AI and machine learning for the analysis of data flow characteristics in industrial network communication security

Zhi Xu, Jun Lu, Xin Wang, Jia Hai Zhang, Mamoun Alazab, Vicente García-Díaz

    Research output: Contribution to journalArticlepeer-review

    3 Citations (Scopus)

    Abstract

    AI and machine learning are revolutionary technologies being explored by the communication industry to integrate them into communication networks, provide modern services, improve network efficiency and user experience. The intrusion detection system is important for ensuring security of the industrial control system. Hence, in this paper, a machine learning assisted intrusion detection system (MLAIDS) has been proposed to analyse data flow characteristics in industrial network communication security. The progressive use of proposed ML algorithms will improve IDS functionality, especially in industrial control systems. Analysis of data flow characteristics given in this article involves the method of ensuring an adequate degree of security for a dispersed industrial network concerning some main elements, including system features, the present state of requirements, the implementation of suitable countermeasures that may lead to reducing the security risk under a predefined, acceptable threshold. The numerical results show that proposed MLAIDS method achieves high detection accuracy of 98.2%, a performance ratio of 97.5%, a prediction ratio of 96.7%, F1-score of 95.8%, and less root mean square error of 10.5% than other existing methods.

    Original languageEnglish
    Pages (from-to)125-136
    Number of pages12
    JournalInternational Journal of Ad Hoc and Ubiquitous Computing
    Volume37
    Issue number3
    DOIs
    Publication statusPublished - Jul 2021

    Bibliographical note

    Publisher Copyright:
    Copyright © 2021 Inderscience Enterprises Ltd.

    Copyright:
    Copyright 2021 Elsevier B.V., All rights reserved.

    Fingerprint

    Dive into the research topics of 'AI and machine learning for the analysis of data flow characteristics in industrial network communication security'. Together they form a unique fingerprint.

    Cite this