Open Access

Fast Attack Detection Method for Imbalanced Data in Industrial Cyber-Physical Systems


Cite

H. Kayan, M. Nunes, O. Rana, P. Burnap, C. Perera, Cybersecurity of industrial cyber-physical systems: a review, ACM Computing Surveys (CSUR), 54(11s), 2022, 1-35.Search in Google Scholar

F. Tao, Q. Qi, New it driven service-oriented smart manufacturing: framework and characteristics, IEEE Transactions on Systems, Man, and Cybernetics: Systems, 49(1), 2019, 81-91.Search in Google Scholar

L.D. Xu, E.L. Xu, L. Li, Industry 4.0: state of the art and future trends, International Journal of Production Research, 56(8), 2018, 2941-2962.Search in Google Scholar

A. Corallo, M. Lazoi, M. Lezzi, A. Luperto, Cyber-security awareness in the context of the Industrial Internet of Things: A systematic literature review, Computers in Industry, 137, 2022, 103614.Search in Google Scholar

Leung M F, Jawaid A, Ip S W, et al, A portfolio recommendation system based on machine learning and big data analytics, Data Science in Finance and Economics, 3(2), 2023, 152-165.Search in Google Scholar

Li C, Chen Y, Shang Y, A review of industrial big data for decision making in intelligent manufacturing, Engineering Science and Technology-an International Journal, 29, 2022, 101021.Search in Google Scholar

D. Kushner, The real story of Stuxnet, IEEE Spectrum, 50(3), 2013, 48-53.Search in Google Scholar

N. Sayfayn and S. Madnick, Cybersafety analysis of the maroochy shire sewage spill, MIT Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity, 2017, 1-29.Search in Google Scholar

K. Stouffer, V. Pillitteri, S. Lightman, M. Abrams, A. Hahn, Guide to industrial control systems (ICS) security. NIST special publication, 800(82), 2011, 16-16.Search in Google Scholar

J. Yang, C. Zhou, S. Yang, H. Xu, B. Hu, Anomaly detection based on zone partition for security protection of industrial cyber-physical systems, IEEE Transactions on Industrial Electronics, 65(5), 2018, 4257-4267.Search in Google Scholar

M. AL-Hawawreh, N. Moustafa, E. Sitnikova, Identification of malicious activities in industrial internet of things based on deep learning models, Journal of Information Security and Applications, 41, 2018, 1-11.Search in Google Scholar

M. Zolanvari, M.A. Teixeira, L. Gupta, K.M. Khan, R. Jain, Machine learning-based network vulnerability analysis of industrial internet of things, IEEE Internet of Things Journal, 6(4), 2019, 6822-6834.Search in Google Scholar

J. Liu, W. Zhang, T. Ma, Z. Tang, Y. Xie, W. Gui, J.P. Niyoyita, Toward security monitoring of industrial cyber-physical systems via hierarchically distributed intrusion detection, Expert Systems with Applications, 158, 2020, 113578.Search in Google Scholar

Z. Hong, C. Yang, L. Yu, R-Print: a system residuals-based fingerprinting for attack detection in industrial cyber-physical systems, IEEE Transactions on Industrial Electronics, 68(11), 2021, 11458-11469.Search in Google Scholar

M. Abdel-Basset, V. Chang, H. Hawash, R.K. Chakrabortty, M. Ryan, Deep-IFS: intrusion detection approach for industrial internet of things traffic in fog Environment, IEEE Transactions on Industrial Informatics. 17(11), 2021, 7704-7715.Search in Google Scholar

J.B. Awotunde, C. Chakraborty, A.E. Adeniyi, Intrusion detection in industrial internet of things network-based on deep learning model with rule-based feature selection, Wireless Communications and Mobile Computing, 2021, 7154587.Search in Google Scholar

D. Upadhyay, J. Manero, M. Zaman, S. Sampalli, Intrusion Detection in SCADA based power grids: recursive feature elimination model with majority vote ensemble algorithm, IEEE Transactions on Network Science and Engineering, 8(3), 2021, 2559-2574.Search in Google Scholar

Y. Gao, J. Chen, H. Miao, B. Song, Y. Lu, W. Pan, Self-learning spatial distribution-based intrusion detection for industrial cyber-physical systems, IEEE Transactions on Computational Social Systems, 9(6), 2022, 1693-1702.Search in Google Scholar

Z. Wang, Z. Li, D. He, S. Chan, A lightweight approach for network intrusion detection in industrial cyber-physical systems based on knowledge distillation and deep metric learning, Expert Systems with Applications, 206, 2022, 117671.Search in Google Scholar

K. Yang, Y. Shi, Z. Yu, Q. Yang, A.K. Sangaiah, H. Zeng, Stacked one-class broad learning system for intrusion detection in industry 4.0, IEEE Transactions on Industrial Informatics, 19(1), 2023, 251-260.Search in Google Scholar

W. Hao, T. Yang, Q. Yang, Hybrid statistical-machine learning for real-time anomaly detection in industrial cyber-physical systems, IEEE Transactions on Automation Science and Engineering, 20(1), 2023, 32-46.Search in Google Scholar

Y. Liu, Y. Peng, B. Wang, S. Yao, Z. Liu, Review on cyber-physical systems, IEEE/CAA Journal of Automatica Sinica, 4(1), 2017, 27-40.Search in Google Scholar

D.G.S. Pivoto, L.F.F. de Almeida, R. da R. Righi, J.J.P.C. Rodrigues, A.B. Lugli, A.M. Alberti, Cyber-physical systems architectures for industrial internet of things applications in Industry 4.0: A literature review, Journal of Manufacturing Systems, 58, 2021, 176-192.Search in Google Scholar

R.V. Yohanandhan, R.M. Elavarasan, P. Manoharan, L. Mihet-Popa, Cyber-physical power system (CPPS): a review on modeling, simulation, and analysis with cyber security applications, IEEE Access, 8, 2020, 151019-151064.Search in Google Scholar

R. Qadeer, C. Murguia, C.M. Ahmed, J. Ruths, Multistage Downstream Attack Detection in a Cyber Physical System, In: S.K. Katsikas, F. Cup-pens, N. Cuppens, C. Lambrinoudakis, C. Kalloniatis, J. Mylopoulos, A. Antn, S. Gritzalis (Eds.), Computer Security, Springer International Publishing, Cham, 2018, pp. 177-185.Search in Google Scholar

Y. Wadhawan, C. Neuman, Evaluating resilience of gas pipeline systems under cyber-physical attacks: a function-based methodology, in: Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, Association for Computing Machinery, New York, NY, USA, 2016, pp. 71-80.Search in Google Scholar

J. Yao, X. Xu, X. Liu, MixCPS: Mixed time/event-triggered architecture of cyber-physical systems, Proceedings of the IEEE, 104(5), 2016, 923-937.Search in Google Scholar

Haibo He, E.A. Garcia, Learning from imbalanced data, IEEE Transactions on Knowledge and Data Engineering, 21(9), 2009, 1263-1284.Search in Google Scholar

G. Haixiang, L. Yijing, J. Shang, G. Mingyun, H. Yuanyue, G. Bing, Learning from class-imbalanced data: review of methods and applications, Expert Systems with Applications, 73, 2017, 220-239.Search in Google Scholar

H. Kaur, H.S. Pannu, A.K. Malhi, A systematic review on imbalanced data challenges in machine learning: applications and solutions, ACM Computing Surveys (CSUR), 52(4), 2019, 1-36.Search in Google Scholar

Y.-C. Chang, K.-H. Chang, G.-J. Wu, Application of eXtreme gradient boosting trees in the construction of credit risk assessment models for financial institutions, Applied Soft Computing, 73, 2018, 914-920.Search in Google Scholar

J. Sun, H. Li, H. Fujita, B. Fu, W. Ai, Class-imbalanced dynamic financial distress prediction based on Adaboost-SVM ensemble combined with SMOTE and time weighting, Information Fusion, 54, 2020, 128-144.Search in Google Scholar

G. Brown, A. Pocock, M.-J. Zhao, and M. Lujan, Conditional likelihood maximisation: a unifying framework for information theoretic feature selection, The Journal of Machine Learning Research, 13(1), 2012, 27-66.Search in Google Scholar

Yang H, Moody J, Feature selection based on joint mutual information, In: Proceedings of international ICSC symposium on advances in intelligent data analysis. Proceedings of international ICSC symposium on advances in intelligent data analysis. Rochester, NY: Citeseer, 1999, 23.Search in Google Scholar

F. Fleuret, Fast binary feature selection with conditional mutual information, Journal of Machine Learning Research, 5(9), 2004, 1531-1555.Search in Google Scholar

Souza F, Premebida C, Araujo R, High-order conditional mutual information maximization for dealing with high-order dependencies in feature selection, Pattern Recognition, 131, 2022, 108895.Search in Google Scholar

Meyer P E, Bontempi G, On the use of variable complementarity for feature selection in cancer classification, in: Applications of Evolutionary Computing: EvoWorkshops 2006: EvoBIO, Evo-COMNET, EvoHOT, EvoIASP, EvoINTERACTION, EvoMUSART, and EvoSTOC, Budapest, Hungary, 2006, pp. 91-102.Search in Google Scholar

D.L. Wilson, Asymptotic properties of nearest neighbor rules using edited data, IEEE Transactions on Systems, Man, and Cybernetics, SMC-2(3), 1972, 408-421.Search in Google Scholar

I. Tomek, An experiment with the edited nearest-neighbor rule, IEEE Transactions on Systems, Man, and Cyberneticsn, SMC-6 (1976) 448-452.Search in Google Scholar

Ke, G., Meng, Q., Finley, T., Wang, T., Chen, W., Ma, W., Ye. Q. W, Liu, T. Y., LightGBM: a highly efficient gradient boosting decision tree, Advances in neural information processing systems, 30, 2017, 3149-3157.Search in Google Scholar

Morris T, Gao W, Industrial control system traffic data sets for intrusion detection research, in: Bayro-Corrochano E, Hancock E (eds) Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications. Springer International Publishing, Cham, 2014, pp. 65-78.Search in Google Scholar

Goh J, Adepu S, Junejo KN, Mathur A, A dataset to support research in the design of secure water treatment systems, in: Havarneanu G, Setola R, Nassopoulos H, Wolthusen S (eds) Critical Information Infrastructures Security, 2017, 88-99.Search in Google Scholar

Booij, T. M., Chiscop, I., Meeuwissen, E., Moustafa, N., den Hartog, F. T, ToN_IoT: the role of heterogeneity and the need for standardization of features and attack types in IoT network intrusion data sets, IEEE Internet of Things Journal, 9(1) 2022, 485-496.Search in Google Scholar

W. Pei, B. Xue, M. Zhang, L. Shang, X. Yao, Q. Zhang, A survey on unbalanced classification: how can evolutionary computation help?, IEEE Transactions on Evolutionary Computation, 2023, 1-1.Search in Google Scholar

Feng C, Li T, Chana D, Multi-level anomaly detection in industrial control systems via package signatures and LSTM networks, In: 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), IEEE, 2017, pp.261-272.Search in Google Scholar

J. Ling, Z. Zhu, Y. Luo, H. Wang, An intrusion detection method for industrial control systems based on bidirectional simple recurrent unit, Computers & Electrical Engineering, 91, 2021, 107049.Search in Google Scholar

Y. Zhang, C. Yang, K. Huang, Y. Li, Intrusion detection of industrial internet-of-things based on reconstructed graph neural networks, IEEE Transactions on Network Science and Engineering, 2022, 1-12.Search in Google Scholar

M. Abdelaty, R. Doriguzzi-Corin, D. Siracusa, DAICS: A deep learning solution for anomaly detection in industrial control systems, IEEE Transactions on Emerging Topics in Computing, 10(2), 2022, 1117-1129.Search in Google Scholar

Abdelaty M, Doriguzzi-Corin R, Siracusa D, AADS: A noise-robust anomaly detection framework for industrial control systems, In: Information and Communications Security: 21st International Conference, Springer International Publishing, 2020, pp. 53-70.Search in Google Scholar

Lin. Q, Adepu S, Verwer. S, Mathur. A, TABOR: A graphical model-based approach for anomaly detection in industrial control systems. In: Proceedings of the 2018 on Asia conference on computer and communications security, Association for Computing Machinery, 2018, pp. 525-536.Search in Google Scholar

P. Kumar, G.P. Gupta, R. Tripathi, An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks, Computer Communications, 166, 2021, 110-124.Search in Google Scholar

M.S. Ahmad, S.M. Shah, Unsupervised ensemble based deep learning approach for attack detection in IoT network, Concurrency and Computation: Practice and Experience, 34(27), 2022, e7338.Search in Google Scholar

eISSN:
2449-6499
Language:
English
Publication timeframe:
4 times per year
Journal Subjects:
Computer Sciences, Databases and Data Mining, Artificial Intelligence