Abstract
Automation control, which is one functional core of industrial control system, has become the prime attack target due to its vulnerabilities. Furthermore, many industrial cyber threats can disturb or destroy the correctness of control operation data to cause industrial accidents, when one normal production process is running smoothly and orderly. In order to effectively identify abnormal activities in various control operation data, this paper proposes one BP (Back Propagation) neural network anomaly prediction model based on the double-optimized CS (Cuckoo Search) algorithm. By using the exponential decline strategy and Gaussian perturbation to improve the traditional CS algorithm, this model can obtain one effective anomaly prediction engine based on the optimized BP neural network: for one thing, it can quickly enter the local search through the exponential decline strategy; for another, the information exchange between all local positions and the global optimal positions is realized by Gaussian perturbation. Moreover, the double-optimized CS algorithm not only solves the problem that the traditional BP neural network is prone to fall into local optimal solution, but also eliminates the defect of low vitality in the traditional CS algorithm. Consequently, this model can realize the high-precision prediction of abnormal control operation data. The experimental results show that, compared with other approaches, this model has better prediction performance under both normal and attack states, and can ensure the security of automation control in industrial production.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Baudouin D., Moalla N., Ouzrout Y.: The challenges, approaches, and used techniques of CPS for manufacturing in Industry 4.0: a literature review. The International J. Adv Manuf. Technol. 113(7–8), 2395–2412 (2021)
Wan, M., Li, J., Liu, Y., Zhao, J., Wang, J.: Characteristic insights on industrial cyber security and popular defense mechanisms. Chin. Commun. 18(1), 130–150 (2021)
Tange, K., Donno, M.D., Fafoutis, X., Dragoni, N.: A systematic survey of industrial internet of things security: requirements and fog computing opportunities. IEEE Commun. Surv Tutorials 22(4), 2489–2520 (2020)
Yu K., Tan L., Mumtaz S., AI-Rubaye S., AI-Dulaimi A., Bashir A. K., Khan F. A.: Securing critical infrastructures: deep-learning-based threat detection in IIoT. IEEE Commun. Mag. 59(10), 76–82 (2021)
Siniosoglou, I., Radoglou-Grammatikis, P., Efstathopoulos, G., Fouliras, P., Sarigiannidis, P.: A unified deep learning anomaly detection and classification approach for smart grid environments. IEEE Trans. Netw. Serv. Manage. 18(2), 1137–1151 (2021)
Koay, M.Y.A., Ko, K.L.R., Hettema, H., Radke, K.: Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges. J. Intell. Inf. Syst. 60(2), 377–405 (2023)
Khan, A.I., Pi, D., Khan, U.Z., Hussain, Y., Nawaz, A.: HML-IDS: a hybrid-multilevel anomaly prediction approach for intrusion detection in SCADA systems. IEEE Access 7, 89507–89521 (2019)
Wan, M., Li, J., Wang, K., Wang, B.: Anomaly detection for industrial control operations with optimized ABC-SVM and weighted function code correlation analysis. J. Ambient. Intell. Humaniz. Comput. 13(3), 1383–1396 (2022)
Hannon C., Deka D., Jin D., Vuffray M., Lokhov Y. A.: Real-time anomaly detection and classification in streaming PMU data. 2021 IEEE Madrid PowerTech, 1–6. IEEE, Madrid, Spain (2021)
Cheminod, M., Durante, L., Seno, L.: Valenzano A: performance evaluation and modeling of an industrial application-layer firewall. IEEE Trans. Industr. Inf. 14(5), 2159–2170 (2018)
Kim C., Robinson D: Modbus monitoring for networked control systems of cyber-defensive architecture. In: 2017 Annual IEEE International Systems Conference (SysCon), pp. 1–6, IEEE, Montreal, Canada (2017)
Ma, L., Li, N., Guo, Y., Huang, M., Yang, S., Wang, X.: Learning to optimize: reference vector reinforcement learning adaption to constrained many-objective optimization of industrial copper burdening system. IEEE Trans. Cybern. 52(12), 12698–12711 (2022)
Nabaei, A., et al.: Topologies and performance of intelligent algorithms: a comprehensive review. Artif. Intell. Rev. 49(1), 79–103 (2018)
Ma, L., Huang, M., Yang, S., Wang, R., Wang, X.: An adaptive localized decision variable analysis approach to large-scale multi-objective and many-objective optimization. IEEE Trans. Cybern. 52(7), 6684–6696 (2022)
Zhang, W., Han, G., Wang, J., Liu, Y.: A BP neural network prediction model based on dynamic cuckoo search optimization algorithm for industrial equipment fault prediction. IEEE Access 7, 11736–11746 (2019)
Shehab, M., Khader, A.T., Al-Betar, M.A.: A survey on applications and variants of the cuckoo search algorithm. Appl. Soft Comput. 61(12), 1041–1059 (2017)
Katoch, S., Chauhan, S.S., Kumar, V.: A review on genetic algorithm: past, present, and future. Multimedia Tools Appl. 80(5), 8091–8126 (2021)
Karaboga, D., Gorkemli, B., Ozturk, C., Karaboga, N.: A comprehensive survey: artificial bee colony (ABC) algorithm and applications. Artif. Intell. Rev. 42(1), 21–57 (2012). https://doi.org/10.1007/s10462-012-9328-0
Acknowledgments
This work is supported by the Scientific Research Project of Educational Department of Liaoning Province (Grant No. LJKZ0082). The authors are grateful to the anonymous referees for their insightful comments and suggestions.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Wan, M., Liu, X., Li, Y. (2023). Double-Optimized CS-BP Anomaly Prediction for Control Operation Data. In: Yang, X., et al. Advanced Data Mining and Applications. ADMA 2023. Lecture Notes in Computer Science(), vol 14176. Springer, Cham. https://doi.org/10.1007/978-3-031-46661-8_34
Download citation
DOI: https://doi.org/10.1007/978-3-031-46661-8_34
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-46660-1
Online ISBN: 978-3-031-46661-8
eBook Packages: Computer ScienceComputer Science (R0)