Chaotic tumbleweed optimization algorithm with stacked deep learning based cyberattack detection in industrial CPS environment

被引:1
|
作者
Alruban, Abdulrahman [1 ]
Alrayes, Fatma S. [2 ]
Kouki, Fadoua [3 ]
Alotaibi, Faiz Abdullah [4 ]
Aljehane, Nojood O. [5 ]
Mohamed, Abdullah [6 ]
机构
[1] Majmaah Univ, Coll Comp & Informat Sci, Dept Informat Technol, Majmaah 11952, Saudi Arabia
[2] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Syst, POB 84428, Riyadh 11671, Saudi Arabia
[3] King Khalid Univ, Appl Coll Muhail Aseer, Dept Financial & Banking Sci, Abha, Saudi Arabia
[4] King Saud Univ, Coll Humanities & Social Sci, Dept Informat Sci, POB 28095, Riyadh 11437, Saudi Arabia
[5] Univ Tabuk, Fac Comp & Informat Technol, Dept Comp Sci, Tabuk, Saudi Arabia
[6] Future Univ Egypt, Res Ctr, New Cairo 11845, Egypt
关键词
Industry; 4.0; Cyber-physical systems; Security; Anomaly detection; Deep learning;
D O I
10.1016/j.aej.2023.10.061
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Cyberattacks on cyber-physical systems (CPS) have led to severe concerns, and then it is most significant to identify the attacks in the initial phase. But, there are major problems that are resolved in this area; it contains the capability of the security method for detecting earlier unknown attacks. These challenges are resolved with system behaviour analysis manners and semi-supervised or unsupervised machine learning (ML) approaches. The efficacy of the attack recognition method is strongly dependent upon the databases utilized for training the ML approaches. Anomaly detection is the procedure of recognizing anomalous procedures, which could not equal the predictable system behaviour. It permits the recognition of novel and secret attacks. Presently, anomaly detection systems are frequently executed utilizing ML like shallow (or traditional) learning and deep learning (DL). This article develops a Chaotic Tumbleweed Optimization Algorithm with Stacked Deep Learning based Cyberattack Detection (CTOASDL-CD) approach in the Industrial CPS platform. The CTOASDL-CD technique intends to exploit the FS with an optimal hyperparameter-tuned DL model for the detection of cyberattacks. To resolve the high dimensionality issue, the CTOASDL-CD technique uses CTOA for feature selection (FS) purposes. Besides, the stacked deep belief network (SDBN) model can be utilized for the recognition of cyberattacks. Finally, the tunicate swarm algorithm (TSA) has been deployed for the capable selection of hyperparameter values of the SDBN approach. To determine the improved performance of the CTOASDL-CD approach, a wide-ranging simulation value was performed. The experimental values demonstrated the capable outcome of the CTOASDL-CD methodology in accomplishing security in the industrial CPS environment.
引用
收藏
页码:250 / 261
页数:12
相关论文
共 50 条
  • [21] A Deep Learning-Based Cyberattack Detection System for Transmission Protective Relays
    Khaw, Yew Meng
    Jahromi, Amir Abiri
    Arani, Mohammadreza F. M.
    Sanner, Scott
    Kundur, Deepa
    Kassouf, Marthe
    IEEE TRANSACTIONS ON SMART GRID, 2021, 12 (03) : 2554 - 2565
  • [22] Harnessing feature pruning with optimal deep learning-based distributed denial of service cyberattack detection on IoT environment
    Aboalela, Rania
    Allehaibi, Khalid H.
    Alsaadi, Naif
    Alorfi, Almuhannad S.
    Maghrabi, Louai A.
    Ashary, Ehab Bahaudien
    Alghamdi, Wajdi
    Ragab, Mahmoud
    ALEXANDRIA ENGINEERING JOURNAL, 2025, 120 : 584 - 597
  • [23] BIRD SWARM OPTIMIZATION-BASED STACKED AUTOENCODER DEEP LEARNING FOR UMPIRE DETECTION AND CLASSIFICATION
    Nandyal, Suvarna
    Kattimani, Survana Laxmikant
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2020, 21 (02): : 173 - 188
  • [24] Bird Swarm optimization-based stacked autoencoder deep learning for umpire detection and classification
    Nandyal S.
    Kattimani S.L.
    1600, West University of Timisoara, B-dul Vasile Parvan 4, Timisoara, 300223, Romania (21): : 173 - 188
  • [25] FSL: federated sequential learning-based cyberattack detection for Industrial Internet of Things
    Fangyu Li
    Junnuo Lin
    Honggui Han
    Industrial Artificial Intelligence, 1 (1):
  • [26] A new deep model based on the stacked autoencoder with intensified iterative learning style for industrial fault detection
    Yu, Jianbo
    Yan, Xuefeng
    PROCESS SAFETY AND ENVIRONMENTAL PROTECTION, 2021, 153 : 47 - 59
  • [27] APPLICATION OF DEEP LEARNING ALGORITHM IN VISUAL OPTIMIZATION OF INDUSTRIAL DESIGN
    Zhang C.
    Scalable Computing, 2024, 25 (04): : 2175 - 2182
  • [28] Optimal Deep Learning-based Cyberattack Detection and Classification Technique on Social Networks
    Albraikan, Amani Abdulrahman
    Hassine, Siwar Ben Haj
    Fati, Suliman Mohamed
    Al-Wesabi, Fahd N.
    Hilal, Anwer Mustafa
    Motwakel, Abdelwahed
    Hamza, Manar Ahmed
    Al Duhayyim, Mesfer
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (01): : 907 - 923
  • [29] A Deep Learning-Based Cyberattack Detection Method for Transmission Line Differential Relays
    Elgamal, Mohamed
    Eladl, Abdelfattah A.
    Sedhom, Bishoy E.
    Sheta, Ahmed N.
    Refaat, Ahmed
    Menaem, A. Abdel
    INTERNET OF THINGS, 2025, 31
  • [30] A hybrid Ant Lion Optimization algorithm based lightweight deep learning framework for cyber attack detection in IoT environment
    Gupta, Brij B.
    Gaurav, Akshat
    Attar, Razaz Waheeb
    Arya, Varsha
    Bansal, Shavi
    Alhomoud, Ahmed
    Chui, Kwok Tai
    COMPUTERS & ELECTRICAL ENGINEERING, 2025, 122