CYBER-ATTACK DETECTION SYSTEM FOR CYBER-PHYSICAL SYSTEMS USING MACHINE LEARNING-BASED ANOMALY DETECTION

Authors

  • Dr. Harish Barapatre Associate Professor, Department of Computer Engineering, Yadavrao Tasgaonkar Institute of Engineering and Technology ,Bhivpuri Road Karjat ,Maharashtra .410201
  • Harshal Patil Student, Department of Computer Engineering,Yadavrao Tasgaonkar Institute of Engineering and Technology ,Bhivpuri Road Karjat ,Maharashtra .410201
  • Anirudha Kamle Student, Department of Computer Engineering,Yadavrao Tasgaonkar Institute of Engineering and Technology ,Bhivpuri Road Karjat ,Maharashtra .410201
  • Vivek Singh Student, Department of Computer Engineering,Yadavrao Tasgaonkar Institute of Engineering and Technology ,Bhivpuri Road Karjat ,Maharashtra .410201

DOI:

https://doi.org/10.29121/ijetmr.v13.i4.2026.1769

Keywords:

Cyber-Physical Systems, Cyber Attack Detection, Anomaly Detection, Machine Learning, Intrusion Detection, Smart Systems

Abstract

Cyber-Physical Systems (CPS) are increasingly deployed in critical domains such as smart grids, industrial automation, healthcare, and transportation, where the integration of computational and physical components introduces significant security challenges. These systems are highly vulnerable to cyber-attacks such as false data injection, denial-of-service, and stealthy manipulation, which can lead to severe physical and economic consequences. Traditional security mechanisms are insufficient due to the dynamic and heterogeneous nature of CPS environments [1], [2].
This paper proposes a conceptual machine learning-based cyber-attack detection framework tailored for CPS environments. The framework focuses on real-time anomaly detection by analyzing multi-source data streams from sensors, network traffic, and control signals. A hybrid detection approach is designed that combines statistical feature analysis and supervised learning models to identify deviations from normal system behavior. The proposed model introduces a risk scoring mechanism that evaluates system states based on behavioral inconsistencies, enabling early detection of potential threats.
The framework emphasizes scalability, adaptability, and low-latency detection, which are critical for real-time CPS applications. Unlike conventional signature-based systems, the proposed approach is capable of detecting unknown and zero-day attacks. The study provides a structured design and mathematical formulation for anomaly scoring and decision-making processes, making it suitable for further implementation and validation in real-world CPS scenarios [3].

Downloads

Download data is not yet available.

References

Abokifa, A. A., Haddad, K., and Lo, C. S. (2019). Detection of Cyber Attacks on Water Distribution Systems Using Machine Learning. Journal of Water Resources Planning and Management, 145(5). https://doi.org/10.1061/(ASCE)WR.1943-5452.0001023 DOI: https://doi.org/10.1061/(ASCE)WR.1943-5452.0001023

Adepu, S., and Mathur, A. (2016). Distributed Detection of Single-Stage Multipoint Cyber Attacks in a Water Treatment Plant. In Proceedings of the ACM Asia Conference on Computer and Communications Security. https://doi.org/10.1145/2897845.2897855 DOI: https://doi.org/10.1145/2897845.2897855

Ahmad, T., Al-Shaikhli, B., and Al-Kahtani, M. A. (2017). Hybrid Intrusion Detection System Using Machine Learning Techniques. International Journal of Computer Applications, 160(7), 1–6.

Axelsson, S. (2000). Intrusion Detection Systems: A Survey and Taxonomy (Technical Report). Chalmers University.

Cintuglu, M. H., Mohammed, O. A., Akkaya, K., and Uluagac, A. S. (2017). A Survey on Smart Grid Cyber-Physical System Testbeds. IEEE Communications Surveys and Tutorials, 19(1), 446–464. https://doi.org/10.1109/COMST.2016.2627399 DOI: https://doi.org/10.1109/COMST.2016.2627399

Conti, M., Dehghantanha, A., Franke, K., and Watson, S. (2018). Internet of Things Security and Forensics: Challenges and Opportunities. Future Generation Computer Systems, 78, 544–546. https://doi.org/10.1016/j.future.2017.07.060 DOI: https://doi.org/10.1016/j.future.2017.07.060

Da Xu, L., He, W., and Li, S. (2014). Internet of Things in Industries: A Survey. IEEE Transactions on Industrial Informatics, 10(4), 2233–2243. https://doi.org/10.1109/TII.2014.2300753 DOI: https://doi.org/10.1109/TII.2014.2300753

Ferrag, M. A., Maglaras, L., Janicke, H., Jiang, J., and Shu, S. (2020). Deep Learning for Cyber Security Intrusion Detection: Approaches, Datasets, and Comparative Study. Journal of Information Security and Applications, 50. https://doi.org/10.1016/j.jisa.2019.102419 DOI: https://doi.org/10.1016/j.jisa.2019.102419

Goh, J., Adepu, S., and Mathur, A. (2016). A Dataset to Support Research in the Design of Secure Water Treatment Systems. In Proceedings of the International Conference on Critical Information Infrastructures Security. https://doi.org/10.1007/978-3-319-71368-7_8 DOI: https://doi.org/10.1007/978-3-319-71368-7_8

He, H., and Yan, J. (2016). Cyber-Physical Attacks and Defenses in the Smart Grid: A Survey. IET Cyber-Physical Systems: Theory and Applications, 1(1), 13–27. https://doi.org/10.1049/iet-cps.2016.0019 DOI: https://doi.org/10.1049/iet-cps.2016.0019

Hinton, G. E., Deng, L., Yu, D., Dahl, G. E., Mohamed, A. R., Jaitly, N., Senior, A., Vanhoucke, V., Nguyen, P., Sainath, T. N., and Kingsbury, B. (2012). Deep Neural Networks for Acoustic Modeling in Speech Recognition. IEEE Signal Processing Magazine, 29(6), 82–97. https://doi.org/10.1109/MSP.2012.2205597 DOI: https://doi.org/10.1109/MSP.2012.2205597

Javaid, A., Niyaz, Q., Sun, W., and Alam, M. (2016). A Deep Learning Approach for Network Intrusion Detection System. In Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies. https://doi.org/10.4108/eai.3-12-2015.2262516 DOI: https://doi.org/10.4108/eai.3-12-2015.2262516

Jin, P. H., Park, Y. J., and Kim, S. H. (2020). Anomaly Detection in Cyber-Physical Systems Using Deep Learning. IEEE Access, 8, 102161–102173.

Kim, Y., Kim, H., and Kim, K. H. (2019). A Deep Learning-Based Intrusion Detection Framework for CPS. IEEE Access, 7, 103492–103504.

Lee, E. A. (2008). Cyber Physical Systems: Design Challenges. In Proceedings of the 11th IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC). https://doi.org/10.1109/ISORC.2008.25 DOI: https://doi.org/10.1109/ISORC.2008.25

Liu, X., Li, Z., and Li, C. (2012). Cyber Security and Privacy Issues in Smart Grids. IEEE Communications Surveys and Tutorials, 14(4), 981–997. https://doi.org/10.1109/SURV.2011.122111.00145 DOI: https://doi.org/10.1109/SURV.2011.122111.00145

Mitchell, R., and Chen, I. R. (2014). A Survey of Intrusion Detection Techniques for Cyber-Physical Systems. ACM Computing Surveys, 46(4), 1–29. https://doi.org/10.1145/2542049 DOI: https://doi.org/10.1145/2542049

Mo, Y., and Sinopoli, B. (2010). False Data Injection Attacks in Control Systems. In Proceedings of the First Workshop on Secure Control Systems.

Moustafa, N., and Slay, J. (2015). UNSW-NB15: A Comprehensive Data Set for Network Intrusion Detection Systems. In Military Communications and Information Systems Conference (MilCIS). https://doi.org/10.1109/MilCIS.2015.7348942 DOI: https://doi.org/10.1109/MilCIS.2015.7348942

Munir, K., Hussain, S. A., and Shah, S. A. (2019). Cyber Attack Detection in Industrial Control Systems Using Machine Learning. IEEE Access, 7, 108602–108615.

Pan, S., Morris, T., and Adhikari, U. (2015). Developing a Hybrid Intrusion Detection System Using Data Mining for Power Systems. IEEE Transactions on Smart Grid, 6(6), 3104–3113. https://doi.org/10.1109/TSG.2015.2409775 DOI: https://doi.org/10.1109/TSG.2015.2409775

Pasqualetti, F., Dörfler, F., and Bullo, F. (2013). Attack Detection and Identification in Cyber-Physical Systems. IEEE Transactions on Automatic Control, 58(11), 2715–2729. https://doi.org/10.1109/TAC.2013.2266831 DOI: https://doi.org/10.1109/TAC.2013.2266831

Teixeira, A., Pérez, D., Sandberg, H., and Johansson, K. H. (2012). Attack Models and Scenarios for Networked Control Systems. In Proceedings of the 1st International Conference on High Confidence Networked Systems. https://doi.org/10.1145/2185505.2185515 DOI: https://doi.org/10.1145/2185505.2185515

Wang, S., Hong, Y., and Chen, J. (2018). Machine Learning-Based Intrusion Detection for Smart Grid Systems. IEEE Transactions on Smart Grid, 9(5), 5134–5143.

Zhang, J., Qin, Z., Yin, H., Ou, L., and Li, K. (2008). A Feature Selection Method for Intrusion Detection Systems Based on Support Vector Machine. In Proceedings of the IEEE International Conference on Information and Automation.

Downloads

Published

2026-04-30

How to Cite

Barapatre, H. ., Patil, H. ., Kamle, A. ., & Singh, V. . (2026). CYBER-ATTACK DETECTION SYSTEM FOR CYBER-PHYSICAL SYSTEMS USING MACHINE LEARNING-BASED ANOMALY DETECTION. International Journal of Engineering Technologies and Management Research, 13(4), 91–104. https://doi.org/10.29121/ijetmr.v13.i4.2026.1769