• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种基于注意力机制、双向门控循环单元(BiGRU)和卷积神经网络(Inception-CNN)的工业物联网(IIoT)入侵检测改进方法。

An improved intrusion detection method for IIoT using attention mechanisms, BiGRU, and Inception-CNN.

作者信息

Yang Kai, Wang JiaMing, Li MinJing

机构信息

School of Computer, Xijing University, Xi'an, 710123, China.

出版信息

Sci Rep. 2024 Aug 20;14(1):19339. doi: 10.1038/s41598-024-70094-2.

DOI:10.1038/s41598-024-70094-2
PMID:39164384
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11335856/
Abstract

In the field of Industrial Internet of Things (IIoT), existing intrusion detection models face challenges in three main areas: low accuracy in detecting attack traffic, feature redundancy when dealing with high-dimensional and complex attack traffic, making it difficult to capture critical information, and a tendency to favor learning common categories while neglecting rare categories when handling imbalanced data. To tackle these challenges, this study introduces an intrusion detection method that combines an attention mechanism, Bidirectional Gated Recurrent Units (BiGRU), and Inception Convolutional Neural Network (Inception-CNN) to enhance the model's detection rate. Simultaneously, the method employs a mixed sampling strategy for data resampling to address the bias learning issue caused by data imbalance. Additionally, the method employs a hybrid sampling strategy for data resampling to address the bias learning issue caused by data imbalance. It also incorporates denoising techniques to handle potential dataset noise introduced by hybrid sampling. Furthermore, a feature selection method combining Pearson correlation coefficient and Random Forest is applied to eliminate feature redundancy, enhancing the model's ability to capture crucial information from high-dimensional attack traffic. Experimental validation on internationally recognized datasets (Edge-IIoTset, CIC-IDS2017, and CIC IoT 2023) affirms the reliability of the proposed intrusion detection method. This approach underscores the significance of intrusion detection in the security of Industrial IoT and showcases its potential in addressing pertinent challenges in network security.

摘要

在工业物联网(IIoT)领域,现有的入侵检测模型在三个主要方面面临挑战:检测攻击流量的准确性低;处理高维复杂攻击流量时存在特征冗余,难以捕捉关键信息;处理不平衡数据时倾向于学习常见类别而忽视罕见类别。为应对这些挑战,本研究引入了一种入侵检测方法,该方法结合了注意力机制、双向门控循环单元(BiGRU)和Inception卷积神经网络(Inception-CNN),以提高模型的检测率。同时,该方法采用混合采样策略对数据进行重采样,以解决数据不平衡导致的偏差学习问题。此外,该方法采用混合采样策略对数据进行重采样,以解决数据不平衡导致的偏差学习问题。它还采用去噪技术来处理混合采样引入的潜在数据集噪声。此外,应用了一种结合皮尔逊相关系数和随机森林的特征选择方法来消除特征冗余,增强模型从高维攻击流量中捕捉关键信息的能力。在国际认可的数据集(Edge-IIoTset、CIC-IDS2017和CIC IoT 2023)上进行的实验验证证实了所提出的入侵检测方法的可靠性。这种方法强调了入侵检测在工业物联网安全中的重要性,并展示了其在解决网络安全相关挑战方面的潜力。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd95/11335856/f07052237f21/41598_2024_70094_Fig14_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd95/11335856/18935cf14091/41598_2024_70094_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd95/11335856/acd005b50781/41598_2024_70094_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd95/11335856/eb1d5d59146d/41598_2024_70094_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd95/11335856/c9953e064525/41598_2024_70094_Figa_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd95/11335856/0abbe2aaf554/41598_2024_70094_Figb_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd95/11335856/edf966f01ede/41598_2024_70094_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd95/11335856/07506ac7a803/41598_2024_70094_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd95/11335856/960e751fed26/41598_2024_70094_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd95/11335856/9b5b6be603e4/41598_2024_70094_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd95/11335856/90a49163813c/41598_2024_70094_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd95/11335856/02d71188b3a5/41598_2024_70094_Figc_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd95/11335856/fdf4cbc06021/41598_2024_70094_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd95/11335856/1dae0365aec2/41598_2024_70094_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd95/11335856/3fa80e20960d/41598_2024_70094_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd95/11335856/f07052237f21/41598_2024_70094_Fig14_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd95/11335856/18935cf14091/41598_2024_70094_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd95/11335856/acd005b50781/41598_2024_70094_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd95/11335856/eb1d5d59146d/41598_2024_70094_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd95/11335856/c9953e064525/41598_2024_70094_Figa_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd95/11335856/0abbe2aaf554/41598_2024_70094_Figb_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd95/11335856/edf966f01ede/41598_2024_70094_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd95/11335856/07506ac7a803/41598_2024_70094_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd95/11335856/960e751fed26/41598_2024_70094_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd95/11335856/9b5b6be603e4/41598_2024_70094_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd95/11335856/90a49163813c/41598_2024_70094_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd95/11335856/02d71188b3a5/41598_2024_70094_Figc_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd95/11335856/fdf4cbc06021/41598_2024_70094_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd95/11335856/1dae0365aec2/41598_2024_70094_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd95/11335856/3fa80e20960d/41598_2024_70094_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd95/11335856/f07052237f21/41598_2024_70094_Fig14_HTML.jpg

相似文献

1
An improved intrusion detection method for IIoT using attention mechanisms, BiGRU, and Inception-CNN.一种基于注意力机制、双向门控循环单元(BiGRU)和卷积神经网络(Inception-CNN)的工业物联网(IIoT)入侵检测改进方法。
Sci Rep. 2024 Aug 20;14(1):19339. doi: 10.1038/s41598-024-70094-2.
2
Network Intrusion Detection Technology Based on Convolutional Neural Network and BiGRU.基于卷积神经网络和双向门控循环单元的网络入侵检测技术
Comput Intell Neurosci. 2022 Apr 12;2022:1942847. doi: 10.1155/2022/1942847. eCollection 2022.
3
Improved Intrusion Detection Based on Hybrid Deep Learning Models and Federated Learning.基于混合深度学习模型和联邦学习的改进入侵检测
Sensors (Basel). 2024 Jun 20;24(12):4002. doi: 10.3390/s24124002.
4
A novel intrusion detection framework for optimizing IoT security.一种用于优化物联网安全的新型入侵检测框架。
Sci Rep. 2024 Sep 18;14(1):21789. doi: 10.1038/s41598-024-72049-z.
5
Focal Causal Temporal Convolutional Neural Networks: Advancing IIoT Security with Efficient Detection of Rare Cyber-Attacks.聚焦因果时间卷积神经网络:通过高效检测罕见网络攻击提升工业物联网安全
Sensors (Basel). 2024 Sep 30;24(19):6335. doi: 10.3390/s24196335.
6
A hybrid feature weighted attention based deep learning approach for an intrusion detection system using the random forest algorithm.基于混合特征加权注意力的深度学习方法与随机森林算法在入侵检测系统中的应用。
PLoS One. 2024 May 23;19(5):e0302294. doi: 10.1371/journal.pone.0302294. eCollection 2024.
7
ROAST-IoT: A Novel Range-Optimized Attention Convolutional Scattered Technique for Intrusion Detection in IoT Networks.ROAST-IoT:一种用于物联网网络入侵检测的新型距离优化注意力卷积散射技术。
Sensors (Basel). 2023 Sep 23;23(19):8044. doi: 10.3390/s23198044.
8
Deep Complex Gated Recurrent Networks-Based IoT Network Intrusion Detection Systems.基于深度复杂门控循环网络的物联网网络入侵检测系统
Sensors (Basel). 2024 Sep 13;24(18):5933. doi: 10.3390/s24185933.
9
Using Embedded Feature Selection and CNN for Classification on CCD-INID-V1-A New IoT Dataset.利用嵌入式特征选择和卷积神经网络对 CCD-INID-V1-新物联网数据集进行分类。
Sensors (Basel). 2021 Jul 15;21(14):4834. doi: 10.3390/s21144834.
10
Enhanced Network Intrusion Detection System for Internet of Things Security Using Multimodal Big Data Representation with Transfer Learning and Game Theory.基于多模态大数据表征、迁移学习和博弈论的物联网安全增强型网络入侵检测系统
Sensors (Basel). 2024 Jun 26;24(13):4152. doi: 10.3390/s24134152.

引用本文的文献

1
Research on Network Intrusion Detection Model Based on Hybrid Sampling and Deep Learning.基于混合采样与深度学习的网络入侵检测模型研究
Sensors (Basel). 2025 Mar 4;25(5):1578. doi: 10.3390/s25051578.

本文引用的文献

1
A lightweight intrusion detection method for IoT based on deep learning and dynamic quantization.一种基于深度学习和动态量化的物联网轻量级入侵检测方法。
PeerJ Comput Sci. 2023 Sep 22;9:e1569. doi: 10.7717/peerj-cs.1569. eCollection 2023.
2
CICIoT2023: A Real-Time Dataset and Benchmark for Large-Scale Attacks in IoT Environment.CICIoT2023:物联网环境中大规模攻击的实时数据集和基准
Sensors (Basel). 2023 Jun 26;23(13):5941. doi: 10.3390/s23135941.
3
A Systematic Literature Review on Machine Learning and Deep Learning Approaches for Detecting DDoS Attacks in Software-Defined Networking.
软件定义网络中基于机器学习和深度学习的 DDoS 攻击检测方法的系统文献综述
Sensors (Basel). 2023 May 1;23(9):4441. doi: 10.3390/s23094441.
4
Enhancing Intrusion Detection Systems for IoT and Cloud Environments Using a Growth Optimizer Algorithm and Conventional Neural Networks.利用增长优化器算法和传统神经网络增强物联网和云环境中的入侵检测系统。
Sensors (Basel). 2023 Apr 30;23(9):4430. doi: 10.3390/s23094430.
5
Enhanced Intrusion Detection with Data Stream Classification and Concept Drift Guided by the Incremental Learning Genetic Programming Combiner.基于数据流分类和概念漂移的增量学习遗传编程组合器的增强入侵检测。
Sensors (Basel). 2023 Apr 4;23(7):3736. doi: 10.3390/s23073736.
6
Multi-scale ResNet and BiGRU automatic sleep staging based on attention mechanism.基于注意力机制的多尺度 ResNet 和 BiGRU 自动睡眠分期。
PLoS One. 2022 Jun 16;17(6):e0269500. doi: 10.1371/journal.pone.0269500. eCollection 2022.
7
Multi-attack and multi-classification intrusion detection for vehicle-mounted networks based on mosaic-coded convolutional neural network.基于马赛克编码卷积神经网络的车载网络多攻击多分类入侵检测
Sci Rep. 2022 Apr 15;12(1):6295. doi: 10.1038/s41598-022-10200-4.
8
Intrusion Detection System in the Advanced Metering Infrastructure: A Cross-Layer Feature-Fusion CNN-LSTM-Based Approach.高级计量基础设施中的入侵检测系统:一种基于跨层特征融合的 CNN-LSTM 方法。
Sensors (Basel). 2021 Jan 18;21(2):626. doi: 10.3390/s21020626.