Репозиторий Евразийского национального университета имени Л.Н. Гумилева
Репозиторий Евразийского национального университета имени Л.Н. Гумилева
Репозиторий Евразийского национального университета имени Л.Н. Гумилева
View Item 
  •   DSpace Home
  • Научные статьи
  • 01. Публикации в изданиях зарубежных стран
  • Computer Science
  • View Item
  •   DSpace Home
  • Научные статьи
  • 01. Публикации в изданиях зарубежных стран
  • Computer Science
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

An Edge-Computing-Based Integrated Framework for Network Traffic Analysis and Intrusion Detection to Enhance Cyber–Physical System Security in Industrial IoT

Thumbnail
Authors
Zhukabayeva, Tamara
Ahmad, Zulfiqar
Adamova, Aigul
Karabayev, Nurdaulet
Abdildayeva, Assel
Date
2025
Publisher
Sensors
ISSN
1424-8220
xmlui.dri2xhtml.METS-1.0.item-identifier-citation
Zhukabayeva, T.; Ahmad, Z.; Adamova, A.; Karabayev, N.; Abdildayeva, A. An EdgeComputing-Based Integrated Framework for Network Traffic Analysis and Intrusion Detection to Enhance Cyber–Physical System Security in Industrial IoT. Sensors 2025, 25, 2395. https://doi.org/ 10.3390/s25082395
Abstract
Industrial Internet of things (IIoT) environments need to implement reliable security measures because of the growth in network traffic and overall connectivity. Accordingly, this work provides the architecture of network traffic analysis and the detection of intrusions in a network with the help of edge computing and using machine-learning methods. The study uses k-means and DBSCAN techniques to examine the flow of traffic in a network and to discover several groups of behavior and possible anomalies. An assessment of the two clustering methods shows that K-means achieves a silhouette score of 0.612, while DBSCAN achieves 0.473. For intrusion detection, k-nearest neighbors (KNN), random forest (RF), and logistic regression (LR) were used and evaluated. The analysis revealed that both KNN and RF yielded seamless results in terms of precision, recall, and F1 score, close to the maximum possible value of 1.00, as demonstrated by both ROC and precision–recall curves. Accuracy matrices show that RF had better precision and recall for both benign and attacks, while KNN and LR had good detection with slight fluctuations. With the integration of edge computing, the framework is improved by real-time data processing, which means a lower latency of the security system. This work enriches the knowledge of the IIOT by offering a detailed solution to the issue of cybersecurity in IoT systems, based on well-grounded performance assessments and the right implementation of current technologies. The results thus support the effectiveness of the proposed framework to improve security and provide tangible improvements over current approaches by identifying potential threats within a network.
URI
http://repository.enu.kz/handle/enu/30476
View/Open
AN-EDG~1.PDF (3.832Mb)
Collections
  • Computer Science[445]
Show full item record
CORE Recommender

Евразийский национальный университет имени Л.Н. Гумилева | Научная библиотека | Contact Us
Яндекс.Метрика
Научная библиотека | Contact Us
 

Browse

All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

My Account

LoginRegister

Евразийский национальный университет имени Л.Н. Гумилева | Научная библиотека | Contact Us
Яндекс.Метрика
Научная библиотека | Contact Us