Dissemination Control in Dynamic Data Clustering For Dense IIoT Against False Data Injection Attack

05/19/2022
by   Carlos Pedroso, et al.
0

The IoT has made possible the development of increasingly driven services, like industrial IIoT services, that often deal with massive amounts of data. Meantime, as IIoT networks grow, the threats are even greater, and false data injection attacks (FDI) stand out as being one of the most aggressive. The majority of current solutions to handle this attack do not take into account the data validation, especially on the data clustering service. Aiming to advance on the issue, this work introduces CONFINIT, an intrusion detection system for mitigating FDI attacks on the data dissemination service performing in dense IIoT networks. CONFINIT combines watchdog surveillance and collaborative consensus strategies for assertively excluding various FDI attacks. The simulations showed that CONFINIT compared to DDFC increased by up to 35 environment. CONFINIT achieved attack detection rates of 99 and F1 score of 0.81 in multiple IIoT scenarios, with only up to 3.2 of false negatives and positives rates, respectively. Moreover, under two variants of FDI attacks, called Churn and Sensitive attacks, CONFINIT achieved detection rates of 100 false positives and negatives rates.

READ FULL TEXT

page 3

page 7

page 12

page 13

page 17

page 24

page 25

page 26

research
10/29/2020

Detecting FDI Attack on Dense IoT Network with Distributed Filtering Collaboration and Consensus

The rise of IoT has made possible the development of personalized servi...
research
01/21/2019

Achievable Rates of Attack Detection Strategies in Echo-Assisted Communication

We consider an echo-assisted communication model wherein block-coded mes...
research
08/26/2019

SynGAN: Towards Generating Synthetic Network Attacks using GANs

The rapid digital transformation without security considerations has res...
research
10/27/2020

Generalized Insider Attack Detection Implementation using NetFlow Data

Insider Attack Detection in commercial networks is a critical problem th...
research
03/14/2022

Base-Rate Fallacy Redux and a Deep Dive Review in Cybersecurity

This paper examines the current state of the science underlying cybersec...
research
07/18/2022

Supervised Contrastive ResNet and Transfer Learning for the In-vehicle Intrusion Detection System

High-end vehicles have been furnished with a number of electronic contro...
research
01/24/2019

Securing Tag-based recommender systems against profile injection attacks: A comparative study. (Extended Report)

This work addresses the challenges related to attacks on collaborative t...

Please sign up or login with your details

Forgot password? Click here to reset