Research article Special Issues

Election-based optimization algorithm with deep learning-enabled false data injection attack detection in cyber-physical systems

  • Cyber-physical systems (CPSs) are affected by cyberattacks once they are more connected to cyberspace. Advanced CPSs are highly complex and susceptible to attacks such as false data injection attacks (FDIA) targeted to mislead the systems and make them unstable. Leveraging an integration of anomaly detection methods, real-time monitoring, and machine learning (ML) algorithms, research workers are developing robust frameworks to recognize and alleviate the effect of FDIA. These methods often scrutinize deviations from predictable system behavior, using statistical analysis and anomaly detection systems to determine abnormalities that can indicate malicious activities. This manuscript offers the design of an election-based optimization algorithm with a deep learning-enabled false data injection attack detection (EBODL-FDIAD) method in the CPS infrastructure. The purpose of the EBODL-FDIAD technique is to enhance security in the CPS environment via the detection of FDIAs. In the EBODL-FDIAD technique, the linear scaling normalization (LSN) approach can be used to scale the input data into valuable formats. Besides, the EBODL-FDIAD system performs ensemble learning classification comprising three classifiers, namely the kernel extreme learning machine (KELM), long short-term memory (LSTM), and attention-based bidirectional recurrent neural network (ABiRNN) model. For optimal hyperparameter selection of the ensemble classifiers, the EBO algorithm can be applied. To validate the enriched performance of the EBODL-FDIAD technique, wide-ranging simulations were involved. The extensive results highlighted that the EBODL-FDIAD algorithm performed well over other systems concerning numerous measures.

    Citation: Hend Khalid Alkahtani, Nuha Alruwais, Asma Alshuhail, Nadhem NEMRI, Achraf Ben Miled, Ahmed Mahmud. Election-based optimization algorithm with deep learning-enabled false data injection attack detection in cyber-physical systems[J]. AIMS Mathematics, 2024, 9(6): 15076-15096. doi: 10.3934/math.2024731

    Related Papers:

    [1] Maha M. Althobaiti, José Escorcia-Gutierrez . Weighted salp swarm algorithm with deep learning-powered cyber-threat detection for robust network security. AIMS Mathematics, 2024, 9(7): 17676-17695. doi: 10.3934/math.2024859
    [2] E Laxmi Lydia, Chukka Santhaiah, Mohammed Altaf Ahmed, K. Vijaya Kumar, Gyanendra Prasad Joshi, Woong Cho . An equilibrium optimizer with deep recurrent neural networks enabled intrusion detection in secure cyber-physical systems. AIMS Mathematics, 2024, 9(5): 11718-11734. doi: 10.3934/math.2024574
    [3] Sheng-Ran Jia, Wen-Juan Lin . Adaptive event-triggered reachable set control for Markov jump cyber-physical systems with time-varying delays. AIMS Mathematics, 2024, 9(9): 25127-25144. doi: 10.3934/math.20241225
    [4] Mohammed Aljebreen, Hanan Abdullah Mengash, Khalid Mahmood, Asma A. Alhashmi, Ahmed S. Salama . Enhancing cybersecurity in cloud-assisted Internet of Things environments: A unified approach using evolutionary algorithms and ensemble learning. AIMS Mathematics, 2024, 9(6): 15796-15818. doi: 10.3934/math.2024763
    [5] Sultanah M. Alshammari, Nofe A. Alganmi, Mohammed H. Ba-Aoum, Sami Saeed Binyamin, Abdullah AL-Malaise AL-Ghamdi, Mahmoud Ragab . Hybrid arithmetic optimization algorithm with deep learning model for secure Unmanned Aerial Vehicle networks. AIMS Mathematics, 2024, 9(3): 7131-7151. doi: 10.3934/math.2024348
    [6] Youseef Alotaibi, R Deepa, K Shankar, Surendran Rajendran . Inverse chi-square-based flamingo search optimization with machine learning-based security solution for Internet of Things edge devices. AIMS Mathematics, 2024, 9(1): 22-37. doi: 10.3934/math.2024002
    [7] Junfeng Zhang, Renjie Fu, Yuanyuan Wu, Bhatti Uzair Aslam . Practical consensus of time-varying fuzzy positive multi-agent systems. AIMS Mathematics, 2024, 9(11): 31119-31141. doi: 10.3934/math.20241500
    [8] Yahan Deng, Zhenhai Meng, Hongqian Lu . Adaptive event-triggered state estimation for complex networks with nonlinearities against hybrid attacks. AIMS Mathematics, 2022, 7(2): 2858-2877. doi: 10.3934/math.2022158
    [9] Amina Turki, Omar Kahouli, Saleh Albadran, Mohamed Ksantini, Ali Aloui, Mouldi Ben Amara . A sophisticated Drowsiness Detection System via Deep Transfer Learning for real time scenarios. AIMS Mathematics, 2024, 9(2): 3211-3234. doi: 10.3934/math.2024156
    [10] Wahida Mansouri, Amal Alshardan, Nazir Ahmad, Nuha Alruwais . Deepfake image detection and classification model using Bayesian deep learning with coronavirus herd immunity optimizer. AIMS Mathematics, 2024, 9(10): 29107-29134. doi: 10.3934/math.20241412
  • Cyber-physical systems (CPSs) are affected by cyberattacks once they are more connected to cyberspace. Advanced CPSs are highly complex and susceptible to attacks such as false data injection attacks (FDIA) targeted to mislead the systems and make them unstable. Leveraging an integration of anomaly detection methods, real-time monitoring, and machine learning (ML) algorithms, research workers are developing robust frameworks to recognize and alleviate the effect of FDIA. These methods often scrutinize deviations from predictable system behavior, using statistical analysis and anomaly detection systems to determine abnormalities that can indicate malicious activities. This manuscript offers the design of an election-based optimization algorithm with a deep learning-enabled false data injection attack detection (EBODL-FDIAD) method in the CPS infrastructure. The purpose of the EBODL-FDIAD technique is to enhance security in the CPS environment via the detection of FDIAs. In the EBODL-FDIAD technique, the linear scaling normalization (LSN) approach can be used to scale the input data into valuable formats. Besides, the EBODL-FDIAD system performs ensemble learning classification comprising three classifiers, namely the kernel extreme learning machine (KELM), long short-term memory (LSTM), and attention-based bidirectional recurrent neural network (ABiRNN) model. For optimal hyperparameter selection of the ensemble classifiers, the EBO algorithm can be applied. To validate the enriched performance of the EBODL-FDIAD technique, wide-ranging simulations were involved. The extensive results highlighted that the EBODL-FDIAD algorithm performed well over other systems concerning numerous measures.



    Today, cyber-physical systems (CPSs) are a focal point due to the development of network communication technology, information technology (IT), control theory, and technological developments. Incessantly, the security of CPSs is considered by progressive researchers, and an increasing number of attacks against numerous CPSs are performed [1]. In several instances, the CPSs have been attacked through false data injection attacks (FDIA). In 2015, the "BlackEnergy" virus provoked an electricity failure of the Ukrainian power grids, and later a different version of the virus attacked a railway operation system and mining company. It is noticeable that the attacks of the CPSs have been tremendously dangerous [2]. Consequently, the security of CPSs will be increasingly examined by several researchers.

    Nowadays, the three leading categories of attacks against CPSs are denial of service (DoS) attacks, replay attacks, and FDIA [3]. The FDIA interrupts execution or stability by inserting false data without identification. Thus, figuring out how to recognize the FDIA is a major exploration domain. FDIA was devised reliant on the physical information of the system, which makes it complex for traditional identification techniques to detect the attacks [4]. Automatically, while the information of the CPSs is changed on FDIA, the connection between the output and input should be modified and what remains between actual and ideal outputs must be altered. Various attacks are caused by different false and even collapses in every part of CPSs, such as physical parts of the system or cyber modules [5]. In general, two important kinds of cyberattacks are denial of service (DoS) and deception attacks. In each category of deception attacks, the target of the attacker is to cooperate with the transferred data at the sensor to decrease the data packet's integrity [6]. Particularly, a few varieties of deception attacks arise frequently in industrial CPSs. Such popular attacks comprise FDIAs where the produced fault data (noise) from the attacker is inserted into the communication network to reduce the data authenticity of the system [7], replay attacks where the prior time data packets will be stored and transmitted recurrently for preventing the submodels from accomplishing the steady-state stage, and time-delay attacks where a delay parameter is inserted into the systems for affecting instability in the system's functions [8]. Deep learning (DL) methods have presented significant achievements in numerous sectors namely speech identification, natural language processing (NLP), and image identification, providing effective possibilities to enhance cybersecurity in Industry 5.0 [9]. Transformer, CNNs, and RNN methods are among the systems that will automatically learn intricate representations and patterns in the raw data [10]. This ability allows DL methods to identify new and complex attacks that should be avoided by standard machine learning (ML) techniques [11]. Additionally, DL methods are modified to deal with the challenges related to cybersecurity datasets, like non-stationarity, noise, and imbalance [12]. It will be integrated with other artificial intelligence (AI) methods, namely reinforcement learning (RL) and adversarial learning, to make highly strong and adaptable attack detection models [13]. DL algorithms can be used to considerably increase the identification and avoidance of web-based attacks in the CPS platform.

    This manuscript offers the design of an election-based optimization algorithm with a deep learning-enabled false data injection attack detection (EBODL-FDIAD) technique in the CPS environment. In the EBODL-FDIAD system, the linear scaling normalization (LSN) approach can be used to scale the input data into a useful format. Besides, the EBODL-FDIAD method performs ensemble learning classification comprising three classifiers, namely the kernel extreme learning machine (KELM), long short-term memory (LSTM), and attention-based bidirectional recurrent neural network (ABiRNN) model. For optimal hyperparameter selection of the ensemble classifiers, the EBO algorithm can be applied. The impact of the presented method, EBODL-FDIAD, lies in its widespread manner of detecting FDIA utilizing DL approaches and advanced optimizer models. By combining an ensemble of classifiers with the EBO approach for hyperparameter tuning, we can improve the model's adaptability and performance, ensuring optimum configuration to generate reliable recognition of and correct cyber threats. The extensive results highlighted that the EBODL-FDIAD technique performed well over other approaches with respect to diverse measures. The major contributions of the study are listed as follows:

    ● The EBODL-FDIAD methodology provides a widespread solution to FDIA detection by integrating ensemble learning and an EBO-based hyperparameter tuning model in the CPS platform. As we know it, the EBODL-FDIAD approach has never occurred in previous literature.

    ● Employing an ensemble model by integrating KELM, LSTM, and ABiRNN enables the model to control the unique strengths of all of the methods, enhancing complete recognition performance. The inclusion of ABiRNN presents a new model for examining graph-structured data that is most relevant for identifying difficult connections and dependencies in CPS networks.

    ● Deploying the EBO approach for hyperparameter tuning improves the effectiveness and efficacy of the model by automatically optimizing main parameters, decreasing the need for manual tuning, and enhancing detection accuracy.

    In [14], a modified red fox optimizer with a DL-based FDIA detection (MRFODL-FDIAD) method was developed at the cyber-physical production system (CPPS) infrastructure. This introduced MRFODL-FDIAD system primarily identifies and categorizes FDIAs at the CPPS platform. This includes a three-phase method of identification, parameter tuning, and preprocessing. For FDIA detection, the MRFODL-FDIAD method employs a multihead attention-based LSTM (MBA-LSTM) system. In [15], an intelligent attack detection and recognition system was developed that can categorize the attack varieties on the physical layer dependent upon the ELM algorithm. Additionally, the developed method finds the attack or false to precise features or capacities in the model to support cybersecurity experts in alleviating the effects of the attack on the communication networks.

    Liu et al. [16] examined the identification of irregular FDIA under CPSs. Deep-RL (DRL) was implemented to make an FDIA detection. Initially, the uneven attack detection issue was labeled as a partially observable Markov decision process (POMDP) and an neural network can be employed to analyze the POMDP. At this network, sliding observation windows consisting of the offline fragment of previous data have been employed as the input. In [17], a graph convolutional network (GCN) algorithm was developed to identify the FDIA. This presented method examined the representational features of FDIAs by executing the graphical architecture of the power network to analyze the changing state assessment values dependent upon the network topology and identified the position of the FDIAs.

    In [18], a testbed of the process industry was designed that was a hardware-in-the-loop environment for simulating real-time industrial manufacturing and implemented an FDIA at this infrastructure. A host improved the physical method, and the cyber product was an engineer station or real industrial controller. Then, this developed method built an effective FDIA detection system, named the DRIF. In [19], an FDIA detection technique dependent upon protected federated DL was developed by integrating a transformer, federated learning (FL), and Paillier cryptosystem. The transformer is a detector employed for edge nodes, examining deeply the relationship among separate electrical measures by employing the multi-class self-attention mechanism. With the help of the FL model, the technique exploits the data at every node for collaboratively training a detection system.

    Fu et al. [20] projected an innovative attack technique called the temporal FDI (TFDI) attack. The virus created outcomes dependent upon temporal interpretations of the CPPS, and a deep Q network (DQN) architecture stimulated the attack. For example, DQN captured vectors of incessant variables as input conditions, and the developed technique is allowed to the state space explosion issue. Additionally, for implementing time-series measures as quasi-dynamic analysis, LSTM cells could be utilized as a layer of the Q network. In [21], an end-wise DL method was established dependent upon a huge volume of real-time sensor data. Primarily, an innovative recursive model with multi-lookback inputs was developed. An innovative learning method called recursive gradient descent (RGD) was made for the designed model for decreasing combined prediction variability. Later, a classification method dependent upon temporal convolutions through numerous channels with decay impact was developed.

    Tian et al. [22] investigated adversarial example attacks on multi-label FDIA locational detectors and presented a common multi-label adversarial attack structure like the multi-label adversarial false data injection attack (LESSON). In [23], the authors analyzed the tasks of adversarial attacks against DL-based Unmanned Aerial Vehicles (UAVs) and presented two adversarial attack approaches against regression methods in UAVs. The investigations exhibited that the presented non-targeted and targeted attack models crafted imperceptible adversarial images and presented a significant attack on the navigation and control systems of UAVs. Tian et al. [24] examined the joint adversarial example and FDIAs (AFDIAs) to discover several attack conditions for state evaluation in power systems. If perturbations are directly added to measurements, they are more likely to be identified by BDDs. The presented approach of adding perturbations to state variables ensures that the attack is secret to BDDs. Afterward, malicious data that are stealthy to both BDDs and DL-based detectors are created.

    In the manuscript, we offer the design of an EBODL-FDIAD technique in the CPS infrastructure. The purpose of the EBODL-FDIAD technique is to enhance security in the CPS environment via the detection of FDIAs. It contains three different processes namely data preprocessing, ensemble learning, and EBO-based parameter tuning. Figure 1 demonstrates the entire procedure of the EBODL-FDIAD technique.

    Figure 1.  Overall process of the EBODL-FDIAD technique.

    At the primary level, the EBODL-FDIAD technique applies the LSN approach to be used for scaling the input data into valuable formats. The LSN is a data preprocessing method developed for improving the comparability of features within a dataset [25]. By converting the values of distinct features through linear scaling, LSN confirms that every feature gives proportionally to the overall analysis without being disproportionately impacted by variances in scale. This system maps the original feature values to a standardized range, normally between 0 and 1, making the data more responsive to different ML methods and statistical analyses. LSN is mainly valued in conditions where disparate scales among features could skew model efficiency, offering a robust and effectual means to standardize datasets for increased interpretability and accuracy in analytical methods.

    The EBODL-FDIAD technique performs ensemble learning classification comprising three classifiers, namely the KELM, LSTM, and ABiRNN models.

    As an advanced model, KELM is proposed based on the ELM model [26]. The kernel function has faster learning ability and better generalization performance. ELM is a feedforward neural network that consists of a hidden layer (HL), input layers, and output layers, and it can be mathematically modeled by,

    Hβ=T, (1)
    H(w1,,w1,b1,,b1,x1,,xn)=(g(w1x1+b1)g(w1x1+b1)g(w1xn+b1)g(w1xn+b1)) (2)

    In the equation, H indicates the output matrix of HL, wl shows the weight of the lth neurons in the HL, T indicates the target output matrix, β refers to the output weight, and bl shows the bias of the lth neurons in the HL. The learning algorithm of ELM is used to resolve the output weight β using the least square model:

    βELM=HT(HHT)1T=H+T. (3)

    In Eq (3), H+ denotes the generalized inverse matrix of H. Figure 2 shows the structure of the KELM model.

    Figure 2.  Framework of KELM.

    In KELM, the kernel function parameters γ and regularization coefficient C are introduced to enhance KELM accuracy, and the kernel function matrix can be formulated by:

    Ω=HHT, (4)
    Ωij=h(Xi)h(xj)=K(xi×xj). (5)

    Next, the least square (LS) solution of β values of the KELM is:

    βKELM=HT(IC+HHT)1T. (6)

    According to the abovementioned equation, the output function of KELM is formulated by:

    f(x)=[K(x,x1)K(x'xn)](Ω+IC)1T. (7)

    Additionally, the radial basis function (RBF) is desired as a kernel operation and its formula can be written as:

    K(xi,xj)=exp(||xx||22γ2). (8)

    In Eq (8), γ implies the kernel parameter.

    LSTM can be a type of RNN. LSTM is used to replace the computation of hidden states with multiple gate functions [27]. This allows for capturing long-term dependence in the temporal data sequence. The LSTM presents an original flow, the cell state mtRn revealed at the top of the cell structure than traditional RNN. LSTM can add or remove the data to the cell states. The cell state retains the LSTM memory. A 3-gating model regulates the data flow in LSTM consisting of the input gate itRn, the forget gate ft Rn, and the output gate otRn. The input gate is used to adjust the level of data from the existing input xt and the prior HL st1 is fed into the existing state. The forget gate regulates what data at the prior cell state mt1 must be retained. The output gate regulates what amount of data is passed into the existing hidden state st. The operation of this gate is given below:

    it=σ(Vixt+Wist1+bi), (9)
    ft=σ(Vfxt+Wfst1+bf), (10)
    ot=σ(Voxt+WoSt1+bo), (11)

    with the parameters Vi, Vf, VoRn×p; Wi, Wf, WoRn×n; and bi, bf, bo Rn×1. σ refers to the sigmoid activation function.

    Next, the cell state and HL are attained as follows.

    gt=tanh(Vmxt+Wmst1+bm), (12)
    mt=ftmt1+itgt, (13)
    st=ottanh(mt). (14)

    The equation indicates the component‐wise multiplication.VmRn×p; WmRn×n; and bmRn×1. tanh refers to the hyperbolic tangent function.

    The LSTM training is performed by the BPTT by reducing the main function on the set of training sequences. This gradient of weight and bias is evaluated at each time step. Next, with the traditional optimization approaches (for example, stochastic gradient descent (SGD), root mean square propogation (RMSprop), or adaptive moment estimation (Adam)), the optimum parameter is attained.

    RNN can capture temporal patterns in the information [28]. Typical RNN is unidirectional, such that the input dataset is processed in a temporal sequence. The shortcoming of RNNs is that they are limited to the usage of prior context. A bidirectional recurrent neural network (BRNN) provides a solution by performing the data processing in backward and forward directions. The structure of BRNN unfolded in time for theT time step. The BRNN includes backward and forward layers. The hft forward layer can be evaluated by processing the input dataset from t=1,,T, and the hbt backward layer can be evaluated by processing the input dataset from t=T,,1 with output from both layers combined using the following equations:

    hft=tanh(Wfxhxt+Wfhhht1+bfh), (15)
    hbt=tanh(Wbxhxt+Wbhhht+1+bbh), (16)
    yt=Wfhyhft+Wbhyhbt+by). (17)

    The output vector yt attained by processing the series of input datasets from t=1,,T was later fed into the attention layer. The dimensional of the hidden layer in the backward and forward direction is 50, with the output at the time step being a 100-size vector.

    Paroxysmal atrial fibrillation (PAF) takes place as an intermittent period of AF scattered with episodes of normal sinus rhythm. Therefore, a soft attention module is applied on top of BRNN such that more attention (or emphasis) is gained with a high prevalence of AF. The attention model is expressed in the following. The output from BRNN [y1,y2,yT] is combined into matrix Y, which is of NxT size, where N denotes the size of output vector yt and T refers to the length of the input series. The weight output vector hatt of the attention layer is given below:

    α=softmax(wTattY), (18)
    hatt=YαT. (19)

    α refers to the weight vector calculated from matrix y, and the output hatt is computed as a weighted sum of the output vector from BRNN (hatt is a 100-dimensional vector).

    For choosing the optimum hyperparameter for the ensemble classifiers, the EBO algorithm can be applied. Trojovsky and Dehghani proposed EBOA as a stochastic-based optimizer [29]. The mathematical modeling of the optimizer is discussed below:

    1) Initialization

    A participant of the community makes up the EBOA, a metaheuristic approach that works in the population dynamics manner. In the EBOA population, all individuals have a different method to address the issues at hand. A matrix named as a population matrix depicts the EBOA population from a mathematical perspective.

    Initial positions of individuals in the search space are randomly allocated as follows:

    xi,j=lbj+r(ubjlbj),|i=1,2,,N,j=1,2,,m (20)

    In Eq (20), a random integer in the range [0, 1] is r, and lbj and ubj are the upper and lower limits of the jth variable, correspondingly. According to the value suggested by each participant of EBO, the value for the objective function (OF) is evaluated for the problem variable. The vector shows the estimated value for the OF of the problem:

    OF=[&OF&1&.&.&.&OF&i&.&.&.&OFN]N×1=[&OF&1&.&.&.&OF&i&.&.&.&OF(XN)]N×1. (21)

    In Eq (21), OF refers to the objective function value of the vector of the EBOA population and OFi is the computed value of OF for ith participants of EBOA. Similar to other optimization techniques, EBOA has two different stages, namely the mathematical representation and physical explanation, which are described in the following section.

    2) Voting and holding elections methods (exploration stage)

    Participants of EBOA vote for a candidate in the election depending upon how well‐informed they are. Their awareness may rely on how high quality the OFs will be and it can be mathematically modeled as follows:

    Ai={OFiOFworstOFbestOFworst,|OFbestOFworst;1,|else, (22)

    In Eq (22), Ai refers to the level of awareness of ith participants and oFbest and OFworst are the best and worst values of OF, correspondingly. In the minimization problem, there is a minimum of two people running for choice on the default assumption of EBOA that the minimal candidate number of (NC),(viz.,NC2) is two.

    The voter's responsiveness is evaluated to be a random integer for determining who gets voted for in EBOA. If the voter's information is higher than the random integer, then that voter must select the fittest candidate (C1). Then, the vote will be randomly distributed among the remaining contenders. This voting procedure can be mathematically modeled as follows:

    Vi={C1,Ai>r;Ck,else. (23)

    In Eq (23), yi refers to the ith voter's preference, C1 denotes the top pick, and Ck indicates the kth candidates, where k indicates an integer selected randomly from {2,3,,NC}.

    Finally, the winner is determined (leader) when each vote has been counted. Even individuals who did not vote for the leader nevertheless sensed the effect of their decisions and policies. Based on the elected leader's recommendation, participants of the EBOA are specified new roles and tasks. This leader enhances the EBOA's ability for exploration by guiding the population method to different portions of the search space.

    The leader directs the EBOA process with new individuals, and each receives a new role. The positions that are generated are recognized to use, thereby increasing the worth of the goal function. The participants retain their prior status in the absence of movement. Using Eqs (24) and (25), the EBOA process for updating itself is given:

    xnew,P1i,j={xi,j+r(Lj||l||xi,j),OFL<OFi;xi,j+r(xi,j||Lj),else. (24)
    Xi={Xnew.P1i,OFnew,P1i<OFi;Xi,else. (25)

    where Xnew.P1i is a new location generated for the ith participants, xnew,P1i,j refers to the ith participant of jth dimensions, OFnew,P1i indicates the value of OF, I shows the random integer within [1,2], L refers to the leader, Li shows the jth dimensions, and OFL indicates the OF value.

    3) Raising awareness via public movement (exploitation stage)

    Person awareness has a big effect on how we make decisions. A restricted search near the predicted solution might support determining the best one, to put it mathematically. Increasing the values of OF makes that individual extra aware and makes them make better decisions in the upcoming choice. Eqs (26) and (27) are used for increasing the public awareness of EBOA.

    xnew,P2i.j=xi,j+(12r)R(1tT)xi,j, (26)
    Xi={Xnew,P2i,|OFnew,P2i<OFi;Xi,|else. (27)

    where Xnew.P2i indicates a new location for the ith population, OFnew,P2ij refers to the jth variable, OFnew,P2i refers to the value of OF, R refers to the constant equivalent to 0.02, t denotes the repetition counter, and T indicates the overall performed iterations.

    The fitness selection is the substantial factor impacting the effectiveness of the EBO methods. The hyperparameter selection procedure contains the solution encoding technique for evaluating the efficacy of the candidate solutions. The EBO algorithm deliberates accuracy as the important measure to develop the fitness function (FF) that can be given in equation form:

    Fitness=max(P), (28)
    P=TPTP+FP. (29)

    Here, FP denotes the false positive and TP means the true positive values.

    The FDIA detection results of the EBODL-FDIAD technique are demonstrated in this section. The results were tested using two aspects: IEEE-14 and IEEE-39 standard bus systems. Table 1 reports a detailed comparison study of the EBODL-FDIAD technique under the IEEE-14 standard bus system [14].

    Table 1.  Comparison outcome of the EBODL-FDIAD technique with other systems on the IEEE14 standard system [14].
    IEEE14 standard system
    Methods Accuy Recal FNR AUCscore
    Training Phase
    EBODL-FDIAD 97.97 97.85 2.08 98.79
    MRFODL-FDIAD 96.89 96.85 3.37 97.61
    SVM Model 90.33 91.80 8.43 91.86
    CNN Algorithm 89.71 92.95 7.30 90.96
    MSA Model 90.53 90.48 9.77 89.89
    CDBN Algorithm 91.82 92.75 7.49 93.64
    SVM-GAB 90.82 92.07 8.16 92.30
    Testing Phase
    EBODL-FDIAD 98.60 98.37 1.34 98.73
    MRFODL-FDIAD 97.81 97.57 2.68 97.08
    SVM Model 91.17 90.66 9.57 91.44
    CNN Algorithm 92.21 92.93 7.30 90.96
    MSA Model 90.23 89.44 10.81 91.62
    CDBN Algorithm 93.72 92.95 7.31 90.07
    SVM-GAB 93.79 91.38 8.86 90.30

     | Show Table
    DownLoad: CSV

    Figure 3 provides a brief, comparative accuy analysis of the EBODL-FDIAD technique on the IEEE14 standard system. The figure implies that the SVM, CNN, MSA, CDBN, and SVM-GAB techniques reported the least performance and the MRFODL-FDIAD model exhibited slightly boosted results. In addition, the results show that the EBODL-FDIAD technique gained increased values of accuy. With TRP, the EBODL-FDIAD technique offered a higher accuy of 97.97%, whereas the MRFODL-FDIAD, SVM, CNN, MSA, CDBN, and SVM-GAB models obtained reduced accuy of 96.89%, 90.33%, 89.71%, 90.53%, 91.82%, and 90.82%, respectively.

    Figure 3.  Accuy analysis of the EBODL-FDIAD technique on the IEEE14 standard system.

    Figure 4 displays a comprehensive, comparative recal analysis of the EBODL-FDIAD system on the IEEE14 standard system. The figure shows that the SVM, CNN, MSA, CDBN, and SVM-GAB methods described the least performance and the MRFODL-FDIAD system shows somewhat increased results. Moreover, the results revealed that the EBODL-FDIAD technique had increased values of recal. With TRP, the EBODL-FDIAD method provided a higher recal of 97.85%, whereas the MRFODL-FDIAD, SVM, CNN, MSA, CDBN, and SVM-GAB techniques acquired decreased recal of 96.85%, 91.80%, 92.95%, 90.48%, 92.75%, and 92.07%, respectively.

    Figure 4.  Recal analysis of the EBODL-FDIAD technique on the IEEE14 standard system.

    Figure 5 offers a brief, comparative AUCscore analysis of the EBODL-FDIAD method on the IEEE14 standard system. The figure exhibits that the SVM, CNN, MSA, CDBN, and SVM-GAB algorithms reported decreased performance and the MRFODL-FDIAD method displays slightly boosted results. In addition, the outcomes prove that the EBODL-FDIAD method gained increased values of AUCscore. According to TRP, the EBODL-FDIAD system provided a greater AUCscore of 98.79%, but the MRFODL-FDIAD, SVM, CNN, MSA, CDBN, and SVM-GAB algorithms had a diminished AUCscore of 97.61%, 91.86%, 90.96%, 89.89%, 93.64%, and 92.30%, respectively.

    Figure 5.  AUCscore analysis of the EBODL-FDIAD technique on the IEEE14 standard system.

    Figure 6 illustrates a wide-ranging comparison of the FNR analysis of the EBODL-FDIAD method with the IEEE14 standard system. This figure showcases that the SVM, CNN, MSA, CDBN, and SVM-GAB techniques informed poorer performance and the MRFODL-FDIAD system displayed moderately improved outcomes. Additionally, the results revealed that the EBODL-FDIAD system had higher values of FNR. With TRP, the EBODL-FDIAD system acquired an increased FNR of 2.08, however, the MRFODL-FDIAD, SVM, CNN, MSA, CDBN, and SVM-GAB techniques had minimized FNR of 3.37, 8.43, 7.30, 9.77, 7.49, and 8.16, respectively.

    Figure 6.  FNR analysis of the EBODL-FDIAD technique on the IEEE14 standard system.

    The accuy curves for training (TRA) and validation (VL) shown in Figure 7 for the EBODL-FDIAD technique on the IEEE14 standard system give valued insights into its effectiveness at varying epochs. Mainly, it can be a reliable upgrade in both TRA and TES accuy with raised epochs, representing the proficiency of the model for learnable and recognizable patterns from TRA and TES data. The increased trends in TES accuy underscore the model flexibility of the TRA dataset and the ability to precisely create predictions on unnoticed data, emphasizing capabilities of robust generalization.

    Figure 7.  Accuy curve of the EBODL-FDIAD technique on the IEEE14 standard system.

    Figure 8 displays a comprehensive overview of the TRA and TES loss values for the EBODL-FDIAD algorithm on the IEEE14 standard system at diverse epochs. The TRA loss reliably decreases as the model refines weights to diminish the classification errors under both datasets. These loss curves explain the arrangement of the model with the TRA data, emphasizing the ability to capture patterns effectually. The incessant improvement of parameters in the EBODL-FDIAD system can be significant, targeted at lessening differences between predictions and actual TRA labels.

    Figure 8.  Loss curve of the EBODL-FDIAD technique on the IEEE14 standard system.

    Table 2 reports an extensive comparison outcome of the EBODL-FDIAD technique on the IEEE-39 standard bus system. Figure 9 represents a wide-ranging, comparative accuy analysis of the EBODL-FDIAD method with the IEEE39 standard system.

    Table 2.  Comparison result of the EBODL-FDIAD model with other algorithms on the IEEE-39 standard system [14].
    IEEE39 standard system
    Methods Accuy Recal FNR AUCscore
    Training Phase
    EBODL-FDIAD 98.17 98.56 1.47 97.98
    MRFODL-FDIAD 96.79 97.70 2.55 96.82
    SVM Model 90.72 92.03 8.22 90.72
    CNN Algorithm 94.21 91.11 9.14 93.89
    MSA Model 94.06 89.51 10.73 89.89
    CDBN Algorithm 92.26 94.10 6.13 94.29
    SVM-GAB 91.33 89.83 10.41 90.62
    Testing Phase
    EBODL-FDIAD 98.52 97.96 1.28 98.58
    MRFODL-FDIAD 97.28 96.80 3.15 97.08
    SVM Model 92.46 89.39 7.19 93.04
    CNN Algorithm 92.67 93.65 10.48 89.77
    MSA Model 90.11 91.22 6.41 93.82
    CDBN Algorithm 91.66 90.69 10.75 89.49
    SVM-GAB 89.91 89.64 8.38 91.86

     | Show Table
    DownLoad: CSV
    Figure 9.  Accuy analysis of the EBODL-FDIAD technique on the IEEE39 standard system.

    This figure indicates that the SVM, CNN, MSA, CDBN, and SVM-GAB techniques described minimized performance and the MRFODL-FDIAD method shows moderately improved outcomes. Moreover, the results exhibit that the EBODL-FDIAD technique had improved values of accuy. With TRP, the EBODL-FDIAD algorithm had boosted accuy of 98.77%, while the MRFODL-FDIAD, SVM, CNN, MSA, CDBN, and SVM-GAB algorithms obtained decreased accuy of 96.79%, 90.72%, 94.21%, 94.06%, 92.26%, and 91.33%, respectively.

    Figure 10 illustrates a comprehensive, comparative recal analysis of the EBODL-FDIAD system on the IEEE39 standard system. This figure shows that the SVM, CNN, MSA, CDBN, and SVM-GAB algorithms had the least performance and the MRFODL-FDIAD system reveals somewhat improved results. Meanwhile, the results denoted that the EBODL-FDIAD method achieved greater values of recal. With TRP, the EBODL-FDIAD method provided an increased recal of 98.56%, while the MRFODL-FDIAD, SVM, CNN, MSA, CDBN, and SVM-GAB approaches acquired lessened recal of 97.70%, 92.03%, 91.11%, 89.51%, 94.10%, and 89.83%, respectively.

    Figure 10.  Recal outcome of the EBODL-FDIAD method with the IEEE39 standard system.

    Figure 11 demonstrates an extensive, comparative AUCscore analysis of the EBODL-FDIAD method with the IEEE39 standard system. This figure indicates that the SVM, CNN, MSA, CDBN, and SVM-GAB systems stated less performance and the MRFODL-FDIAD system displayed moderately boosted outcomes. Additionally, the results presented that the EBODL-FDIAD algorithm had greater values of AUCscore. With TRP, the EBODL-FDIAD technique offered an increased AUCscore of 98.79%, whereas the MRFODL-FDIAD, SVM, CNN, MSA, CDBN, and SVM-GAB algorithms achieved minimized AUCscore of 97.98%, 96.82%, 90.72%, 93.89%, 89.89%, and 94.29%, respectively.

    Figure 11.  AUCscore outcomes of the EBODL-FDIAD algorithm with the IEEE39 standard system.

    Figure 12 displays a brief comparison of the FNR outcomes of the EBODL-FDIAD method on the IEEE39 standard system. The figure implies that the SVM, CNN, MSA, CDBN, and SVM-GAB algorithms reported the least performance and the MRFODL-FDIAD model exhibited somewhat boosted results. Simultaneously, the results show that the EBODL-FDIAD method gained raised values of FNR. With TRP, the EBODL-FDIAD algorithm provided a higher FNR of 1.47, whereas the MRFODL-FDIAD, SVM, CNN, MSA, CDBN, and SVM-GAB techniques obtained reduced FNR of 2.55, 8.22, 9.14, 10.73, 6.13, and 10.41, respectively.

    Figure 12.  FNR analysis of the EBODL-FDIAD technique on the IEEE39 standard system.

    The accuy curves for TRA and VL shown in Figure 13 for the EBODL-FDIAD algorithm with the IEEE39 standard system provide valued insights into its efficiency at various epochs. Primarily, it can be a consistent upgrade in both TRA and TES accuy with higher epochs, representing the proficiency of the model for learnable and recognizable patterns from both TRA and TES data. The raised trends in TES accuy underscore the model flexibility of the TRA dataset and the ability to precisely produce predictions on undetected data, underscoring capabilities of robust generalization.

    Figure 13.  Accuy curve of the EBODL-FDIAD technique under the IEEE39 standard system.

    Figure 14 provides an extensive outcome of the TRA and TES loss values for the EBODL-FDIAD method on the IEEE39 standard system at diverse epochs. The TRA loss is reliably minimized as the model refines weights to lessen the classification errors under both datasets. The loss curves represent the model arrangements with the data of TRA, emphasizing the ability to capture patterns successfully. The continuous improvement of parameters in the EBODL-FDIAD system can be significant, targeted at lessening variances between actual and predicted TRA labels. These accomplished outcomes ensure the enhanced performance of the EBODL-FDIAD method on the FDIA detection process.

    Figure 14.  Loss curve of the EBODL-FDIAD technique with the IEEE39 standard system.

    In this manuscript, we offered the design of an EBODL-FDIAD method in the CPS platform. The purpose of the EBODL-FDIAD algorithm was to enhance security in the CPS environment via the detection of FDIAs. It contains three different processes, namely data preprocessing, ensemble learning, and EBO-based parameter tuning. At the primary level, the EBODL-FDIAD technique applies the LSN approach, which can be used for scaling the input data into valuable formats. In addition, the EBODL-FDIAD technique performs ensemble learning classification comprising three classifiers, namely the KELM, LSTM, and ABiRNN models. For optimal hyperparameter selection of the ensemble classifiers, the EBO algorithm was applied. To validate the enriched performance of the EBODL-FDIAD method, comprehensive simulations were involved. The extensive results highlighted that the EBODL-FDIAD technique performed well over other systems for diverse measures. In future work, the EBODL-FDIAD methodology can be provided by integrating methods from adversarial ML to improve its robustness against sophisticated attacks. By actively creating adversarial examples and training the model to detect and diminish them, this model is optimum for defending against evasion and poisoning efforts by adversaries. Also, exploring the application of federated learning methods to allow collaborative training across distributed CPS platforms are additional developments of the scalability and generalization abilities of the model that can be studied, enabling more effectual recognition of FDIAs in large-scale and heterogeneous systems.

    The authors declare that they have not used artificial intelligence (AI) tools in the creation of this article.

    The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through a large group research project under grant number (RGP2/02/44); Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2024R384), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia; and Research Supporting Project number (RSPD2024R608), King Saud University, Riyadh, Saudi Arabia. The authors extend their appreciation to the Deanship of Scientific Research at Northern Border University, Arar, KSA, for funding this research work through the project number "NBU-FPEJ-2024- 2847-01". This study is partially funded by the Future University in Egypt (FUE).

    The authors declare that they have no conflicts of interest.



    [1] K. D. Lu, Z. G. Wu, Multi-objective false data injection attacks of cyber-physical power systems, IEEE T. Circuits Syst. Ⅱ, 69 (2022), 3924–3928. https://doi.org/10.1109/TCSⅡ.2022.3181827 doi: 10.1109/TCSⅡ.2022.3181827
    [2] P. L. Bhattar, N. M. Pindoriya, A. Sharma, A combined survey on distribution system state estimation and false data injection in cyber-physical power distribution networks, IET Cyber Phys. Syst. Theory Appl., 6 (2021), 41–62. https://doi.org/10.1049/cps2.12000 doi: 10.1049/cps2.12000
    [3] Y. Li, Y. Wang, Developing graphical detection techniques for maintaining state estimation integrity against false data injection attack in integrated electric cyber-physical system, J. Syst. Architect., 105 (2020), 101705. https://doi.org/10.1016/j.sysarc.2019.101705 doi: 10.1016/j.sysarc.2019.101705
    [4] Q. Wang, W. Tai, Y. Tang, M. Ni, Review of the false data injection attack against the cyber-physical power system, IET Cyber Phys. Syst. Theory Appl., 4 (2019), 101–107. https://doi.org/10.1049/iet-cps.2018.5022 doi: 10.1049/iet-cps.2018.5022
    [5] S. Padhan, A. K. Turuk, Design of false data injection attacks in cyber-physical systems, Inform. Sci., 608 (2022), 825–843. https://doi.org/10.1016/j.ins.2022.06.082 doi: 10.1016/j.ins.2022.06.082
    [6] T. Zhou, K. Xiahou, L. L. Zhang, Q. H. Wu, Real-time detection of cyber-physical false data injection attacks on power systems, IEEE T. Ind. Inform., 17 (2021), 6810–6819. https://doi.org/10.1109/TⅡ.2020.3048386 doi: 10.1109/TⅡ.2020.3048386
    [7] Z. Qu, Y. Dong, N. Qu, H. Li, M. Cui, X. Bo, et al., False data injection attack detection in power systems based on cyber-physical attack genes, Front. Energy Res., 9 (2021), 644489. https://doi.org/10.3389/fenrg.2021.644489 doi: 10.3389/fenrg.2021.644489
    [8] G. Cao, W. Gu, G. Lou, W. Sheng, K. Liu, Distributed synchronous detection for false data injection attack in cyber-physical microgrids, Int. J. Elec. Power Energy Syst., 137 (2022), 107788. https://doi.org/10.1016/j.ijepes.2021.107788 doi: 10.1016/j.ijepes.2021.107788
    [9] J. Li, C. Sun, Q. Su, Analysis of cascading failures of power cyberphysical systems considering false data injection attacks, Global Energy Interconnect., 4 (2021), 204–213. https://doi.org/10.1016/j.gloei.2021.05.002 doi: 10.1016/j.gloei.2021.05.002
    [10] T. Zou, A. S. Bretas, C. Ruben, S. C. Dhulipala, N. Bretas, Smart grids cyber-physical security: Parameter correction model against unbalanced false data injection attacks, Electr. Pow. Syst. Res., 187 (2020), 106490. https://doi.org/10.1016/j.epsr.2020.106490 doi: 10.1016/j.epsr.2020.106490
    [11] M. Mazare, Adaptive optimal secure wind power generation control for variable speed wind turbine systems via reinforcement learning, Appl. Energ., 353 (2024), 122034. https://doi.org/10.1016/j.apenergy.2023.122034 doi: 10.1016/j.apenergy.2023.122034
    [12] M. Mazare, M. Taghizadeh, H. Asharioun, Attack‐resilient pitch angle control for variable‐speed wind turbine systems under cyber threats, Int. J. Adapt. Control, 37 (2023), 1423–1439. https://doi.org/10.1002/acs.3580 doi: 10.1002/acs.3580
    [13] M. Mazare, Reinforcement learning-based fixed-time resilient control of nonlinear cyber physical systems under false data injection attacks and mismatch disturbances, J. Franklin I., 360 (2023), 14926–14938. https://doi.org/10.1016/j.jfranklin.2023.10.026 doi: 10.1016/j.jfranklin.2023.10.026
    [14] H. Alamro, K. Mahmood, S. S. Aljameel, A. Yafoz, R. Alsini, A. Mohamed, Modified red fox optimizer with deep learning enabled false data injection attack detection, IEEE Access, 11 (2023), 79256–79264. https://doi.org/10.1109/ACCESS.2023.3298056 doi: 10.1109/ACCESS.2023.3298056
    [15] J. Sakhnini, H. Karimipour, A. Dehghantanha, R. M. Parizi, Physical layer attack identification and localization in cyber–physical grid: An ensemble deep learning based approach, Phys. Commun., 47 (2021), 101394. https://doi.org/10.1016/j.phycom.2021.101394 doi: 10.1016/j.phycom.2021.101394
    [16] K. Liu, H. Zhang, Y. Zhang, C. Sun, False data-injection attack detection in cyber–physical systems with unknown parameters: A deep reinforcement learning approach, IEEE T. Cybernetics, 11 (2023), 7115–7125. https://doi.org/10.1109/TCYB.2022.3225236 doi: 10.1109/TCYB.2022.3225236
    [17] E. Vincent, M. Korki, M. Seyedmahmoudian, A. Stojcevski, S. Mekhilef, Detection of false data injection attacks in cyber–physical systems using graph convolutional network, Electr. Pow. Syst. Res., 217 (2023), 109118. https://doi.org/10.1016/j.epsr.2023.109118 doi: 10.1016/j.epsr.2023.109118
    [18] Y. Zhang, W. Deng, K. Huang, C. Yang, False data injection attack testbed of industrial cyber-physical systems of the process industry and a detection application. In: 2021 IEEE International Conference on Recent Advances in Systems Science and Engineering (RASSE), 2021, 1–7. https://doi.org/10.1109/RASSE53195.2021.9686839
    [19] Y. Li, X. Wei, Y. Li, Z. Dong, M. Shahidehpour, Detection of false data injection attacks in smart grid: A secure federated deep learning approach, IEEE T. Smart Grid, 13 (2022), 4862–4872. https://doi.org/10.1109/TSG.2022.3204796 doi: 10.1109/TSG.2022.3204796
    [20] W. Fu, Y. Yan, Y. Chen, Z. Wang, D. Zhu, L. Jin, Temporal false data injection attack and detection on cyber‐physical power system based on deep reinforcement learning, IET Smart Grid, 7 (2024), 78–88. https://doi.org/10.1049/stg2.12141 doi: 10.1049/stg2.12141
    [21] H. Ruan, B. Dorneanu, H. Arellano-Garcia, P. Xiao, L. Zhang, Deep learning-based fault prediction in wireless sensor network embedded cyber-physical systems for industrial processes, IEEE Access, 10(2022), 10867–10879. https://doi.org/10.1109/ACCESS.2022.3144333 doi: 10.1109/ACCESS.2022.3144333
    [22] J. Tian, C. Shen, B. Wang, X. Xia, M. Zhang, C. Lin, Q. Li, LESSON: Multi-label adversarial false data injection attack for deep learning locational detection, IEEE T. Depend. Secure Comput., 2024, 1–15. https://doi.org/10.1109/TDSC.2024.3353302 doi: 10.1109/TDSC.2024.3353302
    [23] J. Tian, B. Wang, R. Guo, Z. Wang, K. Cao, X. Wang, Adversarial attacks and defenses for deep-learning-based unmanned aerial vehicles, IEEE Internet Things J., 9 (2021), 22399–22409. https://doi.org/10.1109/JIOT.2021.3111024 doi: 10.1109/JIOT.2021.3111024
    [24] J. Tian, B. Wang, Z. Wang, K. Cao, J. Li, M. Ozay, Joint adversarial example and false data injection attacks for state estimation in power systems, IEEE T. Cybernetics, 52 (2022), 13699–13713. https://doi.org/10.1109/TCYB.2021.3125345 doi: 10.1109/TCYB.2021.3125345
    [25] S. Sorguli, H. Rjoub, A novel energy accounting model using fuzzy restricted boltzmann machine—Recurrent neural network, Energies, 16 (2023), 2844. https://doi.org/10.3390/en16062844 doi: 10.3390/en16062844
    [26] Q. Hu, H. Zhou, C. Wang, C. Zhu, J. Shen, P. He, Time-frequency fusion features-based GSWOA-KELM model for gear fault diagnosis, Lubricants, 12 (2024), 10. https://doi.org/10.3390/lubricants12010010 doi: 10.3390/lubricants12010010
    [27] M. Xia, X. Zheng, M. Imran, M. Shoaib, Data-driven prognosis method using hybrid deep recurrent neural network, Appl. Soft Comput., 93 (2020), 106351. https://doi.org/10.1016/j.asoc.2020.106351 doi: 10.1016/j.asoc.2020.106351
    [28] S. P. Shashikumar, A. J. Shah, G. D. Clifford, S. Nemati, Detection of paroxysmal atrial fibrillation using attention-based bidirectional recurrent neural networks, In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018,715–723. https://doi.org/10.1145/3219819.3219912
    [29] M. Abd Elaziz, M. E. Zayed, H. Abdelfattah, A. Q. Aseeri, E. M. Tag-eldin, M. Fujii, et al., Machine learning-aided modeling for predicting freshwater production of a membrane desalination system: A long-short-term memory coupled with election-based optimizer, Alex. Eng. J., 86 (2024), 690–703. https://doi.org/10.1016/j.aej.2023.12.012 doi: 10.1016/j.aej.2023.12.012
  • This article has been cited by:

    1. Alanoud Al Mazroa, Fahad R. Albogamy, Mohamad Khairi Ishak, Samih M. Mostafa, Boosting Cyberattack Detection Using Binary Metaheuristics With Deep Learning on Cyber-Physical System Environment, 2025, 13, 2169-3536, 11280, 10.1109/ACCESS.2025.3526258
  • Reader Comments
  • © 2024 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1555) PDF downloads(51) Cited by(1)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog