Optimizing Feature Selection for IIoT Security: A Sequential Machine Learning Strategy
Abstract
IIoT attacks have the potential to stop industrial processes, which can result in lost production, broken equipment, and large financial losses. IIoT systems frequently manage sensitive data, including operational, proprietary, and employee personal data. Attacks may result in information theft, misuse, and data breaches. To depict the behaviors and interactions of IIoT dev ices, extract pertinent elements from the raw data. features may consist of command sequences, resource use measurements, and device communication patterns. Most of the existing systems uses tree-based techniques or embedded techniques like LASSO to further hone the feature set in accordance with model performance. It may not be ideal if all correlated features are significant because LASSO has a tendency to randomly choose one feature from a set of highly correlated data and ignore the others. The proposed model designs a sequence of ml models namely Random Forest followed by Integrated KNN and logistic regression as feature selector because this order guarantees that the features are assessed using several viewpoints: ensemble techniques (Random Forest), non-parametric methods based on distance (KNN), and linear models (Logistic Regression). The balancing of complexity, performance, and interpretability can be accomplished by using these techniques. A more robust feature selection procedure results from each phase that lessens the drawbacks of the one before it.
References
2. Chuang, Hong-Yu & Chen, Ruey-Maw. (2024). Feature Selection for Malicious Detection on Industrial IoT Using Machine Learning. Sensors and Materials. 36. 1035. 10.18494/SAM4666.
3. Alshehri, Mohammed & Saidani, Oumaima&Alrayes, Fatma & Abbasi, Saadullah & Ahmad, Jawad. (2024). A Self-Attention-Based Deep Convolutional Neural Networks for IIoT Networks Intrusion Detection. IEEE Access. PP. 1-1. 10.1109/ACCESS.2024.3380816.
4. Supriya, Belkar. “Trustworthy and reliable machine learning based cyberattack detection in IOT.” IJPAST 14, no.1 (2024)
5. Melicias, Francisco & Ribeiro, Tiago &Rabadão, Carlos & Santos, Leonel & Costa, Rogério Luís. (2024). GPT and Interpolation-Based Data Augmentation for Multiclass Intrusion Detection in IIoT. IEEE Access. 12. 17945-17965. 10.1109/ACCESS.2024.3360879.
6. Jeffrey, Nicholas & Tan, Qing & Villar, Jose. (2024). Using Ensemble Learning for Anomaly Detection in Cyber–Physical Systems. Electronics. 13. 1391. 10.3390/electronics13071391.
7. Ferrag, Mohamed Amine & Ndhlovu, Mthandazo& Tihanyi, Norbert & Cordeiro, Lucas & Debbah, merouane&Lestable, Thierry & Thandi, Narinderjit. (2024). Revolutionizing Cyber Threat Detection with Large Language Models: A privacy-preserving BERT-based Lightweight Model for IoT/IIoT Devices. IEEE Access. PP. 10.1109/ACCESS.2024.3363469.
8. Zhang, Y., et al. (2023). A survey on machine learning for anomaly detection in IIOT networks. Computers &Eletrical Engineering. https://doi.org/10.1013/j.compeleceng.2023.107670
9. Jin, X.,et al.(2023). Deep learning-based intrusion detection system for IIoT networks. Further Generation Computer Systems. https://doi.org/10.1013/j,future.2023.08.022
10. Lee, S., &Kim,J.(2022 Ensemble-based intrusioin detection system for industrial IoT environments. Computers & Security, 114, 102293. https//doi.org/10.1016/j.cose.2021.102293

