Skip to main content

Advertisement

Log in

Deep learning enabled class imbalance with sand piper optimization based intrusion detection for secure cyber physical systems

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

A cyber physical system (CPS) is a network of cyber (computation, communication) and physical (sensors, actuators) components which interact with one another in a feedback form with human intervention. CPS authorizes the critical infrastructure and is treated as essential in day to day life as they exist in the basis of future smart devices. The increased exploitation of the CPS results in various threats and becomes a global problem. Therefore, it becomes essential to develop a safe, efficient, and robust CPS for real tine environment. For resolving this problem and accomplish security in CPS environment, intrusion detection system (IDS) can be developed. This study introduces an imbalanced generative adversarial network (IGAN) with optimal kernel extreme learning machine (OKELM), called IGAN-OKELM technique for intrusion detection in CPS environment. The proposed IGAN-OKELM technique mainly aims to address the class imbalance problem and intrusion detection. Besides, the IGAN-OKELM technique involves the IGAN model handling the class imbalance problem by the use of imbalanced data filter and convolution layers to the conventional generative adversarial network (GAN), which generates new instances for minority class labels. Moreover, the OKELM model is applied as a classifier and the optimal parameter tuning of the KELM model is performed by the use of sand piper optimization (SPO) algorithm and thereby improvises the intrusion detection performance. A wide ranging simulation analysis is carried out using benchmark dataset and the results are examined under varying aspects. The experimental results reported the better performance of the IGAN-OKELM technique over the recent state of art approaches interms of different measures.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Data availability

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.

References

  1. Luo, Y., Xiao, Y., Cheng, L., Peng, G., Yao, D.: Deep learning-based anomaly detection in cyber-physical systems: progress and opportunities. ACM Comput. Surv. (CSUR) 54(5), 1–36 (2021)

    Article  Google Scholar 

  2. Lun, Y.Z., DâĂŹInnocenzo, A., Smarra, F., Malavolta, I., Benedetto, M.D.D.: State of the art of cyber-physical systems security: an automatic control perspective. J. Syst. Softw. 149(2019), 174–216 (2019)

    Google Scholar 

  3. Mitchell, R., Chen, I.-R.: A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surv. (CSUR) 46(4), 1–29 (2014)

    Article  Google Scholar 

  4. Nazir, S., Patel, S., Patel, D.: Assessing and augmenting SCADA cyber security: a survey of techniques. Comput. Secur. 70(2017), 436–454 (2017)

    Article  Google Scholar 

  5. Elmasry, W., Akbulut, A., Zaim, A.H.: Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic. Comput. Netw. 168, 107042 (2020)

    Article  Google Scholar 

  6. T. Mahmood, U. Afzal, Security analytics: Big data analytics for cybersecurity: a review of trends, techniques and tools, in: 2013 2nd national conference on Information assurance (NCIA), IEEE, 2013, pp. 129–134

  7. Ma, S., Zhang, Y., Lv, J., Yang, H., Wu, J.: Energy-cyber-physical system enabled management for energy-intensive manufacturing industries. J. Clean. Prod. 226, 892–903 (2019)

    Article  Google Scholar 

  8. Nikolakis, N., Maratos, V., Makris, S.: A cyber physical system (CPS) approach for safe human-robot collaboration in a shared workplace. Robot. Comput.-Integrat. Manuf. 56, 233–243 (2019)

    Article  Google Scholar 

  9. Long Cheng, Ke Tian, and Danfeng Yao. 2017. Orpheus: Enforcing cyber-physical execution semantics to defend against data-oriented attacks. In Proceedings of the 33rd Annual Computer Security Applications Conference. 315–326.

  10. Zhenyu, Wu., Guo, Y., Lin, W., Shuyang, Yu., Ji, Y.: A weighted deep representation learning model for imbalanced fault diagnosis in cyber-physical systems. Sensors 18(4), 1096 (2018)

    Article  Google Scholar 

  11. Azizan, A.H., Mostafa, S.A., Mustapha, A., Foozy, C.F.M., Wahab, M.H.A., Mohammed, M.A., Khalaf, B.A.: A machine learning approach for improving the performance of network intrusion detection systems. Ann Emerging Technol. Comput. (AETiC) 5(5), 201–208 (2021)

    Article  Google Scholar 

  12. Al-Mhiqani, M.N., Ahmad, R., Abidin, Z.Z., Abdulkareem, K.H., Mohammed, M.A., Gupta, D., Shankar, K.: A new intelligent multilayer framework for insider threat detection. Comput. Electr. Eng. 97, 107597 (2022)

    Article  Google Scholar 

  13. Lakhan, A., Mohammed, M.A., Ibrahim, D.A., Kadry, S., Abdulkareem, K.H.: ITS Based on Deep graph convolutional fraud detection network blockchain-enabled fog-cloud. IEEE Transactions on Intelligent Transportation Systems (2022)

  14. Lakhan, A., Elhoseny, M., Mohammed, M.A. and Jaber, M.M.: SFDWA: secure and fault-tolerant aware delay optimal workload assignment schemes in edge computing for internet of drone things applications. Wirel. Commun. Mobile Comput. (2022).

  15. Awan, M.J., Masood, O.A., Mohammed, M.A., Yasin, A., Zain, A.M., Damaševičius, R., Abdulkareem, K.H.: Image-based malware classification using VGG19 network and spatial convolutional attention. Electronics 10(19), 2444 (2021)

    Article  Google Scholar 

  16. Anthi, E., Williams, L., Słowińska, M., Theodorakopoulos, G., Burnap, P.: A supervised intrusion detection system for smart home IoT devices. IEEE Internet Things J. 6(5), 9042–9053 (2019)

    Article  Google Scholar 

  17. Li, B., Wu, Y., Song, J., Lu, R., Li, T., Zhao, L.: DeepFed: federated deep learning for intrusion detection in industrial cyber-physical systems. IEEE Trans. Industr. Inf. 17(8), 5615–5624 (2020)

    Article  Google Scholar 

  18. Heartfield, R., Loukas, G., Bezemskij, A., Panaousis, E.: Self-configurable cyber-physical intrusion detection for smart homes using reinforcement learning. IEEE Trans. Inf. Forensics Secur. 16, 1720–1735 (2020)

    Article  Google Scholar 

  19. Sheng, C., Yao, Y., Fu, Q., Yang, W.: A cyber-physical model for SCADA system and its intrusion detection. Comput. Netw. 185, 107677 (2021)

    Article  Google Scholar 

  20. Ma, S., Li, Y., Du, L., Wu, J., Zhou, Y., Zhang, Y., Xu, T.: Programmable intrusion detection for distributed energy resources in cyber–physical networked microgrids. Appl. Energy 306, 118056 (2022)

    Article  Google Scholar 

  21. Nguyen, G.N., Le Viet, N.H., Elhoseny, M., Shankar, K., Gupta, B.B., Abd El-Latif, A.A.: Secure blockchain enabled Cyber–physical systems in healthcare using deep belief network with ResNet model. J. Parall. Distrib. Comput. 153, 150–160 (2021)

    Article  Google Scholar 

  22. Goodfellow, I.J., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., Bengio, Y.: Generative adversarial nets, In: Proceedings of the 27th International Conference on Neural Information Processing Systems, Vol. 2 of NIPS’14, MIT Press, Montreal, 2014, pp. 2672–2680.

  23. Huang, S., Lei, K.: IGAN-IDS: an imbalanced generative adversarial network towards intrusion detection system in ad-hoc networks. Ad Hoc Netw. 105, 102177 (2020)

    Article  Google Scholar 

  24. Huang, G.B., Zhou, H., Ding, X., Zhang, R.: Extreme learning machine for regression and multiclass classification. IEEE Trans. Syst. Man Cybernet. Part B (Cybernetics) 42(2), 513–529 (2011)

    Article  Google Scholar 

  25. Jamei, M., Hasanipanah, M., Karbasi, M., Ahmadianfar, I., Taherifar, S.: Prediction of flyrock induced by mine blasting using a novel kernel-based extreme learning machine. J. Rock Mech. Geotech. Eng. 13(6), 1438–1451 (2021)

    Article  Google Scholar 

  26. Kaur, A., Jain, S., Goel, S.: Sandpiper optimization algorithm: a novel approach for solving real-life engineering problems. Appl. Intell. 50(2), 582–619 (2020)

    Article  Google Scholar 

  27. Metan, J., Prasad, A.Y., Kumar, K.A., Mathapati, M., Patil, K.K.: Cardiovascular MRI image analysis by using the bio inspired (sand piper optimized) fully deep convolutional network (Bio-FDCN) architecture for an automated detection of cardiac disorders. Biomed. Signal Process. Control 70, 103002 (2021)

    Article  Google Scholar 

Download references

Funding

The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through Large Groups Project under grant number (46/43). Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2022R136), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.

Author information

Authors and Affiliations

Authors

Contributions

SA and HM—Conceptualization. HM and FNA—Data curation and Formal analysis. FNA and GA—Investigation and Methodology. GA and AM—Project administration and Resources. AM, MR, IY—Validation and Visualization. AMH—Writing—original draft, AMH, IY and MR—Writing—review and editing. All authors have read and agreed to the published version of the manuscript.

Corresponding author

Correspondence to Anwer Mustafa Hilal.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest. The manuscript was written through contributions of all authors. All authors have given approval to the final version of the manuscript.

Ethical statement

This article does not contain any studies with human participants or animals performed by any of the authors.

Informed consent

Not applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hilal, A.M., Al-Otaibi, S., Mahgoub, H. et al. Deep learning enabled class imbalance with sand piper optimization based intrusion detection for secure cyber physical systems. Cluster Comput 26, 2085–2098 (2023). https://doi.org/10.1007/s10586-022-03628-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-022-03628-w

Keywords

Navigation