Double-Optimized CS-BP Anomaly Prediction for Control Operation Data | SpringerLink
Skip to main content

Double-Optimized CS-BP Anomaly Prediction for Control Operation Data

  • Conference paper
  • First Online:
Advanced Data Mining and Applications (ADMA 2023)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 14176))

Included in the following conference series:

  • 1025 Accesses

Abstract

Automation control, which is one functional core of industrial control system, has become the prime attack target due to its vulnerabilities. Furthermore, many industrial cyber threats can disturb or destroy the correctness of control operation data to cause industrial accidents, when one normal production process is running smoothly and orderly. In order to effectively identify abnormal activities in various control operation data, this paper proposes one BP (Back Propagation) neural network anomaly prediction model based on the double-optimized CS (Cuckoo Search) algorithm. By using the exponential decline strategy and Gaussian perturbation to improve the traditional CS algorithm, this model can obtain one effective anomaly prediction engine based on the optimized BP neural network: for one thing, it can quickly enter the local search through the exponential decline strategy; for another, the information exchange between all local positions and the global optimal positions is realized by Gaussian perturbation. Moreover, the double-optimized CS algorithm not only solves the problem that the traditional BP neural network is prone to fall into local optimal solution, but also eliminates the defect of low vitality in the traditional CS algorithm. Consequently, this model can realize the high-precision prediction of abnormal control operation data. The experimental results show that, compared with other approaches, this model has better prediction performance under both normal and attack states, and can ensure the security of automation control in industrial production.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 11210
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 14013
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Baudouin D., Moalla N., Ouzrout Y.: The challenges, approaches, and used techniques of CPS for manufacturing in Industry 4.0: a literature review. The International J. Adv Manuf. Technol. 113(7–8), 2395–2412 (2021)

    Google Scholar 

  2. Wan, M., Li, J., Liu, Y., Zhao, J., Wang, J.: Characteristic insights on industrial cyber security and popular defense mechanisms. Chin. Commun. 18(1), 130–150 (2021)

    Article  Google Scholar 

  3. Tange, K., Donno, M.D., Fafoutis, X., Dragoni, N.: A systematic survey of industrial internet of things security: requirements and fog computing opportunities. IEEE Commun. Surv Tutorials 22(4), 2489–2520 (2020)

    Article  Google Scholar 

  4. Yu K., Tan L., Mumtaz S., AI-Rubaye S., AI-Dulaimi A., Bashir A. K., Khan F. A.: Securing critical infrastructures: deep-learning-based threat detection in IIoT. IEEE Commun. Mag. 59(10), 76–82 (2021)

    Google Scholar 

  5. Siniosoglou, I., Radoglou-Grammatikis, P., Efstathopoulos, G., Fouliras, P., Sarigiannidis, P.: A unified deep learning anomaly detection and classification approach for smart grid environments. IEEE Trans. Netw. Serv. Manage. 18(2), 1137–1151 (2021)

    Article  Google Scholar 

  6. Koay, M.Y.A., Ko, K.L.R., Hettema, H., Radke, K.: Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges. J. Intell. Inf. Syst. 60(2), 377–405 (2023)

    Article  Google Scholar 

  7. Khan, A.I., Pi, D., Khan, U.Z., Hussain, Y., Nawaz, A.: HML-IDS: a hybrid-multilevel anomaly prediction approach for intrusion detection in SCADA systems. IEEE Access 7, 89507–89521 (2019)

    Article  Google Scholar 

  8. Wan, M., Li, J., Wang, K., Wang, B.: Anomaly detection for industrial control operations with optimized ABC-SVM and weighted function code correlation analysis. J. Ambient. Intell. Humaniz. Comput. 13(3), 1383–1396 (2022)

    Article  MathSciNet  Google Scholar 

  9. Hannon C., Deka D., Jin D., Vuffray M., Lokhov Y. A.: Real-time anomaly detection and classification in streaming PMU data. 2021 IEEE Madrid PowerTech, 1–6. IEEE, Madrid, Spain (2021)

    Google Scholar 

  10. Cheminod, M., Durante, L., Seno, L.: Valenzano A: performance evaluation and modeling of an industrial application-layer firewall. IEEE Trans. Industr. Inf. 14(5), 2159–2170 (2018)

    Article  Google Scholar 

  11. Kim C., Robinson D: Modbus monitoring for networked control systems of cyber-defensive architecture. In: 2017 Annual IEEE International Systems Conference (SysCon), pp. 1–6, IEEE, Montreal, Canada (2017)

    Google Scholar 

  12. Ma, L., Li, N., Guo, Y., Huang, M., Yang, S., Wang, X.: Learning to optimize: reference vector reinforcement learning adaption to constrained many-objective optimization of industrial copper burdening system. IEEE Trans. Cybern. 52(12), 12698–12711 (2022)

    Article  Google Scholar 

  13. Nabaei, A., et al.: Topologies and performance of intelligent algorithms: a comprehensive review. Artif. Intell. Rev. 49(1), 79–103 (2018)

    Article  Google Scholar 

  14. Ma, L., Huang, M., Yang, S., Wang, R., Wang, X.: An adaptive localized decision variable analysis approach to large-scale multi-objective and many-objective optimization. IEEE Trans. Cybern. 52(7), 6684–6696 (2022)

    Article  Google Scholar 

  15. Zhang, W., Han, G., Wang, J., Liu, Y.: A BP neural network prediction model based on dynamic cuckoo search optimization algorithm for industrial equipment fault prediction. IEEE Access 7, 11736–11746 (2019)

    Article  Google Scholar 

  16. Shehab, M., Khader, A.T., Al-Betar, M.A.: A survey on applications and variants of the cuckoo search algorithm. Appl. Soft Comput. 61(12), 1041–1059 (2017)

    Article  Google Scholar 

  17. Katoch, S., Chauhan, S.S., Kumar, V.: A review on genetic algorithm: past, present, and future. Multimedia Tools Appl. 80(5), 8091–8126 (2021)

    Article  Google Scholar 

  18. Karaboga, D., Gorkemli, B., Ozturk, C., Karaboga, N.: A comprehensive survey: artificial bee colony (ABC) algorithm and applications. Artif. Intell. Rev. 42(1), 21–57 (2012). https://doi.org/10.1007/s10462-012-9328-0

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported by the Scientific Research Project of Educational Department of Liaoning Province (Grant No. LJKZ0082). The authors are grateful to the anonymous referees for their insightful comments and suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ming Wan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wan, M., Liu, X., Li, Y. (2023). Double-Optimized CS-BP Anomaly Prediction for Control Operation Data. In: Yang, X., et al. Advanced Data Mining and Applications. ADMA 2023. Lecture Notes in Computer Science(), vol 14176. Springer, Cham. https://doi.org/10.1007/978-3-031-46661-8_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-46661-8_34

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-46660-1

  • Online ISBN: 978-3-031-46661-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics