main concepts and mechanisms of artificial immunity currently utilized to solve various kinds of information security and data mining problems are analyzed. Such algorithms as algorithms of negative selection, clonal selection, automatic updating of detectors, danger theory, dendritic cells and idiopathic immune network theory are examined. The features of each approach are regarded; the advantages of their joint application in integrated intrusion detection system are demonstrated. For the purposes of training and evaluating the efficiency of the given system, a set of testing data on the network interaction of Internet of things devices (Bot-IoT) was used. The results of the computational experiments verify the high efficiency of the suggested approach.

1. Into the mind of an IoT hacker | how to protect IoT networks & devices. RSA Conference. 2021. Available by: https://www.rsaconference.com/Library/presentation/USA/2021/Into%20the%20Mind%20of%20an%20IoT%20Hacker%20%20How%20to%20Protect%20IoT%20Networks%20%20Devices (accessed on 10.09.2022).

2. Zashchishchat' IoT v seti ili zashchishchat' set' ot IoT. Laboratoriya Kasperskogo = Kaspersky Lab. Available by: https://www.kaspersky.ru/blog/rsa2021-dangerous-iot/30870/ (accessed on 10.09.2022) (In Russ.).

3. Industrial Internet of Things – IIoT. Промышленный интернет вещей. TADVISER. Available by: https://www.tadviser.ru/index.php/%D0%A1%D1%82%D0%B0%D1%82%D1%8C%D1%8F:IIoT_-_Industrial_Internet_of_Things_(%D0%9F%D1%80%D0%BE%D0%BC%D1%8B%D1%88%D0%BB%D0%B5%D0%BD%D0%BD%D1%8B%D0%B9_%D0%B8%D0%BD%D1%82%D0%B5%D1%80%D0%BD%D0%B5%D1%82_%D0%B2%D0%B5%D1%89%D0%B5%D0%B9) (accessed on 10.09.2022).

4. Protic D.D. Intrusion detection based on the artificial immune system. Vojnoteh. glas. 2020;4. Available by: https://cyberleninka.ru/article/n/intrusion-detection-based-on-the-artificial-immune-system (accessed on 23.09.2022).

5. Chastikova V.A., Kartamyshev D.A. Artificial immune system: basic approaches and feature of their realization. Nauchnye trudy KubGTU = Scientific Works of the Kuban State Technological University. 2016;8:193–208. (In Russ.).

6. Brown J., Anwar M., Dozier G. An artificial immunity approach to malware detection in a mobile platform. URASIP Journal on Information Security. 2017:7. Available by: https://jis-eurasipjournals.springeropen.com/articles/10.1186/s13635-017-0059-2 (accessed on 20.09.2022).

7. Kumaravel H.V. An anomaly-based intrusion detection system based on artificial immune system (AIS) techniques. Open Access Theses. 2016:964. Available by: https://docs.lib.purdue.edu/open_access_theses/964 (accessed on 25.08.2022).

8. Burlakov M.E., Ivkin A.N. Intrusion detection system based on the artificial immune system. Vestnik PNIPU = PNRPU Bulletin. 2019;29:209–224. (In Russ.).

9. Limon-Cantu D., Alarcon-Aquino V. Network intrusion detection using dendritic cells and danger theory. Technology, Science and Culture: A Global Vision. 2020;23:89–106.

10. The UNSW-NB15 Dataset, University of New South Wales. Available by: https://research.unsw.edu.au/projects/unsw-nb15-dataset (accessed on 25.09.2022).

11. NSL-KDD. University of New Brunswick. Available by: https://www.unb.ca/cic/datasets/nsl.html. (accessed on 25.09.2022).

12. Farzadnia E., Shirazia H., Nowroozi A. A New Intrusion Detection System using the Improved DendriticCell Algorithm. The Computer Journal. 2021;8(64):1193–1214.

13. Duru C., Ladeji-Osias J., Wandji K., Otily T., Kone R. A review of human immune inspired algorithms for intrusion detection systems. 2022 IEEE World AI IoT Congress (AIIoT). 2022:364–371.

14. Selemenev A.V., Astakhova I.F. Application of artificial immune systems for detection of network inclusions. Vestnik VGU = Proceedings of Voronezh State University. 2019;2:49–56. (In Russ.).

15. Alaparthy V., Morgera S. A multi level intrusion detection system for wirel ess sensor networks based on immune theory. IEEE Access. 2018;6:47364–47373.

16. Aldhaheri S., Alghazzawi D., Cheng L., Alzahrani B., Al Barakat A. DeepDCA: Novel network based detection of IoT attacks using artificial immune syste. Applied sciences. 2020;10:1909–1932.

17. The Bot-IoT Dataset, University of New South Wales. Available by: https://research.unsw.edu.au/projects/bot-iot-dataset (accessed on 25.09.2022).

18. Xiao X., Zhang R. A danger theory inspired protection approach for hierarchical wireless sensor networks. KSII Transactions on Internet and Information Systems. 2019;5(13):2732–2753.

19. Vasilyev V.I., Gvozdev V.E., Shamsutdinov R.R. Network Anomaly Detection Based on Artificial Immune System for Industrial Internet of Things. Doklady TUSUR = Proceedings of TUSUR University. 2021;4(21):40–45. (In Russ.).

20. Almomani I., Al-Kasasbeh B., AL-Akhras M. WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks. Journal of Sensors. 2016. Available by: https://www.hindawi.com/journals/js/2016/4731953/ (accessed on 25.09.2022).

21. Vasilyev V.I., Shamsutdinov R.R. Intelligent network intrusion detection system based on artificial immune system mechanisms. Modelirovanie, optimizatsiya i informatsionnye tekhnologii. = Modeling, Optimization and Information Technology. 2019;1(7):521–535. (In Russ.).

22. Vasilyev V.I., Vulfin A.M., Gvozdev V.E., Shamsutdinov R.R. Hybrid intelligent intrusion detection system based on combining machine learning methods. Modelirovanie, optimizatsiya i informatsionnye tekhnologii. = Modeling, Optimization and Information Technology. 2021;9(3). Available by: https://moitvivt.ru/ru/journal/pdf?id=1032 (accessed on 25.09.2022). DOI: 10.26102/2310-6018/2021.34.3.019. (In Russ.).

Vasilyev Vladimir Ivanovich
Doctor of Technical Sciences, Professor

Ufa State Aviation Technical University

Ufa, Russian Federation

Vulfin Alexey Mikhailovich
Doctor of Technical Sciences, Associate Professor

ORCID |

Ufa State Aviation Technical University

Ufa, Russian Federation

Gvozdev Vladimir Efimovich
Doctor of Technical Sciences, Professor

Ufa State Aviation Technical University

Ufa, Russian Federation

Shamsutdinov Rinat Rustemovich

WoS | ORCID |

Ufa State Aviation Technical University

Ufa, Russian Federation

Keywords: information security, network attack, dataset Bot-IoT, internet of Things, industrial Internet of Things, artificial immune system, negative selection, clonal selection, dendritic cells, idiopathic immune network

For citation: Vasilyev V.I., Vulfin A.M., Gvozdev V.E., Shamsutdinov R.R. Joint application of artificial immune system mechanisms in the integrated system for detecting attacks on Industrial Internet of Things. Modeling, Optimization and Information Technology. 2022;10(4). URL: https://moitvivt.ru/ru/journal/pdf?id=1240 DOI: 10.26102/2310-6018/2022.39.4.001 (In Russ).

526

Full text in PDF

Received 04.10.2022

Revised 03.11.2022

Accepted 09.11.2022

Published 31.12.2022