Waste Assessment Model for an Innovative Engineering Educational Framework: Integrating Lean Management into Outcome-Based Engineering Education (OBEE)

Waste Assessment Model for an Innovative Engineering Educational Framework: Integrating Lean Management into Outcome-Based Engineering Education (OBEE)

  IJETT-book-cover           
  
© 2025 by IJETT Journal
Volume-73 Issue-11
Year of Publication : 2025
Author : Saifur Rahman
DOI : 10.14445/22315381/IJETT-V73I11P112

How to Cite?
Saifur Rahman ,"Waste Assessment Model for an Innovative Engineering Educational Framework: Integrating Lean Management into Outcome-Based Engineering Education (OBEE)", International Journal of Engineering Trends and Technology, vol. 73, no. 11, pp.147-164, 2025. Crossref, https://doi.org/10.14445/22315381/IJETT-V73I11P112

Abstract
The rapid proliferation of Industrial Internet of Things (IIoT) systems has introduced unprecedented cybersecurity challenges that require advanced detection and response mechanisms. This paper presents a novel cybersecurity framework that leverages Digital Twin (DT) technology to create a comprehensive security solution for IIoT environments. The proposed framework addresses critical limitations in existing approaches by integrating three interconnected models within a unified digital twin architecture that provides real-time monitoring, intelligent anomaly detection, and automated threat classification. The methodology creates a dynamic virtual replica of the physical IIoT network, enabling proactive security management through continuous behavioral analysis and predictive threat assessment. The framework was evaluated using the Edge-IIoT dataset containing 63 features across 15 attack classes plus normal traffic. Experimental results demonstrate exceptional performance with a classification accuracy of 99.97%, Precision (Pr) of 99.77%, Recall (Re) of 99.64%, and F1-score (Fs) of 99.70% for multiclass threat classification. The anomaly detection component achieved a Pr of 99.74% and ROC-AUC of 90.79%, effectively distinguishing between normal and malicious network behaviors. The reconstruction-based anomaly detection mechanism showed clear separation between normal traffic (mean reconstruction error: 0.006) and attack traffic (mean reconstruction error: 1.289), validating the framework’s ability to identify previously unseen threats. These results demonstrate the effectiveness of the proposed digital twin-based approach in providing comprehensive cybersecurity protection for IIoT environments, significantly outperforming traditional security solutions while enabling real-time threat response and proactive incident management.

Keywords
Anomaly Detection, Cybersecurity, Digital Twin, Edge-IIoT Dataset, Industrial Internet of Things (IIoT), Intrusion Detection System (IDS), Machine Learning, Threat Classification.

References
[1] Alessandra De Benedictis et al., “Digital Twins for Anomaly Detection in the Industrial Internet of Things: Conceptual Architecture and Proof-of-Concept,” IEEE Transactions on Industrial Informatics, vol. 19, no. 12, pp. 11553-11563, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Zhi Qiang Wang, and Abdulmotaleb El Saddik, “DTITD: An Intelligent Insider Threat Detection Framework Based on Digital Twin and Self-Attention Based Deep Learning Models,” IEEE Access, vol. 11, no. 10, pp. 114013-114030, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Seba Anna Varghese et al., “Digital Twin-based Intrusion Detection for Industrial Control Systems,” 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), Pisa, Italy, pp. 611-617, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Qinghua Xu, Shaukat Ali, and Tao Yue, “Digital Twin-based Anomaly Detection with Curriculum Learning in Cyber-Physical Systems,” ACM Transactions on Software Engineering and Methodology, vol. 32, no. 5, pp. 1-32, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Burcu Bolat-Akça, and Elif Bozkaya-Aras, “Digital Twin-Assisted Intelligent Anomaly Detection System for Internet of Things,” Ad Hoc Networks, vol. 158, no. 10, pp. 123-135, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Mikail Mohammed Salim, David Camacho, and Jong Hyuk Park, “Digital Twin and Federated Learning Enabled Cyberthreat Detection System for IoT Networks,” Future Generation Computer Systems, vol. 161, pp. 701-713, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Fatemeh Akbarian, Emma Fitzgerald, and Maria Kihl, “Intrusion Detection in Digital Twins for Industrial Control Systems,” 2020 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia, pp. 1-6, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[8] S. Krishnaveni et al., “CyberDefender: An Integrated Intelligent Defense Framework for Digital-Twin-Based Industrial Cyber-Physical Systems,” Cluster Comput, vol. 27, no. 6, pp. 7273-7306, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[9] S. Krishnaveni et al., “TwinSec-IDS: An Enhanced Intrusion Detection System in SDN-Digital-Twin-Based Industrial Cyber-Physical Systems,” Concurrency and Computation: Practice and Experience, vol. 37, no. 3, pp. 1-12, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Easa Alalwany et al., “Stacking Ensemble Deep Learning for Real-Time Intrusion Detection in IoMT Environments,” Sensors, vol. 25, no. 3, pp. 1-21, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Arreche, Osvaldo, Tanish Guntur, and Mustafa Abdallah, “XAI-IDS: Toward Proposing an Explainable Artificial Intelligence Framework for Enhancing Network Intrusion Detection Systems,” Applied Sciences, vol. 14, no. 10, pp. 1-41, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[12] A. Namrita Gummadi, J. C. Napier and M. Abdallah, “XAI-IoT: An Explainable AI Framework for Enhancing Anomaly Detection in IoT Systems,” IEEE Access, vol. 12, no. 5, pp. 71024-71054, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Nabeel H. Al-A’araji, Safaa O. Al-Mamory, and Ali H. Al-Shakarchi, “Classification and Clustering Based Ensemble Techniques for Intrusion Detection Systems: A Survey,” Journal of Physics: Conference Series, Iraqi Academics Syndicate International Conference for Pure and Applied Sciences (IICPS), Babylon, Iraq, vol. 1818, pp. 1-35, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Ahmed Mahfouz et al., “Ensemble Classifiers for Network Intrusion Detection Using a Novel Network Attack Dataset,” Future Internet, vol. 12, no. 11, pp. 1-19, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Riccardo Lazzarini, Huaglory Tianfield, and Vassilis Charissis, “A Stacking Ensemble of Deep Learning Models for IoT Intrusion Detection,” Knowledge-Based Systems, vol. 279, pp. 1-13, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Yongzhong Cao et al., “An Intrusion Detection System Based on Stacked Ensemble Learning for IoT Network,” Computers and Electrical Engineering, vol. 110, pp. 1-19, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Ghalia Nassreddine, Mohamad Nassereddine, and Obada Al-Khatib, “Ensemble Learning for Network Intrusion Detection Based on Correlation and Embedded Feature Selection Techniques,” Computer, vol. 14, no. 3, pp. 1-23, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Uday Chandra Akuthota, and Lava Bhargava, “Transformer-Based Intrusion Detection for IoT Networks,” IEEE Internet of Things Journal, vol. 12, no. 5, pp. 6062-6067, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Moussab Orabi et al., “Anomaly Detection in Smart Manufacturing: An Adaptive Adversarial Transformer-Based Model,” Journal of Manufacturing Systems, vol. 77, pp. 591-611, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Mustafa Abdallah et al., “Anomaly Detection and Inter-Sensor Transfer Learning on Smart Manufacturing Datasets,” Sensors, vol. 23, no. 1, pp. 1-22, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Baibhab Chatterjee et al., “Context-Aware Collaborative Intelligence with Spatio-Temporal In-Sensor-Analytics for Efficient Communication in a Large-Area IoT Testbed,” IEEE Internet of Things Journal, vol. 8, no. 8, pp. 6800-6814, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Yazeed Alotaibi, and Mohammad Ilyas, “Ensemble-Learning Framework for Intrusion Detection to Enhance Internet of Things’ Devices Security,” Sensors, vol. 23, no. 12, pp. 1-20, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Tommaso Zoppi, Andrea Ceccarelli, and Andrea Bondavalli, “MADneSs: A Multi-Layer Anomaly Detection Framework for Complex Dynamic Systems,” IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 2, pp. 796-809, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Evgeniya Petrova Nikolova, and Veselina Gospodinova Jecheva, “Anomaly Based Intrusion Detection Based on the Junction Tree Algorithm,” Proceedings of the International Multiconference on Computer Science and Information Technology, pp. 641-649, 2007.
[Google Scholar] [Publisher Link]
[25] Danish Javeed et al., “An Intrusion Detection System for Edge-Envisioned Smart Agriculture in Extreme Environment,” IEEE Internet of Things Journal, vol. 11, no. 16, pp. 26866-26876, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Minyue Wu et al., “TRACER: Attack-Aware Divide-and-Conquer Transformer for Intrusion Detection in Industrial Internet of Things,” IEEE Transactions on Industrial Informatics, vol. 21, no. 6, pp. 4924-4934, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Ahmad Salehiyan, Pardis Sadatian Moghaddam, and Masoud Kaveh, “An Optimized Transformer-GAN-AE for Intrusion Detection in Edge and IIoT Systems: Experimental Insights from WUSTL-IIoT-2021, EdgeIIoTset, and TON_IoT Datasets,” Future Internet, vol. 17, no. 7, pp. 1-34, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Haonan Peng, Chunming Wu, and Yanfeng Xiao, “FD-IDS: Federated Learning with Knowledge Distillation for Intrusion Detection in Non-IID IoT Environments,” Sensors, vol. 25, no. 14, pp. 1-31, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Ali Abdi Seyedkolaei, Fatemeh Mahmoudi, and José García, “A Deep Learning Approach for Multiclass Attack Classification in IoT and IIoT Networks Using Convolutional Neural Networks,” Future Internet, vol. 17, no. 6, pp. 1-21, 2025.
[CrossRef] [Google Scholar] [Publisher Link]