Chaotic tumbleweed optimization algorithm with stacked deep learning based cyberattack detection in industrial CPS environment

被引:1
|
作者
Alruban, Abdulrahman [1 ]
Alrayes, Fatma S. [2 ]
Kouki, Fadoua [3 ]
Alotaibi, Faiz Abdullah [4 ]
Aljehane, Nojood O. [5 ]
Mohamed, Abdullah [6 ]
机构
[1] Majmaah Univ, Coll Comp & Informat Sci, Dept Informat Technol, Majmaah 11952, Saudi Arabia
[2] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Syst, POB 84428, Riyadh 11671, Saudi Arabia
[3] King Khalid Univ, Appl Coll Muhail Aseer, Dept Financial & Banking Sci, Abha, Saudi Arabia
[4] King Saud Univ, Coll Humanities & Social Sci, Dept Informat Sci, POB 28095, Riyadh 11437, Saudi Arabia
[5] Univ Tabuk, Fac Comp & Informat Technol, Dept Comp Sci, Tabuk, Saudi Arabia
[6] Future Univ Egypt, Res Ctr, New Cairo 11845, Egypt
关键词
Industry; 4.0; Cyber-physical systems; Security; Anomaly detection; Deep learning;
D O I
10.1016/j.aej.2023.10.061
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Cyberattacks on cyber-physical systems (CPS) have led to severe concerns, and then it is most significant to identify the attacks in the initial phase. But, there are major problems that are resolved in this area; it contains the capability of the security method for detecting earlier unknown attacks. These challenges are resolved with system behaviour analysis manners and semi-supervised or unsupervised machine learning (ML) approaches. The efficacy of the attack recognition method is strongly dependent upon the databases utilized for training the ML approaches. Anomaly detection is the procedure of recognizing anomalous procedures, which could not equal the predictable system behaviour. It permits the recognition of novel and secret attacks. Presently, anomaly detection systems are frequently executed utilizing ML like shallow (or traditional) learning and deep learning (DL). This article develops a Chaotic Tumbleweed Optimization Algorithm with Stacked Deep Learning based Cyberattack Detection (CTOASDL-CD) approach in the Industrial CPS platform. The CTOASDL-CD technique intends to exploit the FS with an optimal hyperparameter-tuned DL model for the detection of cyberattacks. To resolve the high dimensionality issue, the CTOASDL-CD technique uses CTOA for feature selection (FS) purposes. Besides, the stacked deep belief network (SDBN) model can be utilized for the recognition of cyberattacks. Finally, the tunicate swarm algorithm (TSA) has been deployed for the capable selection of hyperparameter values of the SDBN approach. To determine the improved performance of the CTOASDL-CD approach, a wide-ranging simulation value was performed. The experimental values demonstrated the capable outcome of the CTOASDL-CD methodology in accomplishing security in the industrial CPS environment.
引用
收藏
页码:250 / 261
页数:12
相关论文
共 50 条
  • [31] Boosting Cyberattack Detection Using Binary Metaheuristics With Deep Learning on Cyber-Physical System Environment
    Al Mazroa, Alanoud
    Albogamy, Fahad R.
    Khairi Ishak, Mohamad
    Mostafa, Samih M.
    IEEE ACCESS, 2025, 13 : 11280 - 11294
  • [32] SENSOR-BASED CYBERATTACK DETECTION IN CRITICAL INFRASTRUCTURES USING DEEP LEARNING ALGORITHMS
    Yilmaz, Murat
    Catak, Ferhat Ozgur
    Gul, Ensar
    COMPUTER SCIENCE-AGH, 2019, 20 (02): : 213 - 243
  • [33] Image Security Retrieval Based on Chaotic Algorithm and Deep Learning
    Zhang, Qing
    Yan, Yong
    Lin, Yong
    Li, Yan
    IEEE ACCESS, 2022, 10 : 67210 - 67218
  • [34] Optimization of CPS Control for Double Deep Q Learning Based on Function Regularization
    Huang, Fuquan
    Shi, Jun
    Mao, Tian
    Tang, Shouquan
    2023 IEEE/IAS INDUSTRIAL AND COMMERCIAL POWER SYSTEM ASIA, I&CPS ASIA, 2023, : 326 - 331
  • [35] Anomaly Detection Algorithm of Industrial Internet of Things Data Platform Based on Deep Learning
    Li, Xing
    Xie, Chao
    Zhao, Zhijia
    Wang, Chunbao
    Yu, Huajun
    IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, 2024, 8 (03): : 1037 - 1048
  • [36] A chaotic teaching learning based optimization algorithm for clustering problems
    Yugal Kumar
    Pradeep Kumar Singh
    Applied Intelligence, 2019, 49 : 1036 - 1062
  • [37] A chaotic teaching learning based optimization algorithm for clustering problems
    Kumar, Yugal
    Singh, Pradeep Kumar
    APPLIED INTELLIGENCE, 2019, 49 (03) : 1036 - 1062
  • [38] Combinational Metamorphic Testing for Deep Learning based Target Detection CPS Systems
    Ma, Siyou
    Hu, Chi
    Deng, Fei
    Zhou, Yuyao
    Shang, Xiaohu
    Wu, Linbo
    Zou, Wei
    Li, Chunlei
    Yang, Wansheng
    Zhang, Hao
    Ren, Fei
    2021 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C 2021), 2021, : 250 - 255
  • [39] Horse Herd optimization with deep learning based intrusion detection in cloud computing environment
    Samineni Nagamani
    S. Arivalagan
    M. Senthil
    P. Sudhakar
    International Journal of Information Technology, 2025, 17 (1) : 387 - 393
  • [40] Study on Exchange Rate Forecasting with Stacked Optimization Based on a Learning Algorithm
    Xie, Weiwei
    Wu, Haifeng
    Liu, Boyu
    Mu, Shengdong
    Nadia, Nedjah
    MATHEMATICS, 2024, 12 (04)