Research article Special Issues

Election-based optimization algorithm with deep learning-enabled false data injection attack detection in cyber-physical systems

  • Received: 25 February 2024 Revised: 30 March 2024 Accepted: 11 April 2024 Published: 26 April 2024
  • MSC : 11Y40

  • Cyber-physical systems (CPSs) are affected by cyberattacks once they are more connected to cyberspace. Advanced CPSs are highly complex and susceptible to attacks such as false data injection attacks (FDIA) targeted to mislead the systems and make them unstable. Leveraging an integration of anomaly detection methods, real-time monitoring, and machine learning (ML) algorithms, research workers are developing robust frameworks to recognize and alleviate the effect of FDIA. These methods often scrutinize deviations from predictable system behavior, using statistical analysis and anomaly detection systems to determine abnormalities that can indicate malicious activities. This manuscript offers the design of an election-based optimization algorithm with a deep learning-enabled false data injection attack detection (EBODL-FDIAD) method in the CPS infrastructure. The purpose of the EBODL-FDIAD technique is to enhance security in the CPS environment via the detection of FDIAs. In the EBODL-FDIAD technique, the linear scaling normalization (LSN) approach can be used to scale the input data into valuable formats. Besides, the EBODL-FDIAD system performs ensemble learning classification comprising three classifiers, namely the kernel extreme learning machine (KELM), long short-term memory (LSTM), and attention-based bidirectional recurrent neural network (ABiRNN) model. For optimal hyperparameter selection of the ensemble classifiers, the EBO algorithm can be applied. To validate the enriched performance of the EBODL-FDIAD technique, wide-ranging simulations were involved. The extensive results highlighted that the EBODL-FDIAD algorithm performed well over other systems concerning numerous measures.

    Citation: Hend Khalid Alkahtani, Nuha Alruwais, Asma Alshuhail, Nadhem NEMRI, Achraf Ben Miled, Ahmed Mahmud. Election-based optimization algorithm with deep learning-enabled false data injection attack detection in cyber-physical systems[J]. AIMS Mathematics, 2024, 9(6): 15076-15096. doi: 10.3934/math.2024731

    Related Papers:

  • Cyber-physical systems (CPSs) are affected by cyberattacks once they are more connected to cyberspace. Advanced CPSs are highly complex and susceptible to attacks such as false data injection attacks (FDIA) targeted to mislead the systems and make them unstable. Leveraging an integration of anomaly detection methods, real-time monitoring, and machine learning (ML) algorithms, research workers are developing robust frameworks to recognize and alleviate the effect of FDIA. These methods often scrutinize deviations from predictable system behavior, using statistical analysis and anomaly detection systems to determine abnormalities that can indicate malicious activities. This manuscript offers the design of an election-based optimization algorithm with a deep learning-enabled false data injection attack detection (EBODL-FDIAD) method in the CPS infrastructure. The purpose of the EBODL-FDIAD technique is to enhance security in the CPS environment via the detection of FDIAs. In the EBODL-FDIAD technique, the linear scaling normalization (LSN) approach can be used to scale the input data into valuable formats. Besides, the EBODL-FDIAD system performs ensemble learning classification comprising three classifiers, namely the kernel extreme learning machine (KELM), long short-term memory (LSTM), and attention-based bidirectional recurrent neural network (ABiRNN) model. For optimal hyperparameter selection of the ensemble classifiers, the EBO algorithm can be applied. To validate the enriched performance of the EBODL-FDIAD technique, wide-ranging simulations were involved. The extensive results highlighted that the EBODL-FDIAD algorithm performed well over other systems concerning numerous measures.



    加载中


    [1] K. D. Lu, Z. G. Wu, Multi-objective false data injection attacks of cyber-physical power systems, IEEE T. Circuits Syst. Ⅱ, 69 (2022), 3924–3928. https://doi.org/10.1109/TCSⅡ.2022.3181827 doi: 10.1109/TCSⅡ.2022.3181827
    [2] P. L. Bhattar, N. M. Pindoriya, A. Sharma, A combined survey on distribution system state estimation and false data injection in cyber-physical power distribution networks, IET Cyber Phys. Syst. Theory Appl., 6 (2021), 41–62. https://doi.org/10.1049/cps2.12000 doi: 10.1049/cps2.12000
    [3] Y. Li, Y. Wang, Developing graphical detection techniques for maintaining state estimation integrity against false data injection attack in integrated electric cyber-physical system, J. Syst. Architect., 105 (2020), 101705. https://doi.org/10.1016/j.sysarc.2019.101705 doi: 10.1016/j.sysarc.2019.101705
    [4] Q. Wang, W. Tai, Y. Tang, M. Ni, Review of the false data injection attack against the cyber-physical power system, IET Cyber Phys. Syst. Theory Appl., 4 (2019), 101–107. https://doi.org/10.1049/iet-cps.2018.5022 doi: 10.1049/iet-cps.2018.5022
    [5] S. Padhan, A. K. Turuk, Design of false data injection attacks in cyber-physical systems, Inform. Sci., 608 (2022), 825–843. https://doi.org/10.1016/j.ins.2022.06.082 doi: 10.1016/j.ins.2022.06.082
    [6] T. Zhou, K. Xiahou, L. L. Zhang, Q. H. Wu, Real-time detection of cyber-physical false data injection attacks on power systems, IEEE T. Ind. Inform., 17 (2021), 6810–6819. https://doi.org/10.1109/TⅡ.2020.3048386 doi: 10.1109/TⅡ.2020.3048386
    [7] Z. Qu, Y. Dong, N. Qu, H. Li, M. Cui, X. Bo, et al., False data injection attack detection in power systems based on cyber-physical attack genes, Front. Energy Res., 9 (2021), 644489. https://doi.org/10.3389/fenrg.2021.644489 doi: 10.3389/fenrg.2021.644489
    [8] G. Cao, W. Gu, G. Lou, W. Sheng, K. Liu, Distributed synchronous detection for false data injection attack in cyber-physical microgrids, Int. J. Elec. Power Energy Syst., 137 (2022), 107788. https://doi.org/10.1016/j.ijepes.2021.107788 doi: 10.1016/j.ijepes.2021.107788
    [9] J. Li, C. Sun, Q. Su, Analysis of cascading failures of power cyberphysical systems considering false data injection attacks, Global Energy Interconnect., 4 (2021), 204–213. https://doi.org/10.1016/j.gloei.2021.05.002 doi: 10.1016/j.gloei.2021.05.002
    [10] T. Zou, A. S. Bretas, C. Ruben, S. C. Dhulipala, N. Bretas, Smart grids cyber-physical security: Parameter correction model against unbalanced false data injection attacks, Electr. Pow. Syst. Res., 187 (2020), 106490. https://doi.org/10.1016/j.epsr.2020.106490 doi: 10.1016/j.epsr.2020.106490
    [11] M. Mazare, Adaptive optimal secure wind power generation control for variable speed wind turbine systems via reinforcement learning, Appl. Energ., 353 (2024), 122034. https://doi.org/10.1016/j.apenergy.2023.122034 doi: 10.1016/j.apenergy.2023.122034
    [12] M. Mazare, M. Taghizadeh, H. Asharioun, Attack‐resilient pitch angle control for variable‐speed wind turbine systems under cyber threats, Int. J. Adapt. Control, 37 (2023), 1423–1439. https://doi.org/10.1002/acs.3580 doi: 10.1002/acs.3580
    [13] M. Mazare, Reinforcement learning-based fixed-time resilient control of nonlinear cyber physical systems under false data injection attacks and mismatch disturbances, J. Franklin I., 360 (2023), 14926–14938. https://doi.org/10.1016/j.jfranklin.2023.10.026 doi: 10.1016/j.jfranklin.2023.10.026
    [14] H. Alamro, K. Mahmood, S. S. Aljameel, A. Yafoz, R. Alsini, A. Mohamed, Modified red fox optimizer with deep learning enabled false data injection attack detection, IEEE Access, 11 (2023), 79256–79264. https://doi.org/10.1109/ACCESS.2023.3298056 doi: 10.1109/ACCESS.2023.3298056
    [15] J. Sakhnini, H. Karimipour, A. Dehghantanha, R. M. Parizi, Physical layer attack identification and localization in cyber–physical grid: An ensemble deep learning based approach, Phys. Commun., 47 (2021), 101394. https://doi.org/10.1016/j.phycom.2021.101394 doi: 10.1016/j.phycom.2021.101394
    [16] K. Liu, H. Zhang, Y. Zhang, C. Sun, False data-injection attack detection in cyber–physical systems with unknown parameters: A deep reinforcement learning approach, IEEE T. Cybernetics, 11 (2023), 7115–7125. https://doi.org/10.1109/TCYB.2022.3225236 doi: 10.1109/TCYB.2022.3225236
    [17] E. Vincent, M. Korki, M. Seyedmahmoudian, A. Stojcevski, S. Mekhilef, Detection of false data injection attacks in cyber–physical systems using graph convolutional network, Electr. Pow. Syst. Res., 217 (2023), 109118. https://doi.org/10.1016/j.epsr.2023.109118 doi: 10.1016/j.epsr.2023.109118
    [18] Y. Zhang, W. Deng, K. Huang, C. Yang, False data injection attack testbed of industrial cyber-physical systems of the process industry and a detection application. In: 2021 IEEE International Conference on Recent Advances in Systems Science and Engineering (RASSE), 2021, 1–7. https://doi.org/10.1109/RASSE53195.2021.9686839
    [19] Y. Li, X. Wei, Y. Li, Z. Dong, M. Shahidehpour, Detection of false data injection attacks in smart grid: A secure federated deep learning approach, IEEE T. Smart Grid, 13 (2022), 4862–4872. https://doi.org/10.1109/TSG.2022.3204796 doi: 10.1109/TSG.2022.3204796
    [20] W. Fu, Y. Yan, Y. Chen, Z. Wang, D. Zhu, L. Jin, Temporal false data injection attack and detection on cyber‐physical power system based on deep reinforcement learning, IET Smart Grid, 7 (2024), 78–88. https://doi.org/10.1049/stg2.12141 doi: 10.1049/stg2.12141
    [21] H. Ruan, B. Dorneanu, H. Arellano-Garcia, P. Xiao, L. Zhang, Deep learning-based fault prediction in wireless sensor network embedded cyber-physical systems for industrial processes, IEEE Access, 10(2022), 10867–10879. https://doi.org/10.1109/ACCESS.2022.3144333 doi: 10.1109/ACCESS.2022.3144333
    [22] J. Tian, C. Shen, B. Wang, X. Xia, M. Zhang, C. Lin, Q. Li, LESSON: Multi-label adversarial false data injection attack for deep learning locational detection, IEEE T. Depend. Secure Comput., 2024, 1–15. https://doi.org/10.1109/TDSC.2024.3353302 doi: 10.1109/TDSC.2024.3353302
    [23] J. Tian, B. Wang, R. Guo, Z. Wang, K. Cao, X. Wang, Adversarial attacks and defenses for deep-learning-based unmanned aerial vehicles, IEEE Internet Things J., 9 (2021), 22399–22409. https://doi.org/10.1109/JIOT.2021.3111024 doi: 10.1109/JIOT.2021.3111024
    [24] J. Tian, B. Wang, Z. Wang, K. Cao, J. Li, M. Ozay, Joint adversarial example and false data injection attacks for state estimation in power systems, IEEE T. Cybernetics, 52 (2022), 13699–13713. https://doi.org/10.1109/TCYB.2021.3125345 doi: 10.1109/TCYB.2021.3125345
    [25] S. Sorguli, H. Rjoub, A novel energy accounting model using fuzzy restricted boltzmann machine—Recurrent neural network, Energies, 16 (2023), 2844. https://doi.org/10.3390/en16062844 doi: 10.3390/en16062844
    [26] Q. Hu, H. Zhou, C. Wang, C. Zhu, J. Shen, P. He, Time-frequency fusion features-based GSWOA-KELM model for gear fault diagnosis, Lubricants, 12 (2024), 10. https://doi.org/10.3390/lubricants12010010 doi: 10.3390/lubricants12010010
    [27] M. Xia, X. Zheng, M. Imran, M. Shoaib, Data-driven prognosis method using hybrid deep recurrent neural network, Appl. Soft Comput., 93 (2020), 106351. https://doi.org/10.1016/j.asoc.2020.106351 doi: 10.1016/j.asoc.2020.106351
    [28] S. P. Shashikumar, A. J. Shah, G. D. Clifford, S. Nemati, Detection of paroxysmal atrial fibrillation using attention-based bidirectional recurrent neural networks, In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018,715–723. https://doi.org/10.1145/3219819.3219912
    [29] M. Abd Elaziz, M. E. Zayed, H. Abdelfattah, A. Q. Aseeri, E. M. Tag-eldin, M. Fujii, et al., Machine learning-aided modeling for predicting freshwater production of a membrane desalination system: A long-short-term memory coupled with election-based optimizer, Alex. Eng. J., 86 (2024), 690–703. https://doi.org/10.1016/j.aej.2023.12.012 doi: 10.1016/j.aej.2023.12.012
  • Reader Comments
  • © 2024 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(864) PDF downloads(46) Cited by(0)

Article outline

Figures and Tables

Figures(14)  /  Tables(2)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog