Optimized LightGBM model for security and privacy issues in cyber‐physical systems

Author:

Dalal Surjeet1,Poongodi M.2ORCID,Lilhore Umesh Kumar3,Dahan Fadl45,Vaiyapuri Thavavel6,Keshta Ismail7,Aldossary Sultan Mesfer7,Mahmoud Amena8ORCID,Simaiya Sarita9

Affiliation:

1. Department of Computer Science and Engineering Amity University Haryana Gurugram Haryana India

2. Division of Information and Computing Technology, College of Science and Engineering Hamad Bin Khalifa University Doha Qatar

3. Department of Computer Science and Engineering Chandigarh University Gharuan Mohali Punjab India

4. Department of Management Information Systems, College of Business Administration ‐ Hawtat Bani Tamim Prince Sattam bin Abdulaziz University Al‐Kharj Saudi Arabia

5. Department of Computer Sciences, Faculty of Computing and Information Technology‐Al‐Turbah Taiz University Taiz Yemen

6. Department of Computer Sciences, College of Computer Engineering and Sciences Prince Sattam bin AbdulAziz University Al‐Kharj Saudi Arabia

7. Department of Computer Science and Information Systems, College of Applied Sciences AlMaarefa University Riyadh Saudi Arabia

8. Department of Computer Science Kafrelsheikh University Kafr el‐Sheikh Egypt

9. Apex Institute of Technology (CSE) Chandigarh University Gharuan Mohali Punjab India

Abstract

AbstractIntegrating physical, computational, and networking resources are the goal of cyber‐physical systems, also known as smart‐embedded systems. By investing in a solid foundation, we can improve the usefulness and timeliness of the services we rely on in every facet of our lives and ultimately live more elegantly. Regarding modern technology, data security is a significant factor that must be considered. The complexity of cyber‐physical systems' interacting components and middleware presents serious hurdles when it comes to protecting them from cyber‐attacks without negatively impacting their performance. This article proposes a unique, efficient encryption technique for anticipating cyber assaults in cyber‐physical systems, which addresses these concerns. The suggested method uses Bayesian optimization techniques to fine‐tune the LightGBM algorithm's hyper‐parameters. This proposed algorithm has been implemented on the intrusion detection dataset (UNR‐IDD) from the University of Nevada. Reno has been used to test the suggested approach. The proposed system achieved 99.17% accuracy, 0.9918 precision, and 0.9922 recall values. Our empirical evaluation demonstrates that the algorithm successfully increases accuracy and AUC value, making the cyber‐physical system more secure. In turn, the suggested methodology may offer robust assurance for user data safety.

Publisher

Wiley

Subject

Electrical and Electronic Engineering

Cited by 2 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree;Journal of Cloud Computing;2023-09-29

2. Machine learning model for Water Quality evaluation: Systematic Review;2023 Second International Conference On Smart Technologies For Smart Nation (SmartTechCon);2023-08-18

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3