Chaotic tumbleweed optimization algorithm with stacked deep learning based cyberattack detection in industrial CPS environment

被引:1
|
作者
Alruban, Abdulrahman [1 ]
Alrayes, Fatma S. [2 ]
Kouki, Fadoua [3 ]
Alotaibi, Faiz Abdullah [4 ]
Aljehane, Nojood O. [5 ]
Mohamed, Abdullah [6 ]
机构
[1] Majmaah Univ, Coll Comp & Informat Sci, Dept Informat Technol, Majmaah 11952, Saudi Arabia
[2] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Syst, POB 84428, Riyadh 11671, Saudi Arabia
[3] King Khalid Univ, Appl Coll Muhail Aseer, Dept Financial & Banking Sci, Abha, Saudi Arabia
[4] King Saud Univ, Coll Humanities & Social Sci, Dept Informat Sci, POB 28095, Riyadh 11437, Saudi Arabia
[5] Univ Tabuk, Fac Comp & Informat Technol, Dept Comp Sci, Tabuk, Saudi Arabia
[6] Future Univ Egypt, Res Ctr, New Cairo 11845, Egypt
关键词
Industry; 4.0; Cyber-physical systems; Security; Anomaly detection; Deep learning;
D O I
10.1016/j.aej.2023.10.061
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Cyberattacks on cyber-physical systems (CPS) have led to severe concerns, and then it is most significant to identify the attacks in the initial phase. But, there are major problems that are resolved in this area; it contains the capability of the security method for detecting earlier unknown attacks. These challenges are resolved with system behaviour analysis manners and semi-supervised or unsupervised machine learning (ML) approaches. The efficacy of the attack recognition method is strongly dependent upon the databases utilized for training the ML approaches. Anomaly detection is the procedure of recognizing anomalous procedures, which could not equal the predictable system behaviour. It permits the recognition of novel and secret attacks. Presently, anomaly detection systems are frequently executed utilizing ML like shallow (or traditional) learning and deep learning (DL). This article develops a Chaotic Tumbleweed Optimization Algorithm with Stacked Deep Learning based Cyberattack Detection (CTOASDL-CD) approach in the Industrial CPS platform. The CTOASDL-CD technique intends to exploit the FS with an optimal hyperparameter-tuned DL model for the detection of cyberattacks. To resolve the high dimensionality issue, the CTOASDL-CD technique uses CTOA for feature selection (FS) purposes. Besides, the stacked deep belief network (SDBN) model can be utilized for the recognition of cyberattacks. Finally, the tunicate swarm algorithm (TSA) has been deployed for the capable selection of hyperparameter values of the SDBN approach. To determine the improved performance of the CTOASDL-CD approach, a wide-ranging simulation value was performed. The experimental values demonstrated the capable outcome of the CTOASDL-CD methodology in accomplishing security in the industrial CPS environment.
引用
收藏
页码:250 / 261
页数:12
相关论文
共 50 条
  • [41] Small-scale defect detection in industrial environment based on lightweight deep learning network
    Ye Z.-X.
    Liu M.-Q.
    Zhang S.-L.
    Kongzhi yu Juece/Control and Decision, 2023, 38 (05): : 1231 - 1238
  • [42] Malware detection based on deep learning algorithm
    Ding Yuxin
    Zhu Siyi
    NEURAL COMPUTING & APPLICATIONS, 2019, 31 (02): : 461 - 472
  • [43] Malware detection based on deep learning algorithm
    Ding Yuxin
    Zhu Siyi
    Neural Computing and Applications, 2019, 31 : 461 - 472
  • [44] Deep learning enabled intrusion detection system for Industrial IOT environment
    Nandanwar, Himanshu
    Katarya, Rahul
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 249
  • [45] An IoT-based human detection system for complex industrial environment with deep learning architectures and transfer learning
    Ahmed, Imran
    Anisetti, Marco
    Jeon, Gwanggil
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (12) : 10249 - 10267
  • [46] Modified arithmetic optimization algorithm with Deep Learning based data analytics for depression detection
    Alruwais, Nuha
    Alamro, Hayam
    Eltahir, Majdy M.
    Salama, Ahmed S.
    Assiri, Mohammed
    Ahmed, Noura Abdelaziz
    AIMS MATHEMATICS, 2023, 8 (12): : 30335 - 30352
  • [47] Implementation of African vulture optimization algorithm based on deep learning for cybersecurity intrusion detection
    Alsirhani, Amjad
    Alshahrani, Mohammed Mujib
    Hassan, Ahmed M.
    Taloba, Ahmed I.
    El-Aziz, Rasha M. Abd
    Samak, Ahmed H.
    ALEXANDRIA ENGINEERING JOURNAL, 2023, 79 : 105 - 115
  • [48] DEEP LEARNING OF QINLING FOREST FIRE ANOMALY DETECTION BASED ON GENETIC ALGORITHM OPTIMIZATION
    Jiang, Yuan
    Wei, Rui
    Chen, Jian
    Wang, Guibao
    UNIVERSITY POLITEHNICA OF BUCHAREST SCIENTIFIC BULLETIN SERIES C-ELECTRICAL ENGINEERING AND COMPUTER SCIENCE, 2021, 83 (04): : 75 - 84
  • [49] Deep learning of qinling forest fire anomaly detection based on genetic algorithm optimization
    Jiang, Yuan
    Wei, Rui
    Chen, Jian
    Wang, Guibao
    UPB Scientific Bulletin, Series C: Electrical Engineering and Computer Science, 2021, 83 (04): : 75 - 84
  • [50] Sparrow Search Algorithm With Stacked Deep Learning Based Medical Image Analysis for Pancreatic Cancer Detection and Classification
    Ramesh, Janjhyam Venkata Naga
    Abirami, T.
    Gopalakrishnan, T.
    Narayanasamy, Kanagaraj
    Ishak, Mohamad Khairi
    Karim, Faten Khalid
    Mostafa, Samih M.
    Allakany, Alaa
    IEEE ACCESS, 2023, 11 : 111927 - 111935