• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

FFL-IDS:一种基于雾计算的联邦学习入侵检测系统,用于应对工业物联网中的干扰和欺骗攻击。

FFL-IDS: A Fog-Enabled Federated Learning-Based Intrusion Detection System to Counter Jamming and Spoofing Attacks for the Industrial Internet of Things.

作者信息

Rehman Tayyab, Tariq Noshina, Khan Farrukh Aslam, Rehman Shafqat Ur

机构信息

Department of Information Engineering, Computer Science, and Mathematics, University of L'Aquila, 67100 L'Aquila, Italy.

Department of Artificial Intelligence and Data Science, National University of Computer and Emerging Sciences, Islamabad 44000, Pakistan.

出版信息

Sensors (Basel). 2024 Dec 24;25(1):10. doi: 10.3390/s25010010.

DOI:10.3390/s25010010
PMID:39796800
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11722882/
Abstract

The Internet of Things (IoT) contains many devices that can compute and communicate, creating large networks. Industrial Internet of Things (IIoT) represents a developed application of IoT, connecting with embedded technologies in production in industrial operational settings to offer sophisticated automation and real-time decisions. Still, IIoT compels significant cybersecurity threats beyond jamming and spoofing, which could ruin the critical infrastructure. Developing a robust Intrusion Detection System (IDS) addresses the challenges and vulnerabilities present in these systems. Traditional IDS methods have achieved high detection accuracy but need improved scalability and privacy issues from large datasets. This paper proposes a Fog-enabled Federated Learning-based Intrusion Detection System (FFL-IDS) utilizing Convolutional Neural Network (CNN) that mitigates these limitations. This framework allows multiple parties in IIoT networks to train deep learning models with data privacy preserved and low-latency detection ensured using fog computing. The proposed FFL-IDS is validated on two datasets, namely the Edge-IIoTset, explicitly tailored to environments with IIoT, and CIC-IDS2017, comprising various network scenarios. On the Edge-IIoTset dataset, it achieved 93.4% accuracy, 91.6% recall, 88% precision, 87% F1 score, and 87% specificity for jamming and spoofing attacks. The system showed better robustness on the CIC-IDS2017 dataset, achieving 95.8% accuracy, 94.9% precision, 94% recall, 93% F1 score, and 93% specificity. These results establish the proposed framework as a scalable, privacy-preserving, high-performance solution for securing IIoT networks against sophisticated cyber threats across diverse environments.

摘要

物联网(IoT)包含许多能够进行计算和通信的设备,从而形成大型网络。工业物联网(IIoT)是物联网的一种发达应用,它在工业运营环境中与生产中的嵌入式技术相连接,以提供复杂的自动化和实时决策。然而,工业物联网除了面临干扰和欺骗之外,还面临重大的网络安全威胁,这可能会破坏关键基础设施。开发一个强大的入侵检测系统(IDS)可以应对这些系统中存在的挑战和漏洞。传统的IDS方法已经取得了很高的检测准确率,但在处理来自大型数据集的可扩展性和隐私问题方面仍需改进。本文提出了一种基于雾计算的联邦学习入侵检测系统(FFL-IDS),该系统利用卷积神经网络(CNN)来缓解这些限制。这个框架允许工业物联网网络中的多个参与方在保留数据隐私的情况下训练深度学习模型,并使用雾计算确保低延迟检测。所提出的FFL-IDS在两个数据集上进行了验证,即专门为工业物联网环境量身定制的Edge-IIoTset和包含各种网络场景的CIC-IDS2017。在Edge-IIoTset数据集上,对于干扰和欺骗攻击,它实现了93.4%的准确率、91.6%的召回率、88%的精确率、87%的F1分数和87%的特异性。该系统在CIC-IDS2017数据集上表现出更好的鲁棒性,实现了95.8%的准确率、94.9%的精确率、94%的召回率、93%的F1分数和93%的特异性。这些结果表明,所提出的框架是一种可扩展的、保护隐私的、高性能的解决方案,可用于保护工业物联网网络免受各种环境中复杂网络威胁的侵害。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/61e3/11722882/44021783efd5/sensors-25-00010-g019.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/61e3/11722882/f5df75092b86/sensors-25-00010-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/61e3/11722882/bb64e413450c/sensors-25-00010-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/61e3/11722882/a26c11745456/sensors-25-00010-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/61e3/11722882/616c7972a387/sensors-25-00010-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/61e3/11722882/6c28cb645b83/sensors-25-00010-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/61e3/11722882/358c47431beb/sensors-25-00010-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/61e3/11722882/f5db96231b91/sensors-25-00010-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/61e3/11722882/80d9a2242fcc/sensors-25-00010-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/61e3/11722882/2f97e7c65f8e/sensors-25-00010-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/61e3/11722882/f4caf19f14e0/sensors-25-00010-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/61e3/11722882/b75900327629/sensors-25-00010-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/61e3/11722882/55b5b56a6f7a/sensors-25-00010-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/61e3/11722882/31d3fe294018/sensors-25-00010-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/61e3/11722882/fa2665998456/sensors-25-00010-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/61e3/11722882/cbbb76331213/sensors-25-00010-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/61e3/11722882/2f432212dbb3/sensors-25-00010-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/61e3/11722882/d6ec67d5fedf/sensors-25-00010-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/61e3/11722882/0c836d3c4133/sensors-25-00010-g018.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/61e3/11722882/44021783efd5/sensors-25-00010-g019.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/61e3/11722882/f5df75092b86/sensors-25-00010-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/61e3/11722882/bb64e413450c/sensors-25-00010-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/61e3/11722882/a26c11745456/sensors-25-00010-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/61e3/11722882/616c7972a387/sensors-25-00010-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/61e3/11722882/6c28cb645b83/sensors-25-00010-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/61e3/11722882/358c47431beb/sensors-25-00010-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/61e3/11722882/f5db96231b91/sensors-25-00010-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/61e3/11722882/80d9a2242fcc/sensors-25-00010-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/61e3/11722882/2f97e7c65f8e/sensors-25-00010-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/61e3/11722882/f4caf19f14e0/sensors-25-00010-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/61e3/11722882/b75900327629/sensors-25-00010-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/61e3/11722882/55b5b56a6f7a/sensors-25-00010-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/61e3/11722882/31d3fe294018/sensors-25-00010-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/61e3/11722882/fa2665998456/sensors-25-00010-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/61e3/11722882/cbbb76331213/sensors-25-00010-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/61e3/11722882/2f432212dbb3/sensors-25-00010-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/61e3/11722882/d6ec67d5fedf/sensors-25-00010-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/61e3/11722882/0c836d3c4133/sensors-25-00010-g018.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/61e3/11722882/44021783efd5/sensors-25-00010-g019.jpg

相似文献

1
FFL-IDS: A Fog-Enabled Federated Learning-Based Intrusion Detection System to Counter Jamming and Spoofing Attacks for the Industrial Internet of Things.FFL-IDS:一种基于雾计算的联邦学习入侵检测系统,用于应对工业物联网中的干扰和欺骗攻击。
Sensors (Basel). 2024 Dec 24;25(1):10. doi: 10.3390/s25010010.
2
A hybrid AI based framework for enhancing security in satellite based IoT networks using high performance computing architecture.一种基于混合人工智能的框架,用于使用高性能计算架构增强基于卫星的物联网网络的安全性。
Sci Rep. 2024 Dec 28;14(1):30695. doi: 10.1038/s41598-024-78262-0.
3
Using Embedded Feature Selection and CNN for Classification on CCD-INID-V1-A New IoT Dataset.利用嵌入式特征选择和卷积神经网络对 CCD-INID-V1-新物联网数据集进行分类。
Sensors (Basel). 2021 Jul 15;21(14):4834. doi: 10.3390/s21144834.
4
Improved Intrusion Detection Based on Hybrid Deep Learning Models and Federated Learning.基于混合深度学习模型和联邦学习的改进入侵检测
Sensors (Basel). 2024 Jun 20;24(12):4002. doi: 10.3390/s24124002.
5
A Scalable Approach to Internet of Things and Industrial Internet of Things Security: Evaluating Adaptive Self-Adjusting Memory K-Nearest Neighbor for Zero-Day Attack Detection.一种适用于物联网和工业物联网安全的可扩展方法:评估用于零日攻击检测的自适应自调整内存K近邻算法
Sensors (Basel). 2025 Jan 2;25(1):216. doi: 10.3390/s25010216.
6
Customised Intrusion Detection for an Industrial IoT Heterogeneous Network Based on Machine Learning Algorithms Called FTL-CID.基于机器学习算法的工业物联网异构网络的定制入侵检测,称为 FTL-CID。
Sensors (Basel). 2022 Dec 28;23(1):321. doi: 10.3390/s23010321.
7
BFLIDS: Blockchain-Driven Federated Learning for Intrusion Detection in IoMT Networks.BFLIDS:物联网医疗网络中用于入侵检测的区块链驱动联邦学习
Sensors (Basel). 2024 Jul 15;24(14):4591. doi: 10.3390/s24144591.
8
A Dynamic IIoT Framework Based on the Publish-Subscribe Paradigm.一种基于发布-订阅范式的动态工业物联网框架。
Sensors (Basel). 2023 Dec 14;23(24):9829. doi: 10.3390/s23249829.
9
An Adaptive Framework for Intrusion Detection in IoT Security Using MAML (Model-Agnostic Meta-Learning).一种使用MAML(模型无关元学习)的物联网安全入侵检测自适应框架。
Sensors (Basel). 2025 Apr 15;25(8):2487. doi: 10.3390/s25082487.
10
ROAST-IoT: A Novel Range-Optimized Attention Convolutional Scattered Technique for Intrusion Detection in IoT Networks.ROAST-IoT:一种用于物联网网络入侵检测的新型距离优化注意力卷积散射技术。
Sensors (Basel). 2023 Sep 23;23(19):8044. doi: 10.3390/s23198044.

引用本文的文献

1
A Multi-Class Intrusion Detection System for DDoS Attacks in IoT Networks Using Deep Learning and Transformers.一种使用深度学习和Transformer的物联网网络中针对DDoS攻击的多类入侵检测系统。
Sensors (Basel). 2025 Aug 6;25(15):4845. doi: 10.3390/s25154845.

本文引用的文献

1
BFT-IoMT: A Blockchain-Based Trust Mechanism to Mitigate Sybil Attack Using Fuzzy Logic in the Internet of Medical Things.BFT-IoMT:一种基于区块链的信任机制,利用模糊逻辑在医疗物联网中缓解 Sybil 攻击。
Sensors (Basel). 2023 Apr 25;23(9):4265. doi: 10.3390/s23094265.
2
A Trust-Based Model for Secure Routing against RPL Attacks in Internet of Things.一种基于信任的物联网中抵御RPL攻击的安全路由模型
Sensors (Basel). 2022 Sep 17;22(18):7052. doi: 10.3390/s22187052.
3
A Deep Learning-Based Privacy-Preserving Model for Smart Healthcare in Internet of Medical Things Using Fog Computing.
一种基于深度学习的、利用雾计算在医疗物联网中实现智能医疗保健的隐私保护模型。
Wirel Pers Commun. 2022;126(3):2379-2401. doi: 10.1007/s11277-021-09323-0. Epub 2022 Aug 30.
4
THC-RPL: A lightweight Trust-enabled routing in RPL-based IoT networks against Sybil attack.THC-RPL:一种基于 RPL 的物联网网络中的轻量级信任启用路由,用于防范 Sybil 攻击。
PLoS One. 2022 Jul 28;17(7):e0271277. doi: 10.1371/journal.pone.0271277. eCollection 2022.
5
A Hybrid Intelligent Framework to Combat Sophisticated Threats in Secure Industries.一种用于打击安全行业复杂威胁的混合智能框架。
Sensors (Basel). 2022 Feb 17;22(4):1582. doi: 10.3390/s22041582.