AI and machine learning for the analysis of data flow characteristics in industrial network communication security
by Zhi Xu; Jun Lu; Xin Wang; JiaHai Zhang; Mamoun Alazab; Vicente García-Díaz
International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), Vol. 37, No. 3, 2021

Abstract: AI and machine learning are revolutionary technologies being explored by the communication industry to integrate them into communication networks, provide modern services, improve network efficiency and user experience. The intrusion detection system is important for ensuring security of the industrial control system. Hence, in this paper, a machine learning assisted intrusion detection system (MLAIDS) has been proposed to analyse data flow characteristics in industrial network communication security. The progressive use of proposed ML algorithms will improve IDS functionality, especially in industrial control systems. Analysis of data flow characteristics given in this article involves the method of ensuring an adequate degree of security for a dispersed industrial network concerning some main elements, including system features, the present state of requirements, the implementation of suitable countermeasures that may lead to reducing the security risk under a predefined, acceptable threshold. The numerical results show that proposed MLAIDS method achieves high detection accuracy of 98.2%, a performance ratio of 97.5%, a prediction ratio of 96.7%, F1-score of 95.8%, and less root mean square error of 10.5% than other existing methods.

Online publication date: Tue, 03-Aug-2021

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com