Siyang Zhou , Wenjiang Ji , Xinhong Hei , Zhongwei Chang , Yuan Qiu , Lei Zhu , Xin Wang
{"title":"SPR: Malicious traffic detection model for CTCS-3 in railways","authors":"Siyang Zhou , Wenjiang Ji , Xinhong Hei , Zhongwei Chang , Yuan Qiu , Lei Zhu , Xin Wang","doi":"10.1016/j.hspr.2025.04.001","DOIUrl":null,"url":null,"abstract":"<div><div>The increasingly complex and interconnected train control information network is vulnerable to a variety of malicious traffic attacks, and the existing malicious traffic detection methods mainly rely on machine learning, such as poor robustness, weak generalization, and a lack of ability to learn common features. Therefore, this paper proposes a malicious traffic identification method based on stacked sparse denoising autoencoders combined with a regularized extreme learning machine through particle swarm optimization. Firstly, the simulation environment of the Chinese train control system-3, was constructed for data acquisition. Then Pearson coefficient and other methods are used for pre-processing, then a stacked sparse denoising autoencoder is used to achieve nonlinear dimensionality reduction of features, and finally regularization extreme learning machine optimized by particle swarm optimization is used to achieve classification. Experimental data show that the proposed method has good training performance, with an average accuracy of 97.57 % and a false negative rate of 2.43 %, which is better than other alternative methods. In addition, ablation experiments were performed to evaluate the contribution of each component, and the results showed that the combination of methods was superior to individual methods. To further evaluate the generalization ability of the model in different scenarios, publicly available data sets of industrial control system networks were used. The results show that the model has robust detection capability in various types of network attacks.</div></div>","PeriodicalId":100607,"journal":{"name":"High-speed Railway","volume":"3 2","pages":"Pages 105-115"},"PeriodicalIF":0.0000,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"High-speed Railway","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2949867825000194","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The increasingly complex and interconnected train control information network is vulnerable to a variety of malicious traffic attacks, and the existing malicious traffic detection methods mainly rely on machine learning, such as poor robustness, weak generalization, and a lack of ability to learn common features. Therefore, this paper proposes a malicious traffic identification method based on stacked sparse denoising autoencoders combined with a regularized extreme learning machine through particle swarm optimization. Firstly, the simulation environment of the Chinese train control system-3, was constructed for data acquisition. Then Pearson coefficient and other methods are used for pre-processing, then a stacked sparse denoising autoencoder is used to achieve nonlinear dimensionality reduction of features, and finally regularization extreme learning machine optimized by particle swarm optimization is used to achieve classification. Experimental data show that the proposed method has good training performance, with an average accuracy of 97.57 % and a false negative rate of 2.43 %, which is better than other alternative methods. In addition, ablation experiments were performed to evaluate the contribution of each component, and the results showed that the combination of methods was superior to individual methods. To further evaluate the generalization ability of the model in different scenarios, publicly available data sets of industrial control system networks were used. The results show that the model has robust detection capability in various types of network attacks.