{"id":"https://openalex.org/W7133234266","doi":"https://doi.org/10.48550/arxiv.2602.23846","title":"MI$^2$DAS: A Multi-Layer Intrusion Detection Framework with Incremental Learning for Securing Industrial IoT Networks","display_name":"MI$^2$DAS: A Multi-Layer Intrusion Detection Framework with Incremental Learning for Securing Industrial IoT Networks","publication_year":2026,"publication_date":"2026-02-27","ids":{"openalex":"https://openalex.org/W7133234266","doi":"https://doi.org/10.48550/arxiv.2602.23846"},"language":null,"primary_location":{"id":"pmh:doi:10.48550/arxiv.2602.23846","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5127845460","display_name":"Wei Lian","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Lian, Wei","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5011582148","display_name":"Alejandro Guerra-Manzanares","orcid":"https://orcid.org/0000-0002-3655-5804"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Guerra-Manzanares, Alejandro","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5127845460"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.8980000019073486,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.8980000019073486,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.026100000366568565,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.016699999570846558,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.736299991607666},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6604999899864197},{"id":"https://openalex.org/keywords/incremental-learning","display_name":"Incremental learning","score":0.6141999959945679},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.37599998712539673},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.3353999853134155},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.3082999885082245},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.3034999966621399}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7942000031471252},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.736299991607666},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6604999899864197},{"id":"https://openalex.org/C2780735816","wikidata":"https://www.wikidata.org/wiki/Q28324931","display_name":"Incremental learning","level":2,"score":0.6141999959945679},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.49639999866485596},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.43070000410079956},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.37599998712539673},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3637999892234802},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.3353999853134155},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.3082999885082245},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.3034999966621399},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2831000089645386},{"id":"https://openalex.org/C81669768","wikidata":"https://www.wikidata.org/wiki/Q2359161","display_name":"Precision and recall","level":2,"score":0.2777000069618225},{"id":"https://openalex.org/C100660578","wikidata":"https://www.wikidata.org/wiki/Q18733","display_name":"Recall","level":2,"score":0.2720000147819519},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.2702000141143799},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.26249998807907104},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2599000036716461},{"id":"https://openalex.org/C136389625","wikidata":"https://www.wikidata.org/wiki/Q334384","display_name":"Supervised learning","level":3,"score":0.25369998812675476}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:doi:10.48550/arxiv.2602.23846","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},{"id":"doi:10.48550/arxiv.2602.23846","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.23846","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:doi:10.48550/arxiv.2602.23846","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"sustainable_development_goals":[{"score":0.598524808883667,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0],"rapid":[1],"expansion":[2],"of":[3,124,140,148,166],"Industrial":[4],"IoT":[5],"(IIoT)":[6],"systems":[7,30],"has":[8],"amplified":[9],"security":[10,182],"challenges,":[11,54],"as":[12,172],"heterogeneous":[13],"devices":[14],"and":[15,23,44,75,78,176],"dynamic":[16],"traffic":[17,67],"patterns":[18],"increase":[19],"exposure":[20],"to":[21,37,47,71,83],"sophisticated":[22],"previously":[24],"unseen":[25],"cyberattacks.":[26],"Traditional":[27],"intrusion":[28,60],"detection":[29,61],"often":[31],"struggle":[32],"in":[33],"such":[34],"environments":[35],"due":[36],"their":[38],"reliance":[39],"on":[40,92],"extensive":[41],"labeled":[42],"data":[43],"limited":[45],"ability":[46],"detect":[48],"new":[49],"threats.":[50,185],"To":[51],"address":[52],"these":[53],"we":[55],"propose":[56],"MI$^2$DAS,":[57],"a":[58,122,146,164],"multi-layer":[59],"framework":[62,178],"that":[63],"integrates":[64],"anomaly-based":[65],"hierarchical":[66],"pooling,":[68],"open-set":[69,118],"recognition":[70],"distinguish":[72],"between":[73],"known":[74,127,141],"unknown":[76,135],"attacks":[77],"incremental":[79,152],"learning":[80,153],"for":[81,126,134,179],"adapting":[82],"novel":[84,160],"attack":[85,161],"types":[86],"with":[87],"minimal":[88],"labeling.":[89],"Experiments":[90],"conducted":[91],"the":[93,103,151],"Edge-IIoTset":[94],"dataset":[95],"demonstrate":[96],"strong":[97],"performance":[98,157],"across":[99],"all":[100],"layers.":[101],"In":[102,117],"first":[104],"layer,":[105],"GMM":[106,120],"achieves":[107,131,145],"superior":[108],"normal-attack":[109],"discrimination":[110],"(accuracy":[111],"=":[112,115],"0.953,":[113],"TPR":[114],"1.000).":[116],"recognition,":[119],"attains":[121],"recall":[123,133],"0.813":[125],"attacks,":[128,142],"while":[129],"LOF":[130],"0.882":[132],"attacks.":[136],"For":[137],"fine-grained":[138],"classification":[139],"Random":[143],"Forest":[144],"macro-F1":[147,165],"0.941.":[149],"Finally,":[150],"module":[154],"maintains":[155],"robust":[156],"when":[158],"incorporation":[159],"classes,":[162],"achieving":[163],"0.8995.":[167],"These":[168],"results":[169],"showcase":[170],"MI$^2$DAS":[171],"an":[173],"effective,":[174],"scalable":[175],"adaptive":[177],"enhancing":[180],"IIoT":[181],"against":[183],"evolving":[184]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2026-03-03T00:00:00"}
