Skip to main content

Advertisement

Log in

Abnormal traffic detection-based on memory augmented generative adversarial IIoT-assisted network

  • Original Paper
  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

The implementation of IoT in industrial management is referred as Industrial IoT (IIoT). It is used to increase the overall operational efficiency. IIoT is considered as the backbone of the contemporary industries. For this purpose, strong security foundations have to be deployed with IIoT. This accelerates the industrial automation process by enrolling thousands of IoT devices and thus befitting the scattered connection and constrained functionalities of the IoT devices. In the Industrial Internet of Things, abnormal traffic detection is an emerging dilemma in network security. It can be ensured by monitoring the traffic flow in large-scale networks. In this connection, the deep learning paradigm has been accepted as the mainstream phenomenon in the field of abnormal traffic detection. It has achieved optimal results due to the constant improvement of computer performance with the help of Artificial Intelligence. Majority of the existing methods are based on supervised learning. As a result, due to numerous constraints, obtaining and marking abnormal traffic data samples in real life is extremely difficult. In addition, due to the diversity and complexity of the abnormal network data, the adaptability of various detection methods is low as well as difficult to judge the new abnormal traffic. Based on the above problems, this paper has proposed a semi-supervised abnormal flow detection framework in the IIoT based network scenario. The proposed model is named Memory Augment Based on Generative Adversarial Network (MeAEG-Net). It detects anomalies by training only normal flow of sample data and comparing the reconstruction errors of the underlying characteristics of input flow of generator module. To improve the generator's training, generative adversarial network has been deployed to tackle the problem of the autoencoder which is susceptible to noise. The generator uses an autoencoder and decoder structure. In addition, the memory augments module is introduced to the autoencoder's sub-network to reduce the generator module's generalization ability and raise the abnormal traffic reconstruction error. Our experimental results show that the method proposed in this paper can achieve a good effect of abnormal traffic detection in IIoT based networks under the premise of learning normal traffic data samples and improving the overall performance in all sectors of the industry.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

References

  1. Phua, C., Lee, V., Smith, K. and Gayler, R., (2010). A comprehensive survey of data mining-based fraud detection research. arXiv preprint arXiv:1009.6119.

  2. Schlegl, T., Seeböck, P., Waldstein, S. M., Schmidt-Erfurth, U., & Langs, G. (2017). Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. International conference on information processing in medical imaging (pp. 146–157). Cham: Springer.

    Chapter  Google Scholar 

  3. Garcia-Teodoro, P., Diaz-Verdejo, J., Maciá-Fernández, G., & Vázquez, E. (2009). Anomaly-based network intrusion detection Techniques systems and challenges. Computers & security, 28(1–2), 18–28.

    Article  Google Scholar 

  4. Ian, G., Jean, P.A., Mehdi, M., Bing, X., David, W.F., Sherjil, O. and Aaron, C., (2014) Generative adversarial nets. In Advances in neural information processing systems.

  5. Erfani, S. M., Rajasegarar, S., Karunasekera, S., & Leckie, C. (2016). High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning. Pattern Recognition, 58, 121–134.

    Article  Google Scholar 

  6. Kim, Y., Kim, M. and Kim, G., (2018) Memorization precedes generation: Learning unsupervised gans with memory networks. arXiv preprint arXiv:1803.01500.

  7. Gong, D., Liu, L., Le, V., Saha, B., Mansour, M.R., Venkatesh, S. and Hengel, A.V.D., (2019). Memorizing normality to detect anomaly: Memory-augmented deep autoencoder for unsupervised anomaly detection. In Proceedings of the IEEE/CVF International Conference on Computer Vision (pp. 1705–1714).

  8. Vinayakumar, R., Alazab, M., Soman, K. P., Poornachandran, P., Al-Nemrat, A., & Venkatraman, S. (2019). Deep learning approach for intelligent intrusion detection system. IEEE Access, 7, 41525–41550.

    Article  Google Scholar 

  9. Dong, B. and Wang, X., (2016). Comparison deep learning method to traditional methods using for network intrusion detection. In 2016 8th IEEE international conference on communication software and networks (ICCSN) (pp. 581–585). IEEE.

  10. Rajkumar, N., D’Souza, A., Alex, S., & Kathrine, G. J. W. (2018). Long short-term memory-based recurrent neural network approach for intrusion detection. International Conference on ISMAC in Computational Vision and Bio-Engineering (pp. 837–846). Cham: Springer.

    Google Scholar 

  11. Kwon, D., Kim, H., Kim, J., Suh, S. C., Kim, I., & Kim, K. J. (2019). A survey of deep learning-based network anomaly detection. Cluster Computing, 22(1), 949–961.

    Article  Google Scholar 

  12. Litjens, G., Kooi, T., Bejnordi, B. E., Setio, A. A. A., Ciompi, F., Ghafoorian, M., Van Der Laak, J. A., Van Ginneken, B., & Sánchez, C. I. (2017). A survey on deep learning in medical image analysis. Medical image analysis, 42, 60–88.

    Article  Google Scholar 

  13. Akcay, S., Atapour-Abarghouei, A. and Breckon, T.P., (2018). Ganomaly: Semi-supervised anomaly detection via adversarial training. In Asian conference on computer vision (pp. 622–637). Springer, Cham.

  14. Zhang, Y. Z., Xiao, J., Yun, X. C., & Wang, F. Y. (2012). DDoS attacks detection and control mechanisms. Ruanjian Xuebao/Journal of Software, 23(8), 2058–2072.

    Google Scholar 

  15. Chun-Qiong, W. U. (2012). Network Intrusion Detection Model Based on Feature Selection [J]. Computer Simulation, 29(6), 136–139.

    Google Scholar 

  16. Da Xu, L., He, W., & Li, S. (2014). Internet of things in industries: A survey. IEEE Transactions on industrial informatics, 10(4), 2233–2243.

    Article  Google Scholar 

  17. Fu, L., Zhang, W., Tan, X., & Zhu, H. (2021). An algorithm for detection of traffic attribute exceptions based on cluster algorithm in industrial internet of things. IEEE Access, 9, 53370–53378.

    Article  Google Scholar 

  18. Kim, D.S. and Park, J.S., (2003). Network-based intrusion detection with support vector machines. In International conference on information networking (pp. 747–756). Springer, Berlin, Heidelberg.

  19. Moore, A.W. and Zuev, D., (2005). Internet traffic classification using bayesian analysis techniques. In Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems (pp. 50–60).

  20. Williams, N., Zander, S., & Armitage, G. (2006). A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification. ACM SIGCOMM Computer Communication Review, 36(5), 5–16.

    Article  Google Scholar 

  21. Javaid, A., Niyaz, Q., Sun, W., & Alam, M. (2016). A deep learning approach for network intrusion detection system. Eai Endorsed Transactions on Security and Safety, 3(9), e2.

    Google Scholar 

  22. An, J., & Cho, S. (2015). Variational autoencoder based anomaly detection using reconstruction probability. Special Lecture on IE, 2(1), 1–18.

    Google Scholar 

  23. Gao, N., Gao, L., HE, Y. Y., & Wang, H. (2017). A lightweight intrusion detection model based on autoencoder network with feature reduction. ACTA Electonica Sinica, 45(3), 730.

    Google Scholar 

  24. Wang, W., Zhu, M., Wang, J., Zeng, X. and Yang, Z., (2017). End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In 2017 IEEE international conference on intelligence and security informatics (ISI) (pp. 43–48). IEEE.

  25. Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A. and Bengio, Y., (2014). Generative adversarial nets. Advances in neural information processing systems27.

  26. Liu, H., Wu, T., Shen, J., & Shi, C. (2020). Advanced persistent threat detection based on generative adversarial networks and long short-term memory. Comput. Sci, 47(1), 281–286.

    Google Scholar 

  27. Yin, C., Zhu, Y., Liu, S., Fei, J. and Zhang, H., (2018). An enhancing framework for botnet detection using generative adversarial networks. In 2018 International Conference on Artificial Intelligence and Big Data (ICAIBD) (pp. 228–234). IEEE.

  28. Buczak, A. L., & Guven, E. (2015). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications surveys & tutorials, 18(2), 1153–1176.

    Article  Google Scholar 

  29. Liu, Z., Thapa, N., Shaver, A., Roy, K., Yuan, X. and Khorsandroo, S., (2020). Anomaly detection on iot network intrusion using machine learning. In 2020 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD) (pp. 1–5). IEEE.

  30. Berman, D. S., Buczak, A. L., Chavis, J. S., & Corbett, C. L. (2019). A survey of deep learning methods for cyber security. Information, 10(4), 122.

    Article  Google Scholar 

Download references

Acknowledgements

This research project is funded by the Research Foundation of Education, Bureau of Hunan Province (No.19B109), and the Research Foundation of Education Bureau of Hunan Province (No.20A088), and the Special Funds for Construction of Innovative Provinces in Hunan Province of China (No.2020GK2006, No.2020GK2007)

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wenwei Li.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, T., Li, W., Rong, H. et al. Abnormal traffic detection-based on memory augmented generative adversarial IIoT-assisted network. Wireless Netw 28, 2579–2595 (2022). https://doi.org/10.1007/s11276-022-02992-0

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-022-02992-0

Keywords

Navigation