CYBER-ATTACK DETECTION SYSTEM FOR CYBER-PHYSICAL SYSTEMS USING MACHINE LEARNING-BASED ANOMALY DETECTION
DOI:
https://doi.org/10.29121/ijetmr.v13.i4.2026.1769Keywords:
Cyber-Physical Systems, Cyber Attack Detection, Anomaly Detection, Machine Learning, Intrusion Detection, Smart SystemsAbstract
Cyber-Physical Systems (CPS) are increasingly deployed in critical domains such as smart grids, industrial automation, healthcare, and transportation, where the integration of computational and physical components introduces significant security challenges. These systems are highly vulnerable to cyber-attacks such as false data injection, denial-of-service, and stealthy manipulation, which can lead to severe physical and economic consequences. Traditional security mechanisms are insufficient due to the dynamic and heterogeneous nature of CPS environments [1], [2].
This paper proposes a conceptual machine learning-based cyber-attack detection framework tailored for CPS environments. The framework focuses on real-time anomaly detection by analyzing multi-source data streams from sensors, network traffic, and control signals. A hybrid detection approach is designed that combines statistical feature analysis and supervised learning models to identify deviations from normal system behavior. The proposed model introduces a risk scoring mechanism that evaluates system states based on behavioral inconsistencies, enabling early detection of potential threats.
The framework emphasizes scalability, adaptability, and low-latency detection, which are critical for real-time CPS applications. Unlike conventional signature-based systems, the proposed approach is capable of detecting unknown and zero-day attacks. The study provides a structured design and mathematical formulation for anomaly scoring and decision-making processes, making it suitable for further implementation and validation in real-world CPS scenarios [3].
Downloads
References
Abokifa, A. A., Haddad, K., and Lo, C. S. (2019). Detection of Cyber Attacks on Water Distribution Systems Using Machine Learning. Journal of Water Resources Planning and Management, 145(5). https://doi.org/10.1061/(ASCE)WR.1943-5452.0001023 DOI: https://doi.org/10.1061/(ASCE)WR.1943-5452.0001023
Adepu, S., and Mathur, A. (2016). Distributed Detection of Single-Stage Multipoint Cyber Attacks in a Water Treatment Plant. In Proceedings of the ACM Asia Conference on Computer and Communications Security. https://doi.org/10.1145/2897845.2897855 DOI: https://doi.org/10.1145/2897845.2897855
Ahmad, T., Al-Shaikhli, B., and Al-Kahtani, M. A. (2017). Hybrid Intrusion Detection System Using Machine Learning Techniques. International Journal of Computer Applications, 160(7), 1–6.
Axelsson, S. (2000). Intrusion Detection Systems: A Survey and Taxonomy (Technical Report). Chalmers University.
Cintuglu, M. H., Mohammed, O. A., Akkaya, K., and Uluagac, A. S. (2017). A Survey on Smart Grid Cyber-Physical System Testbeds. IEEE Communications Surveys and Tutorials, 19(1), 446–464. https://doi.org/10.1109/COMST.2016.2627399 DOI: https://doi.org/10.1109/COMST.2016.2627399
Conti, M., Dehghantanha, A., Franke, K., and Watson, S. (2018). Internet of Things Security and Forensics: Challenges and Opportunities. Future Generation Computer Systems, 78, 544–546. https://doi.org/10.1016/j.future.2017.07.060 DOI: https://doi.org/10.1016/j.future.2017.07.060
Da Xu, L., He, W., and Li, S. (2014). Internet of Things in Industries: A Survey. IEEE Transactions on Industrial Informatics, 10(4), 2233–2243. https://doi.org/10.1109/TII.2014.2300753 DOI: https://doi.org/10.1109/TII.2014.2300753
Ferrag, M. A., Maglaras, L., Janicke, H., Jiang, J., and Shu, S. (2020). Deep Learning for Cyber Security Intrusion Detection: Approaches, Datasets, and Comparative Study. Journal of Information Security and Applications, 50. https://doi.org/10.1016/j.jisa.2019.102419 DOI: https://doi.org/10.1016/j.jisa.2019.102419
Goh, J., Adepu, S., and Mathur, A. (2016). A Dataset to Support Research in the Design of Secure Water Treatment Systems. In Proceedings of the International Conference on Critical Information Infrastructures Security. https://doi.org/10.1007/978-3-319-71368-7_8 DOI: https://doi.org/10.1007/978-3-319-71368-7_8
He, H., and Yan, J. (2016). Cyber-Physical Attacks and Defenses in the Smart Grid: A Survey. IET Cyber-Physical Systems: Theory and Applications, 1(1), 13–27. https://doi.org/10.1049/iet-cps.2016.0019 DOI: https://doi.org/10.1049/iet-cps.2016.0019
Hinton, G. E., Deng, L., Yu, D., Dahl, G. E., Mohamed, A. R., Jaitly, N., Senior, A., Vanhoucke, V., Nguyen, P., Sainath, T. N., and Kingsbury, B. (2012). Deep Neural Networks for Acoustic Modeling in Speech Recognition. IEEE Signal Processing Magazine, 29(6), 82–97. https://doi.org/10.1109/MSP.2012.2205597 DOI: https://doi.org/10.1109/MSP.2012.2205597
Javaid, A., Niyaz, Q., Sun, W., and Alam, M. (2016). A Deep Learning Approach for Network Intrusion Detection System. In Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies. https://doi.org/10.4108/eai.3-12-2015.2262516 DOI: https://doi.org/10.4108/eai.3-12-2015.2262516
Jin, P. H., Park, Y. J., and Kim, S. H. (2020). Anomaly Detection in Cyber-Physical Systems Using Deep Learning. IEEE Access, 8, 102161–102173.
Kim, Y., Kim, H., and Kim, K. H. (2019). A Deep Learning-Based Intrusion Detection Framework for CPS. IEEE Access, 7, 103492–103504.
Lee, E. A. (2008). Cyber Physical Systems: Design Challenges. In Proceedings of the 11th IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC). https://doi.org/10.1109/ISORC.2008.25 DOI: https://doi.org/10.1109/ISORC.2008.25
Liu, X., Li, Z., and Li, C. (2012). Cyber Security and Privacy Issues in Smart Grids. IEEE Communications Surveys and Tutorials, 14(4), 981–997. https://doi.org/10.1109/SURV.2011.122111.00145 DOI: https://doi.org/10.1109/SURV.2011.122111.00145
Mitchell, R., and Chen, I. R. (2014). A Survey of Intrusion Detection Techniques for Cyber-Physical Systems. ACM Computing Surveys, 46(4), 1–29. https://doi.org/10.1145/2542049 DOI: https://doi.org/10.1145/2542049
Mo, Y., and Sinopoli, B. (2010). False Data Injection Attacks in Control Systems. In Proceedings of the First Workshop on Secure Control Systems.
Moustafa, N., and Slay, J. (2015). UNSW-NB15: A Comprehensive Data Set for Network Intrusion Detection Systems. In Military Communications and Information Systems Conference (MilCIS). https://doi.org/10.1109/MilCIS.2015.7348942 DOI: https://doi.org/10.1109/MilCIS.2015.7348942
Munir, K., Hussain, S. A., and Shah, S. A. (2019). Cyber Attack Detection in Industrial Control Systems Using Machine Learning. IEEE Access, 7, 108602–108615.
Pan, S., Morris, T., and Adhikari, U. (2015). Developing a Hybrid Intrusion Detection System Using Data Mining for Power Systems. IEEE Transactions on Smart Grid, 6(6), 3104–3113. https://doi.org/10.1109/TSG.2015.2409775 DOI: https://doi.org/10.1109/TSG.2015.2409775
Pasqualetti, F., Dörfler, F., and Bullo, F. (2013). Attack Detection and Identification in Cyber-Physical Systems. IEEE Transactions on Automatic Control, 58(11), 2715–2729. https://doi.org/10.1109/TAC.2013.2266831 DOI: https://doi.org/10.1109/TAC.2013.2266831
Teixeira, A., Pérez, D., Sandberg, H., and Johansson, K. H. (2012). Attack Models and Scenarios for Networked Control Systems. In Proceedings of the 1st International Conference on High Confidence Networked Systems. https://doi.org/10.1145/2185505.2185515 DOI: https://doi.org/10.1145/2185505.2185515
Wang, S., Hong, Y., and Chen, J. (2018). Machine Learning-Based Intrusion Detection for Smart Grid Systems. IEEE Transactions on Smart Grid, 9(5), 5134–5143.
Zhang, J., Qin, Z., Yin, H., Ou, L., and Li, K. (2008). A Feature Selection Method for Intrusion Detection Systems Based on Support Vector Machine. In Proceedings of the IEEE International Conference on Information and Automation.
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Dr. Harish Barapatre, Harshal Patil, Anirudha Kamle, Vivek Singh

This work is licensed under a Creative Commons Attribution 4.0 International License.
License and Copyright Agreement
In submitting the manuscript to the journal, the authors certify that:
- They are authorized by their co-authors to enter into these arrangements.
- The work described has not been formally published before, except in the form of an abstract or as part of a published lecture, review, thesis, or overlay journal.
- That it is not under consideration for publication elsewhere.
- That its release has been approved by all the author(s) and by the responsible authorities – tacitly or explicitly – of the institutes where the work has been carried out.
- They secure the right to reproduce any material that has already been published or copyrighted elsewhere.
- They agree to the following license and copyright agreement.
Copyright
Authors who publish with International Journal of Engineering Technologies and Management Research agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC BY-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors can enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or edit it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) before and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
For More info, please visit CopyRight Section





















