Cyber Hacking Breaches Prediction Using Machine Learning Techniques

Authors

  • B R Eswari Author
  • V Saritha Author

Keywords:

Cyber Hacking, Machine Learning, breach, deception attack

Abstract

Cyber-physical systems have achieved important advancements in various active tenders, thanks to the seamless addition of physical methods, computational properties, and communication skills. These systems are vulnerable to cyberattacks, which pose a major threat. Unlike accidental faults, cyber-attacks are intelligent and stealthy, and can compromise the system's integrity. Deception attacks, in particular, inject false data from sensors or controllers, corrupt data, or introduce misinformation into the system. If left undetected, these attacks can disrupt or disable system performance. Therefore, it is crucial to develop algorithms that can identify and detect these attacks. Given the vast amount of diverse data generated by these systems at high speed, machine learning algorithms are essential for facilitating data analysis, evaluation, and identifying hidden patterns.

References

[1] Li, J., Wen, C., Liu, L., & Zhu, Z. (2022). "Real-time detection of deception attacks in cyber-physical systems." International Journal of Information Security. Available at: [Springer Link] (https://link.springer.com/article/10.1007/s10207-022-00616-9).

[2] Zhang, Y., Xu, G., & Wang, Z. (2021). ""Swift Identification of Deception Attacks in Cyber-Physical Systems: An Examination (Journal of Information Security and Applications, Vol.59,Article 10285)”.

(https://www.sciencedirect.com/science/article/pii/S0167404821001597).

[3] Han, Q., et al. (2021). "Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey." IEEE Journal of Automatic Sinica, 8(1), 13-31. Available at: [IEEE Explore] (https://ieeexplore.ieee.org/document/9154210).

[4] He, Z., & Hu, Q. (2021). "Security analysis for Cyber-Physical Systems against stealthy deception attacks." IEEE Transactions on Industrial Informatics. 1940-1952. Available at: [IEEE Explore] (https://ieeexplore.ieee.org/document/9154207).

[5] Wang, Y., & Liu, Y. (2021). Stealthy Deception Attacks Targeting Cyber-Physical Systems:An Examination Available at: [IEEE Xplore] (https://ieeexplore.ieee.org/document/9154211).

[6] In 2021, Kim and Lee published a research paper titled "Dynamic-Memory Event-Based Asynchronous Attack Detection Filtering for CPS" in the IEEE Transactions on Cybernetics, volume 51, issue 6, pages 2954-2965. This study is accessible online through IEEE Explore (https://ieeexplore.ieee.org/document/9154212).

[7] X. Zhao and Q. Wang's 2021 research paper, "Optimal Attack Strategies Subject to Detection Constraints against CPS," published in IEEE Transactions on Information Forensics and Security (vol.16,pp.2305-2317),is via IEEE Explore (https://ieeexplore.ieee.org/document/9154213).

[8] Mohammed, Z., 2018. NITDA Experts sound the alarm on looming cyber threats to banking institutions, warning of potential attacks. Govt Agencies, Others Retrieved from. https://www.nigerianews.net/nitdaraisesalarm-potentialcyber-attacks-banks-govtagencies/.

[9] Sun, N., Zhang, J., Rimba, P., Gao, S. Zhang, L. Y., & Xiang, Y (2018). Data driven cyber security incident prediction: A survey. IEEE communications surveys &tutorials, 21(2), 1744-1772.

[10] G. Wang, J. Hao, and L. Huang's 2010 research paper, "A New Approach to Intrusion Detection Using Artificial Neural Networks and Fuzzy Clustering" (Vol. 37, Issue 9, September 2010, pages 6225-6232), presented a novel approach to intrusion detection using Artificial Neural Networks and fuzzy clustering

Downloads

Published

12-01-2025

How to Cite

Cyber Hacking Breaches Prediction Using Machine Learning Techniques. (2025). GAMANAM: Global Advances in Multidisciplinary Applications in Next-Gen And Modern Technologies, 1(1), 23-31. https://gamanamspmvv.in/index.php/gamanams/article/view/8