Fusion: Practice and Applications

Journal DOI

https://doi.org/10.54216/FPA

Submit Your Paper

2692-4048ISSN (Online) 2770-0070ISSN (Print)

Volume 19 , Issue 1 , PP: 201-221, 2025 | Cite this article as | XML | Html | PDF | Full Length Article

Leveraging Digital Twins with Hybrid Deep Learning Model for Robust Intrusion Detection System in Smart City Environment

Nouf Atiahallah Alghanmi 1

  • 1 Department of Information Technology, Faculty of Computing and Information Technology, King Abdulaziz University, P. O. Box 344, Rabigh 21911, Saudi Arabia - (naalganmy@kau.edu.sa)
  • Doi: https://doi.org/10.54216/FPA.190116

    Received: October 28, 2024 Revised: January 12, 2025 Accepted: February 07, 2025
    Abstract

    Cyber-physical systems (CPSs) unite the computation with physical methods. Embedded networks and computers observe and handle the physical procedures, generally with feedback encircles whereas physical procedures affect computation and conversely. In the last decade, the prompt growth of network-associated services has formed confidential information on the Internet. However, networks are much inclined to intrusions wherever unapproved consumers try to retrieve confidential data and even disturb the systems. Constructing a proficient network intrusion detection system (IDS) can be essential to avert these attacks. Utilizing digital twin technology enhances the IDS of physical devices in CPSs. IDSs normally utilize machine learning (ML) techniques for categorizing the attacks. However, the features employed for classifications are not appropriate or adequate all the time. Moreover, the amount of intrusions can be significantly lower than the amount of non-intrusions. Therefore, simple techniques may fail to deliver satisfactory performances owing to this class imbalance. In this study, we offer a Metaheuristic-Driven Hybrid Deep Learning Model for Robust Intrusion Detection in Secure Cyber-Physical Systems (MHDLM-RIDCPS) model in Smart City Environment. The proposed MHDLM-RIDCPS technique primarily targets the classification and recognition of intrusions using digital twin technology to enhance security within the CPS. Primarily, the proposed MHDLM-RIDCPS approach utilizes min-max normalization for transforming an input data into a standardized format. To alleviate dimensionality issues, the coyote optimization algorithm (COA) can be executed to select a subset of features. In addition, the modified prairie dog optimizer (mPDO) combined with a convolutional neural network and bi-directional long short-term memory with attention mechanism (AM-CNN+BiLSTM) classifier is exploited for the identification of intrusions. The design of the mPDO system primarily concentrates on the parameter optimizer of the AM-CNN+BiLSTM algorithm and so improves the classifier performances. To determine the greater efficiency of the MHDLM-RIDCPS system, a comprehensive set of simulations can be applied and the performances are tested over distinct aspects. The experimental analysis guaranteed the superior results of the MHDLM-RIDCPS methodology with existing methods

    Keywords :

    Intrusion Detection , Smart City Environment , Cyber-Physical System , Metaheuristic Algorithm , Deep Learning , Attack , Feature Selection , Digital Twins

    References

    [1] D. Ding, Q. L. Han, Y. Xiang, X. Ge, and X. M. Zhang, "A survey on security control and attack detection for industrial cyber-physical systems," Neurocomputing, vol. 275, pp. 1674–1683, 2018.

    [2] C. Liang, B. Shanmugam, S. Azam, A. Karim, and A. Islam, "Intrusion detection system for the internet of things based on blockchain and multi-agent systems," Electronics, vol. 9, no. 7, p. 1120, 2020.

    [3] D. Midi, A. Rullo, A. Mudgerikar, and E. Bertino, "Kalis—A system for knowledge-driven adaptable intrusion detection for the internet of things," in Proc. IEEE 37th Int. Conf. Distributed Comput. Syst. (ICDCS), Atlanta, GA, USA, 2017, pp. 656–666.

    [4] A. Hussain, E. M. Tordera, X. Masip-Bruin, and H. C. Leligou, "Rule-based with machine learning IDS for DDoS attack detection in cyber-physical production systems (CPPS)," IEEE Access, vol. 12, pp. 12345–12356, 2024.

    [5] S. Krishnamurthy, S. Sarkar, and A. Tewari, "Scalable anomaly detection and isolation in cyber-physical systems using Bayesian networks," in Proc. ASME 2014 Dynamic Syst. Control Conf., San Antonio, TX, USA, 2014, pp. V002T26A006.

    [6] A. Jones, Z. Kong, and C. Belta, "Anomaly detection in cyber-physical systems: A formal methods approach," in Proc. IEEE 53rd Annu. Conf. Decision Control (CDC), Los Angeles, CA, USA, 2014, pp. 848–853.

    [7] C. Zimmer, B. Bhat, F. Mueller, and S. Mohan, "Time-based intrusion detection in cyber-physical systems," in Proc. 1st ACM/IEEE Int. Conf. Cyber-Physical Syst., 2010, pp. 109–118.

    [8] R. Mitchell and I. R. Chen, "A survey of intrusion detection techniques for cyber-physical systems," ACM Comput. Surveys (CSUR), vol. 46, no. 4, pp. 1–29, 2014.

    [9] K. N. Junejo and D. Yau, "Data-driven physical modelling for intrusion detection in cyber-physical systems," in Proc. Singapore Cyber-Secur. Conf. (SG-CRC), 2016, pp. 43–57.

    [10] H. Sadreazami, A. Mohammadi, A. Asif, and K. N. Plataniotis, "Distributed-graph-based statistical approach for intrusion detection in cyber-physical systems," IEEE Trans. Signal Inf. Process. Netw., vol. 4, no. 1, pp. 137–147, 2017.

    [11] A. Hussain, E. M. Tordera, X. Masip-Bruin, and H. C. Leligou, "Rule-based with machine learning IDS for DDoS attack detection in cyber-physical production systems (CPPS)," IEEE Access, vol. 12, pp. 12345–12356, 2024.

    [12] M. A. Alohali et al., "Swarm intelligence for IoT attack detection in a fog-enabled cyber-physical system," Comput. Electr. Eng., vol. 108, p. 108676, 2023.

    [13] A. Aljabri, F. Jemili, and O. Korbaa, "Intrusion detection in cyber-physical system using RSA blockchain technology," Multimedia Tools Appl., vol. 83, no. 16, pp. 48119–48140, 2024.

    [14] M. S. Korium et al., "Intrusion detection system for cyberattacks in the Internet of Vehicles environment," Ad Hoc Netw., vol. 153, p. 103330, 2024.

    [15] S. C. Hassler, U. A. Mughal, and M. Ismail, "Cyber-physical intrusion detection system for unmanned aerial vehicles," IEEE Trans. Intell. Transp. Syst., 2023.

    [16] Y. K. Saheed et al., "ResNet50-1D-CNN: A new lightweight resNet50-One-dimensional convolution neural network transfer learning-based approach for improved intrusion detection in cyber-physical systems," Int. J. Crit. Infrastruct. Protect., vol. 45, p. 100674, 2024.

    [17] A. Ramachandran, K. Gayathri, A. Alkhayyat, and R. Q. Malik, "Aquila optimization with machine learning-based anomaly detection technique in cyber-physical systems," Comput. Syst. Sci. Eng., vol. 46, no. 2, 2023.

    [18] R. Divya, S. Umamaheswari, and A. A. Stonier, "Machine learning-based smart intrusion and fault identification (SIFI) in inverter-based cyber-physical microgrids," Expert Syst. Appl., vol. 238, p. 122291, 2024.

    [19] L. R. Ramadhan and Y. A. Mudya, "A comparative study of Z-score and Min-Max normalization for rainfall classification in Pekanbaru," J. Data Sci., vol. 2024, no. 04, pp. 1–8, 2024.

    [20] Q. Hai, L. Zhang, G. Li, M. Khayatnezhad, and S. Abdolhosseinzadeh, "Water resource management using remote sensing and coyote optimization algorithms," Irrig. Drain., vol. 73, no. 3, pp. 1010–1029, 2024.

    [21] Z. Ji, W. Tao, and J. Ren, "Boiler furnace temperature and oxygen content prediction based on hybrid CNN, biLSTM, and SE-Net models," Appl. Intell., vol. 54, no. 17, pp. 8241–8261, 2024.

    [22] M. A. Elseify et al., "Boosting prairie dog optimizer for optimal planning of multiple wind turbine and photovoltaic distributed generators in distribution networks considering different dynamic load models," Sci. Rep., vol. 14, no. 1, pp. 1–33, 2024.

    [23] [Online]. Available: https://www.kaggle.com/datasets/hassan06/nslkdd

    [24] I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, "Toward generating a new intrusion detection dataset and intrusion traffic characterization," in Proc. Int. Conf. Inf. Syst. Secur. Privacy, Funchal, Portugal, 2018, pp. 108–116.

    [25] B. A. Alqaralleh, F. Aldhaban, E. A. AlQaralleh, and A. H. Al-Omari, "Optimal machine learning enabled intrusion detection in cyber-physical system environment," Comput. Mater. Continua, vol. 72, no. 3, pp. 4691–4707, 2022.

    Cite This Article As :
    Atiahallah, Nouf. Leveraging Digital Twins with Hybrid Deep Learning Model for Robust Intrusion Detection System in Smart City Environment. Fusion: Practice and Applications, vol. , no. , 2025, pp. 201-221. DOI: https://doi.org/10.54216/FPA.190116
    Atiahallah, N. (2025). Leveraging Digital Twins with Hybrid Deep Learning Model for Robust Intrusion Detection System in Smart City Environment. Fusion: Practice and Applications, (), 201-221. DOI: https://doi.org/10.54216/FPA.190116
    Atiahallah, Nouf. Leveraging Digital Twins with Hybrid Deep Learning Model for Robust Intrusion Detection System in Smart City Environment. Fusion: Practice and Applications , no. (2025): 201-221. DOI: https://doi.org/10.54216/FPA.190116
    Atiahallah, N. (2025) . Leveraging Digital Twins with Hybrid Deep Learning Model for Robust Intrusion Detection System in Smart City Environment. Fusion: Practice and Applications , () , 201-221 . DOI: https://doi.org/10.54216/FPA.190116
    Atiahallah N. [2025]. Leveraging Digital Twins with Hybrid Deep Learning Model for Robust Intrusion Detection System in Smart City Environment. Fusion: Practice and Applications. (): 201-221. DOI: https://doi.org/10.54216/FPA.190116
    Atiahallah, N. "Leveraging Digital Twins with Hybrid Deep Learning Model for Robust Intrusion Detection System in Smart City Environment," Fusion: Practice and Applications, vol. , no. , pp. 201-221, 2025. DOI: https://doi.org/10.54216/FPA.190116