Skip to main content
Log in

A Novel Decentralized Analytical Methodology for Cyber Physical Networks Attack Detection

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In many functional implementations of considerable engineering significance, cyber physical solutions have recently been developed where protection and privacy are essential. This led to the recent increase in interest in the development of advanced and emerging technology for anomaly and intrusion detection. The paper suggests a new frame for the distributed blind intrusion detection by modelling sensor measurements as the graph signal and using the statistical features of the graph signal for the detection of intrusion. The graphic similarity matrices is generated using the measured data of the sensors as well as the proximity of the sensors to completely take account of the underlying network structure. The scope of the collected data is modelled on the random field Gaussian Markov and the required precision matrix can be determined by adjusting to a graph called Laplacian matrix. For research statistics, the suggested technique for intrusion detection is based on the modified Bayesian probability ratio test and the closed-form expressions are derived. In the end, the time analysis of the actions of the network is calculated by computing the Bhattacharyya distance at consecutive times among the measurement distributions. Experiments are carried out, evaluated and equate the efficiency of the proposed system to the modern method. The findings indicate a detection value better than that offered by other existing systems via the proposed intrusion detection frame.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Polycarpou, & Eliades, M. M. (2010). A fault diagnosis and security framework for water systems. IEEE Transactions on Control Systems Technology, 18(6), 1254–1265.

    Article  Google Scholar 

  2. Egilmez, E. Pavez, & A. Ortega (2016). Graph learning with Laplacian constraints: modeling attractive Gaussian Markov random fields,” in Proc. 50th Asilomar Conference on Signals, Systems and Computers, pp. 1470–1474.

  3. Tabuada, F. P., & Diggavi, S. (2014). Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Transactions on Automatic Control, 59(6), 1454–1467.

    Article  MathSciNet  MATH  Google Scholar 

  4. Tong, K. L., & Thomas, R. J. (2015). Subspace methods for data attack on state estimation: A data driven approach. IEEE Transactions on Signal Processing, 63(5), 1102–1114.

    Article  MathSciNet  MATH  Google Scholar 

  5. Kailath, T. (1967). The divergence and Bhattacharyya distance measures in signal selection. IEEE Transactions on Communication Technology, 15(1), 52–60.

    Article  Google Scholar 

  6. Mohammadi, & Plataniotis, K. N. (2016). Improper complex-valued Bhattacharyya distance. IEEE Transactions on Neural Networks and Learning Systems, 27(5), 1049–1064.

    Article  MathSciNet  Google Scholar 

  7. Mo, & Sinopoli, B. (2015). Secure estimation in the presence of integrity attacks. IEEE Transactions on Signal Processing, 60(4), 1145–1151.

    MathSciNet  MATH  Google Scholar 

  8. Sadreazami, A. Asif & A. Mohammadi (2017). Image stylization using iterative graph filtering, in Proc. IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 1–4.

  9. Sadreazami, A. Asif & A. Mohammadi (2017). A late adaptive graphbased edge-aware filtering with iterative weight updating process. in Proc. IEEE Mid-West Symposium on Circuits and Systems (MWSCAS).

  10. Vempaty, A., Ozdemir, O., Agrawal, K., Chen, H., & Varshney, P. K. (2013). Localization in wireless sensor networks: Byzantines and mitigation techniques. IEEE Transactions on Signal Processing., 61(6), 1495–1508.

    Article  MathSciNet  MATH  Google Scholar 

  11. Zhang, J., Blum, R. S., Lu, X., & Conus, D. (2015). Asymptotically optimum distributed estimation in the presence of attacks. IEEE Transactions on Signal Processing, 63(5), 1086–1101.

    Article  MathSciNet  MATH  Google Scholar 

  12. Lee, W. & D Xiang, D. (2001). Information-theoretic measures for anomaly detection, in Proc. IEEE Symposium on Security and Privacy.

Download references

Acknowledgements

The authors extend their appreciation to the Deputyship for Research & innovation, Ministry of Education in Saudi Arabia for funding this research work through the project number (UB-3 0-1442)"

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abdulrahman Saad Alqahtani.

Ethics declarations

Conflict of interest

The author declares that they no conflict of interest. The author of this research acknowledge that they are not involved in any financial interest.

Consent for Publication

Author certifies that this material or similar material has not been and will not be submitted to or published in any other publication before.

Consent for Participation

Author certify that they have participated sufficiently in the work to take public responsibility for the content, including participation in the concept, design, analysis, writing, or revision of the manuscript.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alqahtani, A.S., Abuhasel, K.A. & Alquraish, M. A Novel Decentralized Analytical Methodology for Cyber Physical Networks Attack Detection. Wireless Pers Commun 127, 1705–1716 (2022). https://doi.org/10.1007/s11277-021-08716-5

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08716-5

Keywords

Navigation