Advanced Machine Learning Techniques for Classification and Detection of Network Intrusions in Cyber-Physical Systems
DOI:
https://doi.org/10.32628/CSEIT251112119Keywords:
Cyber-Physical Systems (CPS), Network Security, Cybersecurity, Intrusion Detection System (IDS), Machine Learning, NSL-KDDAbstract
IDS keep an eye out for any indications of malicious behaviour or policy breaches in a network or system. An administrator should be notified or a central record should be kept of any intrusion activity or violation using a security information and event management system. Through the integration of sensing, computation, control, and networking, cyber physical systems connect physical infrastructure and objects to the internet and to each other. Therefore, it is necessary to have sufficient intrusion detection after safeguard the CPS from cyber-attacks, which might corrupt the equipment. CPS network intrusion categorisation and detection using sophisticated ML algorithms is the subject of this study's thorough methodology. Some of the methodical stages of the study were data collection preprocessing, and feature selection of the internet traffic that were used in the work which used NSL-KDD dataset for intrusion detection. As a result, a range of ML models is employed in classification applications that exploit their main benefits, including RF, LR, and XGBoost. This model's performance is evaluated using metrics that are based on recall, accuracy, precision, and F1 score. Confusion matrix visualisations are also included for efficient comprehension of classification results. The findings reveal that RF achieved a highest accuracy at 99.50%, followed closely by XGBoost at 99.41%, while LR recorded an accuracy of 95.39%. In addition, Kappa coefficient test, precision99.65 %, recall99.38%, and F1 score99.51 % in RF were observed. In total, the results reveal Random Forest as the superior model in comparison to employed LR and XGBoost while creating accurate IDS to protect CPS sufficiently.
Downloads
References
S. C. R. V. Bhavik Patel, Vamsi Krishna Yarlagadda, Niravkumar Dhameliya, Kishore Mullangi, “Advancements in 5G Technology: Enhancing Connectivity and Performance in Communication Engineering,” Eng. Int., vol. 10, no. 2, pp. 117–130, 2022.
D. N. Mhawi, A. Aldallal, and S. Hassan, “Advanced Feature-Selection-Based Hybrid Ensemble Learning Algorithms for Network Intrusion Detection Systems,” Symmetry (Basel)., 2022, doi: 10.3390/sym14071461.
S. Y. Diaba, M. Shafie-khah, and M. Elmusrati, “On the performance metrics for cyber-physical attack detection in smart grid,” Soft Comput., 2022, doi: 10.1007/s00500-022-06761-1.
V. V. Kumar, A. Sahoo, and F. W. Liou, “Cyber-enabled product lifecycle management: A multi-agent framework,” in Procedia Manufacturing, 2019. doi: 10.1016/j.promfg.2020.01.247.
P. K. and S. Arora, “THE IMPACT OF MACHINE LEARNING AND AI ON ENHANCING RISK-BASED IDENTITY VERIFICATION PROCESSES,” Int. Res. J. Mod. Eng. Technol. Sci., vol. 06, no. 05, pp. 8246–8255, 2024.
I. Ullah and Q. H. Mahmoud, “Design and Development of RNN Anomaly Detection Model for IoT Networks,” IEEE Access, vol. 10, no. February, pp. 62722–62750, 2022, doi: 10.1109/ACCESS.2022.3176317.
F. E. Laghrissi, S. Douzi, K. Douzi, and B. Hssina, “Intrusion detection systems using long short-term memory (LSTM),” J. Big Data, 2021, doi: 10.1186/s40537-021-00448-4.
P. Khare and S. Srivastava, “AI-Powered Fraud Prevention: A Comprehensive Analysis of Machine Learning Applications in Online Transactions,” J. Emerg. Technol. Innov. Res., vol. 10, pp. f518–f525, 2023.
H. Sinha, “An examination of machine learning-based credit card fraud detection systems,” Int. J. Sci. Res. Arch., vol. 12, no. 01, pp. 2282–2294, 2024, doi: https://doi.org/10.30574/ijsra.2024.12.2.1456.
Y. Fu, Y. Du, Z. Cao, Q. Li, and W. Xiang, “A Deep Learning Model for Network Intrusion Detection with Imbalanced Data,” Electron., 2022, doi: 10.3390/electronics11060898.
H. Hou et al., “Hierarchical Long Short-Term Memory Network for Cyberattack Detection,” IEEE Access, 2020, doi: 10.1109/ACCESS.2020.2983953.
S. Naseer et al., “Enhanced network anomaly detection based on deep neural networks,” IEEE Access, 2018, doi: 10.1109/ACCESS.2018.2863036.
H. Sinha, “ANALYZING MOVIE REVIEW SENTIMENTS ADVANCED MACHINE LEARNING AND NATURAL LANGUAGE PROCESSING METHODS,” Int. Res. J. Mod. Eng. Technol. Sci. (, vol. 06, no. 08, pp. 1326–1337, 2024.
Y. Gao, J. Chen, H. Miao, B. Song, Y. Lu, and W. Pan, “Self-Learning Spatial Distribution-Based Intrusion Detection for Industrial Cyber-Physical Systems,” IEEE Trans. Comput. Soc. Syst., 2022, doi: 10.1109/TCSS.2021.3135586.
Y. Xiao, J. Liu, and L. Zhang, “Cyber-Physical System Intrusion Detection Model Based on Software-Defined Network,” in Proceedings of the IEEE International Conference on Software Engineering and Service Sciences, ICSESS, 2021. doi: 10.1109/ICSESS52187.2021.9522345.
M. Abdullahi, H. Alhussian, N. Aziz, S. J. Abdulkadir, and Y. Baashar, “Deep Learning Model for Cybersecurity Attack Detection in Cyber-Physical Systems,” in 2022 6th International Conference on Computing, Communication, Control and Automation, ICCUBEA 2022, 2022. doi: 10.1109/ICCUBEA54992.2022.10010717.
A. Zainudin, R. Akter, D. S. Kim, and J. M. Lee, “Towards Lightweight Intrusion Identification in SDN-based Industrial Cyber-Physical Systems,” in APCC 2022 - 27th Asia-Pacific Conference on Communications: Creating Innovative Communication Technologies for Post-Pandemic Era, 2022. doi: 10.1109/APCC55198.2022.9943641.
R. Latha and R. M. Bommi, “Hybrid CatBoost Regression model based Intrusion Detection System in IoT-Enabled Networks,” in Proceedings of the 9th International Conference on Electrical Energy Systems, ICEES 2023, 2023. doi: 10.1109/ICEES57979.2023.10110148.
H. Sinha, “Benchmarking Predictive Performance Of Machine Learning Approaches For Accurate Prediction Of Boston House Prices: An In-Depth Analysis,” ternational J. Res. Anal. Rev., vol. 11, no. 3, pp. 181–187, 2024.
V. V. Kumar and F. T. S. Chan, “A superiority search and optimisation algorithm to solve RFID and an environmental factor embedded closed loop logistics model,” Int. J. Prod. Res., vol. 49, no. 16, pp. 4807–4831, Aug. 2010, doi: 10.1080/00207543.2010.503201.
H. Sinha, “Predicting Employee Performance in Business Environments Using Effective Machine Learning Models,” Int. J. Nov. Res. Dev., vol. 9, no. 9, pp. 875–881, 2024.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 International Journal of Scientific Research in Computer Science, Engineering and Information Technology

This work is licensed under a Creative Commons Attribution 4.0 International License.