Loading [MathJax]/jax/output/SVG/jax.js
Research article

Measurement data intrusion detection in industrial control systems based on unsupervised learning


  • Anomaly detection strategies in industrial control systems mainly investigate the transmitting network traffic called network intrusion detection system. However, The measurement intrusion detection system inspects the sensors data integrated into the supervisory control and data acquisition center to find any abnormal behavior. An approach to detect anomalies in the measurement data is training supervised learning models that can learn to classify normal and abnormal data. But, a labeled dataset consisting of abnormal behavior, such as attacks, or malfunctions is extremely hard to achieve. Therefore, the unsupervised learning strategy that does not require labeled data for being trained can be helpful to tackle this problem. This study evaluates the performance of unsupervised learning strategies in anomaly detection using measurement data in control systems. The most accurate algorithms are selected to train unsupervised learning models, and the results show an accuracy of 98% in stealthy attack detection.

    Citation: Sohrab Mokhtari, Kang K Yen. Measurement data intrusion detection in industrial control systems based on unsupervised learning[J]. Applied Computing and Intelligence, 2021, 1(1): 61-74. doi: 10.3934/aci.2021004

    Related Papers:

    [1] Anil Chavada, Nimisha Pathak . Transmission dynamics of breast cancer through Caputo Fabrizio fractional derivative operator with real data. Mathematical Modelling and Control, 2024, 4(1): 119-132. doi: 10.3934/mmc.2024011
    [2] Erick Manuel Delgado Moya, Diego Samuel Rodrigues . Fractional order modeling for injectable and oral HIV pre-exposure prophylaxis. Mathematical Modelling and Control, 2023, 3(2): 139-151. doi: 10.3934/mmc.2023013
    [3] C. Kavitha, A. Gowrisankar . Fractional integral approach on nonlinear fractal function and its application. Mathematical Modelling and Control, 2024, 4(3): 230-245. doi: 10.3934/mmc.2024019
    [4] Chunyu Tian, Lei Sun . Partitioning planar graphs with girth at least 9 into an edgeless graph and a graph with bounded size components. Mathematical Modelling and Control, 2021, 1(3): 136-144. doi: 10.3934/mmc.2021012
    [5] Zhen Lin . On the sum of powers of the Aα-eigenvalues of graphs. Mathematical Modelling and Control, 2022, 2(2): 55-64. doi: 10.3934/mmc.2022007
    [6] Jiaming Dong, Huilan Li . Hopf algebra of labeled simple graphs arising from super-shuffle product. Mathematical Modelling and Control, 2024, 4(1): 32-43. doi: 10.3934/mmc.2024004
    [7] Qian Lin, Yan Zhu . Unicyclic graphs with extremal exponential Randić index. Mathematical Modelling and Control, 2021, 1(3): 164-171. doi: 10.3934/mmc.2021015
    [8] Zhen Lin, Ting Zhou . Degree-weighted Wiener index of a graph. Mathematical Modelling and Control, 2024, 4(1): 9-16. doi: 10.3934/mmc.2024002
    [9] Ihtisham Ul Haq, Nigar Ali, Shabir Ahmad . A fractional mathematical model for COVID-19 outbreak transmission dynamics with the impact of isolation and social distancing. Mathematical Modelling and Control, 2022, 2(4): 228-242. doi: 10.3934/mmc.2022022
    [10] Yunhao Chu, Yansheng Liu . Approximate controllability for a class of fractional semilinear system with instantaneous and non-instantaneous impulses. Mathematical Modelling and Control, 2024, 4(3): 273-285. doi: 10.3934/mmc.2024022
  • Anomaly detection strategies in industrial control systems mainly investigate the transmitting network traffic called network intrusion detection system. However, The measurement intrusion detection system inspects the sensors data integrated into the supervisory control and data acquisition center to find any abnormal behavior. An approach to detect anomalies in the measurement data is training supervised learning models that can learn to classify normal and abnormal data. But, a labeled dataset consisting of abnormal behavior, such as attacks, or malfunctions is extremely hard to achieve. Therefore, the unsupervised learning strategy that does not require labeled data for being trained can be helpful to tackle this problem. This study evaluates the performance of unsupervised learning strategies in anomaly detection using measurement data in control systems. The most accurate algorithms are selected to train unsupervised learning models, and the results show an accuracy of 98% in stealthy attack detection.



    In various fields of science, nonlinear evolution equations practically model many natural, biological and engineering processes. For example, PDEs are very popular and are used in physics to study traveling wave solutions. They have played a crucial role in illustrating the nature of nonlinear problems. PDEs are collected to control the diffusion of chemical reactions. In biology, they play a fundamental role in describing various phenomena, such as population growth. In addition, natural phenomena such as fluid dynamics, plasma physics, optics and optical fibers, electromagnetism, quantum mechanics, ocean waves, and others are studied using PDEs. The qualitative and quantitative characteristics of these phenomena can be identified from the behaviors and shapes of their solutions. Therefore, finding the analytic solutions to such phenomena is a fundamental topic in mathematics. Scientists have developed sparse fundamental approaches to find analytic solutions for nonlinear PDEs. Among these techniques, I present integration methods from [1] and [2], the modified F-expansion and Generalized Algebraic methods, respectively. Bekir and Unsal [3] proposed the first integral method to find the analytical solution of nonlinear equations. Kumar, Seadawy and Joardar [4] used the improved Kudryashov technique to extract fractional differential equations. Adomian [5] proposed the Adomian decomposition technique to find the solution of frontier problems of physics. [6] uses an exploratory method to find explicit solutions of non-linear PDEs. Many different methods of solving equations arising from natural phenomena and some of their analytic solutions, such as dark and light solitons, non-local rogue waves, an occasional wave and mixed soliton solutions, are exhibited and can be found in [7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40].

    The Novikov-Veselov (NV) system [41,42] is given by

    Ψt+αΓxxy+βΦxyy+γΓyΦ+γ(Ψ22)y+λΓΦx+λ(Ψ22)x=0,Γy=Ψx,Ψy=Φx, (1.1)

    where α,β,γ and λ are constants. Barman [42] declared that Eq (1.1) is involved to represent tidal and tsunami waves, electro-magnetic waves in communication cables and magneto-sound and ion waves in plasma. In [42], the generalized Kudryashov method was utilized to have traveling wave solutions for Eq (1.1). According to Croke [43], the Novikov-Veselov system is generalized from the KdV equations which were examined by Novikov and Veselov. Croke [43] used several approaches, (the extended mapping, the Hirota and the extended tanh-function approaches) in the proposed system to achieve numerous soliton solutions, such as breathers, and constrained analytic solutions. Boiti, Leon, and Manna [44] applied the inverse dispersion technique to solve (1.1) for a particular type of initial value. Numerical solutions and a study of the stability of solutions for the proposed equation were presented by Kazeykina and Klein [45]. The Nizhnik-Novikov-Veselov system for two dimensions was also solved using the Kansa technique to find the numerical results [46]. To the best of my knowledge, the stability and error analysis of the numerical scheme presented here has not yet been discussed for system (1.1). Therefore, this has motivated me enormously to do so. The primary purpose is to obtain multiple analytic solutions to system (1.1) by using both the modified F-expansion and Generalized Algebraic methods. In connection with the numerical solution, the method of finite differences is utilized to achieve numerical results for the studied system. I graphically and analytically compare the traveling wave solutions and numerical results. Undoubtedly, the presented results strongly contribute to describing physical problems in practice.

    The outline of this article is provided in this paragraph. Section 2 summarizes the employed methods. All the analytic solutions are extracted in Section 3. The shooting and BVP results for the proposed system are presented in Section 4. In addition, I examine the numerical solution of the system (1.1) in Section 5. Sections 6 and 7 study the stability and error analysis of the numerical scheme, respectively. Section 8 presents the results and discussion.

    Considering the development equation with physical fields Ψ(x,y,t), Φ(x,y,t) and Γ(x,y,t) in the variables x, y and t is given in the following form:

    Q1(Ψ,Ψt,Ψx,Ψy,Γ,Γy,Γxxy,Φ,Φxyy,Φx,)=0. (2.1)

    Step 1. We extract the traveling-wave solutions of System (1.1) that are formed as follows:

    Φ(x,y,t)=ϕ(η),η=x+ywt,Ψ(x,y,t)=ψ(η),Γ(x,y,t)=Θ(η), (2.2)

    where w is the wave speed.

    Step 2. The nonlinear evolution (2.1) is reduced to the following ODE:

    Q2(ψ,ψη,Θ,Θη,Θηηη,ϕ,ϕηηη,ϕη,)=0, (2.3)

    where Q2 is a polynomial in ψ(η),ϕ(η), Θ(η) and their total derivatives.

    According to the modified F-expansion method, the solutions of (2.3) are given by the form

    ψ(η)=ρ0+Nk=1(ρkF(η)k+qkF(η)k), (2.4)

    and F(η) is a solution of the following differential equation:

    F(η)=μ0+μ1F(η)+μ2F(η)2, (2.5)

    where μ0, μ1, μ2, are given in Table 1 [1], and ρk, qk are to be determined later.

    Table 1.  The relations among μ0, μ1, μ2 and the function F(η).
    μ0 μ1 μ2 F(η)
    μ0=0, μ1=1, μ2=1, F(η)=12+12tanh(12η).
    μ0=0, μ1=1, μ2=1, F(η)=1212coth(12η).
    μ0=12, μ1=0, μ2=12, F(η)=coth(η)±csch(η), tanh(η)±sech(η).
    μ0=1, μ1=0, μ2=1, F(η)=tanh(η), coth(η).
    μ0=12, μ1=0, μ2=12, F(η)=sec(η)+tan(η), csc(η)cot(η).
    μ0=12, μ1=0, μ2=12, F(η)=sec(η)tan(η), csc(η)+cot(η).
    μ0=±1, μ1=0, μ2=±1, F(η)=tan(η), cot(η).

     | Show Table
    DownLoad: CSV

    According to the generalized direct algebraic method, the solutions of (2.3) are given by

    ψ(η)=ν0+Nk=1(νkG(η)k+rkG(η)k), (2.6)

    and G(η) is a solution of the following differential equation:

    G(η)=ε4k=0δkGk(η), (2.7)

    where νk, and rk are to be determined, and N is an integer number obtained by the highest degree of the nonlinear terms and the highest order of the derivatives. ε is user-specified, usually taken with ε=±1, and δk, k=0,1,2,3,4, are given in Table 2 [2].

    Table 2.  The relations among δk, k=0,1,2,3,4, and the function G(η).
    δ0 δ1 δ2 δ3 δ4 G(η)
    δ0=0, δ1=0, δ2>0, δ3=0, δ4<0, G(η)=ε δ2δ4sech(δ2η).
    δ0=δ224c4, δ1=0, δ2<0, δ3=0, δ4>0, G(η)=εδ22δ4tanh(δ22η).
    δ0=0, δ1=0, δ2<0, δ3=0, δ4>0, G(η)=ε δ2δ4 sec (δ2η).
    δ0=δ224δ4, δ1=0, δ2>0, δ3=0, δ4>0, G(η)=ε δ22δ4tan(δ22η).
    δ0=0, δ1=0, δ2=0, δ3=0, δ4>0, G(η)=εδ4η.
    δ0=0, δ1=0, δ2>0, δ30, δ4=0, G(η)=δ2δ3.sech2(δ22η).

     | Show Table
    DownLoad: CSV

    Consider the Novikov-Veselov (NV) system

    Ψt+αΓxxy+βΦxyy+γΓyΦ+γ(Ψ22)y+λΓΦx+λ(Ψ22)x=0,Γy=Ψx,Ψy=Φx, (3.1)

    a system of PDEs in the unknown functions Ψ=Ψ(x,y,t),Φ=Φ(x,y,t), Γ=Γ(x,y,t) and their partial derivatives. I plug the transformations

    Φ(x,y,t)=ϕ(η),η=x+ywt,Ψ(x,y,t)=ψ(η),Γ(x,y,t)=Θ(η), (3.2)

    into Eq (3.1) to reduce it to a system of ODEs given by

    wψη+αΘηηη+βϕηηη+γΘηϕ+γ(ψ22)η+λΘϕη+λ(ψ22)η=0,Θη=ψη,ψη=ϕη. (3.3)

    Integrating Θη=ψη and ϕη=ψη yields

    Θ=ψ,and ϕ=ψ. (3.4)

    Substituting (3.4) into the first equation of (3.3) and integrating once with respect to η yields

    wψ+(α+β)ψηη+(γ+λ)ψ2=0. (3.5)

    Balancing ψηη with ψ2 in (3.5) calculates the value of N=2.

    According to the modified F-expansion method with N=2, the solutions of (3.5) are

    ψ(η)=ρ0+ρ1F(η)+q1F(η)+ρ2F(η)2+q2F(η)2, (3.6)

    and F(η) is a solution of the following differential equation:

    F(η)=μ0+μ1F(η)+μ2F(η)2, (3.7)

    where μ0, μ1, μ2 are given in Table 1. To explore the analytic solutions to (3.5), I ought to follow the subsequent steps.

    Step 1. Placing (3.6) along with (3.7) into Eq (3.5) and gathering the coefficients of F(η)j, j = 4,3,2,1,0,1,2,3,4, to zeros gives a system of equations for ρ0,ρk,qk, k=1,2.

    Step 2. Solve the resulting system using mathematical software: for example, Mathematica or Maple.

    Step 3. Choosing the values of μ0,μ1 and μ2 and the function F(η) from Table 1 and substituting them along with ρ0,ρk,qk, k=1,2, in (3.6) produces a set of trigonometric function and rational solutions to (3.5).

    Applying the above steps, I determine the values of ρ0,ρ1,ρ2,q1,q2 and w as follows:

    (1). When μ0=0, μ1=1 and μ2=1, I have two cases.

    Case 1.

    ρ0=0,ρ1=6(α+β)γ+λ,ρ2=6(α+β)γ+λ,q1=q2=0,andw=α+β. (3.8)

    The solution is given by

    Ψ1(x,y,t)=3(α+β)2(γ+λ)sech2(12(x+y(α+β)t+x0)). (3.9)

    Case 2.

    ρ0=α+βγ+λ,ρ1=6(α+β)γ+λ,ρ2=6(α+β)γ+λ,q1=q2=0,andw=(α+β). (3.10)

    The solution is given by

    Ψ2(x,y,t)=(α+β)2(γ+λ)(3tanh2(12(x+y+t(α+β))+x0)1). (3.11)

    Figure 1 presents the time evolution of the analytic solutions (a) Ψ1 and (b) Ψ2 with t=0,10,20. The parameter values are x0=20, α=0.50,β=0.6, γ=1.5, and λ=1. Figure 2 presents the wave behavior by changing a certain parameter value and fixing the values of the others. Figure 2(a,b) presents the behavior of Ψ1 when I change the values of (a) α or β and (b) γ or λ. In Figure 2(a) it can also be seen that the value of α or β affects the direction and amplitude of the wave, such that a negative value always makes the wave negative, its amplitude decreases when α,β0, and its amplitude increases when α,β. In Figure 2(b) the value of γ or λ affects the direction and amplitude of the wave, such that a negative value always makes the wave negative, and its amplitude decreases when the value of γ or λ increases. In Figure 2, (c) and (d) present the wave behavior of Ψ2.

    Figure 1.  Time evolution of the analytic solutions (a) Ψ1 and (b) Ψ2 with t=0,10,20. The parameter are given by x0=20, α=0.50,β=0.6, γ=1.5, and λ=1.
    Figure 2.  This figure present the wave behavior when changing a certain parameter value and fixing the values of the others. (a) presents the behavior when I change the value of α or β, and (b) presents when I change the value of γ or λ for the solution Ψ1. (c) and (d) are for Ψ2.

    (2). When μ0=0, μ1=1, and μ2=1, I have two cases.

    Case 3. The solution is given by

    Ψ3(x,y,t)=3(α+β)2(γ+λ)csch2(12(x+y(α+β)t)). (3.12)

    Case 4. The solution is given by

    Ψ4(x,y,t)=(α+β)2(γ+λ)(3coth2(12(x+y+t(α+β)))1). (3.13)

    (3). When μ0=1, μ1=0, and μ2=1, I have

    Case 5. The solution is given by

    Ψ5(x,y,t)=8(α+β)γ+λ(cosh(4(16t(α+β)+x+y))+2)csch2(2(16t(α+β)+x+y)). (3.14)

    (4). When μ0=±1, μ1=0, and μ2=±1, I have one case.

    Case 6. The solution is given by

    Ψ6(x,y,t)=24(α+β)γ+λcsc2(2(16t(α+β)+x+y)). (3.15)

    According to the generalized algebraic method, the solutions of (3.5) are given by the form

    ψ(η)=ν0+ν1G(η)+ν2G(η)2+r1G(η)+r2G(η)2, (3.16)

    where νk, rk are to be determined later. G(η) is a solution of the following differential equation:

    G(η)=ε4k=0δkGk(η), (3.17)

    where δk, k=0,1,3,4, are given in Table 2. In all the cases mentioned above and the subsequent solutions, I used the mathematical software Mathematica to find the values of the constants ν0,ν1,ν2,r1,r2 and w. Thus, the analytic solutions to (3.5) using the generalized algebraic method will be presented here with different values of the constants δk, k=0,1,3,4.

    (5). When δ0=δ224δ4, δ1=δ3=0, δ2<0, δ4>0, and ε=±1,

    ν0=±4δ22ε4(α+β)2(γ+λ)23δ2ε4(α+β)2(γ+λ)22δ2ε2(α+β)(γ+λ)(γ+λ)2,ν2=6δ4ε2(α+β)(γ+λ),ν1=r1=r2=0,ε=±1.w=±2(4δ223δ2)ε4(α+β)2(γ+λ)2(γ+λ). (3.18)

    Case 7. The solution is given by

    Ψ7(x,y,t)=1(γ+λ)2(3δ2ε4(α+β)(γ+λ)tanh2(δ2(2tδ2(4δ23)ε4(α+β)2(γ+λ)2γ+λ+x+y)2)+2δ2ε2(α+β)(γ+λ)+δ2(4δ23)ε4(α+β)2(γ+λ)2). (3.19)

    Figure 3 shows the time evolution of the analytic solutions. Figure 3(a) shows Ψ7 with t = 0:2:6. The parameter values are δ2=1, δ4=1, ϵ=1, α=0.50, β=0.6, γ=1.5, λ=1.8 and x0=10. Figure 3(b) shows Ψ8 with t=0:2:8. The parameter values are δ2=1, δ4=1, ϵ=1, α=0.50, β=0.6, γ=1.5, λ=1.8 and x0=10. Figures 46 present the 3D time evolution of the analytic solutions Ψ2 (left) and the numerical solutions (right) obtained employing the scheme 5.1 with t=5,15,25, Mx=1600, Ny=100, x=060 and y=01.

    Figure 3.  Time evolution of the analytic solutions. (a) Ψ7 with t=0:2:6. The parameter values are δ2=1, δ4=1, ϵ=1, α=0.50, β=0.6, γ=1.5, λ=1.8 and x0=10. (b) Ψ8 with t=0:2:8. The parameter values are δ2=1, δ4=1, ϵ=1, α=0.50, β=0.6, γ=1.5, λ=1.8 and x0=10.
    Figure 4.  3D graphs presenting the analytic (left) and the numerical (right) solutions of Ψ2(x,y,t) at t=5. The figures present the strength of agreement between analytic and numerical solutions.
    Figure 5.  3D graphs presenting the analytic (left) and the numerical (right) solutions of Ψ2(x,y,t) at t=15. The figures present the strength of agreement between analytic and numerical solutions.
    Figure 6.  3D graphs presenting the analytic (left) and the numerical (right) solutions of Ψ2(x,y,t) at t=25. The figures present the strength of agreement between analytic and numerical solutions.

    (6). When δ0=0, δ1=δ3=0, δ2>0, δ4<0, and ε=±1,

    ν2=6δ4ε2(α+β)γ+λ,ν1=ν0=r1=r2=0,w=4δ2ε2(α+β). (3.20)

    Case 8. The solution is given by

    Ψ8(x,y,t)=6δ2ϵ4(α+β)sech2(δ2(4δ2ϵ2t(α+β)+x+y))γ+λ (3.21)

    (7). When δ0=0, δ1=δ4=0, δ30, δ2>0, ε=±1

    Set 1.ν1=3δ3ε2(α+β)2(γ+λ),ν0=ν2=r1=r2=0,w=δ2ε2(α+β).Set 2.ν0=δ2ε2(α+β)(γ+λ),ν1=3δ3ε2(α+β)2(γ+λ),ν2=r1=r2=0,w=δ2ε2(α+β). (3.22)

    Case 9.The solution is given by

    Ψ9(x,y,t)=3δ2(α+β)sech2(12δ2(δ2t((α+β))+x+y))2(γ+λ). (3.23)

    Case 10. The solution is given by

    Ψ10(x,y,t)=3δ2(α+β)sech2(12δ2(δ2t(α+β)+x+y))2(γ+λ)δ2(α+β)γ+λ. (3.24)

    In this section I extract numerical solutions to the resulting ODE system (3.5) using several numerical methods. The purpose of this procedure is to guarantee the accuracy of the analytic solutions. I picked one of the analytic solutions above to be a sample, (3.11). The nonlinear shooting and BVP methods, at t=0, are used by taking the value of ψ at the right endpoint of the domain η=0 with guessing the initial value for ψη. The new target is to obtain the second boundary condition of ψ at the left endpoint of a particular domain. Once the numerical result is obtained, I compare it with the analytic solution (3.11). The MATLAB solver ODE15s and FSOLVE [47] are used to get the numerical solution. The resulting ODE (3.5) is discretized as

    f(ψ)=0,f(ψi)=wψi+α+βΔη(ψi+12ψi+ψi1)+γ+λ2Δη(ψ2i+1ψ2i1), (4.1)

    for the BVP method and

    ψηη=1α+β(wψ(γ+λ)ψ2), (4.2)

    for the shooting method. Figure 7 presents the comparison between the numerical solutions obtained using the above numerical methods and the analytic solution. Figure 7 shows that the solutions are identical to the analytic solution.

    Figure 7.  Comparing the numerical solutions resulting from the shooting and BVP methods with the analytic solution (3.11) at t=0. The parameter values are taken as α=0.50, β=0.6, γ=1.5,λ=1.8, with N=600.

    Thus, it is possible to verify the correctness of the analytic solution. I also accept the obtained numerical solution as an initial condition for the numerical scheme in the next section.

    In this section, I use the finite-difference method to obtain the numerical results of system (1.1) over the domain [a,b]×[c,d]. Here, a,b,c and d represent the endpoints of the rectangular domain in the x and y directions, respectively, and Tf is a certain time. The domain [a,b]×[c,d] is split into (Mx+1)×(Ny+1) mesh points:

    xm=a+mΔx,m=0,1,2,,Mx,yn=c+nΔy,n=0,1,2,,Ny,

    where Δx and Δy are the step-sizes of the x and y domains, respectively. The system (1.1) is converted to an ODE system by discretizing the space derivatives while keeping the time derivative continuous. Completing this yields

    Ψt|km,n+α2ΔyΔ2xδ2x(Γk+1m,n+1Γk+1m,n1)+β2ΔxΔ2yδ2y(Φk+1m+1,nΦk+1m1,n)γ4Δy((Φk+1m,n+1+Φk+1m,n)Γk+1m,n+1(Φk+1m,n+Φk+1m,n1)Γk+1m,n1)λ4Δx((Γk+1m+1,n+Γk+1m,n)Φk+1m+1,n(Γk+1m,n+Γk+1m1,n)Φk+1m1,n)+γ4Δy((Ψk+1m,n+1)2(Ψk+1m,n1)2)+λ4Δx((Ψk+1m+1,n)2(Ψk+1m1,n)2)=0,12Δy(Γk+1m,n+1Γk+1m,n1)=12Δx(Ψk+1m+1,nΨk+1m1,n),12Δy(Ψk+1m,n+1Ψk+1m,n1)=12Δx(Φk+1m+1,nΦk+1m1,n), (5.1)

    where

    δ2xΓk+1m,n=(Γk+1m+1,n2Γk+1m,n+Γk+1m1,n),δ2yΦk+1m,n=(Φk+1m,n+12Φk+1m,n+Φk+1m,n1),

    subject to the boundary conditions:

    Ψx(a,y,t)=Ψx(b,y,t)=0,y[c,d],Ψy(x,c,t)=Ψy(x,d,t)=0,x[a,b]. (5.2)

    Equation (5.2) permits us to use fictitious points in estimating the space derivatives at the domain's endpoints. The initial conditions are generated by

    Ψ2(x,y,0)=(α+β)2(γ+λ)(3tanh2(12(x+y+x0)1), (5.3)

    where α,β,γ and λ are user-defined parameters. In all the numerical results shown in this section, the parameter values are fixed as α=0.50,β=0.6,γ=1.50,λ=1.80,x0=45.0, y=01, x=060 and t=025. The above system is solved by using an ODE solver in FORTRAN called the DDASPK solver [48]. This solver used a backward differentiation formula. Since I do not have the initial conditions for the space derivatives, I approximate the Jacobian matrix of the linearized system by using LU-Factorization. The obtained numerical results are acceptable. This can be observed from the Figures 8 and 9.

    Figure 8.  Time change for the numerical results while holding y=0.5 and Mx=1600 at t=0:5:25. The wave at t=25 illustrates that the numerical and the analytic solutions are quite identical.
    Figure 9.  The convergence histories of the scheme with the fixation of both y=0.5 and Mx=1600 at t=5.

    The von Neumann analysis is used to examine the stability of the scheme (5.1). The von Neumann analysis is occasionally called Fourier analysis and is utilized exclusively when the scheme is linear. Hence, I suppose that the linear version is given by

    Ψt+αΓxxy+βΦxyy+s0Γy+s1Ψy+s2Φx+s3Ψx=0,Γy=Ψx,Ψy=Φx, (6.1)

    where s0=γΦ, s1=γΨ, s2=λΓ, s3=λΨ are constants. Since Γy=Ψx, and Ψy=Φx, the first equation of (6.1) is given by

    Ψt+αΨxxx+βΨyyy+s0Ψy+s1Ψy+s2Ψx+s3Ψx=0, (6.2)

    where α,β,γ,λ,s0,s1,s2,s3,l4 are constants. I set directly

    Ψkm,n=μkexp(ιπξ0nΔx)exp(ιπξ1mΔy), (6.3)

    and also I can have

    Ψk+1m,n=μΨkm,n,Ψkm+1,n=exp(ιπξ0Δx)Ψkm,n,Ψkm,n+1=exp(ιπξ1Δy)Ψkm,n,Ψkm1,n=exp(ιπξ0Δx)Ψkm,n,Ψkm,n1=exp(ιπξ1Δy)Ψkm,n,m=1,2,,Nx1,n=1,2,,Ny1.

    Substituting (6.3) into (6.2) and doing some operations, I have

    1=μ(1ιΔt(sin(ξ0πΔx)Δx(4αΔ2xsin2(ξ0πΔx2)s2s3)+sin(ξ1πΔy)Δy(4βΔ2ysin2(ξ1πΔy2)s0s1))).

    Hence,

    μ=11aι, (6.4)

    where

    a=Δt(sin(ξ0πΔx)Δx(4αΔ2xsin2(ξ0πΔx2)s2s3)+sin(ξ1πΔy)Δy(4βΔ2ysin2(ξ1πΔy2)s0s1)).

    Thus,

    |μ|2=11+a21. (6.5)

    The stability condition of the von Neumann analysis is fulfilled. Consequently, from Eq (6.5), the scheme is unconditionally stable.

    To examine the accuracy of the numerical scheme (5.1), I study the truncation error utilizing Taylor expansions. Suppose that the error is

    ek+1m,n=Ψk+1m,nΨ(xm,yn,tk+1), (7.1)

    where Ψ(xm,yn,tk+1) and Ψk+1m,n are the analytic solution and an approximate solution, respectively. Substituting (7.1) into (5.1) gives

    ek+1j,kekj,kΔt=Tk+1m,n(α12Δ3xδ2x(ek+1m+1,nek+1m1,n)+β12Δ3yδ2y(ek+1m,n+1ek+1m,n1)+s2+s32Δx(ek+1m+1,nek+1m1,n)+s0+s12Δy(ek+1m,n+1ek+1m,n1)),

    where

    Tk+1m,n=α2Δ3xδ2x(Ψ(xm+1,yn,tk+1)Ψ(xm1,yn,tk+1))+β2Δ3yδ2y(Ψ(xm,yn+1,tk+1)Ψ(xm,yn1,tk+1))+s2+s32Δx(Ψ(xm+1,yn,tk+1)Ψ(xm1,yn,tk+1))+s0+s12Δy(Ψ(xm,yn+1,tk+1)Ψ(xm,yn1,tk+1)).

    Hence,

    Tk+1m,nΔt22Ψ(xm,yn,ξk+1)t2Δ2x25Ψ(ζm,yn,tk+1)x5Δ2y25Ψ(xm,ηn,tk+1)x5Δ2y63Ψ(xm,ηn,tk+1)x3Δ2x63Ψ(ζm,yn,tk+1)x3.

    Accordingly, the truncation error of the numerical scheme is

    Tk+1m,n=O(Δt,Δ2x,Δ2y).

    I have prosperously employed several analytical methods to extract the traveling wave solutions to the two-dimensional Novikov-Veselov system, confirming the solutions with numerical results obtained using the numerical scheme (5.1). The major highlights of the results are shown in Table 3 and Figures 810, which allow immediate comparison of the analytic solutions with the numerical results. Through these, I can notice that the solutions are identical to a large extent, and the error approaches zero whenever the value of Δx,Δy0. The numerical schemes are unconditionally stable for fixing the parameter values α=0.50,β=0.6,γ=1.50,λ=1.80,x0=45.0, y=01, x=060 and t=025.

    Table 3.  The relative error with L2 norm and CPU at t=20..
    Δx The Relative Error CPU
    0.6000 5.600×103 0.063×103m
    0.3000 2.100×103 0.1524×103s
    0.1500 6.700×104 0.3564×103s
    0.0750 2.100×104 0.8892×103s
    0.0375 6.610×105 1.7424×103s
    0.0187 2.310×105 4.0230×103s

     | Show Table
    DownLoad: CSV
    Figure 10.  The convergence histories measured utilizing the relative error with l2 norm as a function of Δx (see Table 3). Here, I picked a certain value of the variable y=0.5 at t=20 and x=060.

    Figure 1 presents the time evolution of the analytic solutions (a) Ψ1 and (b) Ψ2 with t=0,10,20. The parameter values are x0=20, α=0.50, β=0.6, γ=1.5, and λ=1. Figure 2 presents the wave behavior by changing a certain parameter value and fixing the values of the others. Figure 2(a,b) presents the behavior of Ψ1 when I change the values of (a) α or β and (b) γ or λ. In Figure 2(a) it can also be seen that the value of α or β affects the direction and amplitude of the wave, such that a negative value always makes the wave negative, its amplitude decreases when α,β0, and its amplitude increases when α,β. In Figure 2(b) the value of γ or λ affects the direction and amplitude of the wave, such that a negative value always makes the wave negative, and its amplitude decreases when the value of γ or λ increases. In Figure 2(c,d) present the wave behavior of Ψ2. Figure 3 shows the time evolution of the analytic solutions. Figure 3(a) shows Ψ7 with t=0:2:6. The parameter values are δ2=1, δ4=1, ϵ=1, α=0.50, β=0.6, γ=1.5, λ=1.8 and x0=10. Figure 3(b) shows Ψ8 with t=0:2:8. The parameter values are δ2=1, δ4=1, ϵ=1, α=0.50, β=0.6, γ=1.5, λ=1.8 and x0=10. Figures 46 present the 3D time evolution of the analytic solutions Ψ2 (left) and the numerical solutions (right) obtained employing the scheme 5.1 with t=5,15,25, Mx=1600, Ny=100, x=060 and y=01. These figures provide us with an adequate answer that the numerical and analytic solutions are quite identical. Barman et al. [42] accepted several traveling wave solutions for (1.1) as hyperbolic functions. The authors employed other parameters to develop new forms for the accepted solution. They proposed that Eq (1.1) describes tidal and tsunami waves, electromagnetic waves in transmission cables and magneto-sound and ion waves in plasma. In comparison, I have found numerous solutions also as hyperbolic functions. Furthermore, I obtained the numerical solutions to enhance the assurance that the solutions presented here are correct and accurate.

    I have successfully utilized the generalized algebraic and modified F-expansion methods to acquire the soliton solutions for the two-dimensional Novikov-Veselov system, verifying these solutions with numerical results obtained by employing the numerical scheme (5.1). The major highlights of the results shown in Figures 810 and Table 3, which allow immediate comparison of the analytic solutions with the numerical results. Through these, I can notice that the solutions are identical to a large extent, and the error approaches zero whenever the value of Δx,Δy0. The numerical schemes are unconditionally stable for fixing the parameter values α=0.50,β=0.6,γ=1.50,λ=1.80, x0=45.0, y=01, x=060 and t=025. The Jacobi elliptic functions have effectively deteriorated to hyperbolic functions. The applied numerical schemes have provided reliable numerical solutions when using a small value of Δx,Δy0.

    Ultimately, I can deduce that the methods used are valuable and applicable to extract soliton solutions for other nonlinear evolutionary systems found in chemistry, engineering, physics and other sciences.

    The author declares that he has no potential conflict of interest in this article.



    [1] A. Abbaspour, S. Mokhtari, A. Sargolzaei, K. K. Yen, A survey on active fault-tolerant control systems, Electronics, 9 (2021), 1513. doi: 10.3390/electronics9091513 doi: 10.3390/electronics9091513
    [2] N. Sultana, N. Chilamkurti, W. Peng, R. Alhadad, Survey on SDN based network intrusion detection system using machine learning approaches, Peer-to-Peer Netw. Appl., 12 (2019), 493–501. doi: 10.1007/s12083-017-0630-0 doi: 10.1007/s12083-017-0630-0
    [3] S. Mokhtari, A. Abbaspour, K. K. Yen, A. Sargolzaei, A machine learning approach for anomaly detection in industrial control systems based on measurement data, Electronics, 10 (2021), 407. doi: 10.3390/electronics10040407 doi: 10.3390/electronics10040407
    [4] V. Chandola, A. Banerjee, V. Kumar, Anomaly detection: A survey, ACM comput. surv. (CSUR), 41 (2009), 1–58. doi: 10.1145/1541880.1541882 doi: 10.1145/1541880.1541882
    [5] K. Paridari, N. O'Mahony, A. Mady, R. Chabukswar, M. Boubekeur, H. Sandberg, A framework for attack-resilient industrial control systems: Attack detection and controller reconfiguration, P. IEEE, 106 (2017), 113–128. doi: 10.1109/JPROC.2017.2725482 doi: 10.1109/JPROC.2017.2725482
    [6] J. Goh, S. Adepu, M. Tan, Z. S. Lee, Anomaly detection in cyber physical systems using recurrent neural networks, 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE), (2017), 140–145. doi: 10.1109/HASE.2017.36 doi: 10.1109/HASE.2017.36
    [7] A. Javaid, Q. Niyaz, W. Sun, M. Alam, A deep learning approach for network intrusion detection system, Eai Endorsed Transactions on Security and Safety, 3 (2016). doi: 10.4108/eai.3-12-2015.2262516 doi: 10.4108/eai.3-12-2015.2262516
    [8] H. Choi, M. Kim, G. Lee, W. Kim, Unsupervised learning approach for network intrusion detection system using autoencoders, The Journal of Supercomputing, 75 (2019), 5597–5621. doi: 10.1007/s11227-019-02805-w doi: 10.1007/s11227-019-02805-w
    [9] M. Masson, Darktrace OT threat finds: Detecting an advanced ICS attack targeting an international airport, Aug., 2007. Available from: http://shorturl.at/nuJ19.
    [10] Y. Liu, Y. Mu, K. Chen, Y. Li, J. Guo, Daily activity feature selection in smart homes based on pearson correlation coefficient, Neural Process. Lett., (2020), 1–17. doi: 10.1007/s11063-019-10185-8 doi: 10.1007/s11063-019-10185-8
    [11] S. Bornelöv, J. Komorowski, Selection of significant features using Monte Carlo feature selection, Challenges in Computational Statistics and Data Mining, (2016), 25–38. doi: 10.1007/978-3-319-18781-5_2 doi: 10.1007/978-3-319-18781-5_2
    [12] Q. Guo, W. Wu, D. L. Massart, C. Boucon, S. De Jong, Feature selection in principal component analysis of analytical data, Chemometr. Intell. Lab., 61 (2002), 123–132. doi: 10.1016/S0169-7439(01)00203-9 doi: 10.1016/S0169-7439(01)00203-9
    [13] J. G. Dy, C. E. Brodley, Feature selection for unsupervised learning, J. Mach. Learn. Res., 5 (2004), 845–889. doi: 10.5555/1005332.1016787 doi: 10.5555/1005332.1016787
    [14] Y. Li, B. Lu, Z. Wu, Hierarchical fuzzy filter method for unsupervised feature selection, J. Intell. Fuzzy Syst., 18 (2007), 157–169. doi: 10.5555/1368376.1368381 doi: 10.5555/1368376.1368381
    [15] Z table website provides all required information for using Z-test. Aug., 2021. Available from: https://www.ztable.net.
    [16] F. T. Liu, K. M. Ting, Z. Zhou, Isolation forest, 2008 eighth ieee international conference on data mining, (2008), 413–422. doi: 10.1109/ICDM.2008.17 doi: 10.1109/ICDM.2008.17
    [17] M. Wu, C. Jermaine, Outlier detection by sampling with accuracy guarantees, Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, (2006), 767–772. doi: 10.1145/1150402.1150501 doi: 10.1021/ie302042c
    [18] H. Ma, Y. Hu, H. Shi, Fault detection and identification based on the neighborhood standardized local outlier factor method, Ind. Eng. Chem. Res., 52 (2013), 2389–2402. doi: 10.1021/ie302042c doi: 10.1021/ie302042c
    [19] V. Kotu, B. Deshpande, Chapter 13 - Anomaly Detection, Data Science (Second Edition), (2019), 447–465. doi: 10.1016/B978-0-12-814761-0.00013-7 doi: 10.1016/B978-0-12-814761-0.00013-7
    [20] M. Ashrafuzzaman, S. Das, A. A. Jillepalli, Y. Chakhchoukh, F. T. Sheldon, Elliptic Envelope Based Detection of Stealthy False Data Injection Attacks in Smart Grid Control Systems, 2020 IEEE Symposium Series on Computational Intelligence (SSCI), (2020), 1131–1137. doi: 10.1109/SSCI47803.2020.9308523 doi: 10.1109/SSCI47803.2020.9308523
    [21] P. J. Rousseeuw, K. V. Driessen, A fast algorithm for the minimum covariance determinant estimator, Technometrics, 41 (1999), 212–223. doi: 10.1080/00401706.1999.10485670 doi: 10.1080/00401706.1999.10485670
    [22] P. C. Mahalanobis, On the generalized distance in statistics, National Institute of Science of India, 1936. doi: 10.1007/s13171-019-00164-5 doi: 10.1007/s13171-019-00164-5
    [23] M. Sokolova, G. Lapalme, A systematic analysis of performance measures for classification tasks, Inform. process. manag., 45 (2009), 427–437. doi: 10.1016/j.ipm.2009.03.002 doi: 10.1016/j.ipm.2009.03.002
    [24] N. V. Chawla, K. W. Bowyer, L. O. Hall, W. P. Kegelmeyer, SMOTE: synthetic minority over-sampling technique, J. artif. intell. res., 16 (2002), 321–357. doi: 10.5555/1622407.1622416 doi: 10.5555/1622407.1622416
    [25] H. Shin, W. Lee, J. Yun, H. Kim, HAI 1.0: HIL-based Augmented ICS Security Dataset, 13th USENIX Workshop on Cyber Security Experimentation and Test (CSET 20), 2020. doi: 10.5555/3485754.3485755 doi: 10.5555/3485754.3485755
    [26] S. Choi, HIL-based Augmented ICS (HAI) Security Dataset, The Affiliated Institute of ETRI, South Korea, 2020. Available from: https://github.com/icsdataset/hai.
    [27] H. Shin, W. Lee, J. Yun, H. Kim, Implementation of programmable CPS testbed for anomaly detection, 12th USENIX Workshop on Cyber Security Experimentation and Test (CSET 19), 2019. doi: 10.5555/3359012.3359014 doi: 10.5555/3359012.3359014
    [28] W. Hwang, J. Yun, J. Kim, H. Kim, Time-series aware precision and recall for anomaly detection: considering variety of detection result and addressing ambiguous labeling, Proceedings of the 28th ACM International Conference on Information and Knowledge Management, (2019), 2241–2244. doi: 10.1145/3357384.3358118 doi: 10.1145/3357384.3358118
  • Reader Comments
  • © 2021 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(4352) PDF downloads(134) Cited by(5)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog