Research on Attack Detection of Cyber Physical Systems Based on Improved Support Vector Machine

被引:8
作者
Liu, Fengchun [1 ,2 ,3 ,4 ,5 ]
Zhang, Sen [1 ,2 ,3 ,4 ,5 ]
Ma, Weining [1 ,2 ,3 ,4 ,6 ]
Qu, Jingguo [1 ,2 ,3 ,4 ,5 ]
机构
[1] North China Univ Sci & Technol, Hebei Engn Res Ctr Intelligentizat Iron Ore Optim, Tangshan 063210, Peoples R China
[2] North China Univ Sci & Technol, Hebei Key Lab Data Sci & Applicat, Tangshan 063210, Peoples R China
[3] North China Univ Sci & Technol, Tangshan Intelligent Ind & Image Proc Technol Inn, Tangshan 063210, Peoples R China
[4] North China Univ Sci & Technol, Key Lab Engn Comp Tangshan City, Tangshan 063210, Peoples R China
[5] North China Univ Sci & Technol, Coll Sci, Tangshan 063210, Peoples R China
[6] North China Univ Sci & Technol, Coll Met & Energy, Tangshan 063210, Peoples R China
关键词
attack detection; cyber physical systems; data imbalance; principal component analysis; particle swarm optimization; support vector machine;
D O I
10.3390/math10152713
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Cyber physical systems (CPS), in the event of a cyber attack, can have a serious impact on the operating physical equipment. In order to improve the attack detection capability of CPS, an support vector machine (SVM) attacks detection model based on particle swarm optimization (PSO) is proposed. First, the box plot anomaly detection method is used to detect the characteristic variables, and the characteristic variables with abnormal distribution are discretized. Secondly, the number of attack samples was increased by the SMOTE method to solve the problem of data imbalance, and the linear combination of characteristic variables was performed on the high-dimensional CPS network traffic data using principal component analysis (PCA). Then, the penalty coefficient and the hyperparameter of the kernel function in the SVM model are optimized by the PSO algorithm. Finally, Experiments on attack detection of CPS network traffic data show that the proposed model can detect different types of attack data and has higher detection accuracy compared with general detection models.
引用
收藏
页数:14
相关论文
共 27 条
[1]   Cyber-Physical Systems for Water Supply Network Management: Basics, Challenges, and Roadmap [J].
Adedeji, Kazeem B. ;
Hamam, Yskandar .
SUSTAINABILITY, 2020, 12 (22) :1-30
[2]  
Aruna S., 2011, Int J Comput Appl, V31, P14
[3]   Cyber physical systems security: Analysis, challenges and solutions [J].
Ashibani, Yosef ;
Mahmoud, Qusay H. .
COMPUTERS & SECURITY, 2017, 68 :81-97
[4]   Cross-validation in PCA models with the element-wise k-fold (ekf) algorithm: Practical aspects [J].
Camacho, Jose ;
Ferrer, Alberto .
CHEMOMETRICS AND INTELLIGENT LABORATORY SYSTEMS, 2014, 131 :37-50
[5]   LIBSVM: A Library for Support Vector Machines [J].
Chang, Chih-Chung ;
Lin, Chih-Jen .
ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2011, 2 (03)
[6]  
Chen Wanzhi, 2018, Journal of Computer Applications, V38, P363, DOI 10.11772/j.issn.1001-9081.2017061509
[7]  
[邓志刚 Deng Zhigang], 2021, [信息与控制, Information and Control], V50, P410
[8]   A survey on security control and attack detection for industrial cyber-physical systems [J].
Ding, Derui ;
Han, Qing-Long ;
Xiang, Yang ;
Ge, Xiaohua ;
Zhang, Xian-Ming .
NEUROCOMPUTING, 2018, 275 :1674-1683
[9]   On scheduling of deception attacks for discrete-time networked systems equipped with attack detectors [J].
Ding, Derui ;
Wei, Guoliang ;
Zhang, Sunjie ;
Liu, Yurong ;
Alsaadi, Fuad E. .
NEUROCOMPUTING, 2017, 219 :99-106
[10]   Introduction to Industrial Control Networks [J].
Galloway, Brendan ;
Hancke, Gerhard P. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (02) :860-880