WeChat Mini Program
Old Version Features

Boosting Cyberattack Detection Using Binary Metaheuristics with Deep Learning on Cyber-Physical System Environment

IEEE ACCESS(2025)

Cited 0|Views3
Abstract
The swift advancement of cyber-physical systems (CPSs) across sectors such as healthcare, transportation, critical infrastructure, and energy enhances the crucial requirement for robust cybersecurity measures to protect these systems from cyberattacks. The cyber-physical method is a hybrid of cyber and physical components, and a safety breach in the element is central to catastrophic consequences. Cyberattack recognition and mitigation techniques in CPSs include using numerous models like intrusion detection systems (IDSs), access control mechanisms, encryption, and firewalls. Cyberattack detection employing deep learning (DL) contains training neural networks to identify patterns indicative of malicious actions within system logs or network traffic, allowing positive classification and mitigation of cyber-attacks. By leveraging the integral ability of DL methods to learn complex representations, this technique enhances the accuracy and efficiency of detecting diverse and growing cyber-attacks. Thus, the study proposes an automated Cyberattack Detection using Binary Metaheuristics with Deep Learning (ACAD-BMDL) method in a CPS environment. The ACAD-BMDL method mainly focuses on enhancing security in the CPS environment via the cyberattack detection process. The ACAD-BMDL method uses Z-score normalization to scale the input dataset. In addition, the binary grey wolf optimizer (BGWO) model is utilized to choose an optimal feature subset. Moreover, the Enhanced Elman Spike Neural Network (EESNN) model detects cyber-attacks. Furthermore, the Archimedes Optimization Algorithm (AOA) model is employed to select the optimum hyperparameter for the EESNN model. The empirical analysis of the ACAD-BMDL technique is performed on a benchmark dataset. The experimental validation of the ACAD-BMDL technique portrayed a superior accuracy value of 99.12% and 99.36% under NSLKDD2015 and CICIDS2017 datasets in the CPS environment.
More
Translated text
Key words
Cyberattack,Optimization,Feature extraction,Data models,Accuracy,Security,Neural networks,Adaptation models,Deep learning,Computational modeling,Cyber-physical systems,deep learning,cyberattack detection,metaheuristics,Archimedes optimization algorithm
求助PDF
上传PDF
Bibtex
AI Read Science
AI Summary
AI Summary is the key point extracted automatically understanding the full text of the paper, including the background, methods, results, conclusions, icons and other key content, so that you can get the outline of the paper at a glance.
Example
Background
Key content
Introduction
Methods
Results
Related work
Fund
Key content
  • Pretraining has recently greatly promoted the development of natural language processing (NLP)
  • We show that M6 outperforms the baselines in multimodal downstream tasks, and the large M6 with 10 parameters can reach a better performance
  • We propose a method called M6 that is able to process information of multiple modalities and perform both single-modal and cross-modal understanding and generation
  • The model is scaled to large model with 10 billion parameters with sophisticated deployment, and the 10 -parameter M6-large is the largest pretrained model in Chinese
  • Experimental results show that our proposed M6 outperforms the baseline in a number of downstream tasks concerning both single modality and multiple modalities We will continue the pretraining of extremely large models by increasing data to explore the limit of its performance
Upload PDF to Generate Summary
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Data Disclaimer
The page data are from open Internet sources, cooperative publishers and automatic analysis results through AI technology. We do not make any commitments and guarantees for the validity, accuracy, correctness, reliability, completeness and timeliness of the page data. If you have any questions, please contact us by email: report@aminer.cn
Chat Paper
Summary is being generated by the instructions you defined