<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">SID-RIS: Cascaded Intrusion Detection System for Industrial Internet of Things</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">P</forename><forename type="middle">L S</forename><surname>Jayalaxmi</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">School of Computer Science and Engineering Lovely Professional</orgName>
								<orgName type="institution">University</orgName>
								<address>
									<region>Punjab</region>
									<country key="IN">India</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Rahul</forename><surname>Saha</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">School of Computer Science and Engineering Lovely Professional</orgName>
								<orgName type="institution">University</orgName>
								<address>
									<region>Punjab</region>
									<country key="IN">India</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Lalit</forename><surname>Garg</surname></persName>
							<affiliation key="aff1">
								<orgName type="department">Department of Computer Information System (CIS) Faculty of Information Communication Technology (ICT</orgName>
								<orgName type="institution">University of Malta</orgName>
								<address>
									<country key="MT">Malta</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Gulshan</forename><surname>Kumar</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">School of Computer Science and Engineering Lovely Professional</orgName>
								<orgName type="institution">University</orgName>
								<address>
									<region>Punjab</region>
									<country key="IN">India</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">SID-RIS: Cascaded Intrusion Detection System for Industrial Internet of Things</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">664DE761F088D186730A891E9E20399F</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-23T20:40+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Industrial Control Systems (ICS)</term>
					<term>Supervisory Control and Data Acquisition</term>
					<term>Intrusion Detection</term>
					<term>Deep Learning</term>
					<term>False-Positive</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The remote accessibility of Industrial Control System (ICS) with the emergence of smart industrial infrastructure has initiated various vulnerabilities and security breaches in industrial networks and Supervisory Control and Data Acquisition (SCADA). The development of specific security mechanisms can reduce the vulnerabilities of physical and data explosions with less human intervention and control the environmental and financial loss. Traditional Intrusion Detection Systems (IDSs) are very much prone to false-positive rates, high implementation costs, and low-speed models. We propose a novel Smart Intrusion Detection with Risk Identification System (SID-RIS) incorporated with Deep Learning (DL) algorithms. The proposed model is trained and tested on BoT-IoT and KDD+ datasets for the optimal features. The results show that the model is most suitable for classifying the anomaly behavior of the data with high accuracy and low false rates.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Importance of security in IIOT</head><p>The increased connectivity of smart machines raises the wagers. The first alarm situation to breach industrial security was in 2009, when the speed of the centrifuge nuclear enrichment plant was modified to spin out of control by a Stuxnet malware. This was introduced via flash drive for a stand-alone network, which spread automatically across the networks <ref type="bibr" target="#b0">[1]</ref>. A new malware called Trident destabilizes Safety Instrumented System (SIS) and provides a path for hackers to destroy the files by feeding false data <ref type="bibr" target="#b1">[2]</ref>. A strong, smart, and safe shield is very much essential to reduce industrial espionage, IP leakage, information theft, which may lead to the production sabotage. Industrial Control Systems (ICSs) have unique vulnerability, as each connected devices represent a potential risk in each layer of the network, which is particularly susceptible to cyberattack. The major cause of hazardous issues in the industrial sector is the incompatible operation system, outdated Programmable Logic Controllers (PLCs), and Human-Machine Interfaces (HMIs) in an isolated environment with a lack of regular updates on attack patterns, and poor standards <ref type="bibr" target="#b2">[3]</ref>. Table <ref type="table" target="#tab_0">1</ref> provide a detailed list of IoT attack and the proposed counter measures to mitigate the complications of the attack. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.1.">Introduction -IDPS</head><p>An Intrusion Detection System (IDS) is a network security technology built to detect vulnerable exploits in the cyber world. IDS is classified in two forms based on the detection component as Network Intrusion Detection System (NIDS) and Host-based Intrusion Detection System (HIDS). A NIDS observes, monitors, and analyzes the network traffic to identify suspicious events, whereas HIDS trace abnormal activities and report to the security server. Anomaly Intrusion Detection (AID) observes the behavior by scanning the ports. Signature Intrusion Detection (SID) matches predefined patterns based on vulnerability and exploit are used to defend the situation <ref type="bibr" target="#b4">[5]</ref>. SID methods have high rate of accuracy in classifying known attacks and AID methods are popular in identifying zero-day attacks; Both of the methods pro-duce high false-positive rates. IDS detects and reports to the security system but, lacks in preventing the exploitation, neither raise any automatic action to mitigate the risk <ref type="bibr" target="#b5">[6]</ref>. Nowadays Intrusion Detection and Prevention System (IDPS) has become the dominant deployment option for the security system <ref type="bibr" target="#b6">[7]</ref>. Feature selection, compatibility, and unavailability of the labeled dataset are the primary challenges faced by the current IDS models. Immense efforts are required to collect labeled datasets from real-time network traffic and preserve the confidentiality of the internal data. Feature selection plays a vital role in the development of the classification model, to learn good features on a limited amount of labeled data in supervised classification <ref type="bibr" target="#b7">[8]</ref>. These features can be applied for other classification models with a small amount of dataset. Deep learning techniques are more popular for feature reduction and classification; these methods are successfully applied in image, audio, text, and numerical dataset for developing application models <ref type="bibr" target="#b8">[9]</ref>. In this present work, we propose a Deep Learning (DL)-based NIDS model for classification and identifying the most relevant features and detecting the anomalies. We call our proposed model of intrusion as Smart Intrusion Detection with Risk Identification System (SID-RIS). The model is trained and verified on the KDD+ datasets and UNSW-BoT-IoT dataset. We have presented a comparative analysis with the existing techniques to evaluate the efficiency of our model.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.2.">Organization</head><p>The remaining paper is organized in four sections. In Section 2, a few latest and closely related work is discussed. Section 3 presents an overview of the proposed model and the risk factor analysis with the implementation procedures on both datasets. The results and comparative analysis of the model are discussed in Section 4. We conclude our work with future scope in Section 5.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Related Work</head><p>Focusing on security applications, DL techniques with remarkable quality of self-learning are beneficial to developing intrusion detection models. These models result in low false rates and high accuracy as compared to traditional machine learning techniques. The standard Neural Network (NN) architecture is created with a multi-layer perceptron using a liner stack classifier. Raw data in the form of numbers/images/audio are fed into the neurons as input represented with x1, x2, x3,..., xn. Each input is multiplied by weights (w1,w2,w3,…,wn) and passed to an activation function which maps the input signals into an output signal.</p><formula xml:id="formula_0">𝑧 = 𝑓(𝑏 + ∑ 𝑥 𝑖 𝑤 𝑖 𝑁 𝑖=1 )<label>(1)</label></formula><p>In Equation <ref type="formula" target="#formula_0">1</ref>, x represents the inputs, w represents weights to be added for each input, z is used for output, b represents bias, and f represents the activation function. The model adjusts the weights and repeats the task to improve the accuracy using back-propagation.</p><p>Convolutional Neural Network (CNN) and Recurrent Neural Network (RNN) are the most popular methods used for detecting malware activities with self-learning techniques <ref type="bibr" target="#b12">[13]</ref>. ANN is emphatic in monitoring network traffic and detecting Imminent attacks. ANN, CNN, and Deep Neural Network (DNN) are some of the supervised instance learning techniques trained with feed-forward neural networks. Yazan et al. <ref type="bibr" target="#b9">[10]</ref> propose a Spider Monkey Optimization (SMO) algorithm for dimensionality reduction and the Stacked-Deep Polynomial Network (SDPN) for attack classification. The Deep Feature Embedding Learning (DFEL) model has been compared with KNNs, DT, and SVM and results with a 99.14% F1 score. Olakunie Ibitoye et al. <ref type="bibr" target="#b10">[11]</ref>. compared a Feedforward neural network model with a self-normalizing neural network model for BoT-IoT dataset and resulted in 9% higher performance accuracy of SNN IDS than FNN IDS. A Generic algorithm-based Deep belief network model was proposed by Zhang et al. <ref type="bibr" target="#b11">[12]</ref>. The model structure was integrated with a selection of features with crossover, mutation, and elite retention technique of generic algorithm. once the maximal algebraic value is reached the optimal structure is created. Restricted Boltzmann Machine (RBM) and Backpropagation network (BPN) are used for classification <ref type="bibr" target="#b11">[12]</ref>. Roopak et al. <ref type="bibr" target="#b12">[13]</ref> pro-posed four different classification deep learning models as MLP (Multilayer Perceptron), 1d-CNN, LSTM, CNN+LSTM with a comparative analysis on machine learning technique. CNN+LSTM, LSTM, 1d-CNN techniques have high accuracy rate than SVM, Naive Bayes, and Random Forest machine learning techniques for the CICIDS2017 dataset. CNN+LSTM remains the best-proposed technique with 97.15% accuracy where LSTM results in 96.24% and MLP results in 13.66% false rates. Thamilarasu G. et al. <ref type="bibr" target="#b13">[14]</ref> propose a three-layer framework with network connection phase, anomaly detection phase, and the mitigation phase to identify, analyze, and reduce the risk factor using CNN techniques. Another integrated technique using LSTM and CNN as Hybrid CNN model testing on UNSW dataset is proposed by S.smys et al. <ref type="bibr" target="#b14">[15]</ref>. LSTM is used for feature extraction and CNN for intrusion detection. The model gave an excellent performance with a 2.19 sec training time. Another Deep belief network model tested on a real-time dataset proposed by Balakrishnan et al. <ref type="bibr" target="#b15">[16]</ref>. This model enhances the security network compared to Domain Generation Algorithm (DGA) with 0.997 highest precision. Chao Liang et al. <ref type="bibr" target="#b16">[17]</ref> propose a multi-agent system with the blockchain and deep learning (DNN) algorithm, tested for the NSL-KDD dataset, and resulted in 91.50% accurate on testing. The Transient Search Optimization (TSO) algorithm by Fatani et al. <ref type="bibr" target="#b22">[23]</ref> maintains the balancing between exploitation and exploration phases. The model is tested on the most popular IoT datasets including KDDCUP-99, NSL-KDD, BoT-IoT, and CICIDS-2017. It achieves higher accuracy compared to several existing approaches.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">SID-RIS Model</head><p>The traditional architecture of the IDS model is prone to security leaks. The multi-layer recursive structure analyzes the data at various levels and makes the model effective to handle the minute complications. The IoT system is exposed to multiple devices with different processing frameworks connected to various locations. A single layer model lacks in generating enhanced performance, as it is restricted with the scope of the connected components. The multi-layer model is distributed across the system and executes the processes at each level covering the major to minor values based on the state of the system. A self-trained security model with previous inputs minimizes human interaction. In this section, we focus on the proposed methodology. The data set used in building the detection model, the feature extraction techniques, and the multi-layered Cascade detection and classification algorithm are explained in sequence in this section.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Dataset</head><p>We use NSL-KDD and UNSW-2018-BoT-IoT datasets in the present work. KDD Cup dataset is prepared using the network traffic captured by the 1998 DARPA IDS evaluation program <ref type="bibr" target="#b23">[24]</ref>. The BoT-IoT dataset is collected from Cyber Range Lab of UNSW Canberra <ref type="bibr" target="#b24">[25]</ref>.</p><p>KDD + Dataset We have used the NSLKDD+ dataset that has 41 labeled input features with binary and multi-class attack classification. A total of 38 traffic classes with 21 attack classes are available in the test data, from which 16 attacks and 1 normal class are considered for training. The attack records are grouped into four major classes as DoS, Probing, user-to-root (U2R), and root-to-local (R2L) <ref type="bibr" target="#b23">[24]</ref>. We have selected KDD+ dataset with a total of 125973 records of which 58630 are attack values and 67343 are normal records. UNSW-BoT-IoT dataset The BoT-IoT dataset is collected from the Cyber Range Lab of UNSW Canberra. The environment with the combination of normal and attack traffic is configured and collected in various formats. The dataset is created in three categories: i) entire dataset with all features, ii) 5% of data with training and testing files with all the features, and iii) 10-best features with training and testing splits. The dataset has been classified with nine types of cyber-attacks and is represented with 46 labeled feature classes. To test the efficiency of the model we have selected a 5% best-featured dataset which has 10,48,457 attack records and 118 normal values <ref type="bibr" target="#b24">[25]</ref>. The dataset supports four attack classes as DDoS, DoS, Normal, reconnaissance, and theft. Table <ref type="table" target="#tab_1">2</ref> displays various attack classes and number of records in each class for both the datasets. 70% of the data is considered as the training data, 15% for the validation, and 15% for the testing. SID-RIS focuses on multi-class classification to train and trace various cyberattacks. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Data Normalization</head><p>As the first step of normalization, we use the fill missing function to replace all the empty values with standard and constant values. In the second step, all the categorical values (NaN) are converted into numerical identities for easy prediction. We have applied one hot-encoding technique for conversion. This technique processes the categorical variable and converts it into a numerical representation. But at the same time natural ordering between categories with integers may result in poor performance or unexpected results, we have converted the string values to a new binary variable and added for each unique integer value. The BoT-IoT dataset contains three categorical features as prototype, attack category, and sub category (NaN values) which are encoded into numerical form before producing as input to the network model. Normal values are indicated with 0 and the attack values as 1 or any categorical integer value based on the class.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.">Feature Extraction</head><p>In this study, we are extending our previous experiment <ref type="bibr" target="#b25">[26]</ref> in which we have concluded that the model tested with optimal features resulted in a minimum error, compared to the model trained for the entire dataset. In this study, we are using the best subset evaluated from feature reduction techniques. Then we train the sample with Cascading Feed Forward Back Propagation (CFFBP) classification and detection technique. We have selected the 10 best-featured samples provided by the BoT-IoT dataset, and for the KDD dataset, we have used CFS-Subset-Evaluator, a feature reduction algorithm, that results in six best features from 41 labeled values. The CFS subset evaluation technique generates a subset of attributes with the individual predictive ability of each feature, along with the degree of redundancy between them. The resulted features are highly correlated with the target class and have low inter co-relation with other input values. Further to improve the training efficiency and speed up the detection process, we have used the encoded values as input for detection models generated from the Auto Encoder (AE) technique. AE reduces the given input into the lower-dimensional format and regenerates the output as a new representation. To replicate the input vector against the output layer, and train the AE model, we implement a back-propagation algorithm. For a given input X and reconstruction result as x, the network is trained by minimizing the error L (x, 𝒙 ^)</p><p>to measure the variation between the original input and the encoded output. We have trained AE with 25 hidden layers using the scaled conjugate gradient training algorithm. The model performance is evaluated using Mean Square Error (MSE) with L2 sparsity regularizes, the model results in with 6.66% MSE.</p><p>To prevent over-fitting additional information is given to the model in the process of regularization. L2 regression is also considered as ridge regression with the linear regression in Equation 2 and the loss function with L2 norm of the weights represented in Equation <ref type="formula" target="#formula_1">3</ref>.</p><p>𝒙 ^= 𝒘 𝟏 + 𝒙 𝟏 + 𝒘 𝟐 𝒙 𝟐 + ⋯ + 𝒘 𝒏 + 𝒙 𝒏 + 𝒃.</p><p>(2)</p><formula xml:id="formula_1">𝐿𝑜𝑠𝑠 = 𝐸𝑟𝑟𝑜𝑟(𝑥, 𝑥 ^) + 𝜆 ∑ 𝑁 𝑖=1 𝑤 𝑖 2 .<label>(3)</label></formula><p>In the above expression for an auto-encoder model, 𝑥 ^ with x as input variables, w represents the weight, and $b$ represents the bias. We use a loss function to analyze the difference between the true and predicted values. The regularization parameter is represented by λ &gt; 0 $ and ∑ is used to calculate the total loss and predict the efficiency of the model for each input and added weight. The neurons are "inactive" if their output value is close to 0 and active if it is close to 1; we use the sparsity parameter to make it inactive and avoid over-fitting issues. This checks that the average activation of each hidden neuron is close to it, which is a small value close to zero <ref type="bibr" target="#b26">[27]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.4.">Layering in SID-RIS</head><p>We have selected Cascading Feed Forward Back Propagation (CFFBP) method to classify the anomaly and identify the attack and normal packets. As with all other network models, Feed Forward (FF) model consists of a single input layer, multiple hidden layers, and selected output layers. Back Propagation (BP) is used as a learning algorithm to train the network models by updating the weights and calculation the error values to propagate the prior layer. The non-linear transfer function of multiple layers allows one to learn both linear and non-linear relations between input and output vectors <ref type="bibr" target="#b27">[28]</ref>.</p><p>Connecting the input weights from each successive layer is the unique property of the proposed model. Networks with multiple layers have the potential to learn the complex relations between input and output vectors. The model begins with a single input layer and adds multiple connected layers one by one in the process which receives connections from the original input layer and all previously hidden units. A connection from a neuron and multi-layer network is combined with a direct link and shaped through an activation function in the hidden layer <ref type="bibr" target="#b28">[29]</ref>. Perceptions are added one by one in this correlation, it starts with a small number and ends up with a bigger size. Additional connections improve the speed and learning rate. The process is terminated when the net performance is accurate. Such network pattern is called as Cascading Forward Back Propagation Neural Network (CFBPNN). The mathematical expression of CFBPNN is given in Equation <ref type="formula" target="#formula_2">4</ref>.</p><formula xml:id="formula_2">𝑦 = ∑ 𝑛 𝑖=1 𝑓 𝑖 𝑤 𝑖 𝑖 𝑥 𝑖 + 𝑓 0 (∑ 𝑘 𝑗=1 𝑤 𝑗 0 𝑓 𝑗 ℎ (∑ 𝑛 𝑖=1 𝑤 𝑗𝑖 ℎ 𝑥 𝑖 )). (<label>4</label></formula><formula xml:id="formula_3">)</formula><p>In Equation <ref type="formula" target="#formula_2">4</ref>, y represents the output layer, ∑ 𝑛 𝑖=1 is used to calculate the sum of weights and bias of each layer. The special feature of this network is to carry forward the calculated weights and bias by establishing a direct relationship between the input and hidden layers using 𝑓 𝑖 𝑤 𝑖 𝑖 𝑥 𝑖 + 𝑓 0 An activation function is used to train the complex patterns and take decisions for passing the values for the next layers. Figure <ref type="figure" target="#fig_0">1</ref>, represents the internal structure of the cascade model representing the internal connectivity to the weights of the previous layer to next. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.5.">Experimental Setup</head><p>The experiment is conducted on both dataset samples for optimal features adopted from the feature extraction model. The dataset is split into a 70% training set and 15%test set and 15% for validation according to the random data split method. The system is trained using cascading feed-forward network with seven inputs for the KDD+ dataset and 19 input layers for the BoT-IoT dataset. Five hidden layers (10 nodes each) and output layer (1 node) for four attack classes in binary form (0 for normal and 1 for attack) are considered. The model is trained and experimented on an I5 processor (16 GB RAM and 1 TB Octan memory) with a window 10 operating system using MATLAB R2021a environment. Based on the repeated experiments conducted, we have adopted the network model with ideal parameters which produce the highest accuracy and the lowest false rate. We then define the evaluation parameters and finally, discuss the results.</p><p>Various parameters used to activate the network are: i) Data division method: Random (dividerand), ii) no. of Epochs: 1000, iii) transfer function: Transit, iv) training method: Levenberg-Marquardt (trainlm), v) adaption learning function: learngdm, and vi) performance indicator: Mean Square Error (MSE). Cascading model is applied and tested for both the data sets with the same parameters given above. The only change in the size of the input layer is based on the number of features available in the dataset.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.6.">SID-RIS Risk Factor analysis</head><p>To identify the correlation between input and target variables, we have represented a correlation plot for all the six input variables and one target variable for the subset evaluated from KDD+ dataset. The relation between the variable and the impact is displayed in Figure <ref type="figure" target="#fig_3">4</ref>. The diagonal cells represent selfcorrelation. The last column and the row represent the correlation between the variable in a horizontal and vertical direction. From Figure <ref type="figure" target="#fig_3">4a</ref>, we observe that Src-bytes and Dst-Bytes have high impact on the attack types. Diff-RV-rate, srv-error-rate, and logged-in-status variables are having very little impact with zero and negative values for the evaluated subset. Figure <ref type="figure" target="#fig_3">4b</ref> represents the Correlation plot (coorplot) for BoT-IoT dataset with 18 input features and one target value with four classes. It is observed that only seven variables have a positive impact on the target variable and the other ten variables have a negative impact on the attack variable. This experiment helps in tracing the most prominent variable having a high impact on the attack variants. This technique can be further enhanced using the script to develop any prevention model. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Results and Discussion</head><p>The dataset with different input features with variant values is considered for the experiment. The dataset is prepossessed before analyzing self-taught learning on it. Categorical at-tributes with string values are converted into discrete numerical attributes using the one-hot conversion method. As discussed in the methodology section 3.3, optimal features are considered to train and test the model. The testbed is then trained with autoencoders, and the resulted data is used to develop a cascade classification model. These two approaches are applied for the evaluation of NIDSs on the selected samples with a random data split. The proposed model achieved very high accuracy and less false-alarm rates compared to the training implemented for the entire dataset. Cascading model is applied and tested for both datasets with the same parameters. As discussed in <ref type="bibr" target="#b25">[26]</ref>, the detection model is implemented only for the subset, evaluated with best features. This reduces the training time and results in the highest accuracy. Evaluation metrics project the performance of the model, it helps to determine the capabilities and discriminate the model results. We have tested the model for multi classes and analyzed the results using a confusion matrix.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.">Performance Metrics</head><p>A confusion matrix is the most appropriate technique to analyze the performance of the classification model. The results of this technique identify the types of errors encountered by the model in the process of training and testing. The number of incorrect predictions is analyzed for each class assigned to the model with the target variable. The difference in the prediction and actual assumptions are projected in the matrix; it also includes the errors made by the classifier and the category which is wrongly analyzed. The elements of the confusion matrix are used to construct the accuracy of the overall model. The formula to calculate each element of the matrix and the precision is displayed in Figure <ref type="figure" target="#fig_4">5</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>False Negative Rate (FNR):</head><p>The ratio of false cases marked as true.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Accuracy (A):</head><p>The ratio of correctness for the classified samples.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Precision (P):</head><p>The ratio of the true positive samples to predict the positive samples. Recall (R): Represent the ratio of true positive values to the total value. This reflects the model's ability to recognize the attacks from a given class.  The model results in 100\% accuracy for the KDD+ dataset tested on the best features subset, and 99.7\% accuracy for the BoT-IoT dataset. A minimum false rate is observed with 0.3\% for the theft category. The detailed analysis of attack detection ration for each class is given in Figure <ref type="figure" target="#fig_6">7</ref>. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.">Comparative Analysis</head><p>We have tested and compared the model of both the dataset samples and the result matrix is projected in Table <ref type="table" target="#tab_2">3</ref>. The CFBP model is proved more suitable for detecting the attacks with multi-class classification for both the sample datasets. The observational point is that the model shows excellent results for the KDD+ dataset, in which the testing and training are implemented for the subset generated using the feature selection method. The results for the BoT-IoT dataset are quite good compared to other state of art models, the model is most apt in identifying Dos attacks for various samples. There is a slight variation in identification of reconnaissance and theft attack with 0.1%. A detailed projection of the attack class with the resultant matrix is projected in Table <ref type="table" target="#tab_2">3</ref>. The comparison with existing systems is shown in Table <ref type="table" target="#tab_3">4</ref>. The rule-based Decision tree (TDTIDS) model has the highest accuracy of all the existing models <ref type="bibr" target="#b17">[18]</ref> with 99.98%. CFBP model has the benchmark of 100% in the identification of all class attack values. The DBN <ref type="bibr" target="#b11">[12]</ref> and RNNIDS <ref type="bibr" target="#b21">[22]</ref> models have a poor performance comparatively, while the other models' performance are very close to each other. The multi-class feed forward neural network <ref type="bibr" target="#b20">[21]</ref> has a very close accuracy with our CFBNN with a raised recall score but, CFBNN has less FPR which indeed reduces the scope of error. CFBNN performs much better than <ref type="bibr" target="#b13">[14]</ref>, <ref type="bibr" target="#b14">[15]</ref>, <ref type="bibr" target="#b21">[22]</ref>, <ref type="bibr" target="#b17">[18]</ref> on the basis of accuracy, precision, and false rate which are the most important metrics for a detection system. The average false-positive ratio of our model is lower than all these models. However, the disadvantage with the regular deep learning techniques is to determine values with the next layer but, our cascade model has the advantage of processing the previous weight and bias values to the next hidden layers; this improves the detection rate and reduces the error factor. The main goal of CFBNN is to improve the detection rate and reduce the error rate which is successfully accomplished with the six selected features executed in the CFBNN model. The test proves with 100% accuracy and 0% false rates. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusion</head><p>We propose SID-RIS, an intrusion detection model for IIoTs. The purpose of the present study is to improve the detection solution for IoT and IIoT devices and establish an accurate monitoring environment that handles unsafe structure and detect abnormal behavior. SID-RIS is based on deep learning. It classifies the given input based on cascading forward method. A CFS-subset evaluation technique is used to select the optimal features from KDD+ dataset and then process the subset for the training detection model. The model is examined on both KDD+ and BoT-IoT data set and evaluated using the confusion matrix. Our solution, CFBNN achieves better performance in terms of accuracy 100% for the KDD+ dataset, and 99.7% accuracy and 1.1% false rate for BoT-IoT data set for multiclass classification. To identify the risk factor, we have implemented a co-relation plot to trace the impact of the variable with the target and identified three variables for the KDD+ dataset and seven for the BoT-IoT dataset. In the future, we would like to extend our work to experiment with prevention techniques for other open datasets to generalize the results.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: CFBPNN Inner Layer structure</figDesc><graphic coords="6,108.50,292.63,377.53,195.45" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: CFBPNN Internal Network structure</figDesc><graphic coords="7,143.75,84.65,307.10,231.58" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: Internal structure of the layer representing Transig function</figDesc><graphic coords="7,83.75,456.16,427.40,92.40" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 4 (</head><label>4</label><figDesc>Figure 4(a): Co-relation Plot for risk analysis KDD+ Dataset Figure 4(b): Co-relation Plot for risk analysis BoT-IoT Dataset.</figDesc><graphic coords="8,113.00,72.00,368.50,195.60" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: Confusion Matrix -Calculations</figDesc><graphic coords="9,112.82,284.27,360.80,142.80" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 6 Figure 6 :</head><label>66</label><figDesc>Figure 6(a): KDD+ Dataset Figure 6(b): KDD+ Dataset Figure 6: Confusion Matrix -Calculations</figDesc><graphic coords="9,98.70,504.18,397.58,170.05" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Figure 7 :</head><label>7</label><figDesc>Figure 7: Performance of model for each attack class.</figDesc><graphic coords="10,96.33,72.00,393.95,180.38" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1 :</head><label>1</label><figDesc>Various IoT attack and the Counter Measures</figDesc><table><row><cell>IoT Layer</cell><cell>Attack type</cell><cell>Measures</cell></row><row><cell>Physical</cell><cell>Jamming DoS, Collision,</cell><cell>Packet alternate (re)routing</cell></row><row><cell></cell><cell>Exhaustion, Man-in-the-</cell><cell>System logs modelling</cell></row><row><cell></cell><cell>Middle attacks</cell><cell>Spiking neural network classification</cell></row><row><cell></cell><cell></cell><cell>CUmulative SUM (CUSUM) algorithm [4],[5]</cell></row><row><cell>Datalink</cell><cell>, Phishing, Data Transit</cell><cell>Data encryption algorithm</cell></row><row><cell></cell><cell></cell><cell>Intelligence Web Application Firewall (IWAF)</cell></row><row><cell></cell><cell></cell><cell>URL Embedding (UE) [6],[7]</cell></row><row><cell>Network</cell><cell>Routing, DDoS, SCADA</cell><cell>Network filtering and Secure MQTT, ABE algorithm</cell></row><row><cell></cell><cell>Modbus</cell><cell>Next Generation firewalls filtering capabilities</cell></row><row><cell></cell><cell>attacks</cell><cell>Mapping by extracting URLs from spam mail [8]</cell></row><row><cell>Transport</cell><cell>System flooding</cell><cell>Intrusion detection and prevention system</cell></row><row><cell></cell><cell></cell><cell>Compressed Transport Protocols</cell></row><row><cell></cell><cell></cell><cell>Ingress filtering and IDS solutions [9]</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 2 :</head><label>2</label><figDesc>Attack class and no of records</figDesc><table><row><cell cols="2">BoT-IoT Dataset</cell><cell></cell><cell>KDD-Dataset</cell></row><row><cell>Class</cell><cell cols="2">No. of Records Class</cell><cell>No. of Records</cell></row><row><cell>Normal</cell><cell>118</cell><cell>Normal</cell><cell>67343</cell></row><row><cell>DDoS</cell><cell>550955</cell><cell>DoS</cell><cell>45927</cell></row><row><cell>DoS</cell><cell>471635</cell><cell>Probe</cell><cell>11656</cell></row><row><cell>Reconnaissance</cell><cell>25846</cell><cell>R2L</cell><cell>995</cell></row><row><cell>Theft</cell><cell>21</cell><cell>U2R</cell><cell>52</cell></row><row><cell>Grand Total</cell><cell>1048575</cell><cell>Grand Total</cell><cell>125973</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 3 : Performance Metrics</head><label>3</label><figDesc></figDesc><table><row><cell></cell><cell cols="2">KDD+ Dataset</cell><cell></cell><cell></cell><cell></cell><cell cols="2">BoT-IoT Dataset</cell></row><row><cell>Attack</cell><cell cols="4">Accuracy Precision Recall F1</cell><cell>Attack</cell><cell cols="3">Accuracy Precision Recall F1</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell>Score</cell><cell></cell><cell></cell><cell></cell><cell>Score</cell></row><row><cell>DoS</cell><cell>100%</cell><cell>1.0</cell><cell>1.0</cell><cell cols="2">1.0 DDoS</cell><cell>99.99</cell><cell>1.0</cell><cell>1.0 1.0</cell></row><row><cell>Probe</cell><cell>100%</cell><cell>1.0</cell><cell>1.0</cell><cell>1.0 DoS</cell><cell></cell><cell>100</cell><cell>1.0</cell><cell>1.0 1.0</cell></row><row><cell>R2L</cell><cell>100%</cell><cell>1.0</cell><cell>1.0</cell><cell cols="2">1.0 Reconnaissance</cell><cell>99.76</cell><cell>1.0</cell><cell>0.9 1.0</cell></row><row><cell>U2R</cell><cell>100%</cell><cell>1.0</cell><cell>1.0</cell><cell>1.0 Theft</cell><cell></cell><cell>99.75</cell><cell>0.0</cell><cell>0.0 0.0</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_3"><head>Table 4 :</head><label>4</label><figDesc>Comparison of DL-based IDS models for IoT Author and ReferenceTechnique Data set Accuracy Zhang et al.<ref type="bibr" target="#b11">[12]</ref> DBN for anomaly detection in IoT mobile network Simulated data 94%.Thamilarasu G. et al.<ref type="bibr" target="#b13">[14]</ref> three phase model with DBN and DNN Real-time 97%. S. Smys et al.<ref type="bibr" target="#b14">[15]</ref> </figDesc><table><row><cell></cell><cell cols="2">Hybrid Convolutional Neural Network UNSW NB15</cell><cell>98.6%.</cell></row><row><cell>Mohamed Amine</cell><cell>RDTIDS: Rules and Decision Tree-Based</cell><cell>CICIDS2017</cell><cell>96.995%.</cell></row><row><cell>Ferrag et al. [18]</cell><cell>Intrusion Detection</cell><cell></cell><cell></cell></row><row><cell></cell><cell>System</cell><cell></cell><cell></cell></row><row><cell>Abdelouahid Derhab et al.</cell><cell>Temporal Convolution Neural Network</cell><cell>Bot-IoT</cell><cell>99.998%.</cell></row><row><cell>[19]</cell><cell>(TCNN) with Syn-</cell><cell></cell><cell></cell></row><row><cell></cell><cell>thetic Minority Oversampling Technique-</cell><cell></cell><cell></cell></row><row><cell></cell><cell>Nominal Continuous (SMOTE-NC)</cell><cell></cell><cell></cell></row><row><cell>Alkahtani.H et al. [20]</cell><cell>Hybrid convolution neural network with</cell><cell>IoTID20</cell><cell>98.80%.</cell></row><row><cell></cell><cell>the Long Short-Term</cell><cell></cell><cell></cell></row><row><cell></cell><cell>Memory (CNN-LSTM)</cell><cell></cell><cell></cell></row><row><cell cols="2">Mengmeng.Ge et al. [21] Multiclass Feed-Forward Neural</cell><cell>BoT-IoT</cell><cell>999.79%.</cell></row><row><cell></cell><cell>Networks (FNN)</cell><cell></cell><cell></cell></row><row><cell>Qureshi et al. [22]</cell><cell cols="2">Random Neural Network -IDS (RNNIDS) NSL-KDD</cell><cell>95.25%.</cell></row><row><cell>Fatani A et al. [23]</cell><cell>Deep learning and Meta Heuristics (MH)</cell><cell>KDD Cup</cell><cell>99.62%.</cell></row><row><cell></cell><cell>algorithms</cell><cell></cell><cell></cell></row><row><cell>Proposed Model</cell><cell>Cascade Forward Back Propagation</cell><cell cols="2">KDD+,BoT-IoT 100%,99.7%</cell></row></table></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">References</head></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Are Cyber-Weapons Effective? Assessing Stuxnet&apos;s Impact on the Iranian Enrichment Programme</title>
		<author>
			<persName><forename type="first">I</forename><surname>Barzashka</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">The RUSI Journal</title>
		<imprint>
			<biblScope unit="volume">158</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="48" to="56" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">NATO: Stepping up its game in cyber defence</title>
		<author>
			<persName><forename type="first">J</forename><surname>Shea</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cyber Security: A Peer-Reviewed Journal</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="165" to="174" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Cyber Threats to Industrial IoT: A Survey on Attacks and Countermeasures</title>
		<author>
			<persName><forename type="first">K</forename><surname>Tsiknas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Taketzis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Demertzis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Skianis</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IoT</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="163" to="188" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Cross layer denial of service attacks in wireless sensor network using swarm intelligence</title>
		<author>
			<persName><forename type="first">R</forename><surname>Muraleedharan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Osadciw</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2006 40th Annual Conference on Information Sciences and Systems</title>
				<meeting>the 2006 40th Annual Conference on Information Sciences and Systems<address><addrLine>Princeton, NJ, USA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2006-03-24">22-24 March 2006</date>
			<biblScope unit="page" from="1653" to="1658" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Temporal execution behavior for host anomaly detection in programmable logic controllers</title>
		<author>
			<persName><forename type="first">D</forename><surname>Formby</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Beyah</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans. Inf.Forensics Secur</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="page" from="1455" to="1469" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">The next generation cognitive security operations center: Network flow forensics using cybersecurity intelligence</title>
		<author>
			<persName><forename type="first">K</forename><surname>Demertzis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Kikiras</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Tziritas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Sanchez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Iliadis</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Big Data Cogn. Comput</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page">35</biblScope>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Learning URL embedding for malicious website detection</title>
		<author>
			<persName><forename type="first">X</forename><surname>Yan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Cui</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Guo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Li</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans. Ind. Inform</title>
		<imprint>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="page" from="6673" to="6681" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">A framework for DNS based detection and mitigation of malware infections on a network</title>
		<author>
			<persName><forename type="first">E</forename><surname>Stalmans</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Irwin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2011 Information Security for South Africa</title>
				<meeting>the 2011 Information Security for South Africa<address><addrLine>Johannesburg, South Africa</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2011-08-17">15-17 August 2011</date>
			<biblScope unit="page" from="1" to="8" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Security of the internet of things: Vulnerabilities, attacks, and countermeasures</title>
		<author>
			<persName><forename type="first">I</forename><surname>Butun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Osterberg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Song</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Commun Surv. Tutor</title>
		<imprint>
			<biblScope unit="volume">22</biblScope>
			<biblScope unit="page" from="616" to="644" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">DL-IDS: a deep learning-based intrusion detection framework for securing IoT</title>
		<author>
			<persName><forename type="first">Yazan</forename><surname>Otoum</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Dandan</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Amiya</forename><surname>Nayak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Transactions on Emerging Telecommunications Technologies</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page">e3803</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Analyzing adversarial attacks against deep learning for intrusion detection in IoT networks</title>
		<author>
			<persName><forename type="first">Olakunle</forename><surname>Ibitoye</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Omair</forename><surname>Shafiq</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ashraf</forename><surname>Matrawy</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2019 IEEE Global Communications Conference (GLOBECOM). IEEE</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Intrusion detection for IoT based on improved genetic algorithm and deep belief network</title>
		<author>
			<persName><forename type="first">Ying</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Peisong</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Xinheng</forename><surname>Wang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Access7</title>
		<imprint>
			<biblScope unit="page" from="31711" to="31722" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Deep learning models for cybersecurity in IoT networks</title>
		<author>
			<persName><forename type="first">Monika</forename><surname>Roopak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Gui</forename><surname>Yun Tian</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jonathon</forename><surname>Chambers</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2019 IEEE 9th annual computing and communication workshop and conference (CCWC). IEEE</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="452" to="0457" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Towards deep-learning-driven intrusion detection for the internet of things</title>
		<author>
			<persName><forename type="first">G</forename><surname>Thamilarasu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Chawla</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Sensors</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="issue">9</biblScope>
			<date type="published" when="1977">2019. 1977</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Hybrid intrusion detection system for internet of Things (IoT)</title>
		<author>
			<persName><forename type="first">S</forename><surname>Smys</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Haoxiang</forename><surname>Abul Basar</surname></persName>
		</author>
		<author>
			<persName><surname>Wang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of ISMAC</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">04</biblScope>
			<biblScope unit="page" from="190" to="199" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Deep Belief Network enhanced intrusion detection system to prevent security breach in the Internet of Things</title>
		<author>
			<persName><forename type="first">N</forename><surname>Balakrishnan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rajendran</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Pelusi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Ponnusamy</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Internet of things</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="page">100112</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Intrusion detection system for the internet of things based on blockchain and multiagent systems</title>
		<author>
			<persName><forename type="first">C</forename><surname>Liang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Shanmugam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Azam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Karim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Islam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Zamani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kavianpour</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">B</forename><surname>Idris</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Electronics</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="issue">7</biblScope>
			<biblScope unit="page">1120</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Rdtids: Rules and decision tree-based intrusion detection system for internet-of-things networks</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Ferrag</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Maglaras</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Ahmim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Derdour</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Janicke</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Future internet</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page">44</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Intrusion detection system for Internet of Things based on temporal convolution neural network and efficient feature engineering</title>
		<author>
			<persName><forename type="first">A</forename><surname>Derhab</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Aldweesh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">Z</forename><surname>Emam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">A</forename><surname>Khan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Wireless Communications and Mobile Computing</title>
		<imprint>
			<date type="published" when="2020">2020. 2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Intrusion detection system to advance internet of things infrastructure-based deep learning algorithms</title>
		<author>
			<persName><forename type="first">H</forename><surname>Alkahtani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">H</forename><surname>Aldhyani</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Complexity</title>
		<imprint>
			<date type="published" when="2021">2021. 2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Towards a deep learning-driven intrusion detection approach for Internet of Things</title>
		<author>
			<persName><forename type="first">M</forename><surname>Ge</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">F</forename><surname>Syed</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Fu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Baig</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Robles-Kelly</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer Networks</title>
		<imprint>
			<biblScope unit="volume">186</biblScope>
			<biblScope unit="page">107784</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">A heuristic intrusion detection system for Internet-of-Things (IoT)</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">U H</forename><surname>Qureshi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Larijani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Ahmad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Mtetwa</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Intelligent computing-proceedings of the computing conference</title>
				<meeting><address><addrLine>, Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2019-07">2019. July</date>
			<biblScope unit="page" from="86" to="98" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">IoT Intrusion Detection System Using Deep Learning and Enhanced Transient Search Optimization</title>
		<author>
			<persName><forename type="first">A</forename><surname>Fatani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Abd Elaziz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Dahou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Al-Qaness</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Lu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="page" from="123448" to="123464" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<monogr>
		<ptr target="http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html" />
		<title level="m">KDD Cup 99</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-IoT dataset</title>
		<author>
			<persName><forename type="first">Nickolaos</forename><surname>Koroniotis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Nour</forename><surname>Moustafa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Elena</forename><surname>Sitnikova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Benjamin</forename><surname>Turnbull</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Future Generation Computer Systems</title>
		<imprint>
			<biblScope unit="volume">100</biblScope>
			<biblScope unit="page" from="779" to="796" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Machine and deep learning amalgamation for feature extraction in Industrial Internet-of-Things</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">L S</forename><surname>Jayalaxmi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Saha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Kumar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">H</forename><surname>Kim</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computers \&amp; Electrical Engineering</title>
		<imprint>
			<biblScope unit="page">107610</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">October. Autoencoderbased Intrusion Detection System</title>
		<author>
			<persName><forename type="first">F</forename><surname>Kamalov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Zgheib</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">H</forename><surname>Leung</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Al-Gindy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Moussa</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Engineering and Emerging Technologies (ICEET)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2021">2021. 2021</date>
			<biblScope unit="page" from="1" to="5" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Constructive algorithm for fully connected cascade feedforward neural networks</title>
		<author>
			<persName><forename type="first">J</forename><surname>Qiao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Han</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Li</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Neurocomputing</title>
		<imprint>
			<biblScope unit="volume">182</biblScope>
			<biblScope unit="page" from="154" to="164" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Cascade forward neural network for timeseries prediction</title>
		<author>
			<persName><forename type="first">Budi</forename><surname>Warsito</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Rukun</forename><surname>Santoso</surname></persName>
		</author>
		<author>
			<persName><surname>Hasbi Yasin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Physics: Conference Series</title>
		<imprint>
			<biblScope unit="volume">1025</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page">12097</biblScope>
			<date type="published" when="2018">2018</date>
			<publisher>IOP Publishing</publisher>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
