Awesome
GID
-
If you are interested in this paper, please contact wangyizyc409@126.com at any time if you have any questions, I am pleased to discuss with you.
-
This is the source code of "Y. Zhang, C. Yang, K. Huang and Y. Li, "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks," in IEEE Transactions on Network Science and Engineering, vol. 10, no. 5, pp. 2894-2905, 1 Sept.-Oct. 2023, doi: 10.1109/TNSE.2022.3184975."
-
The DOI of this paper is: 10.1109/TNSE.2022.3184975
-
Mississippi data, mentioned in the paper, can be obtained from Mississippi Industrial Control System (ICS) Cyber Attack Datasets
-
The data in /data/HardinLoopPlatform is collected from the hard-in-the-loop platform of School of Automation of Central South University. The photo of the self-built platform is shown below:
-
The details of this platform can be found in this paper: False Data Injection Attack Testbed of Industrial Cyber-Physical Systems of Process Industry and A Detection Application
-
If you find the source code useful, please cite:
@ARTICLE{9802721,
author={Zhang, Yichi and Yang, Chunhua and Huang, Keke and Li, Yonggang},
journal={IEEE Transactions on Network Science and Engineering},
title={Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks},
year={2023},
volume={10},
number={5},
pages={2894-2905},
abstract={Industrial Internet-of-Things (IIoT) are highly vulnerable to cyber-attacks due to their open deployment in unattended environments. Intrusion detection is an efficient solution to improve security. However, because the labeled samples are difficult to obtain, and the sample categories are imbalanced in real applications, it is difficult to obtain a reliable model. In this paper, a general framework for intrusion detection is proposed based on graph neural network technologies. In detail, a network embedding feature representation is proposed to deal with the high dimensional, redundant but categories imbalanced and rare labeled data in IIoT. To avoid the influence caused by the inaccurate network structure, a network constructor with refinement regularization is designed to amend it. At last, the network embedding representation weights and network constructor are trained together. The high accuracy and robust properties of the proposed method were verified by conducting intrusion detection tasks based on public datasets. Compared with several state-of-art algorithms, the proposed framework outperforms these methods in many evaluation metrics. In addition, a hard-in-the-loop platform is designed to test the performance in real environments. The results show that the method can not only identify different attacks but also distinguish between cyber-attacks and physical failures.},
keywords={},
doi={10.1109/TNSE.2022.3184975},
ISSN={2327-4697},
month={Sep.},}
- In Jan. 18 2024, I noticed that this paper is marked as highly cited and hot paper on web of science, I am so excited! Although I have already left the academia for some reasons, I am still happy my work can be accepted by other researchers.