With the increased advancements of smart industries,cybersecurity has become a vital growth factor in the success of industrial transformation.The Industrial Internet of Things(IIoT)or Industry 4.0 has revolutionized ...With the increased advancements of smart industries,cybersecurity has become a vital growth factor in the success of industrial transformation.The Industrial Internet of Things(IIoT)or Industry 4.0 has revolutionized the concepts of manufacturing and production altogether.In industry 4.0,powerful IntrusionDetection Systems(IDS)play a significant role in ensuring network security.Though various intrusion detection techniques have been developed so far,it is challenging to protect the intricate data of networks.This is because conventional Machine Learning(ML)approaches are inadequate and insufficient to address the demands of dynamic IIoT networks.Further,the existing Deep Learning(DL)can be employed to identify anonymous intrusions.Therefore,the current study proposes a Hunger Games Search Optimization with Deep Learning-Driven Intrusion Detection(HGSODLID)model for the IIoT environment.The presented HGSODL-ID model exploits the linear normalization approach to transform the input data into a useful format.The HGSO algorithm is employed for Feature Selection(HGSO-FS)to reduce the curse of dimensionality.Moreover,Sparrow Search Optimization(SSO)is utilized with a Graph Convolutional Network(GCN)to classify and identify intrusions in the network.Finally,the SSO technique is exploited to fine-tune the hyper-parameters involved in the GCN model.The proposed HGSODL-ID model was experimentally validated using a benchmark dataset,and the results confirmed the superiority of the proposed HGSODL-ID method over recent approaches.展开更多
The increasing demand for software engineers cannot completely be fulfilled by university education and conventional training approaches due to limited capacities.Accordingly,an alternative approach is necessary where...The increasing demand for software engineers cannot completely be fulfilled by university education and conventional training approaches due to limited capacities.Accordingly,an alternative approach is necessary where potential software engineers are being educated in software engineering skills using new methods.We suggest micro tasks combined with theoretical lessons to overcome existing skill deficits and acquire fast trainable capabilities.This paper addresses the gap between demand and supply of software engineers by introducing an actionoriented and scenario-based didactical approach,which enables non-computer scientists to code.Therein,the learning content is provided in small tasks and embedded in learning factory scenarios.Therefore,different requirements for software engineers from the market side and from an academic viewpoint are analyzed and synthesized into an integrated,yet condensed skills catalogue.This enables the development of training and education units that focus on the most important skills demanded on the market.To achieve this objective,individual learning scenarios are developed.Of course,proper basic skills in coding cannot be learned over night but software programming is also no sorcery.展开更多
Recently,to build a smart factory,research has been conducted to perform fault diagnosis and defect detection based on vibration and noise signals generated when a mechanical system is driven using deep-learning techn...Recently,to build a smart factory,research has been conducted to perform fault diagnosis and defect detection based on vibration and noise signals generated when a mechanical system is driven using deep-learning technology,a field of artificial intelligence.Most of the related studies apply various audio-feature extraction techniques to one-dimensional raw data to extract sound-specific features and then classify the sound by using the derived spectral image as a training dataset.However,compared to numerical raw data,learning based on image data has the disadvantage that creating a training dataset is very time-consuming.Therefore,we devised a two-step data preprocessing method that efficiently detects machine anomalies in numerical raw data.In the first preprocessing process,sound signal information is analyzed to extract features,and in the second preprocessing process,data filtering is performed by applying the proposed algorithm.An efficient dataset was built formodel learning through a total of two steps of data preprocessing.In addition,both showed excellent performance in the training accuracy of the model that entered each dataset,but it can be seen that the time required to build the dataset was 203 s compared to 39 s,which is about 5.2 times than when building the image dataset.展开更多
Contemporary attackers,mainly motivated by financial gain,consistently devise sophisticated penetration techniques to access important information or data.The growing use of Internet of Things(IoT)technology in the co...Contemporary attackers,mainly motivated by financial gain,consistently devise sophisticated penetration techniques to access important information or data.The growing use of Internet of Things(IoT)technology in the contemporary convergence environment to connect to corporate networks and cloud-based applications only worsens this situation,as it facilitates multiple new attack vectors to emerge effortlessly.As such,existing intrusion detection systems suffer from performance degradation mainly because of insufficient considerations and poorly modeled detection systems.To address this problem,we designed a blended threat detection approach,considering the possible impact and dimensionality of new attack surfaces due to the aforementioned convergence.We collectively refer to the convergence of different technology sectors as the internet of blended environment.The proposed approach encompasses an ensemble of heterogeneous probabilistic autoencoders that leverage the corresponding advantages of a convolutional variational autoencoder and long short-term memory variational autoencoder.An extensive experimental analysis conducted on the TON_IoT dataset demonstrated 96.02%detection accuracy.Furthermore,performance of the proposed approach was compared with various single model(autoencoder)-based network intrusion detection approaches:autoencoder,variational autoencoder,convolutional variational autoencoder,and long short-term memory variational autoencoder.The proposed model outperformed all compared models,demonstrating F1-score improvements of 4.99%,2.25%,1.92%,and 3.69%,respectively.展开更多
基金Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2022R319)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code:22UQU4340237DSR44The authors are thankful to the Deanship of Scientific Research at Najran University for funding thiswork under theResearch Groups Funding program Grant Code(NU/RG/SERC/11/4).
文摘With the increased advancements of smart industries,cybersecurity has become a vital growth factor in the success of industrial transformation.The Industrial Internet of Things(IIoT)or Industry 4.0 has revolutionized the concepts of manufacturing and production altogether.In industry 4.0,powerful IntrusionDetection Systems(IDS)play a significant role in ensuring network security.Though various intrusion detection techniques have been developed so far,it is challenging to protect the intricate data of networks.This is because conventional Machine Learning(ML)approaches are inadequate and insufficient to address the demands of dynamic IIoT networks.Further,the existing Deep Learning(DL)can be employed to identify anonymous intrusions.Therefore,the current study proposes a Hunger Games Search Optimization with Deep Learning-Driven Intrusion Detection(HGSODLID)model for the IIoT environment.The presented HGSODL-ID model exploits the linear normalization approach to transform the input data into a useful format.The HGSO algorithm is employed for Feature Selection(HGSO-FS)to reduce the curse of dimensionality.Moreover,Sparrow Search Optimization(SSO)is utilized with a Graph Convolutional Network(GCN)to classify and identify intrusions in the network.Finally,the SSO technique is exploited to fine-tune the hyper-parameters involved in the GCN model.The proposed HGSODL-ID model was experimentally validated using a benchmark dataset,and the results confirmed the superiority of the proposed HGSODL-ID method over recent approaches.
基金supported in part by the Junior Research Group“ProMUT”(01UU1705B)which is funded by the German Federal Ministry of Education and Research as part of its funding initiative“Social-Ecological Research”the German Internet Institute(16DII116).
文摘The increasing demand for software engineers cannot completely be fulfilled by university education and conventional training approaches due to limited capacities.Accordingly,an alternative approach is necessary where potential software engineers are being educated in software engineering skills using new methods.We suggest micro tasks combined with theoretical lessons to overcome existing skill deficits and acquire fast trainable capabilities.This paper addresses the gap between demand and supply of software engineers by introducing an actionoriented and scenario-based didactical approach,which enables non-computer scientists to code.Therein,the learning content is provided in small tasks and embedded in learning factory scenarios.Therefore,different requirements for software engineers from the market side and from an academic viewpoint are analyzed and synthesized into an integrated,yet condensed skills catalogue.This enables the development of training and education units that focus on the most important skills demanded on the market.To achieve this objective,individual learning scenarios are developed.Of course,proper basic skills in coding cannot be learned over night but software programming is also no sorcery.
基金supported by the National Research Foundation of Korea(NRF)grant funded by the Korea Government(MSIT)(No.2021R1C1C1013133)funded by BK21 FOUR(Fostering Outstanding Universities for Research)(No.5199990914048)supported by the Soonchunhyang University Research Fund.
文摘Recently,to build a smart factory,research has been conducted to perform fault diagnosis and defect detection based on vibration and noise signals generated when a mechanical system is driven using deep-learning technology,a field of artificial intelligence.Most of the related studies apply various audio-feature extraction techniques to one-dimensional raw data to extract sound-specific features and then classify the sound by using the derived spectral image as a training dataset.However,compared to numerical raw data,learning based on image data has the disadvantage that creating a training dataset is very time-consuming.Therefore,we devised a two-step data preprocessing method that efficiently detects machine anomalies in numerical raw data.In the first preprocessing process,sound signal information is analyzed to extract features,and in the second preprocessing process,data filtering is performed by applying the proposed algorithm.An efficient dataset was built formodel learning through a total of two steps of data preprocessing.In addition,both showed excellent performance in the training accuracy of the model that entered each dataset,but it can be seen that the time required to build the dataset was 203 s compared to 39 s,which is about 5.2 times than when building the image dataset.
基金This work was supported by the National Research Foundation of Korea(NRF)grant funded by the Korean government(MSIT)(No.2021R1A2C2011391)was supported by the Institute of Information&communications Technology Planning&Evaluation(IITP)grant funded by the Korea government(MSIT)(No.2021-0-01806Development of security by design and security management technology in smart factory).
文摘Contemporary attackers,mainly motivated by financial gain,consistently devise sophisticated penetration techniques to access important information or data.The growing use of Internet of Things(IoT)technology in the contemporary convergence environment to connect to corporate networks and cloud-based applications only worsens this situation,as it facilitates multiple new attack vectors to emerge effortlessly.As such,existing intrusion detection systems suffer from performance degradation mainly because of insufficient considerations and poorly modeled detection systems.To address this problem,we designed a blended threat detection approach,considering the possible impact and dimensionality of new attack surfaces due to the aforementioned convergence.We collectively refer to the convergence of different technology sectors as the internet of blended environment.The proposed approach encompasses an ensemble of heterogeneous probabilistic autoencoders that leverage the corresponding advantages of a convolutional variational autoencoder and long short-term memory variational autoencoder.An extensive experimental analysis conducted on the TON_IoT dataset demonstrated 96.02%detection accuracy.Furthermore,performance of the proposed approach was compared with various single model(autoencoder)-based network intrusion detection approaches:autoencoder,variational autoencoder,convolutional variational autoencoder,and long short-term memory variational autoencoder.The proposed model outperformed all compared models,demonstrating F1-score improvements of 4.99%,2.25%,1.92%,and 3.69%,respectively.