Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

Volume 15 , Issue 2 , PP: 208-224, 2025 | Cite this article as | XML | Html | PDF | Full Length Article

Securing the Future: Real-Time intrusion Detection in IIoT Smart Grids through Innovative AI Solutions

Mounir Mohammad Abou-Elasaad 1 * , Samir G. Sayed 2 , Mohamed M. El-Dakroury 3

  • 1 Department of Electronics & Communications, Faculty of Engineering Egypt, Helwan University, Egypt - (Mounir_abouelkhair@h-eng.helwan.edu.eg)
  • 2 Professor, Department of Electronics and communication Engineering, Helwan University, Egypt - (samir_abdelgawad@h-eng.helwan.edu.eg)
  • 3 Assistant Professor, Department of Electronics and Communications Engineering, Helwan, Egypt - (mdakroury@h-eng.helwan.edu.eg)
  • Doi: https://doi.org/10.54216/JCIM.150216

    Received: May 15, 2024 Revised: July 14, 2024 Accepted: November 02, 2024
    Abstract

    The world is witnessing an unprecedented boom in the development of information technology, which has come to encompass all aspects of life, Smart networks based on the Industrial Internet of Things (IIoT) are among the latest technologies used in various industries, contributing to improved production efficiency, reduced costs, and enhanced security, With the increasing reliance on this technology, the challenge of complex cyberattacks are also on the rise, These attacks are considered one of the major challenges facing smart networks, as attackers can exploit vulnerabilities in systems to access sensitive data or disrupt industrial operations, To counteract these threats, advanced intrusion detection systems should be developed, leveraging artificial intelligence and big data analytics to effectively detect and respond to attacks in real-time. Therefore, it is imperative to strive towards developing advanced and intelligent security systems to combat cyberattacks, ensuring the safety of industrial operations and data protection. This paper provides two IDS based on AI that are developed to negate the raising sophisticated cyberattacks. IN the first technique, Group of ML techniques such as Decision tree, Random Forrest classifiers, support vector classifier, and K_Nearest Neigbor are used with Feature reduction algorithms classifying network traffic subspecies to enhancing the accuracy and efficiency of detection systems. The second proposed technique for specifying the type of intrusion advantage various methodologies, particularly in the context of IoT networks and deep learning, the two algorithms are trained and tested using three well-known datasets to investigate wide domain of cyberattacks targeting the IIoT infrastructure. Results of the simulation show that the algorithm proposed in this work provides high improvement in detection of cyberattacks. The first algorithm achieved an accuracy of 99.9% and a very low false positive rate of just 0.1%. In addition, the second proposed algorithm identifies type of attack with a detection ratio of 99.76%. These results demonstrate how the proposed IDS based on AI algorithms can effectively detect network intrusion, and significantly enhance the security of IIoT system

    Keywords :

    Industrial Internet of Things (IIoT) , Intrusion Detection Systems (IDS) , Artificial Intelligence (AI) , Machine Learning (ML), Deep Learning (DL)

    References

    [1] H. Boyes, B. Hallaq, J. Cunningham, T. Watson, “The industrial internet of things (IIoT): An analysis framework,” Elsevier, 2018.

    [2] A. Khatib, M. Hamlich, and D. Hamad, “Machine learning based intrusion detection for cyber-security in iot networks,” E3S Web of Conferences, vol. 297, p. 01057, 2021.

    [3] H. Tyagi and R. Kumar, “Attack and anomaly detection in iot networks using supervised machine learning approaches,” Revue d’Intelligence Artificielle, vol. 35, p. 11–21, Feb 2021.

    [4] B. Alotaibi, “A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities,” Sensors 2023.

    [5] R. A. Ramadan and K. Yadav, “A novel hybrid intrusion detection system (ids) for the detection of internet of things (iot) network attacks,” Annals of Emerging Technologies in Computing, vol. 4, p. 61–74, Dec 2020.

    [6] Y. N. Soe, Y. Feng, P. I. Santosa, R. Hartanto, and K. Sakurai, “Implementing lightweight iot-ids on raspberry pi using correlation-based feature selection and its performance evaluation,” Advances in Intelligent Systems and Computing, p. 458–469, Mar 2019.

    [7] E. Seid, O. Popov, and F. Blix, “Security Attack Behavioural Pattern Analysis for Critical Service Providers,”, J. Cybersecur. Priv., 4, 55–75, 2024

    [8] S. Choudhary, N. Kesswani, S. Majhi, “An ensemble intrusion detection model for internet of things network,” 2021.

    [9] S. Krishnan, A. Neyaz, and Q. Liu, “Iot network attack detection using supervised machine learning,” 2021.

    [10] A. Verma and V. Ranga, “Machine learning based intrusion detection systems for iot applications,” Wireless Personal Communications, vol. 111, p. 2287–2310, Nov 2019.

    [11] K. M. Sai, B. B. Gupta, C.-H. Hsu, and D. Perakovi´c, “Lightweight intrusion detection system in iot networks using raspberry pi 3b+.,” in SysCom, pp. 43–51, 2021.

    [12] R. Qaddoura, A. M. Al-Zoubi, I. Almomani, and H. Faris, “A multi-stage classification approach for iot intrusion detection based on clustering with oversampling,” Applied Sciences, vol. 11, no. 7, 2021.

    [13] A. Jamalipour, S. Murali, “A Taxonomy of Machine-Learning-Based Intrusion Detection Systems for the Internet of Things: A Survey,” IEEE Internet Things J., 9, 9444–9466, 2021.

    [14] Z. AZAM, MD. M. ISLAM, and M. NURUL HUDA, “Comparative Analysis of Intrusion Detection Systems and Machine Learning-Based Model Analysis through Decision Tree,” IEEE Access, VOLUME 11, 2023.

    [15] S. M. KASONGO, “An Advanced Intrusion Detection System for IIoT Based on GA and Tree Based Algorithms,” IEEE Access, VOLUME 9, 2021.

    [16] I. Tareq, B. M. Elbagoury, S. El-Regaily, and El-Sayed M. El-Horbaty, “Analysis of ToN-IoT, UNW-NB15, and Edge-IIoT Datasets Using DL in Cybersecurity for IoT,” Appl. Sci., 12, 9572, 2022.

    [17] A. Manderna, S. Kumar, U. Dohare, M. Aljaidi, O. Kaiwartya, and J. Lloret, “Vehicular Network Intrusion Detection Using a Cascaded Deep Learning Approach with Multi-Variant Metaheuristic,” Sensors, 23, 8772, 2023.

    [18] K. Kethineni, G. Pradeepini, “Intrusion Detection in Internet of Things Based Smart Farming Using Hybrid Deep Learning Framework,” 2023.

    [19] X. Larriva-Novo, C. Sánchez-Zas, V. A. Villagrá, A. Marín-Lopez, and J. Berrocal, “Leveraging Explainable Artificial Intelligence in Real-Time Cyberattack Identification: Intrusion Detection System Approach,” Appl. Sci.,13, 8587,2023

    [20] B. Khampirat, “The impact of work-integrated learning and learning strategies on engineering students’ learning outcomes in thailand: A multiple mediation model of learning experiences and psychological factors,” IEEE Access, vol. 9, pp. 111390–111406, 2021.

    [21] I. Sharafaldin, A. H. Lashkari, S. Hakak, and A. A. Ghorbani, “Developing realistic distributed denial of service (ddos) attack dataset and taxonomy,” in 2019 International Carnahan Conference on Security Technol- ogy (ICCST), pp. 1–8, 2019.

    [22] M. A. Ferrag, O. Friha, D. Hamouda, L. Maglaras, and H. Janicke, “Edge-iiotset: A new comprehensive realistic cyber security dataset of iot and iiot applications: Cen- tralized and federated learning,” 2022.

    [23] N. Moustafa and J. Slay, “Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw- nb15 network data set),” in 2015 Military Communi- cations and Information Systems Conference (MilCIS), pp. 1–6, 2015.

    [24] S. More, M. Idrissi, H. Mahmoud, and A. T. Asyhari, “Enhanced Intrusion Detection Systems Performance with UNSW-NB15 Data Analysis,” Algorithms, 2024.

    [25] K. Roshan, A. Zafar, “An Optimized Auto-Encoder based Approach for Detecting Zero-Day Cyber-Attacks in Computer Network,” IEEE, 2021.

    [26] A. Guerra-Manzanares, J. Medina-Galindo, H. Bahsi, and S. No˜mm, “Medbiot: Generation of an iot botnet dataset in a medium-sized iot network,” 02 2022.

    [27] F. Aubet, M. Pahl, “DS2OS traffic traces,” 2018, Available at: https://www.kaggle.com/datasets/francoisxa/ds2ostraffictraces.

    [28] M. Zolanvari, M. A. Teixeira, L. Gupta, K. M. Khan, and R. Jain, “WUSTL-IIOT-2021 Dataset for IIoT Cybersecurity Research,” 2021.

    [29] E. C. P. Neto, S. Dadkhah, R. Ferreira, A. Zohourian, R. Lu, and A. A. Ghorbani, “CICIoT2023: A Real-Time Dataset and Benchmark for Large-Scale Attacks in IoT Environment,” Sensors, 2023.

    [30] A. Mehto, S. Tapaswi, and K. Pattanaik, “Multi-objective particle swarm optimization-based rendezvous point selection for the energy and delay efficient networked wireless sensor data acquisition,” Journal of Network and Computer Applications, vol. 195, p. 103234, 2021.

    [31] Z. M. Nayeri, T. Ghafarian, and B. Javadi, “Application placement in fog computing with ai approach: Taxonomy and a state-of-the-art survey,” Journal of Network and Computer Applications, vol. 185, p. 103078, 2021.

    [32] Z. Tong, X. Deng, J. Mei, B. Liu, and K. Li, “Response time and energy consumption co-offloading with slrta algorithm in cloud–edge collaborative computing,” Future Generation Computer Systems, vol. 129, pp. 64–76, 2022.

    [33] T. A. Akyildiz, C. B. Guzgeren, C. Yilmaz, and E. Savas, “Meltdowndetector: A runtime approach for detecting meltdown attacks,” Future Generation Computer Systems, vol. 112, pp. 136–147, 2020.

    [34] A. Mallik, “MAN-IN-THE-MIDDLE-ATTACK: UNDERSTANDING IN SIMPLE WORDS,” Cyberspace: Jurnal Pendidikan Teknologi Informasi, 2019.

    [35] A. Singh, B. B. Gupta, “Distributed Denial-of-Service (DDoS) Attacks and Defense Mechanisms in Various Web-Enabled Computing Platforms: Issues, Challenges, and Future Research Directions,” International Journal on Semantic Web and Information Systems (IJSWIS) 18(1), 2022.

    [36] F. Nabi, J. Yong, X. Tao, “Classification of Logical Vulnerability Based on Group Attacking Method,” Procedia Computer Science, 170, 2020.

    [37] N. S. Turhan, “Karl Pearson's Chi-Square Tests,” Educational Research and Reviews, 16(9), 575-580, 2020

    [38] Codecademy Team, “Feature Importance,” Codecademy. Available at: https://www.codecademy.com/article/fe-feature-importance-final.

    [39] M. Komorowski, D.C. Marshall, J.D. Salciccioli, Y. Crutain, “Exploratory Data Analysis. In: Secondary Analysis of Electronic Health Records,” Springer, Cham, 2016.

    [40] I. D. Acheme, O. R. Vincent, “16 - Machine-learning models for predicting survivability in COVID-19 patients,” Data Science for COVID-19, Academic Press, 2021.

    [41] M. K.Dahouda, , I. Joe, “A deep-learned embedding technique for categorical features encoding,” IEEE Access, 9, 114381-114391, 2021

    [42] T. Fawcett, "An introduction to ROC analysis," Pattern recognition letters, vol. 27, no. 8, 2006, pp. 861-874.

    [43] D. M. Powers, "Evaluation: from precision, recall and Fmeasure to ROC, informedness, markedness and correlation," Journal of machine learning research, vol. 2, no. 1, 2011, pp. 37–63.

    [44] Y. Sasaki, "The truth of the F-measure," Teach Tutor mater, vol. 1, no. 5, 2007, pp. 1-5.

     

    Cite This Article As :
    Mohammad, Mounir. , G., Samir. , M., Mohamed. Securing the Future: Real-Time intrusion Detection in IIoT Smart Grids through Innovative AI Solutions. Journal of Cybersecurity and Information Management, vol. , no. , 2025, pp. 208-224. DOI: https://doi.org/10.54216/JCIM.150216
    Mohammad, M. G., S. M., M. (2025). Securing the Future: Real-Time intrusion Detection in IIoT Smart Grids through Innovative AI Solutions. Journal of Cybersecurity and Information Management, (), 208-224. DOI: https://doi.org/10.54216/JCIM.150216
    Mohammad, Mounir. G., Samir. M., Mohamed. Securing the Future: Real-Time intrusion Detection in IIoT Smart Grids through Innovative AI Solutions. Journal of Cybersecurity and Information Management , no. (2025): 208-224. DOI: https://doi.org/10.54216/JCIM.150216
    Mohammad, M. , G., S. , M., M. (2025) . Securing the Future: Real-Time intrusion Detection in IIoT Smart Grids through Innovative AI Solutions. Journal of Cybersecurity and Information Management , () , 208-224 . DOI: https://doi.org/10.54216/JCIM.150216
    Mohammad M. , G. S. , M. M. [2025]. Securing the Future: Real-Time intrusion Detection in IIoT Smart Grids through Innovative AI Solutions. Journal of Cybersecurity and Information Management. (): 208-224. DOI: https://doi.org/10.54216/JCIM.150216
    Mohammad, M. G., S. M., M. "Securing the Future: Real-Time intrusion Detection in IIoT Smart Grids through Innovative AI Solutions," Journal of Cybersecurity and Information Management, vol. , no. , pp. 208-224, 2025. DOI: https://doi.org/10.54216/JCIM.150216