Skip to main content

Advertisement

Log in

Artificial intelligence enabled intrusion detection systems for cognitive cyber-physical systems in industry 4.0 environment

  • Research Article
  • Published:
Cognitive Neurodynamics Aims and scope Submit manuscript

Abstract

In recent days, Cognitive Cyber-Physical System (CCPS) has gained significant interest among interdisciplinary researchers which integrates machine learning (ML) and artificial intelligence (AI) techniques. This era is witnessing a rapid transformation in digital technology and AI where brain-inspired computing-based solutions will play a vital role in industrial informatics. The application of CCPS with brain-inspired computing in Industry 4.0 will create a significant impact on industrial evolution. Though the CCPSs in industrial environment offer several merits, security remains a challenging design issue. The rise of artificial intelligence AI techniques helps to address cybersecurity issues related to CCPS in industry 4.0 environment. With this motivation, this paper presents a new AI-enabled multimodal fusion-based intrusion detection system (AIMMF-IDS) for CCPS in industry 4.0 environment. The proposed model initially performs the data pre-processing technique in two ways namely data conversion and data normalization. In addition, improved fish swarm optimization based feature selection (IFSO-FS) technique is used for the appropriate selection of features. The IFSO technique is derived by the use of Levy Flight (LF) concept into the searching mechanism of the conventional FSO algorithm to avoid the local optima problem. Since the single modality is not adequate to accomplish enhanced detection performance, in this paper, a weighted voting based ensemble model is employed for the multimodal fusion process using recurrent neural network (RNN), bi-directional long short term memory (Bi-LSTM), and deep belief network (DBN), depicts the novelty of the work. The simulation analysis of the presented model highlighted the improved performance over the recent state of art techniques interms of different measures.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  • Aiello G, Giallanza A, Vacante S, Fasoli S, Mascarella G (2020) Propulsion monitoring system for digitized ship management: preliminary results from a case study. Proc Manuf 42:16–23

    Google Scholar 

  • Aljehane NO (2021) A secure intrusion detection system in cyberphysical systems using a parameter-tuned deep-stacked autoencoder. CMC-Comput Mater Cont 68(3):3915–3929

    Google Scholar 

  • Althobaiti MM, Kumar KPM, Gupta D, Kumar S, Mansour RF (2021) An intelligent cognitive computing based intrusion detection for industrial cyber-physical systems. Measurement 186:110145

    Article  Google Scholar 

  • Dabba A, Tari A, Zouache D (2020) Multiobjective artificial fish swarm algorithm for multiple sequence alignment. INFOR Inform Syst Oper Res 58(1):38–59

    Google Scholar 

  • de Araujo-Filho PF, Kaddoum G, Campelo DR, Santos AG, Macêdo D, Zanchettin C (2020) Intrusion detection for cyber–physical systems using generative adversarial networks in fog environment. IEEE Internet Things J 8(8):6247–6256

    Article  Google Scholar 

  • De Sousa Jabbour ABL, Jabbour CJC, Foropon C, Filho MG (2018) When titans meet—can industry 4.0 revolutionise the environmentally-sustainable manufacturing wave? The role of critical success factors. Technol Forecast Soc Change 132:18–25

    Article  Google Scholar 

  • Diro AA, Chilamkurti N (2018) Distributed attack detection scheme using deep learning approach for internet of things. Futur Gener Comput Syst 82(761–768):43

    Google Scholar 

  • Djenouri Y, Belhadi A, Lin JCW et al (2019) Adapted k-nearest neighbors for detecting anomalies on spatio–temporal traffic flow. IEEE Access 7:10015–10027

    Article  Google Scholar 

  • http://www.unb.ca/research/iscx/dataset/iscx-NSL-KDD-dataset.html

  • https://www.unb.ca/cic/datasets/ids-2017.html

  • Jagtap SS, Subramaniyaswamy V (2021) A hypergraph based Kohonen map for detecting intrusions over cyber–physical systems traffic. Fut Gen Comput Syst 119:84–109

    Article  Google Scholar 

  • Jia Y, Wu J, Xu M (2017) Traffic flow prediction with rainfall impact using a deep learning method. J Adv Transp 2017.

  • Jiang JR (2018) An improved cyber-physical systems architecture for Industry 4.0 smart factories. Adv Mech Eng 10(6):1687814018784192

    Article  Google Scholar 

  • Khalili A, Sami A, Khozaei A, Pouresmaeeli S (2018) SIDS: State-based intrusion detection for stage-based cyber physical systems. Int J Crit Infrastruct Protect 22:113–124

    Article  Google Scholar 

  • Kwon S, Yoo H, Shon T (2020) IEEE 1815.1-based power system security with bidirectional RNN-based network anomalous attack detection for cyber-physical system. IEEE Access 8:77572–77586

    Article  Google Scholar 

  • Li X-L (2002) An optimizing method based on autonomous animats: fish-swarm algorithm. Syst Eng Theory Pract 22(11):32–38

    Google Scholar 

  • Li B, Lu R, Wang W, Choo KKR (2017) Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system. J Parallel Distrib Comput 103:32–41

    Article  Google Scholar 

  • Li J, Zhao Z, Li R et al (2018) AI-based two-stage intrusion detection for software defined IoT networks. IEEE Internet Things J 6(2):2093–2102

    Article  Google Scholar 

  • Li B, Wu Y, Song J, Lu R, Li T, Zhao L (2020) DeepFed: federated deep learning for intrusion detection in industrial cyber–physical systems. IEEE Trans Ind Inform 17(8):5615–5624

    Article  Google Scholar 

  • Luo Y, Xiao Y, Cheng L, Peng G, Yao D (2021) Deep learning-based anomaly detection in cyber-physical systems: progress and opportunities. ACM Comput Surv (CSUR) 54(5):1–36

    Article  Google Scholar 

  • Machado CG, Winroth MP, Ribeiro da Silva EHD (2020) Sustainable manufacturing in industry 4.0: an emerging research agenda. Int J Prod Res 58:1462–1484

    Article  Google Scholar 

  • Moustafa N, Adi E, Turnbull B, Hu J (2018) A new threat intelligence scheme for safeguarding industry 4.0 systems. IEEE Access 6:32910–32924

    Article  Google Scholar 

  • Murad A, Pyun JY (2017) Deep recurrent neural networks for human activity recognition. Sensors 17(11):2556

    Article  PubMed Central  Google Scholar 

  • Nguyen GN, Viet NHL, Elhoseny M, Shankar K, Gupta BB, El-Latif AAA (2021) Secure blockchain enabled Cyber–physical systems in healthcare using deep belief network with ResNet model. J Parall Distrib Comput 153:150–160. https://doi.org/10.1016/j.jpdc.2021.03.011

    Article  Google Scholar 

  • Oztemel E, Gursev S (2020) Literature review of industry 4.0 and related technologies. J Intell Manuf 31:127–182

    Article  Google Scholar 

  • Peng Z, Dong K, Yin H, Bai Y (2018) Modification of fish swarm algorithm based on levy flight and firefly behavior. Comput Intell Neurosci 2018.

  • Porkodi V et al (2020) Resource provisioning for cyber–physical–social system in cloud-fog-edge computing using optimal flower pollination algorithm. IEEE Access 8:105311–105319. https://doi.org/10.1109/ACCESS.2020.2999734

    Article  Google Scholar 

  • Radanliev P, De Roure D, Van Kleek M, Santos O, Ani U (2020) Artificial intelligence in cyber physical systems. AI Soc 1–14.

  • Sun R (2020) Potential of full human–machine symbiosis through truly intelligent cognitive systems. AI Soc 35(1):17–28

    Article  Google Scholar 

  • Thakur S, Chakraborty A, De R, Kumar N, Sarkar R (2021) Intrusion detection in cyber-physical systems using a generic and domain specific deep autoencoder model. Comput Elect Eng 91:107044

    Article  Google Scholar 

  • Yang Y, Zheng K, Wu C et al (2019) Building an effective intrusion detection system using the modified density peak clustering algorithm and deep belief networks. Appl Sci 9(2):238

    Article  Google Scholar 

  • Yu J, Liu G (2020) Knowledge-based deep belief network for machining roughness prediction and knowledge discovery. Comput Ind Stry 121:103262

    Article  Google Scholar 

  • Zhang Y, Zhang H, Cai J, Yang B (2014) A weighted voting classifier based on differential evolution. In: Abstract and applied analysis, vol 2014. Hindawi.

Download references

Acknowledgements

The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under grant number (RGP2/209/42).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fahd N. Al-Wesabi.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest. The manuscript was written through contributions of all authors. All authors have given approval to the final version of the manuscript.

Data availability

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alohali, M.A., Al-Wesabi, F.N., Hilal, A.M. et al. Artificial intelligence enabled intrusion detection systems for cognitive cyber-physical systems in industry 4.0 environment. Cogn Neurodyn 16, 1045–1057 (2022). https://doi.org/10.1007/s11571-022-09780-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11571-022-09780-8

Keywords

Navigation