{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T09:57:33Z","timestamp":1772791053865,"version":"3.50.1"},"reference-count":42,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2023,1,19]],"date-time":"2023-01-19T00:00:00Z","timestamp":1674086400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172249"],"award-info":[{"award-number":["62172249"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["ZR2019MF014"],"award-info":[{"award-number":["ZR2019MF014"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["93K172022K01"],"award-info":[{"award-number":["93K172022K01"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["62172249"],"award-info":[{"award-number":["62172249"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2019MF014"],"award-info":[{"award-number":["ZR2019MF014"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["93K172022K01"],"award-info":[{"award-number":["93K172022K01"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Fundamental Research Funds for the Central Universities, JLU","award":["62172249"],"award-info":[{"award-number":["62172249"]}]},{"name":"Fundamental Research Funds for the Central Universities, JLU","award":["ZR2019MF014"],"award-info":[{"award-number":["ZR2019MF014"]}]},{"name":"Fundamental Research Funds for the Central Universities, JLU","award":["93K172022K01"],"award-info":[{"award-number":["93K172022K01"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Industrial Cyber-Physical Systems (ICPS) connect intelligent manufacturing equipment equipped with sensors, wireless and RFID communication technologies through data interaction, which makes the interior of the factory, even between factories, become a whole. However, intelligent factories will suffer information leakage and equipment damage when being attacked by ICPS intrusion. Therefore, the network security of ICPS cannot be ignored, and researchers have conducted in-depth research on network intrusion detection for ICPS. Though machine learning and deep learning methods are often used for network intrusion detection, the problem of data imbalance can cause the model to pay attention to the misclassification cost of the prevalent class, but ignore that of the rare class, which seriously affects the classification performance of network intrusion detection models. Considering the powerful generative power of the diffusion model, we propose an ICPS Intrusion Detection system based on the Diffusion model (IDD). Firstly, data corresponding to the rare class is generated by the diffusion model, which makes the training dataset of different classes balanced. Then, the improved BiLSTM classification network is trained on the balanced training set. Extensive experiments are conducted to show that the IDD method outperforms the existing baseline method on several available datasets.<\/jats:p>","DOI":"10.3390\/s23031141","type":"journal-article","created":{"date-parts":[[2023,1,19]],"date-time":"2023-01-19T03:45:16Z","timestamp":1674099916000},"page":"1141","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["A Diffusion Model Based on Network Intrusion Detection Method for Industrial Cyber-Physical Systems"],"prefix":"10.3390","volume":"23","author":[{"given":"Bin","family":"Tang","sequence":"first","affiliation":[{"name":"Qingdao Innovation and Development Base, Harbin Engineering University, Qingdao 266000, China"},{"name":"Ship Science and Technology Co., Ltd., Harbin Engineering University, Qingdao 266000, China"}]},{"given":"Yan","family":"Lu","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Qingdao University of Science and Technology, Qingdao 266000, China"}]},{"given":"Qi","family":"Li","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Qingdao University of Science and Technology, Qingdao 266000, China"}]},{"given":"Yueying","family":"Bai","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Qingdao University of Science and Technology, Qingdao 266000, China"}]},{"given":"Jie","family":"Yu","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Qingdao University of Science and Technology, Qingdao 266000, China"}]},{"given":"Xu","family":"Yu","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Qingdao University of Science and Technology, Qingdao 266000, China"},{"name":"Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education, Jilin University, Changchun 130000, China"}]}],"member":"1968","published-online":{"date-parts":[[2023,1,19]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","article-title":"Anomaly-based network intrusion detection: Techniques, systems and challenges","volume":"28","author":"Vazquez","year":"2009","journal-title":"Comput. Secur."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"708","DOI":"10.1016\/j.procs.2015.08.220","article-title":"Survey on Anomaly Detection using Data Mining Techniques","volume":"60","author":"Agrawal","year":"2015","journal-title":"Procedia Comput. Sci."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1109\/SURV.2013.050113.00191","article-title":"A Survey of Intrusion Detection Systems in Wireless Sensor Networks","volume":"16","author":"Butun","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_4","unstructured":"Hodo, E., Bellekens, X., Hamilton, A., Tachtatzis, C., and Atkinson, R. (2017). Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey. arXiv."},{"key":"ref_5","unstructured":"Aminanto, M.E., and Kim, K. (2017, January 24\u201326). Improving Detection of Wi-Fi Impersonation by Fully Unsupervised Deep Learning. Proceedings of the 18th International Conference on Information Security Applications, Jeju Island, Republic of Korea."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1016\/j.knosys.2018.05.037","article-title":"An empirical comparison on state-of-the-art multi-class imbalance learning algorithms and a new diversified ensemble learning scheme","volume":"158","author":"Bi","year":"2018","journal-title":"Knowl. Based Syst."},{"key":"ref_7","unstructured":"Vartouni, A.M., Kashi, S.S., and Teshnehlab, M. (March, January 28). An anomaly detection method to detect web attacks using Stacked Auto-Encoder. Proceedings of the 6th Iranian Joint Congress on Fuzzy and Intelligent Systems, Kerman, Iran."},{"key":"ref_8","unstructured":"Ni, G., Ling, G., Gao, Q., and Hai, W. (2014, January 20\u201322). An Intrusion Detection Model Based on Deep Belief Networks. Proceedings of the Second International Conference on Advanced Cloud & Big Data, Huangshan, China."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Abolhasanzadeh, B. (2015, January 26\u201328). Nonlinear dimensionality reduction for intrusion detection using auto-encoder bottleneck features. Proceedings of the 7th Conference on Information and Knowledge Technology, Urmia, Iran.","DOI":"10.1109\/IKT.2015.7288799"},{"key":"ref_10","unstructured":"Javaid, A.Y., Niyaz, Q., Sun, W., and Alam, M. (, January 3\u20135). A Deep Learning Approach for Network Intrusion Detection System. Proceedings of the 9th EAI International Conference on Bio-Inspired Information and Communications Technologies, New York, NY, USA."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Alom, M.Z., and Taha, T.M. (2017, January 27\u201330). Network Intrusion Detection for Cyber Security using Unsupervised Deep Learning Approaches. Proceedings of the National Aerospace & Electronics Conference, Dayton, OH, USA.","DOI":"10.1109\/NAECON.2017.8268746"},{"key":"ref_12","first-page":"6840","article-title":"Denoising Diffusion Probabilistic Models","volume":"33","author":"Ho","year":"2020","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/MCOM.2002.1039860","article-title":"Network intrusion and fault detection: A statistical anomaly approach","volume":"40","author":"Manikopoulos","year":"2002","journal-title":"IEEE Commun. Mag."},{"key":"ref_14","unstructured":"Caberera, J., Ravichandran, B., and Mehra, R.K. (September, January 29). Statistical traffic modeling for network intrusion detection. Proceedings of the Analysis and Simulation of Computer and Telecommunication Systems, San Francisco, CA, USA."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Stein, G., Bing, C., Wu, A.S., and Hua, K.A. (2005, January 18\u201320). Decision tree classifier for network intrusion detection with GA-based feature selection. Proceedings of the Southeast Regional Conference, Kennesaw, GA, USA.","DOI":"10.1145\/1167253.1167288"},{"key":"ref_16","first-page":"231","article-title":"Selection of Candidate Support Vectors in incremental SVM for network intrusion detection","volume":"45","author":"Chitrakar","year":"2014","journal-title":"Telecom Power Technol."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Sommer, R., and Paxson, V. (2010, January 8\u20139). Outside the Closed World: On Using Machine Learning for Network Intrusion Detection. Proceedings of the 31th IEEE Symposium on Security and Privacy, Istanbul, Turkey.","DOI":"10.1109\/SP.2010.25"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"677","DOI":"10.15837\/ijccc.2017.5.2972","article-title":"A new deep learning approach for anomaly base IDS using memetic classifier","volume":"12","author":"Mohammadi","year":"2017","journal-title":"Int. J. Comput. Commun. Control"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"117671","DOI":"10.1016\/j.eswa.2022.117671","article-title":"A Lightweight Approach for Network Intrusion Detection in Industrial Cyber-Physical Systems Based on Knowledge Distillation and Deep Metric Learning","volume":"206","author":"Wang","year":"2022","journal-title":"Expert Syst. Appl."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1185","DOI":"10.1007\/s00521-010-0487-0","article-title":"Intrusion detection using reduced-size RNN based on feature grouping","volume":"21","author":"Sheikhan","year":"2012","journal-title":"Neural Comput. Appl."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Kim, J., Kim, J., Thu, H.L.T., and Kim, H. (2016, January 15\u201317). Long short term memory recurrent neural network classifier for intrusion detection. Proceedings of the 2016 International Conference on Platform Technology and Service, Jeju, Republic of Korea.","DOI":"10.1109\/PlatCon.2016.7456805"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"115524","DOI":"10.1016\/j.eswa.2021.115524","article-title":"A bidirectional LSTM deep learning approach for intrusion detection","volume":"185","author":"Imrana","year":"2021","journal-title":"Expert Syst. Appl."},{"key":"ref_23","unstructured":"Batzolis, G., Stanczuk, J., Sch\u00f6nlieb, C.B., and Etmann, C. (2021). Conditional image generation with score-based diffusion models. arXiv."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.J., Li, K., and Fei-Fei, L. (2009, January 20\u201325). Imagenet: A large-scale hierarchical image database. Proceedings of the 2009 IEEE Conference on Computer Vision and Pattern Recognition, Miami, FL, USA.","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Esser, P., Rombach, R., and Ommer, B. (2021, January 20\u201325). Taming transformers for high-resolution image synthesis. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Nashville, TN, USA.","DOI":"10.1109\/CVPR46437.2021.01268"},{"key":"ref_26","first-page":"17981","article-title":"Structured denoising diffusion models in discrete state-spaces","volume":"34","author":"Austin","year":"2021","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref_27","unstructured":"Park, S.W., Lee, K., and Kwon, J. (2022, January 25\u201329). Neural Markov Controlled SDE: Stochastic Optimization for Continuous-Time Data. Proceedings of the 10th International Conference on Learning Representations, Online."},{"key":"ref_28","first-page":"24804","article-title":"CSDI: Conditional score-based diffusion models for probabilistic time series imputation","volume":"34","author":"Tashiro","year":"2021","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref_29","first-page":"37","article-title":"Long short-term memory","volume":"385","author":"Graves","year":"2012","journal-title":"Supervised Seq. Label. Recurr. Neural Netw."},{"key":"ref_30","unstructured":"Zhu, X., Sobihani, P., and Guo, H. (2015, January 9\u201311). Long short-term memory over recursive structures. Proceedings of the International Conference on Machine Learning, Miami, FL, USA."},{"key":"ref_31","unstructured":"Wan, L., Zeiler, M., Zhang, S., Le Cun, Y., and Fergus, R. (2013, January 16\u201321). Regularization of neural networks using dropconnect. Proceedings of the International Conference on Machine Learning, Atlanta, GA, USA."},{"key":"ref_32","unstructured":"Hinton, G.E., Srivastava, N., Krizhevsky, A., Sutskever, I., and Salakhutdinov, R.R. (2012). Improving neural networks by preventing co-adaptation of feature detectors. arXiv."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Jeatrakul, P., Wong, K.W., and Fung, C.C. (2010, January 22\u201325). Classification of imbalanced data by combining the complementary neural network and SMOTE algorithm. Proceedings of the International Conference on Neural Information Processing, Sydney, Australia.","DOI":"10.1007\/978-3-642-17534-3_19"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1145\/3422622","article-title":"Generative adversarial networks","volume":"63","author":"Goodfellow","year":"2020","journal-title":"Commun. ACM"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Anani, W., and Samarabandu, J. (2018, January 13\u201316). Comparison of recurrent neural network algorithms for intrusion detection based on predicting packet sequences. Proceedings of the 2018 IEEE Canadian Conference on Electrical & Computer Engineering, Quebec, QC, Canada.","DOI":"10.1109\/CCECE.2018.8447793"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Farahnakian, F., and Heikkonen, J. (2018, January 11\u201314). A deep auto-encoder based approach for intrusion detection system. Proceedings of the 20th International Conference on Advanced Communication Technology, Chuncheon, Republic of Korea.","DOI":"10.23919\/ICACT.2018.8323688"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Alom, M.Z., Bontupalli, V., and Taha, T.M. (2015, January 15\u201319). Intrusion detection using deep belief networks. Proceedings of the 2015 National Aerospace and Electronics Conference, Dayton, OH, USA.","DOI":"10.1109\/NAECON.2015.7443094"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., and Ghorbani, A.A. (2009, January 8\u201310). A detailed analysis of the KDD CUP 99 data set. Proceedings of the IEEE International Conference on Computational Intelligence for Security & Defense Applications, Ottawa, IL, USA.","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Moustafa, N., and Slay, J. (2015, January 18\u201319). UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). Proceedings of the Military Communications and Information Systems Conference, Cracow, Poland.","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Mao, X., Li, Q., Xie, H., Lau, R.Y., Wang, Z., and Paul Smolley, S. (2017, January 22\u201329). Least squares generative adversarial networks. Proceedings of the International Conference on Computer Vision, Venice, Italy.","DOI":"10.1109\/ICCV.2017.304"},{"key":"ref_41","unstructured":"Huang, H., Li, Z., He, R., Sun, Z., and Tan, T. (2018, January 3\u20138). Introvae: Introspective variational autoencoders for photographic image synthesis. Proceedings of the 32nd Conference on Neural Information Processing Systems (NeurIPS 2018), Montr\u00e9al, QC, Canada."},{"key":"ref_42","unstructured":"Yang, L., Zhang, Z., Song, Y., Hong, S., Xu, R., Zhao, Y., Shao, Y., Zhang, W., Cui, B., and Yang, M.H. (2022). Diffusion models: A comprehensive survey of methods and applications. arXiv."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/3\/1141\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T18:10:09Z","timestamp":1760119809000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/3\/1141"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,19]]},"references-count":42,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2023,2]]}},"alternative-id":["s23031141"],"URL":"https:\/\/doi.org\/10.3390\/s23031141","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,19]]}}}