A Secure Intrusion Detection System in Cyberphysical Systems Using a Parameter-Tuned Deep-Stacked Autoencoder

被引:8
作者
Aljehane, Nojood O. [1 ]
机构
[1] Univ Tabuk, Coll Comp Sci & Informat Technol, Tabuk, Saudi Arabia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2021年 / 68卷 / 03期
关键词
Cyberphysical system; intrusion detection system; autoencoder; cybersecurity;
D O I
10.32604/cmc.2021.017905
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber physical systems (CPSs) are a networked system of cyber (computation, communication) and physical (sensors, actuators) elements that interact in a feedback loop with the assistance of human interference. Generally, CPSs authorize critical infrastructures and are considered to be important in the daily lives of humans because they form the basis of future smart devices. Increased utilization of CPSs, however, poses many threats, which may be of major significance for users. Such security issues in CPSs represent a global issue; therefore, developing a robust, secure, and effective CPS is currently a hot research topic. To resolve this issue, an intrusion detection system (IDS) can be designed to protect CPSs. When the IDS detects an anomaly, it instantly takes the necessary actions to avoid harming the system. In this study, we introduce a new parameter-tuned deep-stacked autoencoder based on deep learning (DL), called PT-DSAE, for the IDS in CPSs. The proposed model involves preprocessing, feature extraction, parameter tuning, and classification. First, data preprocessing takes place to eliminate the noise present in the data. Next, a DL-based DSAE model is applied to detect anomalies in the CPS. In addition, hyperparameter tuning of the DSAE takes place using a search-and-rescue optimization algorithm to tune the parameters of the DSAE, such as the number of hidden layers, batch size, epoch count, and learning rate. To assess the experimental outcomes of the PT-DSAE model, a series of experiments were performed using data from a sensor-based CPS. Moreover, a detailed comparative analysis was performed to ensure the effective detection outcome of the PT-DSAE technique. The experimental results obtained verified the superior performance on the applied data over the compared methods.
引用
收藏
页码:3915 / 3929
页数:15
相关论文
共 21 条
[1]   Protocol analysis in intrusion detection using decision tree [J].
Abbes, T ;
Boulloula, A ;
Rusinowitch, M .
ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, 2004, :404-408
[2]  
Antonatos S., 2004, Software Engineering Notes, V29, P207, DOI 10.1145/974043.974078
[3]   Design of robust fuzzy fault detection filter for polynomial fuzzy systems with new finite frequency specifications [J].
Chibani, Ali ;
Chadli, Mohammed ;
Ding, Steven X. ;
Braiek, Naceur Benhadj .
AUTOMATICA, 2018, 93 :42-54
[4]   Distributed attack detection scheme using deep learning approach for Internet of Things [J].
Diro, Abebe Abeshu ;
Chilamkurti, Naveen .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 82 :761-768
[5]   Adapted K-Nearest Neighbors for Detecting Anomalies on Spatio-Temporal Traffic Flow [J].
Djenouri, Youcef ;
Belhadi, Asma ;
Lin, Jerry Chun-Wei ;
Cano, Alberto .
IEEE ACCESS, 2019, 7 :10015-10027
[6]   Anomaly Detection in Cyber Physical Systems using Recurrent Neural Networks [J].
Goh, Jonathan ;
Adepu, Sridhar ;
Tan, Marcus ;
Shan, Lee Zi .
2017 IEEE 18TH INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE 2017), 2017, :140-145
[7]  
Jones A, 2014, IEEE DECIS CONTR P, P848, DOI 10.1109/CDC.2014.7039487
[8]   Automatic Construction of Statechart-Based Anomaly Detection Models for Multi-Threaded Industrial Control Systems [J].
Kleinmann, Amit ;
Wool, Avishai .
ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2017, 8 (04)
[9]   Temporal Logics for Learning and Detection of Anomalous Behavior [J].
Kong, Zhaodan ;
Jones, Austin ;
Belta, Calin .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2017, 62 (03) :1210-1222
[10]  
Kosek Anna Magdalena, 2016, IEEE P 2016 JOINT WO