IDEAS home Printed from https://ideas.repec.org/a/gam/jmathe/v10y2022i15p2713-d877548.html
   My bibliography  Save this article

Research on Attack Detection of Cyber Physical Systems Based on Improved Support Vector Machine

Author

Listed:
  • Fengchun Liu

    (Hebei Engineering Research Center for the Intelligentization of Iron Ore Optimization and Ironmaking Raw Materials Preparation Processes, North China University of Science and Technology, Tangshan 063210, China
    Hebei Key Laboratory of Data Science and Application, North China University of Science and Technology, Tangshan 063210, China
    Tangshan Intelligent Industry and Image Processing Technology Innovation Center, North China University of Science and Technology, Tangshan 063210, China
    The Key Laboratory of Engineering Computing in Tangshan City, North China University of Science and Technology, Tangshan 063210, China)

  • Sen Zhang

    (Hebei Engineering Research Center for the Intelligentization of Iron Ore Optimization and Ironmaking Raw Materials Preparation Processes, North China University of Science and Technology, Tangshan 063210, China
    Hebei Key Laboratory of Data Science and Application, North China University of Science and Technology, Tangshan 063210, China
    Tangshan Intelligent Industry and Image Processing Technology Innovation Center, North China University of Science and Technology, Tangshan 063210, China
    The Key Laboratory of Engineering Computing in Tangshan City, North China University of Science and Technology, Tangshan 063210, China)

  • Weining Ma

    (Hebei Engineering Research Center for the Intelligentization of Iron Ore Optimization and Ironmaking Raw Materials Preparation Processes, North China University of Science and Technology, Tangshan 063210, China
    Hebei Key Laboratory of Data Science and Application, North China University of Science and Technology, Tangshan 063210, China
    Tangshan Intelligent Industry and Image Processing Technology Innovation Center, North China University of Science and Technology, Tangshan 063210, China
    The Key Laboratory of Engineering Computing in Tangshan City, North China University of Science and Technology, Tangshan 063210, China)

  • Jingguo Qu

    (Hebei Engineering Research Center for the Intelligentization of Iron Ore Optimization and Ironmaking Raw Materials Preparation Processes, North China University of Science and Technology, Tangshan 063210, China
    Hebei Key Laboratory of Data Science and Application, North China University of Science and Technology, Tangshan 063210, China
    Tangshan Intelligent Industry and Image Processing Technology Innovation Center, North China University of Science and Technology, Tangshan 063210, China
    The Key Laboratory of Engineering Computing in Tangshan City, North China University of Science and Technology, Tangshan 063210, China)

Abstract

Cyber physical systems (CPS), in the event of a cyber attack, can have a serious impact on the operating physical equipment. In order to improve the attack detection capability of CPS, an support vector machine (SVM) attacks detection model based on particle swarm optimization (PSO) is proposed. First, the box plot anomaly detection method is used to detect the characteristic variables, and the characteristic variables with abnormal distribution are discretized. Secondly, the number of attack samples was increased by the SMOTE method to solve the problem of data imbalance, and the linear combination of characteristic variables was performed on the high-dimensional CPS network traffic data using principal component analysis (PCA). Then, the penalty coefficient and the hyperparameter of the kernel function in the SVM model are optimized by the PSO algorithm. Finally, Experiments on attack detection of CPS network traffic data show that the proposed model can detect different types of attack data and has higher detection accuracy compared with general detection models.

Suggested Citation

  • Fengchun Liu & Sen Zhang & Weining Ma & Jingguo Qu, 2022. "Research on Attack Detection of Cyber Physical Systems Based on Improved Support Vector Machine," Mathematics, MDPI, vol. 10(15), pages 1-14, August.
  • Handle: RePEc:gam:jmathe:v:10:y:2022:i:15:p:2713-:d:877548
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2227-7390/10/15/2713/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2227-7390/10/15/2713/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Carlos Martin-Barreiro & John A. Ramirez-Figueroa & Xavier Cabezas & Victor Leiva & Ana Martin-Casado & M. Purificación Galindo-Villardón, 2021. "A New Algorithm for Computing Disjoint Orthogonal Components in the Parallel Factor Analysis Model with Simulations and Applications to Real-World Data," Mathematics, MDPI, vol. 9(17), pages 1-22, August.
    2. Liyan Zhang & Jingfeng Guo & Jiazheng Wang & Jing Wang & Shanshan Li & Chunying Zhang, 2022. "Hypergraph and Uncertain Hypergraph Representation Learning Theory and Methods," Mathematics, MDPI, vol. 10(11), pages 1-22, June.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Jing Wang & Jing Wang & Jingfeng Guo & Liya Wang & Chunying Zhang & Bin Liu, 2023. "Research Progress of Complex Network Modeling Methods Based on Uncertainty Theory," Mathematics, MDPI, vol. 11(5), pages 1-27, March.
    2. Fernando Rojas & Peter Wanke & Víctor Leiva & Mauricio Huerta & Carlos Martin-Barreiro, 2022. "Modeling Inventory Cost Savings and Supply Chain Success Factors: A Hybrid Robust Compromise Multi-Criteria Approach," Mathematics, MDPI, vol. 10(16), pages 1-18, August.
    3. Jingfeng Guo & Chao Zheng & Shanshan Li & Yutong Jia & Bin Liu, 2022. "BiInfGCN: Bilateral Information Augmentation of Graph Convolutional Networks for Recommendation," Mathematics, MDPI, vol. 10(17), pages 1-16, August.
    4. Alma Y. Alanis, 2022. "Bioinspired Intelligent Algorithms for Optimization, Modeling and Control: Theory and Applications," Mathematics, MDPI, vol. 10(13), pages 1-2, July.
    5. Liya Wang & Yaxun Dai & Renzhuo Wang & Yuwen Sun & Chunying Zhang & Zhiwei Yang & Yuqing Sun, 2022. "SEIARN: Intelligent Early Warning Model of Epidemic Spread Based on LSTM Trajectory Prediction," Mathematics, MDPI, vol. 10(17), pages 1-23, August.
    6. Xiao Chen & Tong Hao & Li Han & Meng Leng & Jing Chen & Jingfeng Guo, 2022. "Heterogeneous Network Embedding Based on Random Walks of Type and Inner Constraint," Mathematics, MDPI, vol. 10(15), pages 1-20, July.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:10:y:2022:i:15:p:2713-:d:877548. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.