An ensemble of fuzzy soft expert set with deep learning on attack detection for secure industrial cyber-physical systems

被引:0
作者
Alotaibi, Sultan Refa [1 ]
Alrayes, Fatma S. [2 ]
Mansouri, Wahida [3 ]
Alqahtani, Hamed [4 ]
Alajmani, Samah Hazzaa [5 ]
Alotaibi, Moneerah [1 ]
Alallah, Fouad Shoie [6 ]
Alshareef, Abdulrhman [6 ]
机构
[1] Shaqra Univ, Coll Sci & Humanities Dawadmi, Dept Comp Sci, Shaqraa, Saudi Arabia
[2] Princess Nourah bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Syst, POB 84428, Riyadh 11671, Saudi Arabia
[3] Northern Border Univ, Fac Sci & Arts, Dept Comp Sci & Informat Technol, Turaif 91431, Arar, Saudi Arabia
[4] King Khalid Univ, Coll Comp Sci, Ctr Artificial Intelligence, Dept Informat Syst, Abha, Saudi Arabia
[5] Taif Univ, Coll Comp & Informat Technol, Dept Informat Technol, POB 11099, Taif 21944, Saudi Arabia
[6] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Informat Syst, Jeddah, Saudi Arabia
关键词
Industrial cyber-physical systems; Grey wolf optimizer; Fuzzy set; Heuristic search; Neutrosophic model; Interval neutrosophic set; INTRUSION DETECTION;
D O I
10.1016/j.jrras.2025.101464
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The most effective tool for forming uncertainty in problems of decision-making is neutrosophic set (NS) and its additions, like interval NS (INS), complex NS (CNS), and interval complex NS (ICNS). An effective tool for signifying vagueness and uncertainty in the decision process is NS, which is more generalization of a classical set, fuzzy set (FS), and intuitionistic fuzzy set (IFS) by including 3 degrees of falsehood, truth, and indeterminacy of a definite statement. A cyber-physical system (CPS) combines numerous connected physical methods, networking units, and computing resources. Also, it observes the applications and processes of the computational techniques. Interconnection of the cyber and physical world starts threatening security tasks, particularly with the enlarging intricacy of communication systems. Despite the struggles to contest these tasks, it is very complex to identify and examine cyber-physical threats in a compound CPS. Many researchers have implemented machine learning (ML) and deep learning (DL)-based methods for analyzing cyber-physical security methods. This study develops an Enhanced Single Valued Model using the Heuristic Search on Attack Detection (ESVM-HSAD) model in Industrial CPS. The foremost intention of the ESVM-HSAD technique is to concentrate on the recognition and classification of cyberattacks in CPS. The ESVM-HSAD method utilizes the Grey Wolf Optimizer (GWO) as a feature selection (FS) technique to select an optimum set of features. For attack recognition, the ESVM-HSAD methodology utilizes a single-valued fuzzy soft expert set (SVSFES) method and an ensemble of two DL classifiers, such as GRU and Convolutional auto-encoder (CAE). Finally, the recognition outcomes of the ensemble model are enhanced by utilizing the Whale Optimization Algorithm (WOA). Many experiments were performed to detect the improved performance of the ESVM-HSAD approach. The comparative study of the ESVM-HSAD approach exhibited a superior accuracy value of 99.01 % when equated to other methods.
引用
收藏
页数:12
相关论文
共 26 条
[1]   A gated recurrent unit model to predict Poisson's ratio using deep learning [J].
Alakbari, Fahd Saeed ;
Mohyaldinn, Mysara Eissa ;
Ayoub, Mohammed Abdalla ;
Hussein, Ibnelwaleed A. ;
Muhsan, Ali Samer ;
Ridha, Syahrir ;
Salih, Abdullah Abduljabbar .
JOURNAL OF ROCK MECHANICS AND GEOTECHNICAL ENGINEERING, 2024, 16 (01) :123-135
[2]  
Alghamdi MI., 2020, J. Cybersecur. Inform. Manage, V3, P53, DOI [10.54216/JCIM.030203, DOI 10.54216/JCIM.030203]
[3]  
Almuhur E., 2024, International Journal of Neutrosophic Science (IJNS), V23, P148
[4]   Explainable Artificial Intelligence Enabled Intrusion Detection Technique for Secure Cyber-Physical Systems [J].
Almuqren, Latifah ;
Maashi, Mashael S. ;
Alamgeer, Mohammad ;
Mohsen, Heba ;
Hamza, Manar Ahmed ;
Abdelmageed, Amgad Atta .
APPLIED SCIENCES-BASEL, 2023, 13 (05)
[5]  
Alqazzaz A., 2024, Int. J. Neutrosophic Sci. IJNS, V23
[6]   IoT Attack Detection and Mitigation with Optimized Deep Learning Techniques [J].
Brindha Devi, V. ;
Ranjan, Nihar M. ;
Sharma, Himanshu .
CYBERNETICS AND SYSTEMS, 2024, 55 (07) :1702-1728
[7]   Anomaly-Based Intrusion Detection System for Cyber-Physical System Security [J].
Colelli, Riccardo ;
Magri, Filippo ;
Panzieri, Stefano ;
Pascucci, Federica .
2021 29TH MEDITERRANEAN CONFERENCE ON CONTROL AND AUTOMATION (MED), 2021, :428-434
[8]  
Gharib M., 2024, International Journal of Neutrosophic Science, V23, P184
[9]  
Hassan A. Q., 2024, Full Length Article, V24, P8
[10]   Deep learning enabled class imbalance with sand piper optimization based intrusion detection for secure cyber physical systems [J].
Hilal, Anwer Mustafa ;
Al-Otaibi, Shaha ;
Mahgoub, Hany ;
Al-Wesabi, Fahd N. ;
Aldehim, Ghadah ;
Motwakel, Abdelwahed ;
Rizwanullah, Mohammed ;
Yaseen, Ishfaq .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (03) :2085-2098