Election-based optimization algorithm with deep learning-enabled false data injection attack detection in cyber-physical systems

被引:1
作者
Alkahtani, Hend Khalid [1 ]
Alruwais, Nuha [2 ]
Alshuhail, Asma [3 ]
Nemri, Nadhem [4 ]
Ben Miled, Achraf [5 ]
Mahmud, Ahmed [6 ]
机构
[1] Princess Nourah bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Syst, POB 84428, Riyadh 11671, Saudi Arabia
[2] King Saud Univ, Coll Appl Studies & Community Serv, Dept Comp Sci & Engn, POB 22459, Riyadh 11495, Saudi Arabia
[3] King Faisal Univ, Coll Comp Sci & Informat Technol, Dept Informat Syst, Al Hufuf, Saudi Arabia
[4] King Khalid Univ, Coll Sci & Art Mahayil, Dept Informat Syst, Al Hufuf, Saudi Arabia
[5] Northern Border Univ, Dept Comp Sci, Coll Sci, Ar Ar, Saudi Arabia
[6] Future Univ Egypt, Res Ctr, New Cairo 11835, Egypt
来源
AIMS MATHEMATICS | 2024年 / 9卷 / 06期
关键词
cyber-physical system; false data injection attack; deep learning; election-based optimization; ensemble learning;
D O I
10.3934/math.2024731
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Cyber-physical systems (CPSs) are affected by cyberattacks once they are more connected to cyberspace. Advanced CPSs are highly complex and susceptible to attacks such as false data injection attacks (FDIA) targeted to mislead the systems and make them unstable. Leveraging an integration of anomaly detection methods, real-time monitoring, and machine learning (ML) algorithms, research workers are developing robust frameworks to recognize and alleviate the effect of FDIA. These methods often scrutinize deviations from predictable system behavior, using statistical analysis and anomaly detection systems to determine abnormalities that can indicate malicious activities. This manuscript offers the design of an election -based optimization algorithm with a deep learning -enabled false data injection attack detection (EBODL-FDIAD) method in the CPS infrastructure. The purpose of the EBODL-FDIAD technique is to enhance security in the CPS environment via the detection of FDIAs. In the EBODL-FDIAD technique, the linear scaling normalization (LSN) approach can be used to scale the input data into valuable formats. Besides, the EBODL-FDIAD system performs ensemble learning classification comprising three classifiers, namely the kernel extreme learning machine (KELM), long short-term memory (LSTM), and attention -based bidirectional recurrent neural network (ABiRNN) model. For optimal hyperparameter selection of the ensemble classifiers, the EBO algorithm can be applied. To validate the enriched performance of the EBODL-FDIAD technique, wide-ranging simulations were involved. The extensive results highlighted that the EBODL-FDIAD algorithm performed well over other systems concerning numerous measures .
引用
收藏
页码:15076 / 15096
页数:21
相关论文
共 28 条
[1]   Machine learning-aided modeling for predicting freshwater production of a membrane desalination system: A long-short-term memory coupled with election-based optimizer [J].
Abd Elaziz, Mohamed ;
Zayed, Mohamed E. ;
Abdelfattah, H. ;
Aseeri, Ahmad O. ;
Tag-eldin, Elsayed M. ;
Fujii, Manabu ;
Elsheikh, Ammar H. .
ALEXANDRIA ENGINEERING JOURNAL, 2024, 86 :690-703
[2]   Modified Red Fox Optimizer With Deep Learning Enabled False Data Injection Attack Detection [J].
Alamro, Hayam ;
Mahmood, Khalid ;
Aljameel, Sumayh S. ;
Yafoz, Ayman ;
Alsini, Raed ;
Mohamed, Abdullah .
IEEE ACCESS, 2023, 11 :79256-79264
[3]   Distributed synchronous detection for false data injection attack in cyber-physical microgrids [J].
Cao, Ge ;
Gu, Wei ;
Lou, Guannan ;
Sheng, Wanxing ;
Liu, Keyan .
INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2022, 137
[4]  
Deng W., 2021, 2021 IEEE INT C REC, P1, DOI [10.1109/RASSE53195.2021.9686839, DOI 10.1109/RASSE53195.2021.9686839]
[5]   Temporal false data injection attack and detection on cyber-physical power system based on deep reinforcement learning [J].
Fu, Wei ;
Yan, Yunqi ;
Chen, Ying ;
Wang, Zhisheng ;
Zhu, Danlong ;
Jin, Longxing .
IET SMART GRID, 2024, 7 (01) :78-88
[6]   Time-Frequency Fusion Features-Based GSWOA-KELM Model for Gear Fault Diagnosis [J].
Hu, Qin ;
Zhou, Haiting ;
Wang, Chengcheng ;
Zhu, Chenxi ;
Shen, Jiaping ;
He, Peng .
LUBRICANTS, 2024, 12 (01)
[7]   Analysis of cascading failures of power cyber-physical systems considering false data injection attacks [J].
Li, Jian ;
Sun, Chaowei ;
Su, Qingyu .
GLOBAL ENERGY INTERCONNECTION-CHINA, 2021, 4 (02) :204-213
[8]   Detection of False Data Injection Attacks in Smart Grid: A Secure Federated Deep Learning Approach [J].
Li, Yang ;
Wei, Xinhao ;
Li, Yuanzheng ;
Dong, Zhaoyang ;
Shahidehpour, Mohammad .
IEEE TRANSACTIONS ON SMART GRID, 2022, 13 (06) :4862-4872
[9]   Developing graphical detection techniques for maintaining state estimation integrity against false data injection attack in integrated electric cyber-physical system [J].
Li, Yuancheng ;
Wang, Yuanyuan .
JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 105
[10]   False Data-Injection Attack Detection in Cyber-Physical Systems With Unknown Parameters: A Deep Reinforcement Learning Approach [J].
Liu, Kecheng ;
Zhang, Hui ;
Zhang, Ya ;
Sun, Changyin .
IEEE TRANSACTIONS ON CYBERNETICS, 2023, 53 (11) :7115-7125