single-jc.php

JACIII Vol.29 No.4 pp. 703-710
doi: 10.20965/jaciii.2025.p0703
(2025)

Research Paper:

An Intrusion Detection Model Based on AFSA-SVM for Petroleum Multi-Channel Industrial Control Network Communication

Bo Yang, Yang Xiao, Xinzhang Wang, Zehao Cui, and Cheng Peng

CNOOC Energy Technology & Services-Oil Production Services Co.
5th Boundary Area, Donggu Petroleum New Village, Tanggu, Binhai New Area, Tianjin 300452, China

Corresponding author

Received:
January 11, 2024
Accepted:
February 15, 2025
Published:
July 20, 2025
Keywords:
AFSA-SVM, multi-channel industrial control network, communication intrusion detection, artificial fish shoals, weighted information gain
Abstract

To prevent viruses and zombie programs from affecting the secure communication of oil multi-channel industrial control networks, an intrusion detection model for oil multi-channel industrial control network communication based on AFSA-SVM is studied. Collect the communication status information of the oil multi-channel industrial control network. The communication status features of the oil multi-channel industrial control network are extracted from the collected information by using the foraging, clustering, and tail chasing behaviors of the artificial fish swarm algorithm (AFSA). The weighted information gain method is used to reduce the extracted features, take the reduced features as the input, and use the support vector machine (SVM) to realize the intrusion detection of the oil multi-channel industrial control network communication. The experimental results show that the communication state features extracted from the model are representative; after feature reduction, the weighted error measure of intrusion detection is significantly reduced; under different intrusion intensities, the single intrusion and mixed intrusion detection effects of the model are excellent, and the intrusion destination IP address can be obtained.

Cite this article as:
B. Yang, Y. Xiao, X. Wang, Z. Cui, and C. Peng, “An Intrusion Detection Model Based on AFSA-SVM for Petroleum Multi-Channel Industrial Control Network Communication,” J. Adv. Comput. Intell. Intell. Inform., Vol.29 No.4, pp. 703-710, 2025.
Data files:
References
  1. [1] A. M. Y. Koay, R. K. L. Ko, H. Hettema, and K. Radke, “Machine learning in industrial control system (ICS) security: Current landscape, opportunities and challenges,” J. of Intelligent Information Systems, Vol.60, No.2, pp. 377-405, 2023. https://doi.org/10.1007/s10844-022-00753-1
  2. [2] L. Liang et al., “Task scheduling strategy for industrial control network based on cloud-edge-end fusion framework,” J. of Physics: Conf. Series, Vol.2405, Article No.012016, 2022. https://doi.org/10.1088/1742-6596/2405/1/012016
  3. [3] I.-C. Lin, C.-C. Chang, and Y.-S. Chang, “Data security and preservation mechanisms for industrial control network using IOTA,” Symmetry, Vol.14, No.2, Article No.237, 2022. https://doi.org/10.3390/sym14020237
  4. [4] C. Wang et al., “Dimension reduction technique based on supervised autoencoder for intrusion detection of industrial control systems,” Security and Communication Networks, Vol.2022, Article No.5713074, 2022. https://doi.org/10.1155/2022/5713074
  5. [5] B. Al-Muntaser, M. A. Mohamed, and A. Y. Tuama, “Real-time intrusion detection of insider threats in industrial control system workstations through file integrity monitoring,” Int. J. of Advanced Computer Science and Applications, Vol.14, No.6, 2023. https://doi.org/10.14569/IJACSA.2023.0140636
  6. [6] S. Nagarajan, S. Kayalvizhi, R. Subhashini, and V. Anitha, “Hybrid honey badger-world cup algorithm-based deep learning for malicious intrusion detection in industrial control systems,” Computers & Industrial Engineering, Vol.180, Article No.109166, 2023. https://doi.org/10.1016/j.cie.2023.109166
  7. [7] V. Kourepinis, C. Iliopoulou, I. Tassopoulos, and G. Beligiannis, “An artificial fish swarm optimization algorithm for the urban transit routing problem,” Applied Soft Computing, Vol.155, Article No.111446, 2024. https://doi.org/10.1016/j.asoc.2024.111446
  8. [8] G. Jayanthi and K. Balachander, “Energy management system using artificial fish swarm speed optimized fuzzy controller based on a deep recurrent neural learning classifier,” CT&F – Ciencia, Tecnología & Futuro, Vol.13, No.2, pp. 29-37, 2023. https://doi.org/10.29047/01225383.677
  9. [9] R. Sethuraman et al., “An optimized AdaBoost Multi-class support vector machine for driver behavior monitoring in the advanced driver assistance systems,” Expert Systems with Applications, Vol.212, Article No.118618, 2023. https://doi.org/10.1016/j.eswa.2022.118618
  10. [10] A. Kurani, P. Doshi, A. Vakharia, and M. Shah, “A comprehensive comparative study of artificial neural network (ANN) and support vector machines (SVM) on stock forecasting,” Annals of Data Science, Vol.10, No.1, pp. 183-208, 2023. https://doi.org/10.1007/s40745-021-00344-x
  11. [11] N. S. Bajaj et al., “Application of metaheuristic optimization based support vector machine for milling cutter health monitoring,” Intelligent Systems with Applications, Vol.18, Article No.200196, 2023. https://doi.org/10.1016/j.iswa.2023.200196
  12. [12] L. Zhao, F. Wang, and Y. Bai, “Route planning for autonomous vessels based on improved artificial fish swarm algorithm,” Ships and Offshore Structures, Vol.18, No.6, pp. 897-906, 2023. https://doi.org/10.1080/17445302.2022.2081423
  13. [13] B. Fields, S. Gupta, and M. Sandora, “Information gain as a tool for assessing biosignature missions,” Int. J. of Astrobiology, Vol.22, No.5, pp. 583-607, 2023. https://doi.org/10.1017/S1473550423000150
  14. [14] F. Guo, S. Su, and S. Zhong, “Can investors gain incremental information through online searching? Evidence from China,” Emerging Markets Finance and Trade, Vol.59, No.9, pp. 2994-3010, 2023. https://doi.org/10.1080/1540496X.2023.2190846
  15. [15] D. Gibson, V. Kovanovic, D. Ifenthaler, S. Dexter, and S. Feng, “Learning theories for artificial intelligence promoting learning processes,” British J. of Educational Technology, Vol.54, No.5, pp. 1125-1146, 2023. https://doi.org/10.1111/bjet.13341

*This site is desgined based on HTML5 and CSS3 for modern browsers, e.g. Chrome, Firefox, Safari, Edge, Opera.

Last updated on Jul. 19, 2025