Abstract
In many functional implementations of considerable engineering significance, cyber physical solutions have recently been developed where protection and privacy are essential. This led to the recent increase in interest in the development of advanced and emerging technology for anomaly and intrusion detection. The paper suggests a new frame for the distributed blind intrusion detection by modelling sensor measurements as the graph signal and using the statistical features of the graph signal for the detection of intrusion. The graphic similarity matrices is generated using the measured data of the sensors as well as the proximity of the sensors to completely take account of the underlying network structure. The scope of the collected data is modelled on the random field Gaussian Markov and the required precision matrix can be determined by adjusting to a graph called Laplacian matrix. For research statistics, the suggested technique for intrusion detection is based on the modified Bayesian probability ratio test and the closed-form expressions are derived. In the end, the time analysis of the actions of the network is calculated by computing the Bhattacharyya distance at consecutive times among the measurement distributions. Experiments are carried out, evaluated and equate the efficiency of the proposed system to the modern method. The findings indicate a detection value better than that offered by other existing systems via the proposed intrusion detection frame.
Similar content being viewed by others
References
Polycarpou, & Eliades, M. M. (2010). A fault diagnosis and security framework for water systems. IEEE Transactions on Control Systems Technology, 18(6), 1254–1265.
Egilmez, E. Pavez, & A. Ortega (2016). Graph learning with Laplacian constraints: modeling attractive Gaussian Markov random fields,” in Proc. 50th Asilomar Conference on Signals, Systems and Computers, pp. 1470–1474.
Tabuada, F. P., & Diggavi, S. (2014). Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Transactions on Automatic Control, 59(6), 1454–1467.
Tong, K. L., & Thomas, R. J. (2015). Subspace methods for data attack on state estimation: A data driven approach. IEEE Transactions on Signal Processing, 63(5), 1102–1114.
Kailath, T. (1967). The divergence and Bhattacharyya distance measures in signal selection. IEEE Transactions on Communication Technology, 15(1), 52–60.
Mohammadi, & Plataniotis, K. N. (2016). Improper complex-valued Bhattacharyya distance. IEEE Transactions on Neural Networks and Learning Systems, 27(5), 1049–1064.
Mo, & Sinopoli, B. (2015). Secure estimation in the presence of integrity attacks. IEEE Transactions on Signal Processing, 60(4), 1145–1151.
Sadreazami, A. Asif & A. Mohammadi (2017). Image stylization using iterative graph filtering, in Proc. IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 1–4.
Sadreazami, A. Asif & A. Mohammadi (2017). A late adaptive graphbased edge-aware filtering with iterative weight updating process. in Proc. IEEE Mid-West Symposium on Circuits and Systems (MWSCAS).
Vempaty, A., Ozdemir, O., Agrawal, K., Chen, H., & Varshney, P. K. (2013). Localization in wireless sensor networks: Byzantines and mitigation techniques. IEEE Transactions on Signal Processing., 61(6), 1495–1508.
Zhang, J., Blum, R. S., Lu, X., & Conus, D. (2015). Asymptotically optimum distributed estimation in the presence of attacks. IEEE Transactions on Signal Processing, 63(5), 1086–1101.
Lee, W. & D Xiang, D. (2001). Information-theoretic measures for anomaly detection, in Proc. IEEE Symposium on Security and Privacy.
Acknowledgements
The authors extend their appreciation to the Deputyship for Research & innovation, Ministry of Education in Saudi Arabia for funding this research work through the project number (UB-3 0-1442)"
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The author declares that they no conflict of interest. The author of this research acknowledge that they are not involved in any financial interest.
Consent for Publication
Author certifies that this material or similar material has not been and will not be submitted to or published in any other publication before.
Consent for Participation
Author certify that they have participated sufficiently in the work to take public responsibility for the content, including participation in the concept, design, analysis, writing, or revision of the manuscript.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Alqahtani, A.S., Abuhasel, K.A. & Alquraish, M. A Novel Decentralized Analytical Methodology for Cyber Physical Networks Attack Detection. Wireless Pers Commun 127, 1705–1716 (2022). https://doi.org/10.1007/s11277-021-08716-5
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-021-08716-5