{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T11:10:28Z","timestamp":1773486628654,"version":"3.50.1"},"reference-count":43,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2025,3,23]],"date-time":"2025-03-23T00:00:00Z","timestamp":1742688000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>In recent years, Internet of Things (IoT) systems are used in Industrial Internet of Things (IIoT) systems due to their widespread use in industrial sectors, providing convenience to users in SCADA systems, like other domains. In addition to the diverse technological advancements discussed, the inherent symmetry within the network structures of SCADA systems utilized in the IIoT echoes a fundamental balance sought in digital frameworks. However, along with the advantages of IIoT systems, there are also disadvantages, one major drawback being their vulnerability to attacks. It has been observed that advanced methods such as artificial intelligence, unlike traditional detection techniques, are more successful at detecting attacks on IIoT systems used in SCADA systems. The proposed model was developed to detect cyberattacks on SCADA systems using machine learning and deep learning models. The SCADA network traffic consists of over 7 million rows and has a size of 627 MB. Attack network traffic refers to the type of traffic aimed at causing damage to the system. The attack traffic in this study includes five different attacks. Normal traffic is the type of traffic that facilitates the system\u2019s usual communication. Prepared network traffic is not a different type of traffic. Prepared network traffic, as named, is the state of the traffic dataset that has been made ready for analysis with models. The prepared network traffic was examined using eight machine learning models, including the CART, Decision Tree, KNN, Logistic Regression, Naive Bayes, Random Forest, SVM, and XGBoost models, as well as seven deep learning models, namely, CNN, GRU, LSTM, MLP, RNN, CNN-LSTM, and LSTM-CNN. During the evaluation of the models, performance parameters such as the accuracy, F-score, precision, and recall were considered, and the results are presented accordingly. Upon examining the dataset with various models, the highest outcomes were achieved using the MLP model. The investigation utilizing the MLP model resulted in an accuracy of 99.95%, a precision of 99.63%, a recall of 99.49%, and an F-score of 99.56%. These values were obtained with a batch-size combination of 100 and 20 epochs. By addressing cyberattack detection in SCADA systems used in the IIoT within a big data environment, the study encompasses a multidisciplinary approach, touching upon cybersecurity, big data analytics, AI, information security, and IoT-related concerns, all of which are focal points within the scope of the journal. This breadth and depth of coverage make the study highly relevant and aligned with the diverse interests of the journal.<\/jats:p>","DOI":"10.3390\/sym17040480","type":"journal-article","created":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T13:48:20Z","timestamp":1742824100000},"page":"480","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Symmetrical Resilience: Detection of Cyberattacks for SCADA Systems Used in IIoT in Big Data Environments"],"prefix":"10.3390","volume":"17","author":[{"given":"Celil","family":"Okur","sequence":"first","affiliation":[{"name":"Information Security Engineering, Graduate School of Natural and Applied Sciences, Gazi University, 06560 Ankara, Turkey"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5746-6141","authenticated-orcid":false,"given":"Murat","family":"Dener","sequence":"additional","affiliation":[{"name":"Information Security Engineering, Graduate School of Natural and Applied Sciences, Gazi University, 06560 Ankara, Turkey"}]}],"member":"1968","published-online":{"date-parts":[[2025,3,23]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Tawalbeh, L., Muheidat, F., Tawalbeh, M., and Quwaider, M. (2020). IoT Privacy and Security: Challenges and Solutions. Appl. Sci., 10.","DOI":"10.3390\/app10124102"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.compind.2018.04.015","article-title":"The industrial internet of things (IIoT): An analysis framework","volume":"101","author":"Boyes","year":"2018","journal-title":"Comput. Ind."},{"key":"ref_3","first-page":"228659","article-title":"A Survey on IIoT Security","volume":"8","author":"Yu","year":"2020","journal-title":"IEEE Access"},{"key":"ref_4","first-page":"258","article-title":"Network intrusion detection using naive bayes","volume":"7","author":"Panda","year":"2007","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"ref_5","unstructured":"Teixeira, M. (2024, April 09). IIOT-2018 Dataset for ICS (SCADA) Cybersecurity Research. WUSTL. Available online: https:\/\/www.cse.wustl.edu\/~jain\/iiot\/index.html."},{"key":"ref_6","unstructured":"Goetz, E., and Shenoi, S. (2008). Lessons Learned from the Maroochy Water Breach. Critical Infrastructure Protection, Springer."},{"key":"ref_7","unstructured":"(2024, April 09). Analysis of the Cyber Attack on the Ukrainian Power Grid. Available online: https:\/\/www.researchgate.net\/publication\/378730818_Analysis_of_Ukraine_power_grid_cyber-attack_2015."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H., and Stoddart, K. (2022, January 1\u20133). A review of cyber security risk assessment methods for SCADA systems. Proceedings of the IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security), Bristol, UK.","DOI":"10.1016\/j.cose.2015.09.009"},{"key":"ref_9","unstructured":"Yadav, G., and Paul, K. (2015, January 15\u201318). Architecture and security of SCADA systems: A review. Proceedings of the IEEE International Conference on Advanced Networks and Telecommunication Systems (ANTS), Janeiro, Brazil."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"4486","DOI":"10.1109\/JIOT.2018.2822842","article-title":"IoT cyber security risk modeling for SCADA systems","volume":"5","author":"Gregory","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_11","first-page":"944","article-title":"Security issues in SCADA networks","volume":"91","author":"Igure","year":"2003","journal-title":"Proc. IEEE"},{"key":"ref_12","first-page":"1","article-title":"Identification of malicious activities in industrial internet of things based on Deep Learning Models","volume":"41","author":"Moustafa","year":"2018","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"100034","DOI":"10.1016\/j.csa.2023.100034","article-title":"Security analysis of cyber physical system using digital forensic incident response","volume":"2","author":"Binnar","year":"2024","journal-title":"Cyber Secur. Appl."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Relan, N.G., and Patil, D.R. (2015, January 9\u201310). Implementation of network intrusion detection system using variant of decision tree algorithm. Proceedings of the 2015 International Conference on Nascent Technologies in the Engineering Field (ICNTE), Navi Mumbai, India.","DOI":"10.1109\/ICNTE.2015.7029925"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"108214","DOI":"10.1016\/j.compeleceng.2022.108214","article-title":"DeBot: A deep learning-based model for BOT detection in industrial internet-of-things","volume":"102","author":"Jayalaxmi","year":"2022","journal-title":"Comput. Electr. Eng."},{"key":"ref_16","first-page":"157100","article-title":"Robust Attack Detection Approach for IIoT Using Ensemble Classifier","volume":"7","author":"Priya","year":"2019","journal-title":"IEEE Access"},{"key":"ref_17","first-page":"289","article-title":"Algorithms for detecting network attacks in an enterprise industrial network based on data mining algorithms","volume":"2001","author":"Vulfin","year":"2018","journal-title":"IEEE Conf. Netw. Softwarization NetSoft"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Siddavatam, I., Satish, S., Mahesh, W., and Kazi, F. (2017, January 21\u201323). An Ensemble Learning for Anomaly Identification in SCADA System. Proceedings of the 7th International Conference on Power Systems ICPS, Pune, India.","DOI":"10.1109\/ICPES.2017.8387337"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Li, M., Wang, S., Fang, S., and Zhao, J. (2020). Anomaly Detection of Wind Turbines Based on Deep Small-World Neural Network. Appl. Sci., 10.","DOI":"10.3390\/app10041243"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Yang, H., Cheng, L., and Chuah, M.C. (2019, January 10\u201312). Deep-Learning-Based Network Intrusion Detection for SCADA Systems. Proceedings of the 2019 IEEE Conference on Communications and Network Security CNS, Washington, DC, USA.","DOI":"10.1109\/CNS.2019.8802785"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1007\/s11235-019-00614-3","article-title":"Detection of interruption attack in the wireless networked closed loop industrial control systems","volume":"73","author":"Benisha","year":"2020","journal-title":"Telecommun. Syst."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2019\/8124254","article-title":"Industrial Anomaly Detection and Attack Classification Method Based on Convolutional Neural Network","volume":"2019","author":"Lai","year":"2019","journal-title":"Secur. Commun. Netw."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Naseer, S., Faizan, R., Dominic, P.D.D., and Saleem, Y. (2020). Learning Representations of Network Traffic Using Deep Neural Networks for Network Anomaly Detection: A Perspective towards Oil and Gas IT Infrastructures. Symmetry, 12.","DOI":"10.3390\/sym12111882"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1321","DOI":"10.1109\/JIOT.2020.3009180","article-title":"Omni SCADA Intrusion Detection Using Deep Learning Algorithms","volume":"8","author":"Gao","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_25","first-page":"3485","article-title":"On the Performance of Isolation Forest and Multi-Layer Perceptron for Anomaly Detection in Industrial Control Systems Networks","volume":"17","author":"Alqurashi","year":"2021","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_26","first-page":"62036","article-title":"A Security, Privacy, and Trust Methodology for IIoT","volume":"9","author":"Chen","year":"2021","journal-title":"IEEE Access"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"3003","DOI":"10.1007\/s12652-021-03431-2","article-title":"A neutrosophic WPM-based machine learning model for device trust in industrial internet of things","volume":"14","author":"Khan","year":"2023","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"ref_28","first-page":"573","article-title":"A Lightweight Hybrid Intrusion Detection Framework using Machine Learning for Edge-Based IIoT Security","volume":"19","author":"Guezzaz","year":"2022","journal-title":"Int. Arab. J. Inf. Technol."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"de Elias, E.M., Carriel, V.S., De Oliveira, G.W., Dos Santos, A.L., Nogueira, M., Junior, R.H., and Batista, D.M. (December, January 30). A Hybrid CNN-LSTM Model for IIoT Edge Privacy-Aware Intrusion Detection. Proceedings of the 2022 IEEE Latin-American Conference on Communications (LATINCOM), Rio de Janeiro, Brazil.","DOI":"10.1109\/LATINCOM56090.2022.10000468"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"8362","DOI":"10.1109\/JIOT.2020.2991693","article-title":"A Machine-Learning-Based Technique for False Data Injection Attacks Detection in Industrial IoT","volume":"7","author":"Aboelwafa","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Silva Oliveira, G.A., Lima, P.S.S., Kon, F., Terada, R., Batista, D.M., Hirata, R., and Hamdan, M. (December, January 30). A Stacked Ensemble Classifier for an Intrusion Detection System in the Edge of IoT and IIoT Networks. Proceedings of the 2022 IEEE Latin-American Conference on Communications LATINCOM, Rio de Janeiro, Brazil.","DOI":"10.1109\/LATINCOM56090.2022.10000559"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"4372","DOI":"10.1109\/JSYST.2020.3033423","article-title":"A Weighted Machine Learning-Based Attacks Classification to Alleviating Class Imbalance","volume":"15","author":"Chkirbene","year":"2021","journal-title":"IEEE Syst. J."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1007\/s11416-022-00456-9","article-title":"An effective intrusion detection approach based on ensemble learning for IIoT edge computing","volume":"19","author":"Guezzaz","year":"2022","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Tien, C.W., Huang, T.Y., Chen, P.C., and Wang, J.H. (2020, January 10\u201313). Automatic Device Identification and Anomaly Detection with Machine Learning Techniques in Smart Factories. Proceedings of the 2020 IEEE International Conference on Big Data (Big Data), Chengdu, China.","DOI":"10.1109\/BigData50022.2020.9378168"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"8927830","DOI":"10.1155\/2022\/8927830","article-title":"Deep Learning-Based Privacy-Preserving Data Transmission Scheme for Clustered IIoT Environment","volume":"2022","author":"Lakshmanna","year":"2022","journal-title":"Comput. Intell. Neurosci."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1109\/MNET.001.1800479","article-title":"Hybrid Intrusion Detection System for Edge-Based IIoT Relying on Machine-Learning Aided Detection","volume":"33","author":"Yao","year":"2019","journal-title":"IEEE Netw."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Zolanvari, M., Teixeira, M., and Jain, R. (2018, January 22\u201325). Effect of Imbalanced Datasets on Security of Industrial IoT Using Machine Learning. Proceedings of the 2018 IEEE International Conference on Communications (ICC), Toronto, ON, Canada.","DOI":"10.1109\/ISI.2018.8587389"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Jadidi, Z., Pal, S., Nayak, N., Selvakkumar, A., Chang, C.-C., Beheshti, M., and Jolfaei, A. (2021, January 25\u201328). Security of Machine Learning-Based Anomaly Detection in Cyber Physical Systems. Proceedings of the 2022 International Conference on Computer Communications and Networks ICCCN, Honolulu, HI, USA.","DOI":"10.1109\/ICCCN54977.2022.9868845"},{"key":"ref_39","first-page":"4415","article-title":"Robust Malware Defense in Industrial IoT Applications Using Machine Learning with Selective Adversarial Samples","volume":"56","author":"Khoda","year":"2020","journal-title":"IEEE Trans. Ind. Appl."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Hashemi, S.M., Hashemi, S.A., and Botez, R.M. (2023, January 18). Reliable Aircraft Trajectory Prediction Using Autoencoder Secured with P2P Blockchain. Proceedings of the International Symposium on Unmanned Systems and the Defense Industry, Madrid, Spain.","DOI":"10.1007\/978-3-031-37160-8_41"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Hashemi, S.M., Botez, R.M., and Grigorie, T.L. (2020). New Reliability Studies of Data-Driven Aircraft Trajectory Prediction. Aerospace, 7.","DOI":"10.3390\/aerospace7100145"},{"key":"ref_42","first-page":"2505","article-title":"Cyber-attacks detection in industrial systems using artificial intelligence-driven method","volume":"16","author":"Wang","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","article-title":"Random forests","volume":"45","author":"Breiman","year":"2001","journal-title":"Mach. Learn."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/17\/4\/480\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T16:58:40Z","timestamp":1760029120000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/17\/4\/480"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,23]]},"references-count":43,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2025,4]]}},"alternative-id":["sym17040480"],"URL":"https:\/\/doi.org\/10.3390\/sym17040480","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,23]]}}}