Author
Listed:
- C. Babu Vignesh
(Western Digital (SanDisk))
- E. Arul
(Coimbatore Institute of Technology)
- V. C. Mahavishnu
(PSG Institute of Technology and Applied Research)
- A. Punidha
(KPR Institute of Engineering and Technology, Tamil Nadu)
Abstract
With advances in Cyber-Physical Systems (CPS), privacy-preserving and security issues have attracted substantial attention. A crucial function provided by CPS is anomaly detection on large-scale, complicated, and dynamic data. Physical and network information about the systems for safeguarding original data and identifying cyberattacks is needed in order to develop a reliable privacy-preserving anomaly detection approach. Conventional anomaly detection techniques cannot be directly used to solve these problems because they must deal with the expanding amount of data and need domain-specific expertise. By filtering and choosing key aspects from the original data for improved safety, this research presents a privacy preservation approach for secure anomaly detection. For selecting features, the Mutation Mayfly Algorithm (MMA) has been developed. The proposed program combines key benefits of swarm intelligence and evolutionary algorithms. The usage of MMA in feature selection results from its better accuracy and straightforward structure. Then, a strategy for identifying anomalies based on a Kalman Filter (KF) model and a Gaussian Mixture Model (GMM) has been created to find cyberattacks in CPS. Furthermore, the efficacy of privacy-preserving anomaly detection is being improved through the utilization of a Gaussian Mixture Model (GMM) to convert the noteworthy features into representative characteristics. The present study provides a description of the KF approach, which involves the analysis of the dynamics pertaining to both normal and attack events. The system employs a dynamic thresholding technique to detect anomalous behavior by calculating the lower and upper boundaries of normal activity. The architecture is assessed using two open datasets, UNSW-NB15 for network data and Power System for data on cyber power.
Suggested Citation
C. Babu Vignesh & E. Arul & V. C. Mahavishnu & A. Punidha, 2024.
"Mutation mayfly algorithm (MMA) based feature selection and probabilistic anomaly detection model for cyber-physical systems,"
International Journal of System Assurance Engineering and Management, Springer;The Society for Reliability, Engineering Quality and Operations Management (SREQOM),India, and Division of Operation and Maintenance, Lulea University of Technology, Sweden, vol. 15(12), pages 5454-5468, December.
Handle:
RePEc:spr:ijsaem:v:15:y:2024:i:12:d:10.1007_s13198-024-02438-0
DOI: 10.1007/s13198-024-02438-0
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:ijsaem:v:15:y:2024:i:12:d:10.1007_s13198-024-02438-0. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.