Chaotic tumbleweed optimization algorithm with stacked deep learning based cyberattack detection in industrial CPS environment

被引:1
|
作者
Alruban, Abdulrahman [1 ]
Alrayes, Fatma S. [2 ]
Kouki, Fadoua [3 ]
Alotaibi, Faiz Abdullah [4 ]
Aljehane, Nojood O. [5 ]
Mohamed, Abdullah [6 ]
机构
[1] Majmaah Univ, Coll Comp & Informat Sci, Dept Informat Technol, Majmaah 11952, Saudi Arabia
[2] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Syst, POB 84428, Riyadh 11671, Saudi Arabia
[3] King Khalid Univ, Appl Coll Muhail Aseer, Dept Financial & Banking Sci, Abha, Saudi Arabia
[4] King Saud Univ, Coll Humanities & Social Sci, Dept Informat Sci, POB 28095, Riyadh 11437, Saudi Arabia
[5] Univ Tabuk, Fac Comp & Informat Technol, Dept Comp Sci, Tabuk, Saudi Arabia
[6] Future Univ Egypt, Res Ctr, New Cairo 11845, Egypt
关键词
Industry; 4.0; Cyber-physical systems; Security; Anomaly detection; Deep learning;
D O I
10.1016/j.aej.2023.10.061
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Cyberattacks on cyber-physical systems (CPS) have led to severe concerns, and then it is most significant to identify the attacks in the initial phase. But, there are major problems that are resolved in this area; it contains the capability of the security method for detecting earlier unknown attacks. These challenges are resolved with system behaviour analysis manners and semi-supervised or unsupervised machine learning (ML) approaches. The efficacy of the attack recognition method is strongly dependent upon the databases utilized for training the ML approaches. Anomaly detection is the procedure of recognizing anomalous procedures, which could not equal the predictable system behaviour. It permits the recognition of novel and secret attacks. Presently, anomaly detection systems are frequently executed utilizing ML like shallow (or traditional) learning and deep learning (DL). This article develops a Chaotic Tumbleweed Optimization Algorithm with Stacked Deep Learning based Cyberattack Detection (CTOASDL-CD) approach in the Industrial CPS platform. The CTOASDL-CD technique intends to exploit the FS with an optimal hyperparameter-tuned DL model for the detection of cyberattacks. To resolve the high dimensionality issue, the CTOASDL-CD technique uses CTOA for feature selection (FS) purposes. Besides, the stacked deep belief network (SDBN) model can be utilized for the recognition of cyberattacks. Finally, the tunicate swarm algorithm (TSA) has been deployed for the capable selection of hyperparameter values of the SDBN approach. To determine the improved performance of the CTOASDL-CD approach, a wide-ranging simulation value was performed. The experimental values demonstrated the capable outcome of the CTOASDL-CD methodology in accomplishing security in the industrial CPS environment.
引用
收藏
页码:250 / 261
页数:12
相关论文
共 50 条
  • [1] A Stacked Deep Learning Approach for IoT Cyberattack Detection
    Alotaibi, Bandar
    Alotaibi, Munif
    JOURNAL OF SENSORS, 2020, 2020
  • [2] CTOA: Toward a Chaotic-Based Tumbleweed Optimization Algorithm
    Wu, Tsu-Yang
    Shao, Ankang
    Pan, Jeng-Shyang
    MATHEMATICS, 2023, 11 (10)
  • [3] Trustworthy and Reliable Deep-Learning-Based Cyberattack Detection in Industrial IoT
    Khan, Fazlullah
    Alturki, Ryan
    Rahman, Md Arafatur
    Mastorakis, Spyridon
    Razzak, Imran
    Shah, Syed Tauhidullah
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (01) : 1030 - 1038
  • [4] Artificial intelligence based optimization with deep learning model for blockchain enabled intrusion detection in CPS environment
    Romany F. Mansour
    Scientific Reports, 12
  • [5] Artificial intelligence based optimization with deep learning model for blockchain enabled intrusion detection in CPS environment
    Mansour, Romany F.
    SCIENTIFIC REPORTS, 2022, 12 (01)
  • [6] Optimization Research of Bird Detection Algorithm Based on YOLO in Deep Learning Environment
    Chen, Xi
    Zhang, Zhenyu
    INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, 2024,
  • [7] Modeling of Botnet Detection Using Chaotic Binary Pelican Optimization Algorithm With Deep Learning on Internet of Things Environment
    Alrowais, Fadwa
    Eltahir, Majdy M.
    Aljameel, Sumayh S.
    Marzouk, Radwa
    Mohammed, Gouse Pasha
    Salama, Ahmed S.
    IEEE ACCESS, 2023, 11 : 130618 - 130626
  • [8] Optimal Deep-Learning-Based Cyberattack Detection in a Blockchain-Assisted IoT Environment
    Assiri, Fatmah Y.
    Ragab, Mahmoud
    MATHEMATICS, 2023, 11 (19)
  • [9] Gradient Optimizer Algorithm with Hybrid Deep Learning Based Failure Detection and Classification in the Industrial Environment
    Zarouan, Mohamed
    Mehedi, Ibrahim M.
    Latif, Shaikh Abdul
    Rana, Md. Masud
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2024, 138 (02): : 1341 - 1364
  • [10] Enhanced Crow Search with Deep Learning-Based Cyberattack Detection in SDN-IoT Environment
    Motwakel, Abdelwahed
    Alrowais, Fadwa
    Tarmissi, Khaled
    Marzouk, Radwa
    Mohamed, Abdullah
    Zamani, Abu Sarwar
    Yaseen, Ishfaq
    Eldesouki, Mohamed I.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 36 (03): : 3157 - 3173