Full text

Turn on search term navigation

© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.

Abstract

Supervisory control and data acquisition (SCADA) systems are vulnerable to cyberattacks; hence, cybersecurity is a major concern. Hybrid methodologies using advanced machine learning (ML) may increase intrusion detection and system security. The intrusion detection algorithms have little adaptability, high false-positive rates for novel threats, and restricted feature extraction. SCADA systems are subject to sophisticated attacks. This study’s hybrid autoencoder-hybrid ResNet–long short-term memory (LSTM) (HAE–HRL) architecture includes deep feature extraction, anomaly detection, and sequential analysis. This framework uses these three methods to improve threat detection. AI can scan massive amounts of data and find patterns humans and traditional systems miss. The hybrid approach gives defenders an unequal edge. Autoencoders identify anomalies, convolutional neural networks (CNNs) extract features, and hybrid ResNet–LSTM learns temporal patterns. Cyber risks are correctly classified using this method. With SCADA security and intrusion detection, the model may considerably enhance network abnormality and hostile activity detection. According to experimental tests, HAE–HRL reduces false positives and improves detection accuracy, making it a robust cybersecurity solution.

Details

Title
Hybrid Cybersecurity for Asymmetric Threats: Intrusion Detection and SCADA System Protection Innovations
Author
Almalawi Abdulmohsen 1   VIAFID ORCID Logo  ; Hassan Shabbir 2   VIAFID ORCID Logo  ; Adil, Fahad 3 ; Iqbal Arshad 4 ; Khan, Asif Irshad 2   VIAFID ORCID Logo 

 Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia; [email protected] 
 Department of Computer Science, Aligarh Muslim University, Aligarh 202002, Uttar Pradesh, India; [email protected] 
 Department of Computer Science, College of Computer Science & Information Technology, Al Baha University, Al Baha 65527, Saudi Arabia; [email protected] 
 K. A. Nizami Centre for Quranic Studies, Aligarh Muslim University, Aligarh 202002, Uttar Pradesh, India; [email protected] 
First page
616
Publication year
2025
Publication date
2025
Publisher
MDPI AG
e-ISSN
20738994
Source type
Scholarly Journal
Language of publication
English
ProQuest document ID
3194646786
Copyright
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.