AI-Driven Hybrid Defense Mechanisms for Enhancing Cybersecurity in Cyber-Physical Systems Through Packet Sniffing and Cyber Ranges

Authors

  • Deepa Singh Sisodiya Department of Computer Science and Engineering, IIIT-Pune, India Author
  • Ritu Tiwari Department of Computer Science and Engineering, IIIT-Pune, India Author
  • Priyank Jain Department of Computer Science and Engineering, IIIT-Pune, India Author

DOI:

https://doi.org/10.56294/dm20261329

Keywords:

Cyber-Physical Systems , Intrusion Detection , Hybrid CNN–LSTM , Attention Mechanism, Packet Sniffing , Real-Time Detection

Abstract

Introduction: Cyber-Physical Systems are the backbone of modern critical infrastructures but remain inherently vulnerable to cyberattacks due to their interconnected nature. This calls for more adaptive and intelligent intrusion detection solutions, as existing approaches often fall short in capturing the spatial-temporal complexity of CPS traffic.
Methods: This work proposes a hybrid deep learning framework based on the integration of CNN and LSTM networks with an attention mechanism. The system exploits real-time packet sniffing for fine-grained traffic analysis and the use of cyber range simulations to evaluate its performance in different attack conditions. A structured preprocessing pipeline, covering normalization, time windowing, and controlled data augmentation, ensures high-quality feature extraction while maintaining spatial and temporal patterns.
Results: The proposed model outperforms standalone CNN and LSTM architectures on a balanced multi-class CPS dataset with 99,08 % accuracy and very high precision, recall, and F1-scores across all attack types. Attention significantly enhances sensitivity by picking up important temporal features and provides better interpretability via packet-level relevance mapping. The model maintains an extremely low false-positive rate, further supporting its suitability for real-world deployment.
Conclusions: These results position the hybrid CNN-LSTM-Attention architecture, combined with packet sniffing, as a robust and adaptive intrusion detection for CPS environments. Strong performance with low error rates accordingly underlines the potential to mitigate emerging threats. Future work will extend the evaluation to diverse datasets and will benchmark the system against state-of-the-art detection models in order to further validate generalizability.

References

1. Czekster RM, Metere R, Morisset C. Incorporating Cyber Threat Intelligence into Complex Cyber-Physical Systems: A STIX Model for Active Buildings. Appl Sci. 2022;12(10). DOI: https://doi.org/10.3390/app12105005

2. Smadi AA, Ajao BT, Johnson BK, Lei H, Chakhchoukh Y, Al-Haija QA. A comprehensive survey on cyber-physical smart grid testbed architectures: Requirements and challenges. Electron. 2021;10(9):1–25. DOI: https://doi.org/10.3390/electronics10091043

3. Thakur P, Kansal V, Rishiwal V. Hybrid Deep Learning Approach Based on LSTM and CNN for Malware Detection. Wirel Pers Commun. 2024;136(3):1879–901. DOI: https://doi.org/10.1007/s11277-024-11366-y

4. Zhang J, Pan L, Han QL, Chen C, Wen S, Xiang Y. Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey. IEEE/CAA J Autom Sin. 2022;9(3):377–91. DOI: https://doi.org/10.1109/JAS.2021.1004261

5. Markevych M, Dawson M. A Review of Enhancing Intrusion Detection Systems for Cybersecurity Using Artificial Intelligence (AI). Int Conf KNOWLEDGE-BASED Organ. 2023;29(3):30–7. DOI: https://doi.org/10.2478/kbo-2023-0072

6. Medjek F, Tandjaoui D, Djedjig N, Romdhani I. Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things. Int J Crit Infrastruct Prot. 2021;34:100436. DOI: https://doi.org/10.1016/j.ijcip.2021.100436

7. Alsuwian T, Shahid Butt A, Amin AA. Smart Grid Cyber Security Enhancement: Challenges and Solutions—A Review. Sustain. 2022;14(21):1–21. DOI: https://doi.org/10.3390/su142114226

8. Kim S, Park KJ. A survey on machine-learning based security design for cyber-physical systems. Appl Sci. 2021;11(12). DOI: https://doi.org/10.3390/app11125458

9. Pimple J, Sharma A. Enhancing Cybersecurity in Medical Cyber-Physical Systems Using Blockchain and Deep Learning. In: 2025 IEEE International Students’ Conference on Electrical, Electronics and Computer Science (SCEECS). 2025. p. 1–6. DOI: https://doi.org/10.1109/SCEECS64059.2025.10941630

10. Kabir S, Hannan N, Shufian A, Rahman Zishan MS. Proactive detection of cyber-physical grid attacks: A pre-attack phase identification and analysis using anomaly-based machine learning models. Array. 2025;27:100441. DOI: https://doi.org/10.1016/j.array.2025.100441

11. Li J, Yang Y, Sun JS, Tomsovic K, Qi H. ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems. In: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security. New York, NY, USA: Association for Computing Machinery; 2021. p. 52–66. (ASIA CCS ’21). DOI: https://doi.org/10.1145/3433210.3437513

12. Zhang D, Wang QG, Feng G, Shi Y, Vasilakos A V. A survey on attack detection, estimation and control of industrial cyber–physical systems. ISA Trans. 2021;116:1–16. DOI: https://doi.org/10.1016/j.isatra.2021.01.036

13. Bhutani M, Dalal S, Alhussein M, Lilhore UK, Aurangzeb K, Hussain A. SAD-GAN: A Novel Secure Anomaly Detection Framework for Enhancing the Resilience of Cyber-Physical Systems. Cognit Comput. 2025;17(4):127. DOI: https://doi.org/10.1007/s12559-025-10483-5

14. Kamble D, Rathod S, Bhelande M, Shah A, Sapkal P. Original Research Article Correlating forensic data for enhanced network crime investigations: Techniques for packet sniffing, network forensics, and attack detection. J Auton Intell. 2024;7(4). DOI: https://doi.org/10.32629/jai.v7i4.1272

15. Grossi M, Alfonsi F, Prandini M, Gabrielli A. A Highly Configurable Packet Sniffer Based on Field-Programmable Gate Arrays for Network Security Applications. Vol. 12, Electronics. 2023. DOI: https://doi.org/10.3390/electronics12214412

16. Kibriya H, Masood M, Nawaz M, Rafique R, Rehman S. Multiclass brain tumor classification using convolutional neural network and support vector machine. In: 2021 Mohammad Ali Jinnah University international conference on computing (MAJICC). IEEE; 2021. p. 1–4. DOI: https://doi.org/10.1109/MAJICC53071.2021.9526262

17. Nguyen TT, Nguyen QVH, Nguyen DT, Nguyen DT, Huynh-The T, Nahavandi S, et al. Deep learning for deepfakes creation and detection: A survey. Comput Vis Image Underst. 2022;223:103525. DOI: https://doi.org/10.1016/j.cviu.2022.103525

18. Alnajjar M. Image-based detection using deep learning and Google Colab. 2021;

19. Koonce B, Koonce BE. Convolutional neural networks with swift for tensorflow: Image recognition and dataset categorization. Springer; 2021. DOI: https://doi.org/10.1007/978-1-4842-6168-2

20. Hua Y, Zhao Z, Li R, Chen X, Liu Z, Zhang H. Deep Learning with Long Short-Term Memory for Time Series Prediction. IEEE Commun Mag. 2019;57(6):114–9. DOI: https://doi.org/10.1109/MCOM.2019.1800155

21. Smagulova K, James AP. A survey on LSTM memristive neural network architectures and applications. Eur Phys J Spec Top. 2019;228(10):2313–24. DOI: https://doi.org/10.1140/epjst/e2019-900046-x

22. Fang Z, Crimier N, Scanu L, Midelet A, Alyafi A, Delinchant B. Multi-zone indoor temperature prediction with LSTM-based sequence to sequence model. Energy Build. 2021;245:111053. DOI: https://doi.org/10.1016/j.enbuild.2021.111053

23. Nayak SS. Packet Sniffing. Int J Eng Manag Res Peer Rev Ref J e. 2024;14(1):71–6.

24. Sabeel A, Rajeev S., H.S C. with tips on how to get the Network Interface. Internetworking Res Exp. 2003;(December 2002):17–9. DOI: https://doi.org/10.1016/S1353-4858(02)00312-4

25. Asrodia P, Sharma V. Network Monitoring and Analysis by Packet Sniffing Method. 2013;4(May):2133–5.

26. Ibrahim Diyeb IA, Saif A, Al-Shaibany NA. Ethical Network Surveillance using Packet Sniffing Tools: A Comparative Study. Int J Comput Netw Inf Secur. 2018;10(7):12–22. DOI: https://doi.org/10.5815/ijcnis.2018.07.02

27. Mohiuddin K, Welke P, Alam MA, Martin M, Alam MM, Lehmann J, et al. Retention Is All You Need. Int Conf Inf Knowl Manag Proc. 2023;(Nips):4752–8. DOI: https://doi.org/10.1145/3583780.3615497

28. Niño-Adan I, Landa-Torres I, Portillo E, Manjarres D. Influence of statistical feature normalisation methods on K-Nearest Neighbours and K-Means in the context of industry 4.0. Eng Appl Artif Intell. 2022;111:104807. DOI: https://doi.org/10.1016/j.engappai.2022.104807

29. Rodríguez P, Bautista MA, Gonzàlez J, Escalera S. Beyond one-hot encoding: Lower dimensional target embedding. Image Vis Comput. 2018;75:21–31. DOI: https://doi.org/10.1016/j.imavis.2018.04.004

30. Yang GW, Jing HF. Multiple Convolutional Neural Network for Feature Extraction BT - Intelligent Computing Theories and Methodologies. In: Huang DS, Jo KH, Hussain A, editors. Cham: Springer International Publishing; 2015. p. 104–14. DOI: https://doi.org/10.1007/978-3-319-22186-1_10

31. Hefron RG, Borghetti BJ, Christensen JC, Kabban CMS. Deep long short-term memory structures model temporal dependencies improving cognitive workload estimation. Pattern Recognit Lett. 2017;94:96–104. DOI: https://doi.org/10.1016/j.patrec.2017.05.020

32. Soydaner D. Attention mechanism in neural networks: where it comes and where it goes. Neural Comput Appl. 2022;34(16):13371–85. DOI: https://doi.org/10.1007/s00521-022-07366-3

33. Wardhani NWS, Rochayani MY, Iriany A, Sulistyono AD, Lestantyo P. Cross-validation Metrics for Evaluating Classification Performance on Imbalanced Data. 2019 Int Conf Comput Control Informatics its Appl Emerg Trends Big Data Artif Intell IC3INA 2019. 2019;14–8. DOI: https://doi.org/10.1109/IC3INA48034.2019.8949568

Downloads

Published

2026-01-01

Issue

Section

Original

How to Cite

1.
Sisodiya DS, Tiwari R, Jain P. AI-Driven Hybrid Defense Mechanisms for Enhancing Cybersecurity in Cyber-Physical Systems Through Packet Sniffing and Cyber Ranges. Data and Metadata [Internet]. 2026 Jan. 1 [cited 2026 Jan. 14];5:1329. Available from: https://dm.ageditor.ar/index.php/dm/article/view/1329