IDEAS home Printed from https://ideas.repec.org/a/gam/jsusta/v15y2023i10p8076-d1148024.html
   My bibliography  Save this article

Design of Efficient Based Artificial Intelligence Approaches for Sustainable of Cyber Security in Smart Industrial Control System

Author

Listed:
  • Ali Alzahrani

    (Department of Computer Engineering, King Faisal University, P.O. Box 400, Al Hofuf 31982, Saudi Arabia)

  • Theyazn H. H. Aldhyani

    (Applied College in Abqaiq, King Faisal University, P.O. Box 400, Al Hofuf 31982, Saudi Arabia)

Abstract

Online food security and industrial environments and sustainability-related industries are highly confidential and in urgent need for network traffic analysis to attain proper security information to avoid attacks from anywhere in the world. The integration of cutting-edge technology such as the Internet of things (IoT) has resulted in a gradual increase in the number of vulnerabilities that may be exploited in supervisory control and data acquisition (SCADA) systems. In this research, we present a network intrusion detection system for SCADA networks that is based on deep learning. The goal of this system is to defend ICSs against network-based assaults that are both conventional and SCADA-specific. An empirical evaluation of a number of classification techniques including k-nearest neighbors (KNN), linear discriminant analysis (LDA), random forest (RF), convolution neural network (CNN), and integrated gated recurrent unit (GRU) is reported in this paper. The suggested algorithms were tested on a genuine industrial control system (SCADA), which was known as the WUSTL-IIoT-2018 and WUSTL-IIoT-20121 datasets. SCADA system operators are now able to augment proposed machine learning and deep learning models with site-specific network attack traces as a result of our invention of a re-training method to handle previously unforeseen instances of network attacks. The empirical results, using realistic SCADA traffic datasets, show that the proposed machine learning and deep-learning-based approach is well-suited for network intrusion detection in SCADA systems, achieving high detection accuracy and providing the capability to handle newly emerging threats. The accuracy performance attained by the KNN and RF algorithms was superior and achieved a near-perfect score of 99.99%, whereas the CNN-GRU model scored an accuracy of 99.98% using WUSTL-IIoT-2018. The Rf and GRU algorithms achieved >99.75% using the WUSTL-IIoT-20121 dataset. In addition, a statistical analysis method was developed in order to anticipate the error that exists between the target values and the prediction values. According to the findings of the statistical analysis, the KNN, RF, and CNN-GRU approaches were successful in achieving an R 2 > 99%. This was demonstrated by the fact that the approach was able to handle previously unknown threats in the industrial control systems (ICSs) environment.

Suggested Citation

  • Ali Alzahrani & Theyazn H. H. Aldhyani, 2023. "Design of Efficient Based Artificial Intelligence Approaches for Sustainable of Cyber Security in Smart Industrial Control System," Sustainability, MDPI, vol. 15(10), pages 1-29, May.
  • Handle: RePEc:gam:jsusta:v:15:y:2023:i:10:p:8076-:d:1148024
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2071-1050/15/10/8076/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2071-1050/15/10/8076/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Marcio Andrey Teixeira & Tara Salman & Maede Zolanvari & Raj Jain & Nader Meskin & Mohammed Samaka, 2018. "SCADA System Testbed for Cybersecurity Research Using Machine Learning Approach," Future Internet, MDPI, vol. 10(8), pages 1-15, August.
    2. Oyeniyi Akeem Alimi & Khmaies Ouahada & Adnan M. Abu-Mahfouz & Suvendi Rimer & Kuburat Oyeranti Adefemi Alimi, 2021. "A Review of Research Works on Supervised Learning Algorithms for SCADA Intrusion Detection and Classification," Sustainability, MDPI, vol. 13(17), pages 1-19, August.
    3. Pankaj Kumar Keserwani & Mahesh Chandra Govil & Emmanuel S. Pilli, 2021. "An Optimal Intrusion Detection System using GWO-CSA-DSAE Model," Cyber-Physical Systems, Taylor & Francis Journals, vol. 7(4), pages 197-220, October.
    4. Theyazn H. H. Aldhyani & Hasan Alkahtani, 2023. "Cyber Security for Detecting Distributed Denial of Service Attacks in Agriculture 4.0: Deep Learning Model," Mathematics, MDPI, vol. 11(1), pages 1-19, January.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Grigorii Asyaev & Alexander Sokolov & Alexey Ruchay, 2023. "Intelligent Algorithms for Event Processing and Decision Making on Information Protection Strategies against Cyberattacks," Mathematics, MDPI, vol. 11(18), pages 1-17, September.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Alaa O. Khadidos & Hariprasath Manoharan & Shitharth Selvarajan & Adil O. Khadidos & Khaled H. Alyoubi & Ayman Yafoz, 2022. "A Classy Multifacet Clustering and Fused Optimization Based Classification Methodologies for SCADA Security," Energies, MDPI, vol. 15(10), pages 1-24, May.
    2. Abdullah Alzaqebah & Ibrahim Aljarah & Omar Al-Kadi & Robertas Damaševičius, 2022. "A Modified Grey Wolf Optimization Algorithm for an Intrusion Detection System," Mathematics, MDPI, vol. 10(6), pages 1-16, March.
    3. Ugochukwu Onyekachi Obonna & Felix Kelechi Opara & Christian Chidiebere Mbaocha & Jude-Kennedy Chibuzo Obichere & Isdore Onyema Akwukwaegbu & Miriam Mmesoma Amaefule & Cosmas Ifeanyi Nwakanma, 2023. "Detection of Man-in-the-Middle (MitM) Cyber-Attacks in Oil and Gas Process Control Networks Using Machine Learning Algorithms," Future Internet, MDPI, vol. 15(8), pages 1-19, August.
    4. Sachin Sharma & Saish Urumkar & Gianluca Fontanesi & Byrav Ramamurthy & Avishek Nag, 2022. "Future Wireless Networking Experiments Escaping Simulations," Future Internet, MDPI, vol. 14(4), pages 1-32, April.
    5. Mathew, Midhya & Kazi, Faruk, 2024. "Hardware-in-Loop (HIL) Testbed Design of Thermal Power Plant for Threat Modeling and Attack Vector Analysis," International Journal of Critical Infrastructure Protection, Elsevier, vol. 45(C).
    6. Sepideh Radhoush & Maryam Bahramipanah & Hashem Nehrir & Zagros Shahooei, 2022. "A Review on State Estimation Techniques in Active Distribution Networks: Existing Practices and Their Challenges," Sustainability, MDPI, vol. 14(5), pages 1-16, February.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jsusta:v:15:y:2023:i:10:p:8076-:d:1148024. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.