Intrusion Detection in Industrial Internet of Things Network‐Based on Deep Learning Model with Rule‐Based Feature Selection

JB Awotunde, C Chakraborty… - … and mobile computing, 2021 - Wiley Online Library
The Industrial Internet of Things (IIoT) is a recent research area that links digital equipment
and services to physical systems. The IIoT has been used to generate large quantities of …

Identification of malicious activities in industrial internet of things based on deep learning models

ALH Muna, N Moustafa, E Sitnikova - Journal of information security and …, 2018 - Elsevier
Abstract Internet Industrial Control Systems (IICSs) that connect technological appliances
and services with physical systems have become a new direction of research as they face …

Game‐based learning: A review of tabletop exercises for cybersecurity incident response training

GN Angafor, I Yevseyeva, Y He - Security and privacy, 2020 - Wiley Online Library
The surge in cyber security breaches including the shortage of skilled cyber incident
response (CSIR) professionals and the ever‐changing cyber threat landscape is a big …

[HTML][HTML] XGBoost for imbalanced multiclass classification-based industrial internet of things intrusion detection systems

TTH Le, YE Oktian, H Kim - Sustainability, 2022 - mdpi.com
The Industrial Internet of Things (IIoT) has advanced digital technology and the fastest
interconnection, which creates opportunities to substantially grow industrial businesses …

Enhancing IIoT networks protection: A robust security model for attack detection in Internet Industrial Control Systems

IA Khan, M Keshk, D Pi, N Khan, Y Hussain, H Soliman - Ad Hoc Networks, 2022 - Elsevier
Abstract Industrial Internet of Things (IIoT) networks involves heterogeneous technological
and manufacturing services and devices. The communication and data exchange …

Bridging the cyber security skills gap: Using tabletop exercises to solve the CSSG crisis

GN Angafor, I Yevseyeva, Y He - Joint International Conference on …, 2020 - Springer
Recent breaches like the WannaCry ransomware attack in 2017 are evidence of the rapidly
evolving cyber security threat landscape. They demonstrate the ability of cybercriminals to …

Learning analytics perspective: Evidencing learning from digital datasets in cybersecurity exercises

K Maennel - 2020 IEEE European symposium on security and …, 2020 - ieeexplore.ieee.org
Cybersecurity exercises are gaining in popularity in university curricula and professional
training paths and are seen as an effective teaching method. Such exercises provide digital …

SCADA testbed for vulnerability assessments, penetration testing and incident forensics

S Krishnan, M Wei - … on Digital Forensics and Security (ISDFS), 2019 - ieeexplore.ieee.org
Industrial control systems are critical assets as they interact with real-life aspects of our daily
life. These systems often run 24/7 to control and monitor critical industrial and infrastructure …

Design of deep learning models for the identifications of harmful attack activities in IIOT

S RajBalaji, R Raman, B Pant… - 2023 International …, 2023 - ieeexplore.ieee.org
IICSs, which connect technical systems with physical systems to deliver services to
businesses, have become a new field of study since they are susceptible to various cyber …

Hardware-in-the-loop labs for SCADA cybersecurity awareness and training

M Puys, PH Thevenon, S Mocanu - Proceedings of the 16th International …, 2021 - dl.acm.org
In this paper, we present a SCADA cybersecurity awareness and training program based on
a Hands-On training using two twin cyber-ranges named WonderICS and G-ICS. These labs …