| dc.contributor.author | Zhukabayeva, Tamara | |
| dc.contributor.author | Ahmad, Zulfiqar | |
| dc.contributor.author | Adamova, Aigul | |
| dc.contributor.author | Karabayev, Nurdaulet | |
| dc.contributor.author | Abdildayeva, Assel | |
| dc.date.accessioned | 2026-02-20T06:34:48Z | |
| dc.date.available | 2026-02-20T06:34:48Z | |
| dc.date.issued | 2025 | |
| dc.identifier.citation | Zhukabayeva, T.; Ahmad, Z.; Adamova, A.; Karabayev, N.; Abdildayeva, A. An EdgeComputing-Based Integrated Framework for Network Traffic Analysis and Intrusion Detection to Enhance Cyber–Physical System Security in Industrial IoT. Sensors 2025, 25, 2395. https://doi.org/ 10.3390/s25082395 | ru |
| dc.identifier.issn | 1424-8220 | |
| dc.identifier.other | doi.org/10.3390/s25082395 | |
| dc.identifier.uri | http://repository.enu.kz/handle/enu/29253 | |
| dc.description.abstract | Industrial Internet of things (IIoT) environments need to implement reliable security measures because of the growth in network traffic and overall connectivity. Accordingly, this work provides the architecture of network traffic analysis and the detection of intrusions in a network with the help of edge computing and using machine-learning methods. The study uses k-means and DBSCAN techniques to examine the flow of traffic in a network and to discover several groups of behavior and possible anomalies. An assessment of the two clustering methods shows that K-means achieves a silhouette score of 0.612, while DBSCAN achieves 0.473. For intrusion detection, k-nearest neighbors (KNN), random forest (RF), and logistic regression (LR) were used and evaluated. The analysis revealed that both KNN and RF yielded seamless results in terms of precision, recall, and F1 score, close to the maximum possible value of 1.00, as demonstrated by both ROC and precision–recall curves. Accuracy matrices show that RF had better precision and recall for both benign and attacks, while KNN and LR had good detection with slight fluctuations. With the integration of edge computing, the framework is improved by real-time data processing, which means a lower latency of the security system. This work enriches the knowledge of the IIOT by offering a detailed solution to the issue of cybersecurity in IoT systems, based on well-grounded performance assessments and the right implementation of current technologies. The results thus support the effectiveness of the proposed framework to improve security and provide tangible improvements over current approaches by identifying potential threats within a network. | ru |
| dc.language.iso | en | ru |
| dc.publisher | Sensors | ru |
| dc.relation.ispartofseries | 25, 2395; | |
| dc.subject | network analysis | ru |
| dc.subject | clustering | ru |
| dc.subject | cybersecurity | ru |
| dc.subject | intrusion detection and prevention | ru |
| dc.subject | machine learning | ru |
| dc.subject | cyber–physical systems | ru |
| dc.subject | industrial IoT | ru |
| dc.title | An Edge-Computing-Based Integrated Framework for Network Traffic Analysis and Intrusion Detection to Enhance Cyber–Physical System Security in Industrial IoT | ru |
| dc.type | Article | ru |