EconPapers    
Economics at your fingertips  
 

Mutation mayfly algorithm (MMA) based feature selection and probabilistic anomaly detection model for cyber-physical systems

C. Babu Vignesh (), E. Arul (), V. C. Mahavishnu () and A. Punidha ()
Additional contact information
C. Babu Vignesh: Western Digital (SanDisk)
E. Arul: Coimbatore Institute of Technology
V. C. Mahavishnu: PSG Institute of Technology and Applied Research
A. Punidha: KPR Institute of Engineering and Technology, Tamil Nadu

International Journal of System Assurance Engineering and Management, 2024, vol. 15, issue 12, No 3, 5454-5468

Abstract: Abstract With advances in Cyber-Physical Systems (CPS), privacy-preserving and security issues have attracted substantial attention. A crucial function provided by CPS is anomaly detection on large-scale, complicated, and dynamic data. Physical and network information about the systems for safeguarding original data and identifying cyberattacks is needed in order to develop a reliable privacy-preserving anomaly detection approach. Conventional anomaly detection techniques cannot be directly used to solve these problems because they must deal with the expanding amount of data and need domain-specific expertise. By filtering and choosing key aspects from the original data for improved safety, this research presents a privacy preservation approach for secure anomaly detection. For selecting features, the Mutation Mayfly Algorithm (MMA) has been developed. The proposed program combines key benefits of swarm intelligence and evolutionary algorithms. The usage of MMA in feature selection results from its better accuracy and straightforward structure. Then, a strategy for identifying anomalies based on a Kalman Filter (KF) model and a Gaussian Mixture Model (GMM) has been created to find cyberattacks in CPS. Furthermore, the efficacy of privacy-preserving anomaly detection is being improved through the utilization of a Gaussian Mixture Model (GMM) to convert the noteworthy features into representative characteristics. The present study provides a description of the KF approach, which involves the analysis of the dynamics pertaining to both normal and attack events. The system employs a dynamic thresholding technique to detect anomalous behavior by calculating the lower and upper boundaries of normal activity. The architecture is assessed using two open datasets, UNSW-NB15 for network data and Power System for data on cyber power.

Keywords: Privacy preservation; Anomaly detection; Cyber-physical system (CPS); Supervisory control and data acquisition (SCADA); Power systems; Cyber-attacks; Gaussian mixture model (GMM); Mutation Mayfly algorithm (MMA); Kalman Filter (KF) (search for similar items in EconPapers)
Date: 2024
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
http://link.springer.com/10.1007/s13198-024-02438-0 Abstract (text/html)
Access to the full text of the articles in this series is restricted.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:spr:ijsaem:v:15:y:2024:i:12:d:10.1007_s13198-024-02438-0

Ordering information: This journal article can be ordered from
http://www.springer.com/engineering/journal/13198

DOI: 10.1007/s13198-024-02438-0

Access Statistics for this article

International Journal of System Assurance Engineering and Management is currently edited by P.K. Kapur, A.K. Verma and U. Kumar

More articles in International Journal of System Assurance Engineering and Management from Springer, The Society for Reliability, Engineering Quality and Operations Management (SREQOM),India, and Division of Operation and Maintenance, Lulea University of Technology, Sweden
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

 
Page updated 2025-03-20
Handle: RePEc:spr:ijsaem:v:15:y:2024:i:12:d:10.1007_s13198-024-02438-0