Mutation mayfly algorithm (MMA) based feature selection and probabilistic anomaly detection model for cyber-physical systems

Mahavishnu, V C (2024) Mutation mayfly algorithm (MMA) based feature selection and probabilistic anomaly detection model for cyber-physical systems. International Journal of System Assurance Engineering and Management, 15 (12). pp. 5454-5468. ISSN 0975-6809

[thumbnail of Mutation mayfly algorithm (MMA) based feature selection and probabilistic anomaly detection model for cyber-physical systems.pdf] Text
Mutation mayfly algorithm (MMA) based feature selection and probabilistic anomaly detection model for cyber-physical systems.pdf - Published Version

Download (246kB)

Abstract

With advances in Cyber-Physical Systems (CPS), privacy-preserving and security issues have attracted substantial attention. A crucial function provided by CPS is anomaly detection on large-scale, complicated, and dynamic data. Physical and network information about the systems for safeguarding original data and identifying cyberattacks is needed in order to develop a reliable privacy-preserving anomaly detection approach. Conventional anomaly detection techniques cannot be directly used to solve these problems because they must deal with the expanding amount of data and need domain-specific expertise. By filtering and choosing key aspects from the original data for improved safety, this research presents a privacy preservation approach for secure anomaly detection. For selecting features, the Mutation Mayfly Algorithm (MMA) has been developed. The proposed program combines key benefits of swarm intelligence and evolutionary algorithms. The usage of MMA in feature selection results from its better accuracy and straightforward structure. Then, a strategy for identifying anomalies based on a Kalman Filter (KF) model and a Gaussian Mixture Model (GMM) has been created to find cyberattacks in CPS. Furthermore, the efficacy of privacy-preserving anomaly detection is being improved through the utilization of a Gaussian Mixture Model (GMM) to convert the noteworthy features into representative characteristics. The present study provides a description of the KF approach, which involves the analysis of the dynamics pertaining to both normal and attack events. The system employs a dynamic thresholding technique to detect anomalous behavior by calculating the lower and upper boundaries of normal activity. The architecture is assessed using two open datasets, UNSW-NB15 for network data and Power System for data on cyber power.

Item Type: Article
Uncontrolled Keywords: Privacy preservation · Anomaly detection · Cyber-physical system (CPS) · Supervisory control and data acquisition (SCADA) · Power systems · Cyberattacks · Gaussian mixture model (GMM) · Mutation Mayfy algorithm (MMA) · Kalman Filter (KF)
Subjects: A Artificial Intelligence and Data Science > Cyber Security
C Computer Science and Engineering > Algorithm Analysis
D Electrical and Electronics Engineering > Power System
Divisions: Computer Science and Engineering
Depositing User: Dr Krishnamurthy V
Date Deposited: 07 Jan 2025 08:49
Last Modified: 07 Jan 2025 08:50
URI: https://ir.psgitech.ac.in/id/eprint/1283

Actions (login required)

View Item
View Item