Abstract
A cyber physical system (CPS) is a network of cyber (computation, communication) and physical (sensors, actuators) components which interact with one another in a feedback form with human intervention. CPS authorizes the critical infrastructure and is treated as essential in day to day life as they exist in the basis of future smart devices. The increased exploitation of the CPS results in various threats and becomes a global problem. Therefore, it becomes essential to develop a safe, efficient, and robust CPS for real tine environment. For resolving this problem and accomplish security in CPS environment, intrusion detection system (IDS) can be developed. This study introduces an imbalanced generative adversarial network (IGAN) with optimal kernel extreme learning machine (OKELM), called IGAN-OKELM technique for intrusion detection in CPS environment. The proposed IGAN-OKELM technique mainly aims to address the class imbalance problem and intrusion detection. Besides, the IGAN-OKELM technique involves the IGAN model handling the class imbalance problem by the use of imbalanced data filter and convolution layers to the conventional generative adversarial network (GAN), which generates new instances for minority class labels. Moreover, the OKELM model is applied as a classifier and the optimal parameter tuning of the KELM model is performed by the use of sand piper optimization (SPO) algorithm and thereby improvises the intrusion detection performance. A wide ranging simulation analysis is carried out using benchmark dataset and the results are examined under varying aspects. The experimental results reported the better performance of the IGAN-OKELM technique over the recent state of art approaches interms of different measures.












Similar content being viewed by others
Data availability
Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.
References
Luo, Y., Xiao, Y., Cheng, L., Peng, G., Yao, D.: Deep learning-based anomaly detection in cyber-physical systems: progress and opportunities. ACM Comput. Surv. (CSUR) 54(5), 1–36 (2021)
Lun, Y.Z., DâĂŹInnocenzo, A., Smarra, F., Malavolta, I., Benedetto, M.D.D.: State of the art of cyber-physical systems security: an automatic control perspective. J. Syst. Softw. 149(2019), 174–216 (2019)
Mitchell, R., Chen, I.-R.: A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surv. (CSUR) 46(4), 1–29 (2014)
Nazir, S., Patel, S., Patel, D.: Assessing and augmenting SCADA cyber security: a survey of techniques. Comput. Secur. 70(2017), 436–454 (2017)
Elmasry, W., Akbulut, A., Zaim, A.H.: Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic. Comput. Netw. 168, 107042 (2020)
T. Mahmood, U. Afzal, Security analytics: Big data analytics for cybersecurity: a review of trends, techniques and tools, in: 2013 2nd national conference on Information assurance (NCIA), IEEE, 2013, pp. 129–134
Ma, S., Zhang, Y., Lv, J., Yang, H., Wu, J.: Energy-cyber-physical system enabled management for energy-intensive manufacturing industries. J. Clean. Prod. 226, 892–903 (2019)
Nikolakis, N., Maratos, V., Makris, S.: A cyber physical system (CPS) approach for safe human-robot collaboration in a shared workplace. Robot. Comput.-Integrat. Manuf. 56, 233–243 (2019)
Long Cheng, Ke Tian, and Danfeng Yao. 2017. Orpheus: Enforcing cyber-physical execution semantics to defend against data-oriented attacks. In Proceedings of the 33rd Annual Computer Security Applications Conference. 315–326.
Zhenyu, Wu., Guo, Y., Lin, W., Shuyang, Yu., Ji, Y.: A weighted deep representation learning model for imbalanced fault diagnosis in cyber-physical systems. Sensors 18(4), 1096 (2018)
Azizan, A.H., Mostafa, S.A., Mustapha, A., Foozy, C.F.M., Wahab, M.H.A., Mohammed, M.A., Khalaf, B.A.: A machine learning approach for improving the performance of network intrusion detection systems. Ann Emerging Technol. Comput. (AETiC) 5(5), 201–208 (2021)
Al-Mhiqani, M.N., Ahmad, R., Abidin, Z.Z., Abdulkareem, K.H., Mohammed, M.A., Gupta, D., Shankar, K.: A new intelligent multilayer framework for insider threat detection. Comput. Electr. Eng. 97, 107597 (2022)
Lakhan, A., Mohammed, M.A., Ibrahim, D.A., Kadry, S., Abdulkareem, K.H.: ITS Based on Deep graph convolutional fraud detection network blockchain-enabled fog-cloud. IEEE Transactions on Intelligent Transportation Systems (2022)
Lakhan, A., Elhoseny, M., Mohammed, M.A. and Jaber, M.M.: SFDWA: secure and fault-tolerant aware delay optimal workload assignment schemes in edge computing for internet of drone things applications. Wirel. Commun. Mobile Comput. (2022).
Awan, M.J., Masood, O.A., Mohammed, M.A., Yasin, A., Zain, A.M., Damaševičius, R., Abdulkareem, K.H.: Image-based malware classification using VGG19 network and spatial convolutional attention. Electronics 10(19), 2444 (2021)
Anthi, E., Williams, L., Słowińska, M., Theodorakopoulos, G., Burnap, P.: A supervised intrusion detection system for smart home IoT devices. IEEE Internet Things J. 6(5), 9042–9053 (2019)
Li, B., Wu, Y., Song, J., Lu, R., Li, T., Zhao, L.: DeepFed: federated deep learning for intrusion detection in industrial cyber-physical systems. IEEE Trans. Industr. Inf. 17(8), 5615–5624 (2020)
Heartfield, R., Loukas, G., Bezemskij, A., Panaousis, E.: Self-configurable cyber-physical intrusion detection for smart homes using reinforcement learning. IEEE Trans. Inf. Forensics Secur. 16, 1720–1735 (2020)
Sheng, C., Yao, Y., Fu, Q., Yang, W.: A cyber-physical model for SCADA system and its intrusion detection. Comput. Netw. 185, 107677 (2021)
Ma, S., Li, Y., Du, L., Wu, J., Zhou, Y., Zhang, Y., Xu, T.: Programmable intrusion detection for distributed energy resources in cyber–physical networked microgrids. Appl. Energy 306, 118056 (2022)
Nguyen, G.N., Le Viet, N.H., Elhoseny, M., Shankar, K., Gupta, B.B., Abd El-Latif, A.A.: Secure blockchain enabled Cyber–physical systems in healthcare using deep belief network with ResNet model. J. Parall. Distrib. Comput. 153, 150–160 (2021)
Goodfellow, I.J., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., Bengio, Y.: Generative adversarial nets, In: Proceedings of the 27th International Conference on Neural Information Processing Systems, Vol. 2 of NIPS’14, MIT Press, Montreal, 2014, pp. 2672–2680.
Huang, S., Lei, K.: IGAN-IDS: an imbalanced generative adversarial network towards intrusion detection system in ad-hoc networks. Ad Hoc Netw. 105, 102177 (2020)
Huang, G.B., Zhou, H., Ding, X., Zhang, R.: Extreme learning machine for regression and multiclass classification. IEEE Trans. Syst. Man Cybernet. Part B (Cybernetics) 42(2), 513–529 (2011)
Jamei, M., Hasanipanah, M., Karbasi, M., Ahmadianfar, I., Taherifar, S.: Prediction of flyrock induced by mine blasting using a novel kernel-based extreme learning machine. J. Rock Mech. Geotech. Eng. 13(6), 1438–1451 (2021)
Kaur, A., Jain, S., Goel, S.: Sandpiper optimization algorithm: a novel approach for solving real-life engineering problems. Appl. Intell. 50(2), 582–619 (2020)
Metan, J., Prasad, A.Y., Kumar, K.A., Mathapati, M., Patil, K.K.: Cardiovascular MRI image analysis by using the bio inspired (sand piper optimized) fully deep convolutional network (Bio-FDCN) architecture for an automated detection of cardiac disorders. Biomed. Signal Process. Control 70, 103002 (2021)
Funding
The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through Large Groups Project under grant number (46/43). Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2022R136), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.
Author information
Authors and Affiliations
Contributions
SA and HM—Conceptualization. HM and FNA—Data curation and Formal analysis. FNA and GA—Investigation and Methodology. GA and AM—Project administration and Resources. AM, MR, IY—Validation and Visualization. AMH—Writing—original draft, AMH, IY and MR—Writing—review and editing. All authors have read and agreed to the published version of the manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest. The manuscript was written through contributions of all authors. All authors have given approval to the final version of the manuscript.
Ethical statement
This article does not contain any studies with human participants or animals performed by any of the authors.
Informed consent
Not applicable.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Hilal, A.M., Al-Otaibi, S., Mahgoub, H. et al. Deep learning enabled class imbalance with sand piper optimization based intrusion detection for secure cyber physical systems. Cluster Comput 26, 2085–2098 (2023). https://doi.org/10.1007/s10586-022-03628-w
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-022-03628-w