An adaptable Intelligence Algorithm to a Cybersecurity Framework for IIOT
Main Article Content
The industrial internet of things (IIoT) has grown in recent years, which makes it possible to publicize new technological innovations and be able to integrate them with each other, such as smart cities among other applications such as: health, education, traffic among others , but at the same time there is a problem that is security, since lately there have been several security incidents related to IIoT, more specifically to the networks that handle these technologies such as: ISPs (Internet Service Provider), which makes it necessary to adopt and investigate the inclusion of artificial intelligence in cybersecurity, which this provides new paradigms that will help in a satisfactory solution (1)The Objective was propose an intelligence technique adaptable to a cybersecurity framework with the ability to solve network security problems in IIoT devices. For the development of this work, the action research methodology (IA) is used, which consists of uniting theory with practice in such a way that the researcher can draw correct conclusions about the practices carried out. Because this type of methodology seeks to solve specific problems in a specific community, continuously managing to understand and interpret to improve from them (2). It has been found that there are a great variety of intelligence techniques such as Deep Learning deep learning, which obtained a very high score in the characterization due to its great possibilities when integrating the algorithm into the field of cybersecurity. very little characterized; However, in the initial research that was carried out, the result was how to work with this technology and how to adapt it to cybersecurity. There are different ways to analyze and secure data on the network, one of those are learning techniques, in this research several techniques were identified that with their respective algorithms that provided the basis for adaptability with a framework related to IIoT technologies.
(1) LAVFLLGA Yolvi Ocaña Fernández, «Artificial intelligence and its implications in higher education,» Scielo Perú, Vols. % 1 of% 2On-line ISSN 2310-4635, nº http://dx.doi.org/10.20511/pyr2019.v7n2.274, 2018.
(2) MLP Ana Mercedes Colmenares, «Action research,» Laurus Magazine in Education, vol. 14, no. 27, pp. 1-20, May-August 2008.
(3) JEL Dominguez, Data Transmission (Unit 1), SOLIDARIDAD MEXICO, UAEM Valle de Chalco University Center: https://slideplayer.es/slide/12447354/, 2015.
(4) C. Urcuqui, Machine Learning Classifiers to Detect Malicius Websites, 2017.
(5) C. Borghello, «Segu-Info,» Segu-Info Ciberseguridad, 09 09 2019. [Online]. Available: https://blog.segu-info.com.ar/2019/09/buscar-la-direccion-lp-real-detras-de.html?m=0. [Last access: 03 03 2020].
(6) JP Sifre, "Network IDS for the detection of attacks on SSH and FTP," RUA, Institutional Repository of the University of Alicante, Alicante, Spain, 2020.
(7) AV and. P. Portilla, "Industrial Internet of Things (IIOT): New Way of Smart Manufacturing," Fundación Universitaria de Popayán, Popayán, 2021.
(8) TTJBBAS Miloud Bagaa, "A Machine Learning Security Framework for Iot Systems," IEEE Explore, DOI No: 10.1109 / ACCESS.2020.2996214, pp. 114066 - 114077, 21 05 2020.
(9) AA and. BC Amador Siler, «Using Artificial Intelligence to detect Port Scans,» Acis - Jornada de Ciberseguridad, vol. http://acciente.acis.org.co/typo43/fileadmin/Base_de_Conocimiento/VI_JornadaSeguridad/ArticuloIAPortScan_VIJNSI.pdf, 2006.
(10) BSSAMJFDBGN Chao Liang, "Intrusion Detection System for Internet of Things based on a Machine Learning approach," 2019 International Conference on Vision Towards Emerging Trends in Communication and Networking (ViTECoN), vol. DOI: 10.1109 / ViTECoN.2019.8899448, nº https://ieeexplore.ieee.org/document/8899448/authors#authors, 2019.
(11) O. Alkadi, N. Moustafa, B. Turnbull and K.-KR Choo, "A Deep Blockchain Framework-enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks," IEEE Internet of Things Journal, No. DOI: 10.1109 / JIOT.2020.2996590 , 22 05 2020.
(12) MG,. G.,. LM,. AF,. MFAK Abdelouahid Derhab, "Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security," MDPI - Sensors, vol. 4, no https://doi.org/10.3390/s19143119, 2019.
(13) C. Liang, B. Shanmugam, S. Azam, M. Jonkman, FD Boer and G. Narayans, «Intrusion Detection System for Internet of Things based on a Machine Learning approach,» International Conference on Vision Towards Emerging Trends in Communication and Networking (ViTECoN), No. DOI: 10.1109 / ViTECoN.2019.8899448, 14 11 2019.
(14) DV Medhane, AK Sangaiah, MS Hossain and KSURSA Ghulam Muhammad, "Blockchain-Enabled Distributed Security Framework for Next-Generation IoT: An Edge Cloud and Software-Defined Network-Integrated Approach," IEEE Internet of Things Journal, DOI no .: 10.1109 / JIOT.2020.2977196, pp. 6143 - 6149, 28 02 2020.
(15) JB-PJMGO José Roldán, "Integrating complex event processing and machine learning: An intelligent architecture for detecting IoT security attacks," Science Direct, vol. 149, nº https://doi.org/10.1016/j.eswa.2020.113251, 1 07 2020.
(16) J. Maldonado, «Advances in Intrusion Detection Systems with ´ Self-learning - Systematic Review of ´ Literature,» Sixth National Conference on Computing, Informatics and Systems / CoNCISa 2018 /, nº ISBN: 978-980-7683 -04-3, 30 11 2018.
(17) BWKJHP Shailendra Rathore, "BlockSecIoTNet: Blockchain-based decentralized security architecture for IoT network," Science Direct, vol. 143, nº https://doi.org/10.1016/j.jnca.2019.06.019, 1 10 2019.
(18) MXSTIS Sukhpal Singh Gill, "Sukhpal SinghGill Transformative effects of IoT, Blockchain and Artificial Intelligence on cloud computing: Evolution, vision, trends and open challenges," Science Direct - Internet of Things, vol. 8, no https://doi.org/10.1016/j.iot.2019.100118, 12 2019.
(19) NMES Nickolaos Koroniotis, "A new network forensic framework based on deep learning for Internet of Things networks: A particle deep framework," Science Direct, vol. 110, nº https://doi.org/10.1016/j.future.2020.03.042, 09 09 2020.
(20) PRK-KRCNB Gonzalo De La Torre Parra, «Detecting Internet of Things attacks using distributed deep learning,» Science Direct, nº https://doi.org/10.1016/j.jnca.2020.102662, 1 08 2020.
(21) FKMHAQSY Mohab Aly, «Enforcing security in Internet of Things frameworks: A Systematic Literature Review,» Science Direct, nº https://doi.org/10.1016/j.iot.2019.100050, 06 07 2019.
(22) KWMBNJN Somayy Hajiheidari, "Intrusion detection systems in the Internet of things: A comprehensive investigation," Science Direct, vol. 160, nº https://doi.org/10.1016/j.comnet.2019.05.014, 03 09 2019.
(23) JPPCOLMVHCA Kelton AP da Costa, «Internet of Things: A survey on machine learning-based intrusion detection approaches,» Science Direct, nº https://doi.org/10.1016/j.comnet.2019.01.023, 14 03 2019.
(24) "Doku IFLBC On the Edge Intelligence Using Federated Learning Blockchain Network," IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS), DOI #: 10.1109 / BigDataSecurity-HPSC-IDS49724.2020.00047, pp. 1-6, 23 06 202.
(25) CSPSAK Bharat Bhushan, "Unification of Blockchain and Internet of Things (BIoT): requirements, working model, challenges and future directions," Wireless Networks, No. https://www.springerprofessional.de/en/unification-of-blockchain-and -internet-of-things-biot-requiremen / 18255264, 06 08 2020.
(26) LHHYZY Hou Rui, "Research on secure transmission and storage of energy IoT information based on Blockchain," Peer-to-Peer Networking and Applications, vol. 13, p. 1225-1235, 06 05 2020.
(27) A. Dawoud, S. Shahristani and C. Raun, "A Deep Learning Framework to Enhance Software Defined Networks Security," 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA), No. DOI: 10.1109 / WAINA.2018.00172, 23 08 2018.
(28) A. Nagisetty and GP Gupta, «Framework for Detection of Malicious Activities in IoT Networks using Keras Deep Learning Library,» 3rd International Conference on Computing Methodologies and Communication (ICCMC), No. DOI: 10.1109 / ICCMC.2019.8819688, 29 08 2019.
(29) DLAN Yazan Otoum, «DL-IDS a deep learning – based intrusion detection framework for securing IoT,» Internet Technology Letters, nº https://doi.org/10.1002/ett.3803, 29 11 2019.
(30) M. Amjad, H. Zahid, S. Zafar and T. Mahmood, "A Novel Deep Learning Framework for Intrusion Detection System," International Conference on Advances in the Emerging Computing Technologies (AECT), No. DOI: 10.1109 / AECT47998.2020.9194224, 10 09 2020.
(31) C. MORALES, intrusion detection model using Machine Learning techniques, Antioquia, 2018.
(32) M.JACOBSON, comparative and study of IoT platforms, Catalonia, 2017.
(33) BBC Joaquín Q. Lima M., «Particle Swarm Optimization applied to the Problem of the Bi-objective Traveling Cashier,» Ibero-American Journal of Artificial Intelligence, nº https://www.redalyc.org/pdf/925/92503209.pdf.
(34) S. Eguren, Probabilistic Modeling Based on Deep Learning for the detection of anomalies, Mendoza, Argentina, 2019.
(35) A. Dawoud, A Deep Learning Framework to Enhance Software, 2018.
(36) A. Nagisetty, Framework for Detection of Malicious Activities in, 2019.
(37) H. Waagsnes, SCADA Intrusion Detection System Test Framework, 2017.
(38) alexfrancow, "https://www.hackplayers.com/," 2018. [Online]. Available: https://www.hackplayers.com/2018/09/a-detector-ids-based-en-anomalias.html. [Last access: May 15, 2021].
(39) Alfon, "https://seguridadyredes.wordpress.com/," 2008. [Online]. Available: https://seguridadyredes.wordpress.com/2008/01/22/sistemas-de-deteccion-de-intrusos-y-snort-ii-creacion-de-reglas-i/.
(40) J.Cano, Artificial intelligence applied to forensic analysis, 2020.
(41) N. Koroniotis, A new network forensic framework based on deep learning for Internet of Things networks: A particle deep framework, 2020.
(42) Martínez Jg. Innovación En Ciberseguridad. Estrategia Y Tendencias. Revista Economia Industrial. 2018;(https://www.mincotur.gob.es/Publicaciones/Publicacionesperiodicas/EconomiaIndustrial/RevistaEconomiaIndustrial/410/JUAN%20GONZ%C3%81LEZ%20MART%C3%8DNEZ.pdf).
(43) Harold Daniel Morán Amórtegui Khm. Análisis Comparativo De Plataformas Cloud Con Soporte Orientado A Servicios De Internet De Las Cosas. Trabajo De Grado De Investigación Tecnológica. Bogotá Dc: Universidad Catolica De Colombia, Cundinamarca; 2017.
- Santiago Ordoñez Tumbo, Katerine Márceles Villalba, Siler Amador Donado, Validation of the Intelligence Technique in the detection of cyber attacks , Ingeniería y Competitividad: Vol. 26 No. 3 (2024): Ingeniería y Competitividad
- Cristian F. Bravo Mosquera, Manuel F. Silva Joaqui, Katerine Márceles Villalba, Siler Amador Donado, SINSEÑAS: Mobile application for learning and translation of colombian sign language , Ingeniería y Competitividad: Vol. 26 No. 1 (2024): Ingeniería y Competitividad
Accepted 2022-01-20
Published 2022-05-26
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Authors grant the journal and Universidad del Valle the economic rights over accepted manuscripts, but may make any reuse they deem appropriate for professional, educational, academic or scientific reasons, in accordance with the terms of the license granted by the journal to all its articles.
Articles will be published under the Creative Commons 4.0 BY-NC-SA licence (Attribution-NonCommercial-ShareAlike).