Protection of Network Hacking and Threats in Industry 5.0 Based on DL Intrusion Detection System
Keywords:
Industry 5.0: Intrusion Detection System (IDS): Threat protection: Deep LearningAbstract
Industry 5.0, or the fifth industrial revolution, has been viewed as an important development. Their goal is to create manufacturing techniques that are further user-friendly and environmentally conscious than those of Industry 4.0 by merging the creative abilities of human experts with productive, natural, and prominent technology. Owing to the every day responsibilities we accomplish online, which involve e-banking, e-education, and e-commerce, the Internet has grown to be a vital component of our lives. As a consequence, there is currently an increasing threat from attackers and hackers. Devices or software applications referred to as intrusion detection systems (IDS) investigate a network and/or network activity for illegal conduct or policy alterations. An IDS has been mandatory to detect these particular kinds of hostile endeavors. Tragically, the majority of commercial intrusion detection systems focuses solely on consumption and has been built to determine known crimes. Thus this intrusion detection is proposed in this paper for the detection of hackers and attackers and for protecting the wireless or wired network with advanced security. Therefore the Industries 5.0 version will be effective and give the enhanced revenue and productivity for the industrial owners.
Downloads
References
Maciá-Pérez, F., Mora-Gimeno, F. J., Marcos-Jorquera, D., Gil-Martínez-Abarca, J. A., Ramos-Morillo, H., & Lorenzo-Fonseca, I. (2010). Network intrusion detection system embedded on a smart sensor. IEEE Transactions on Industrial Electronics, 58(3), 722-732.
Kaliappan, J., Thiagarajan, R., & Sundararajan, K. (2015). Fusion of heterogeneous intrusion detection systems for network attack detection. The Scientific World Journal, 2015.
Selim, S., Hashem, M., & Nazmy, T. M. (2011). Hybrid multi-level intrusion detection system. International Journal of Computer Science and Information Security, 9(5), 23.
Cao, B., Li, C., Song, Y., & Fan, X. (2022). Network intrusion detection technology based on convolutional neural network and BiGRU. Computational Intelligence and Neuroscience, 2022.
Man, J., & Sun, G. (2021). A residual learning-based network intrusion detection system. Security and Communication Networks, 2021, 1-9.
Chen, L., Kuang, X., Xu, A., Suo, S., & Yang, Y. (2020, December). A novel network intrusion detection system based on CNN. In 2020 eighth international conference on advanced cloud and big data (CBD) (pp. 243-247). IEEE.
Hu, J., Liu, C., & Cui, Y. (2021). An improved CNN approach for network intrusion detection system. Int. J. Netw. Secur, 23(4), 569-575.
Halbouni, A., Gunawan, T. S., Habaebi, M. H., Halbouni, M., Kartiwi, M., & Ahmad, R. (2022). CNN-LSTM: hybrid deep neural network for network intrusion detection system. IEEE Access, 10, 99837-99849.
Rababah, B., & Srivastava, S. (2020). Hybrid model for intrusion detection systems. arXiv preprint arXiv:2003.08585.
Kim, W., Lee, J., Lee, Y., Kim, Y., Chung, J., & Woo, S. (2022). Vehicular Multilevel Data Arrangement-Based Intrusion Detection System for In-Vehicle CAN. Security and Communication Networks, 2022, 1-11.
Zhang, J., Zulkernine, M., & Haque, A. (2008). Random-forests-based network intrusion detection systems. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 38(5), 649-659.
Javeed, D., Gao, T., Kumar, P., & Jolfaei, A. (2023). An Explainable and Resilient Intrusion Detection System for Industry 5.0. IEEE Transactions on Consumer Electronics.
Kocher, G., & Kumar, G. (2021). Machine learning and deep learning methods for intrusion detection systems: recent developments and challenges. Soft Computing, 25(15), 9731-9763.
Otoum, Y., Liu, D., & Nayak, A. (2022). DL‐IDS: a deep learning–based intrusion detection framework for securing IoT. Transactions on Emerging Telecommunications Technologies, 33(3), e3803.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.