AI-Based Anomaly Detection in Industrial Control and Cyber–Physical Systems: A Data-Type-Oriented Systematic Review
Abstract
1. Introduction
2. Background
2.1. ICS and CPS
2.2. Anomaly Detection by AI
3. Methods
3.1. Research Questions
- RQ1: What security objectives and observation scopes does each data type address across the cyber, physical, policy, and cyber–physical integration layers of ICS/CPS, and how do these collectively form a complementary multilayer defense architecture?
- RQ2: How are the AI models and learning/preprocessing strategies applied to each data type aligned with the domain characteristics of those data, and what performance advantages do they offer?
- RQ3: What structural limitations do current evaluation methodologies exhibit in terms of detecting unknown or zero-day attacks, and how do proposed approaches—such as physics-based constraints, adversarial learning, and simulation-based methods—improve these weaknesses?
- RQ4: When integrating detection results across heterogeneous data types, what design principles should be applied in data collection and modeling to ensure cyber–physical consistency in CPS?
3.2. Eligibility Criteria
- Literature written in English: As English is the predominant language in contemporary medical, scientific, and engineering research, this ensures diversity of the reviewed studies.
- Literature published in peer-reviewed conferences or journals: This ensures a minimum level of quality for the documents analyzed.
- The collected literature must present an anomaly detection technique based on a specific type of dataset.
- The collected literature must address cyber-attack anomaly detection techniques (algorithms) for ICS/CPS environments.
- Studies that propose a methodology but provide no objective evaluation of the proposal.
- Studies that fall outside the scope of this review, such as anomaly detection caused by device faults or physical behaviors rather than cyberattacks.
- Secondary research (e.g., survey papers) rather than primary research on AI-based anomaly detection techniques for ICS/CPS environments.
- Studies conducted solely in general IT network environments that do not consider ICS (Industrial Control Systems) or OT (Operational Technology) characteristics.
3.3. Information Sources
3.4. Search and Study Selection
- All literature identified in the bibliographic databases using the search queries was exported to the reference management software EndNote 21.
- Duplicate records retrieved from different bibliographic databases were removed.
- The identified studies were reviewed based on their titles and abstracts according to the previously defined eligibility criteria.
- To determine which studies should be included in this review, we repeated Steps 2 and 3 and conducted a full-text evaluation of the literature.
3.5. Data Collection Process
3.6. Quality Assessment
- Review topic: The study must present a method for detecting anomalies or attacks from data generated within ICS/CPS environments.
- Contextual information: Sufficient contextual details must be provided to properly interpret the results.
- Data: The study must provide a detailed explanation of how detection is performed using the data employed in the experiments. This is essential for answering RQ1.
- Details: The study must accurately describe the proposed detection method and provide explanations of network traffic data, operational data, simulation data, hybrid data, and other data types, supporting answers to RQ2–RQ4.
- Experimental results: Experimental results play a crucial role in validating the study’s effectiveness.
4. Results of Study Selection
4.1. Search and Study Selection Results
4.2. Study Characteristics
4.3. Network Traffic Data Type
4.3.1. Statistical and Entropy-Based Anomaly Detection
4.3.2. Time-Series Dependency-Based Anomaly Detection
4.3.3. Protocol Feature-Based Detection
4.3.4. Payload Feature-Based Detection
4.3.5. Graph-Structured Feature-Based Detection
4.3.6. Operational Integration Characteristics
4.4. Process Data Type
4.4.1. Prediction-Residual-Based Anomaly Detection Study
4.4.2. Reconstruction-Error-Based Anomaly Detection Studies
4.4.3. Sensor-Correlation-Based Anomaly Detection Studies
4.4.4. Leveraging Operational-Consistency Characteristics Anomaly Studies
4.5. Simulation Data Type
4.6. Hybrid Data Type
4.6.1. Hybrid Data Fusion-Based Anomaly Detection Studies
4.6.2. Ensemble and Decision-Fusion-Based Detection Studies
4.7. Other Data Type
5. Discussion
Research Questions Answers
- RQ1: What security objectives and observation scopes does each data type address across the cyber, physical, policy, and cyber–physical integration layers of ICS/CPS, and how do these collectively form a complementary multilayer defense architecture?
- RQ2: How are the AI models and learning/preprocessing strategies applied to each data type aligned with the domain characteristics of those data, and what performance advantages do they offer?
- RQ3: What structural limitations do current evaluation methodologies exhibit in terms of detecting unknown or zero-day attacks, and how do proposed approaches—such as physics-based constraints, adversarial learning, and simulation-based methods—improve these weaknesses?
- RQ4: When integrating detection results across heterogeneous data types, what design principles should be applied in data collection and modeling to ensure cyber–physical consistency in CPS?
6. Conclusions and Future Research Directions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
| 1D-CNN | One-Dimensional Convolutional Neural Network |
| AE | Autoencoder |
| AFA | Adaptive Factor Analysis |
| ANN | Artificial Neural Network |
| APPNP | Approximate Personalized Propagation of Neural Predictions |
| APT | Advanced Persistent Threat |
| ARF | Adaptive Random Forest |
| ARIMA | Autoregressive Integrated Moving Average |
| ASC | Adaptive Supervisory Control |
| ATT&CK | Adversarial Tactics, Techniques, and Common Knowledge |
| AVTP | Audio Video Transport Protocol |
| AdaBoost | Adaptive Boosting |
| Attn | Attention mechanism |
| BBN | Bayesian Belief Network |
| BECN-AE | Bidirectional Encoder–Context Normalization Autoencoder |
| Bi-GRU | Bidirectional Gated Recurrent Unit |
| BLSTM | Bidirectional Long Short-Term Memory |
| BLS | Broad Learning System |
| BLS-AE | Broad Learning System-based Autoencoder |
| Bloom | Bloom Filter |
| BN | Bayesian Network |
| C&C | Command and Control |
| CAM | Content Addressable Memory |
| CAN | Controller Area Network |
| CANet | Channel/Context Attention Network |
| CMRI | Control Message–Related Intrusion |
| CPPS | Cyber-Physical Production System |
| CPS | Cyber–Physical System |
| CUSUM | Cumulative Sum (change detection) |
| DAE | Denoising Autoencoder |
| DAGMM | Deep Autoencoding Gaussian Mixture Model |
| DBSCAN | Density-Based Spatial Clustering of Applications with Noise |
| Deep RNN | Deep Recurrent Neural Network |
| DDQL | Double Deep Q-Learning (Double Deep Q-Network) |
| DDoS | Distributed Denial of Service |
| DFFNN | Deep Feed-Forward Neural Network |
| DL | Deep Learning |
| DLL | Dynamic Link Library |
| DNN | Deep Neural Network |
| DoS | Denial of Service |
| DT | Decision Tree |
| Ens | Ensemble Model |
| ESR | Event-Sequence Reasoning |
| ExtraTrees | Extremely Randomized Trees |
| FDI | False Data Injection |
| FGSM | Fast Gradient Sign Method |
| FID-GAN | Feature-Importance-Driven Generative Adversarial Network |
| FMI | Functional Model Identification |
| FMRAC | Functional Model Reference Adaptive Control |
| FSM | Finite State Machine |
| GA-mADAM-LSTM | Genetic Algorithm–optimized modified ADAM LSTM |
| GAN | Generative Adversarial Network |
| GB | Gradient Boosting |
| GBDT | Gradient Boosting Decision Tree |
| GARCH | Generalized Autoregressive Conditional Heteroskedasticity |
| GCN | Graph Convolutional Network |
| GCNN | Graph Convolutional Neural Network |
| GNN | Graph Neural Network |
| GRU | Gated Recurrent Unit |
| GTO | Gorilla Troops Optimization |
| HAT | Hoeffding Adaptive Tree |
| HCA | Hierarchical Cluster Analysis |
| HMM | Hidden Markov Model |
| Hetero-SAGEConv | Heterogeneous GraphSAGE Convolution |
| IAT | Inter-Arrival Time |
| ICPS | Industrial Cyber–Physical System |
| ICS | Industrial Control System |
| IDS | Intrusion Detection System |
| IF | Isolation Forest |
| IIoT | Industrial Internet of Things |
| IoT | Internet of Things |
| K-NN | K-Nearest Neighbors |
| KAN | Kolmogorov–Arnold Network |
| KD | Knowledge Distillation |
| K–S | Kolmogorov–Smirnov |
| LD | Latent Dimension |
| LM | Linear Model |
| LOF | Local Outlier Factor |
| LR | Logistic Regression |
| LRP | Layer-wise Relevance Propagation |
| LSP-DFA | Latent State Process–Driven Feature Analysis |
| LSTM | Long Short-Term Memory |
| LSTM AE | LSTM-based Autoencoder |
| MFCI | Multi-Function Command Injection |
| MIL | Multi-Instance Learning |
| MITM | Man-in-the-Middle |
| ML | Machine Learning |
| MLP | Multi-Layer Perceptron |
| MM | Mixture Model |
| MPC | Model Predictive Control |
| MPCI | Multi-Point Command Injection |
| MSCI | Multi-Stage Command Injection |
| NDAE | Nonlinear Deep Autoencoder |
| NMRI | Network Measurement–Related Intrusion |
| NN | Neural Network |
| NN-Oneclass | Neural Network One-Class Classifier |
| OCSVM | One-Class Support Vector Machine |
| PCA | Principal Component Analysis |
| PoD | Ping of Death |
| PM-ACT | Process Monitoring for Actuators |
| PM-SEN | Process Monitoring for Sensors |
| PTP | Precision Time Protocol |
| Prob | Probabilistic model |
| RAAD | Retrieval-Augmented Anomaly Detection |
| RF | Random Forest |
| RS | Random Space |
| RT | Random Tree |
| Recon | Reconnaissance |
| SARIMA | Seasonal Autoregressive Integrated Moving Average |
| SCADA | Supervisory Control And Data Acquisition |
| SLR | Systematic Literature Review |
| SRI | System Response Inference |
| ST-OCBLS | Stacked One-Class Broad Learning System |
| SVM | Support Vector Machine |
| TCN | Temporal Convolutional Network |
| Trans | Transformer Network |
| VAE | Variational Autoencoder |
| VAE-LSTM | Variational Autoencoder with LSTM |
| XGBoost | eXtreme Gradient Boosting |
Appendix A. PRISMA Checklist
| Section and Topic | Item # | Checklist Item | Location Where Item Is Reported |
| Title | 1 | Identify the report as a systematic review. | Title |
| Abstract | 2 | See the PRISMA 2020 for Abstracts checklist. | Abstract |
| Rationale | 3 | Describe the rationale for the review in the context of existing knowledge. | Section 1 |
| Objectives | 4 | Provide an explicit statement of the objective(s) or question(s) the review addresses. | Section 1 and Section 3.1 |
| Eligibility criteria | 5 | Specify the inclusion and exclusion criteria for the review and how studies were grouped for the syntheses. | Section 3.2 |
| Information sources | 6 | Specify all databases, registers, websites, organisations, reference lists and other sources searched or consulted to identify studies. Specify the date when each source was last searched or consulted. | Section 3.3 |
| Search strategy | 7 | Present the full search strategies for all databases, registers and websites, including any filters and limits used. | Section 3.4 and Table 1 |
| Selection process | 8 | Specify the methods used to decide whether a study met the inclusion criteria of the review, including how many reviewers screened each record and each report retrieved, whether they worked independently, and if applicable, details of automation tools used in the process. | Section 3.4 |
| Data collection process | 9 | Specify the methods used to collect data from reports, including how many reviewers collected data from each report, whether they worked independently, any processes for obtaining or confirming data from study investigators, and if applicable, details of automation tools used in the process. | Section 3.5 |
| Data items | 10a | List and define all outcomes for which data were sought. Specify whether all results that were compatible with each outcome domain in each study were sought (e.g., for all measures, time points, analyses), and if not, the methods used to decide which results to collect. | Section 3.5 |
| 10b | List and define all other variables for which data were sought (e.g., participant and intervention characteristics, funding sources). Describe any assumptions made about any missing or unclear information. | Section 3.5 | |
| Study risk of bias assessment | 11 | Specify the methods used to assess risk of bias in the included studies, including details of the tool(s) used, how many reviewers assessed each study and whether they worked independently, and if applicable, details of automation tools used in the process. | Section 3.6 |
| Effect measures | 12 | Specify for each outcome the effect measure(s) (e.g., risk ratio, mean difference) used in the synthesis or presentation of results. | N/A-no statistical meta-anlaysis; |
| Synthesis methods | 13a | Describe the processes used to decide which studies were eligible for each synthesis (e.g., tabulating the study intervention characteristics and comparing against the planned groups for each synthesis (item #5)). | Section 3.2 |
| 13b | Describe any methods required to prepare the data for presentation or synthesis, such as handling of missing summary statistics, or data conversions. | Section 3.5 | |
| 13c | Describe any methods used to tabulate or visually display results of individual studies and syntheses. | Section 4, Table | |
| 13d | Describe any methods used to synthesize results and provide a rationale for the choice(s). If meta-analysis was performed, describe the model(s), method(s) to identify the presence and extent of statistical heterogeneity, and software package(s) used. | N/A—no quantitative synthesis | |
| 13e | Describe any methods used to explore possible causes of heterogeneity among study results (e.g., subgroup analysis, meta-regression). | N/A—no meta-analysis /heterogeneity tests | |
| 13f | Describe any sensitivity analyses conducted to assess robustness of the synthesized results. | N/A—no sensitivity analysis | |
| Reporting bias assessment | 14 | Describe any methods used to assess risk of bias due to missing results in a synthesis (arising from reporting biases). | N/A—reporting bias not formally assessed |
| Certainty assessment | 15 | Describe any methods used to assess certainty (or confidence) in the body of evidence for an outcome. | N/A—certainty of evidence not formally graded |
| Study selection | 16a | Describe the results of the search and selection process, from the number of records identified in the search to the number of studies included in the review, ideally using a flow diagram. | Section 4.1 and Figure 1 |
| 16b | Cite studies that might appear to meet the inclusion criteria, but which were excluded, and explain why they were excluded. | Section 3.2 and Section 4.1 | |
| Study characteristics | 17 | Cite each included study and present its characteristics. | Section 4.2, Section 4.3, Section 4.4, Section 4.5, Section 4.6 and Section 4.7 |
| Risk of bias in studies | 18 | Present assessments of risk of bias for each included study. | Not specifically tabulated; only described generally in Section 3.6 |
| Results of individual studies | 19 | For all outcomes, present, for each study: (a) summary statistics for each group (where appropriate) and (b) an effect estimate and its precision (e.g., confidence/credible interval), ideally using structured tables or plots. | Section 4.3, Section 4.4, Section 4.5, Section 4.6 and Section 4.7 |
| Results of syntheses | 20a | For each synthesis, briefly summarise the characteristics and risk of bias among contributing studies. | Section 5, Section 4.3, Section 4.4, Section 4.5, Section 4.6 and Section 4.7 |
| 20b | Present results of all statistical syntheses conducted. If meta-analysis was done, present for each the summary estimate and its precision (e.g., confidence/credible interval) and measures of statistical heterogeneity. If comparing groups, describe the direction of the effect. | N/A—no statistical synthesis/meta-analysis | |
| 20c | Present results of all investigations of possible causes of heterogeneity among study results. | N/A—no statistical heterogeneity analyses | |
| 20d | Present results of all sensitivity analyses conducted to assess the robustness of the synthesized results. | N/A—no sensitivity analyses | |
| Reporting biases | 21 | Present assessments of risk of bias due to missing results (arising from reporting biases) for each synthesis assessed. | N/A—reporting bias not formally assessed |
| Certainty of evidence | 22 | Present assessments of certainty (or confidence) in the body of evidence for each outcome assessed. | N/A—certainty of evidence not graded |
| Discussion | 23a | Provide a general interpretation of the results in the context of other evidence. | Section 5 and Section 6 |
| 23b | Discuss any limitations of the evidence included in the review. | Section 5 | |
| 23c | Discuss any limitations of the review processes used. | Section 5 | |
| 23d | Discuss implications of the results for practice, policy, and future research. | Section 5 and Section 6 | |
| Registration and protocol | 24a | Provide registration information for the review, including register name and registration number, or state that the review was not registered. | N/A |
| 24b | Indicate where the review protocol can be accessed, or state that a protocol was not prepared. | N/A | |
| 24c | Describe and explain any amendments to information provided at registration or in the protocol. | N/A | |
| Support | 25 | Describe sources of financial or non-financial support for the review, and the role of the funders or sponsors in the review. | Funding Section |
| Competing interests | 26 | Declare any competing interests of review authors. | Conflicts of Interest Section |
| Availability of data, code and other materials | 27 | Report which of the following are publicly available and where they can be found: template data collection forms; data extracted from included studies; data used for all analyses; analytic code; any other materials used in the review. | No new data were created or analyzed in this study |
| # Item number corresponds to the PRISMA 2020 checklist item. | |||
References
- Bhamare, D.; Zolanvari, M.; Erbad, A.; Jain, R.; Khan, K.; Meskin, N. Cybersecurity for industrial control systems: A survey. Comput. Secur. 2020, 89, 101677. [Google Scholar] [CrossRef]
- Koay, A.M.; Ko, R.K.L.; Hettema, H.; Radke, K. Machine learning in industrial control system (ICS) security: Current landscape, opportunities and challenges. J. Intell. Inf. Syst. 2023, 60, 377–405. [Google Scholar] [CrossRef]
- Firoozjaei, M.D.; Mahmoudyar, N.; Baseri, Y.; Ghorbani, A.A. An evaluation framework for industrial control system cyber incidents. Int. J. Crit. Infrastruct. Prot. 2022, 36, 100487. [Google Scholar] [CrossRef]
- Abshari, D.; Sridhar, M. A survey of anomaly detection in cyber-physical systems. arXiv 2025, arXiv:2502.13256. [Google Scholar] [CrossRef]
- Ji, I.H.; Lee, J.H.; Kang, M.J.; Park, W.J.; Jeon, S.H.; Seo, J.T. Artificial intelligence-based anomaly detection technology over encrypted traffic: A systematic literature review. Sensors 2024, 24, 898. [Google Scholar] [CrossRef]
- Gaggero, G.B.; Girdinio, P.; Marchese, M. Artificial intelligence and physics-based anomaly detection in the smart grid: A survey. IEEE Access 2025, 13, 23597–23606. [Google Scholar] [CrossRef]
- Djouad, A.; Atil, F.; Seriai, A.-D.; Beddiar, C. Domain Model for Cyber-Physical Systems. In Proceedings of the ICAASE, Constantine, Algeria, 1–2 December 2018. [Google Scholar]
- Khraisat, A.; Gondal, I.; Vamplew, P.; Kamruzzaman, J. Survey of intrusion detection systems: Techniques, datasets and challenges. Cybersecurity 2019, 2, 20. [Google Scholar] [CrossRef]
- Wang, F.; Jiang, Y.; Zhang, R.; Wei, A.; Xie, J.; Pang, X. A survey of deep anomaly detection in multivariate time series: Taxonomy, applications, and directions. Sensors 2025, 25, 190. [Google Scholar] [CrossRef] [PubMed]
- Paolini, D.; Dini, P.; Soldaini, E.; Saponara, S. One-Class Anomaly Detection for Industrial Applications: A Comparative Survey and Experimental Study. Computers 2025, 14, 281. [Google Scholar] [CrossRef]
- Moher, D.; Liberati, A.; Tetzlaff, J.; Altman, D.G. Preferred reporting items for systematic reviews and meta-analyses: The PRISMA statement. Bmj 2009, 339, b2535. [Google Scholar] [CrossRef]
- Keele, S. Guidelines for Performing Systematic Literature Reviews in Software Engineering; Technical Report, Ver. 2.3 ebse Technical Report. ebse: 2007; Elsevier: Amsterdam, The Netherlands, 2007. [Google Scholar]
- Malathi, S.; Begum, S.R. Enhancing trustworthiness among iot network nodes with ensemble deep learning-based cyber attack detection. Expert Syst. Appl. 2024, 255, 124528. [Google Scholar] [CrossRef]
- Garcia, S.; Parmisano, A.; Erquiaga, M.J. IoT-23: A Labeled Dataset with Malicious and Benign IoT Network Traffic (Version 1.0.0) [Data Set]; Zenodo, 2020; Available online: https://zenodo.org/records/4743746 (accessed on 15 December 2025). [CrossRef]
- Sangeetha, V.; Naidu, R.C.A.; Bhat, A.; Kulkarni, P. Integrating deep learning with ensemble approach for anomaly detection in network traffic. In Proceedings of the 2024 4th International Conference on Mobile Networks and Wireless Communications (ICMNWC), Reykjavik, Iceland, 13–14 December 2024; IEEE: New York, NY, USA, 2024. [Google Scholar]
- Sarhan, M.; Layeghy, S.; Moustafa, N.; Portmann, M. Netflow datasets for machine learning-based network intrusion detection systems. In Proceedings of the International Conference on Big Data Technologies and Applications, Virtual Event, 11 December 2020; Springer: Berlin/Heidelberg, Germany, 2020. [Google Scholar]
- RajBalaji, S.; Raman, R.; Pant, B.; Rathour, N.; Rajagopa, B.R.; Prasad, C.R. Design of deep learning models for the identifications of harmful attack activities in IIOT. In Proceedings of the 2023 International Conference on Artificial Intelligence and Smart Communication (AISC), Jaipur, India, 27–28 May 2023; IEEE: New York, NY, USA, 2023. [Google Scholar]
- Tavallaee, M.; Bagheri, E.; Lu, W.; Ghorbani, A.A. A detailed analysis of the KDD CUP 99 data set. In Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, Ottawa, ON, Canada, 8–10 July 2009; IEEE: New York, NY, USA, 2009. [Google Scholar]
- Moustafa, N.; Slay, J. UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In Proceedings of the 2015 Military Communications and Information Systems Conference (MilCIS), Canberra, Australia, 10–12 November 2015; IEEE: New York, NY, USA, 2015. [Google Scholar]
- Saghezchi, F.B.; Mantas, G.; Violas, M.A.; de Oliveira Duarte, A.M.; Rodriguez, J. Machine learning for DDoS attack detection in industry 4.0 CPPSs. Electronics 2022, 11, 602. [Google Scholar] [CrossRef]
- Zhang, Z.; Wang, X.; Yang, Q.; Liu, B.; Wang, W.; Ye, P.; Yang, T. Unsupervised Real-time Communication Traffic Anomaly Detection for Multi-dimensional Industrial Networks. IEEE Trans. Ind. Cyber-Phys. Syst. 2024, 3, 228–240. [Google Scholar]
- Sharafaldin, I.; Lashkari, A.H.; Ghorbani, A.A. Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 2018, 1, 108–116. [Google Scholar]
- Atheeq, C.; Sultana, R.; Sabahath, S.A.; Mohammed, M.A.K. Advancing IoT Cybersecurity: Adaptive threat identification with deep learning in Cyber-physical systems. Eng. Technol. Appl. Sci. Res. 2024, 14, 13559–13566. [Google Scholar] [CrossRef]
- Mathur, A.P.; Tippenhauer, N.O. SWaT: A water treatment testbed for research and training on ICS security. In Proceedings of the 2016 International Workshop on Cyber-Physical Systems for Smart Water Networks (CySWater), Vienna, Austria, 11 April 2016; IEEE: New York, NY, USA, 2016. [Google Scholar]
- Sun, H.; Huang, Y.; Zhou, C.; Han, L.; Liu, H.; Chen, J.; Li, X. Space Decoupled Prototype Learning for Few-Shot Attack Detection in Cyber–Physical Systems. IEEE Trans. Ind. Inform. 2024, 20, 12350–12362. [Google Scholar] [CrossRef]
- Moustafa, N. New generations of internet of things datasets for cybersecurity applications based machine learning: TON_IoT datasets. In Proceedings of the eResearch Australasia Conference, Brisbane, Australia, 21–25 October 2019. [Google Scholar]
- Quincozes, S.E.; Albuquerque, C.; Passos, D.; Mossé, D. Ereno: An extensible tool for generating realistic iec-61850 intrusion detection datasets. In Proceedings of the Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg), Vitória, Brazil, 6–10 November 2023; SBC: Porto Alegre, Brazil, 2022. [Google Scholar]
- Yang, K.; Shi, Y.; Yu, Z.; Yang, Q.; Sangaiah, A.K.; Zeng, H. Stacked one-class broad learning system for intrusion detection in industry 4.0. IEEE Trans. Ind. Inform. 2022, 19, 251–260. [Google Scholar] [CrossRef]
- Kravchik, M.; Shabtai, A. Efficient cyber attack detection in industrial control systems using lightweight neural networks and pca. IEEE Trans. Dependable Secur. Comput. 2021, 19, 2179–2197. [Google Scholar] [CrossRef]
- Taormina, R.; Galelli, S.; Tippenhauer, N.O.; Salomons, E.; Ostfeld, A.; Eliades, D.G.; Aghashahi, M.; Sundararajan, R.; Pourahmadi, M.; Banks, M.K. Battle of the attack detection algorithms: Disclosing cyber attacks on water distribution networks. J. Water Resour. Plan. Manag. 2018, 144, 04018048. [Google Scholar] [CrossRef]
- Ahmed, C.M.; Palleti, V.R.; Mathur, A.P. WADI: A water distribution testbed for research in the design of secure cyber physical systems. In Proceedings of the 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks, Porto, Portugal, 17 April 2017. [Google Scholar]
- Sekaran, Y.; Debnath, T.; Assadi, T.A.; Suvvari, S.D.; Oswal, S. Using machine learning to detect abnormalities on modbus/TCP networks. In Proceedings of the 4th International Conference on Information Management & Machine Intelligence, Jaipur, India, 23–24 December 2022. [Google Scholar]
- Frazão, I.; Abreu, P.; Cruz, T.; Araújo, H.; Simões, P. Cyber-Security Modbus ICS Dataset. IEEE Dataport, 31 January 2019. [Google Scholar] [CrossRef]
- Niu, Z.; Guo, W.; Xue, J.; Wang, Y.; Kong, Z.; Huang, L. A novel anomaly detection approach based on ensemble semi-supervised active learning (ADESSA). Comput. Secur. 2023, 129, 103190. [Google Scholar] [CrossRef]
- Gonaygunta, H.; Nadella, G.S.; Pawar, P.P.; Kumar, D. Enhancing cybersecurity: The development of a flexible deep learning model for enhanced anomaly detection. In Proceedings of the 2024 Systems and Information Engineering Design Symposium (SIEDS), Charlottesville, VA, USA, 26 April 2024; IEEE: New York, NY, USA, 2024. [Google Scholar]
- Damasevicius, R.; Venckauskas, A.; Grigaliunas, S.; Toldinas, J.; Morkevicius, N.; Aleliunas, T.; Smuikys, P. LITNET-2020: An annotated real-world network flow dataset for network intrusion detection. Electronics 2020, 9, 800. [Google Scholar] [CrossRef]
- Barut, O.; Luo, Y.; Zhang, T.; Li, W.; Li, P. NetML: A challenge for network traffic analytics. arXiv 2020, arXiv:2004.13006. [Google Scholar] [CrossRef]
- Pathak, P.; Singh, D.; Saxena, A.; Kumar, K.; Dari, S.S.; Dhabliya, D. Enhancing Cyber-Physical System Security with CGAN in Fog Environment. In Proceedings of the 2023 International Conference on Data Science and Network Security (ICDSNS), Tiruchengode, India, 21–22 July 2023; IEEE: New York, NY, USA, 2023. [Google Scholar]
- Xu, Q.; Ali, S.; Yue, T.; Nedim, Z.; Singh, I. KDDT: Knowledge distillation-empowered digital twin for anomaly detection. In Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, San Francisco, CA, USA, 3–9 December 2023. [Google Scholar]
- Min, W.; Almughalles, W.; Muthanna, M.S.A.; Ouamri, M.A.; Muthanna, A.; Hong, S.; Abd El-Latif, A.A. An SDN-Orchestrated Artificial Intelligence-Empowered Framework to Combat Intrusions in the Next Generation Cyber-Physical Systems. Hum.-Centric Comput. Inf. Sci. 2024, 14. Available online: https://hcisj.com/articles/?HCIS202414011 (accessed on 15 December 2025).
- Sharafaldin, I.; Lashkari, A.H.; Hakak, S.; Ghorbani, A.A. Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy. In Proceedings of the 2019 International Carnahan Conference on Security Technology (ICCST), Chennai, India, 1–3 October 2019; IEEE: New York, NY, USA, 2019. [Google Scholar]
- Jeong, S.; Kim, H.K.; Han, M.L.; Kwak, B.I. Aero: Automotive ethernet real-time observer for anomaly detection in in-vehicle networks. IEEE Trans. Ind. Inform. 2023, 20, 4651–4662. [Google Scholar] [CrossRef]
- Han, M.L.; Kwak, B.I.; Kim, H.K. TOW-IDS: Intrusion detection system based on three overlapped wavelets for automotive ethernet. IEEE Trans. Inf. Forensics Secur. 2022, 18, 411–422. [Google Scholar] [CrossRef]
- Hao, W.; Yang, T.; Yang, Q. Hybrid statistical-machine learning for real-time anomaly detection in industrial cyber–physical systems. IEEE Trans. Autom. Sci. Eng. 2021, 20, 32–46. [Google Scholar] [CrossRef]
- Shu, J.; Lu, J. Two-Stage Botnet Detection Method Based on Feature Selection for Industrial Internet of Things. IET Inf. Secur. 2025, 2025, 9984635. [Google Scholar] [CrossRef]
- Meidan, Y.; Bohadana, M.; Mathov, Y.; Mirsky, Y.; Shabtai, A.; Breitenbacher, D.; Elovici, Y. N-baiot—Network-based detection of iot botnet attacks using deep autoencoders. IEEE Pervasive Comput. 2018, 17, 12–22. [Google Scholar] [CrossRef]
- Kim, H.; Kim, S.; Jo, W.; Kim, K.-H.; Shon, T. Unknown payload anomaly detection based on format and field semantics inference in cyber-physical infrastructure systems. IEEE Access 2021, 9, 75542–75552. [Google Scholar] [CrossRef]
- Morris, T.H.; Thornton, Z.; Turnipseed, I. Industrial control system simulation and data logging for intrusion detection system research. In Proceedings of the 7th Annual Southeastern Cyber Security Summit, Huntsvile, AL, USA, 3–4 June 2015; pp. 3–4. Available online: https://www.semanticscholar.org/paper/Industrial-Control-System-Simulation-and-Data-for-Morris-Thornton/bb9714e0c661576f5df19fb54e0e26567ca37372 (accessed on 15 December 2025).
- Varol, M.; İskefiyeli, M. An intrusion detection system for critical infrastructures: Modbus approach. Eng. Appl. Artif. Intell. 2025, 162, 112410. [Google Scholar] [CrossRef]
- Yang, T.; Jiang, Z.; Liu, P.; Yang, Q.; Wang, W. A traffic anomaly detection approach based on unsupervised learning for industrial cyber–physical system. Knowl.-Based Syst. 2023, 279, 110949. [Google Scholar] [CrossRef]
- Cao, Z.; Liu, B.; Gao, D.; Zhou, D.; Han, X.; Cao, J. A Dynamic Spatiotemporal Deep Learning Solution for Cloud–Edge Collaborative Industrial Control System Distributed Denial of Service Attack Detection. Electronics 2025, 14, 1843. [Google Scholar] [CrossRef]
- Boakye-Boateng, K.; Ghorbani, A.A.; Lashkari, A.H. Securing substations with trust, risk posture, and multi-agent systems: A comprehensive approach. In Proceedings of the 2023 20th Annual International Conference on Privacy, Security and Trust (PST), Copenhagen, Denmark, 21–23 August 2023; IEEE: New York, NY, USA, 2023. [Google Scholar]
- Ferrag, M.A.; Friha, O.; Hamouda, D.; Maglaras, L.; Janicke, H. Edge-IIoTset: A new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning. IEEE Access 2022, 10, 40281–40306. [Google Scholar] [CrossRef]
- Balaba, S.; Chernyshov, Y.; Skorohodov, A.; Komarov, D. Graph-Based Anomaly Detection in Industrial Control Systems. In Proceedings of the 2025 IEEE Ural-Siberian Conference on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT), Yekaterinburg, Russia, 11–13 March 2025; IEEE: New York, NY, USA, 2025. [Google Scholar]
- Jagtap, S.S.; VS, S.S. A hypergraph based Kohonen map for detecting intrusions over cyber–physical systems traffic. Future Gener. Comput. Syst. 2021, 119, 84–109. [Google Scholar] [CrossRef]
- Sayin, B.; Zoppi, T.; Marchini, N.; Khokhar, F.A.; Passerini, A. Bringing Machine Learning Classifiers Into Critical Cyber-Physical Systems: A Matter of Design. IEEE Access 2025, 13, 94858–94877. [Google Scholar] [CrossRef]
- Ring, M.; Wunderlich, S.; Grüdl, D.; Landes, D.; Hotho, A. Flow-based benchmark data sets for intrusion detection. In Proceedings of the 16th European Conference on Cyber Warfare and Security (ECCWS), Dublin, Ireland, 29–30 June 2017; ACPI: South Oxfordshire, UK, 2017. [Google Scholar]
- Lashkari, A.H.; Kadir, A.F.A.; Taheri, L.; Ghorbani, A.A. Toward developing a systematic approach to generate benchmark android malware datasets and classification. In Proceedings of the 2018 International Carnahan Conference on Security Technology (ICCST), Montreal, QC, Canada, 22–24 October 2018; IEEE: New York, NY, USA, 2018. [Google Scholar]
- Nie, Z.; Basumallik, S.; Banerjee, P.; Srivastava, A.K. Intrusion detection in cyber-physical grid using incremental ML with adaptive moment estimation. IEEE Trans. Ind. Cyber-Phys. Syst. 2024, 2, 206–219. [Google Scholar] [CrossRef]
- Zahid, H.; Hina, S.; Hayat, M.F.; Shah, G.A. Agentless approach for security information and event management in industrial iot. Electronics 2023, 12, 1831. [Google Scholar] [CrossRef]
- Krishnan, P.; Jain, K.; Buyya, R.; Vijayakumar, P.; Nayyar, A.; Bilal, M.; Song, H. MUD-based behavioral profiling security framework for software-defined IoT networks. IEEE Internet Things J. 2021, 9, 6611–6622. [Google Scholar] [CrossRef]
- Hamza, A.; Ranathunga, D.; Gharakheili, H.H.; Roughan, M.; Sivaraman, V. Clear as MUD: Generating, validating and applying IoT behavioral profiles. In Proceedings of the 2018 Workshop on IoT Security and Privacy, Budapest, Hungary, 19 October 2018. [Google Scholar]
- Resende, P.A.A.; Drummond, A.C. The Hogzilla Dataset. 2018. Available online: http://ids-hogzilla.org/dataset (accessed on 15 December 2025).
- Cai, T.; Jia, T.; Adepu, S.; Li, Y.; Yang, Z. ADAM: An adaptive DDoS attack mitigation scheme in software-defined cyber-physical system. IEEE Trans. Ind. Inform. 2023, 19, 7802–7813. [Google Scholar] [CrossRef]
- Cho, K.; Mitsuya, K.; Kato, A. Traffic data repository at the {WIDE} project. In Proceedings of the 2000 USENIX Annual Technical Conference (USENIX ATC 00), San Diego, CA, USA, 18–23 June 2000. [Google Scholar]
- Kus, D.; Wagner, E.; Pennekamp, J.; Wolsing, K.; Fink, I.B.; Dahlmanns, M.; Wehrle, K.; Henze, M. A false sense of security? Revisiting the state of machine learning-based industrial intrusion detection. In Proceedings of the 8th ACM on Cyber-Physical System Security Workshop, Nagasaki, Japan, 27 May 2022. [Google Scholar]
- Tang, S.; Ding, Y.; Wang, H. Industrial Control Anomaly Detection Based on Distributed Linear Deep Learning. Comput. Mater. Contin. 2025, 82, 1129–1150. [Google Scholar] [CrossRef]
- Xia, Z.; Wang, S.; Tan, J.; Hu, Z. Stacking Ensemble Learning Network Attack Detection Based on Industrial Processes in CPS-Enabled Smart Water Conservancy. In Proceedings of the 2024 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD), Tianjin, China, 8–10 May 2024; IEEE: New York, NY, USA, 2024. [Google Scholar]
- Li, S.; Liu, J.; Pan, Z.; Lv, S.; Si, S.; Sun, L. Anomaly detection based on robust spatial-temporal modeling for industrial control systems. In Proceedings of the 2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems (MASS), Denver, CO, USA, 20–22 October 2022; IEEE: New York, NY, USA, 2022. [Google Scholar]
- Hong, A.E.; Malinovsky, P.P.; Damodaran, S.K. Towards attack detection in multimodal cyber-physical systems with sticky HDP-HMM based time series analysis. Digit. Threat. Res. Pract. 2024, 5, 1–21. [Google Scholar] [CrossRef]
- Schuh, R.A. An overview of the 1553 bus with testing and simulation considerations. In Proceedings of the 1988. IMTC-88. 5th IEEE Instrumentation and Measurement Technology Conference, San Diego, CA, USA, 19–21 April 1988; IEEE: New York, NY, USA, 1988. [Google Scholar]
- Xu, Z.; Zhang, Z.; He, T. PLC-MDT: A Framework for Detecting Anomalies with Digital Twins of Industrial Control Systems. IEEE Sens. J. 2025, 25, 17739–17749. [Google Scholar] [CrossRef]
- Badihi, H.; Jadidi, S.; Yu, Z.; Zhang, Y.; Lu, N. Smart cyber-attack diagnosis and mitigation in a wind farm network operator. IEEE Trans. Ind. Inform. 2022, 19, 9468–9478. [Google Scholar] [CrossRef]
- Soltani, M.; Knudsen, T.; Bak, T. Modeling and simulation of offshore wind farms for farm level control. In Proceedings of the European Offshore Wind Conference and Exhibition (EOW), Stockholm, Sweden, 14–16 September 2009. [Google Scholar]
- Ndonda, G.K.; Sadre, R. Exploiting the temporal behavior of state transitions for intrusion detection in ICS/SCADA. IEEE Access 2022, 10, 111171–111187. [Google Scholar] [CrossRef]
- Song, Y.; Huang, H.; Wei, Q.; Liu, L.; Wei, Z. TSMixAD: A Time-Series Anomaly Detection Framework for Industrial Control Systems Incorporating Time-Frequency Domain Data Augmentation Techniques. In Proceedings of the 2025 6th International Conference on Computer Information and Big Data Applications, Wuhan, China, 14–16 March 2025. [Google Scholar]
- Du, X.; Zhou, C.; Tian, Y.-C.; Wang, K. Anomaly detection based on data super-resolution in industrial cyber–physical systems with multirate sampling. IEEE Sens. J. 2024, 24, 16478–16490. [Google Scholar] [CrossRef]
- Santander, O.; Kuppuraj, V.; Harrison, C.A.; Baldea, M. An open source fluid catalytic cracker-fractionator model to support the development and benchmarking of process control, machine learning and operation strategies. Comput. Chem. Eng. 2022, 164, 107900. [Google Scholar] [CrossRef]
- Choi, W.-H.; Kim, J. Unsupervised learning approach for anomaly detection in industrial control systems. Appl. Syst. Innov. 2024, 7, 18. [Google Scholar] [CrossRef]
- Shin, H.-K.; Lee, W.; Yun, J.-H.; Kim, H. {HAI} 1.0:{HIL-based} augmented {ICS} security dataset. In Proceedings of the 13th USENIX Workshop on Cyber Security Experimentation and Test (CSET 20), Online, 10 August 2020. [Google Scholar]
- Boateng, E.A.; Bruce, J.W.; Talbert, D.A. Anomaly detection for a water treatment system based on one-class neural network. IEEE Access 2022, 10, 115179–115191. [Google Scholar] [CrossRef]
- Pinto, A.; Herrera, L.-C.; Donoso, Y.; Gutierrez, J.A. Enhancing Critical Infrastructure Security: Unsupervised Learning Approaches for Anomaly Detection. Int. J. Comput. Intell. Syst. 2024, 17, 236. [Google Scholar] [CrossRef]
- Kim, J.; Shin, J.; Park, K.-W.; Seo, J.T. Improving Method of Anomaly Detection Performance for Industrial IoT Environment. Comput. Mater. Contin. 2022, 72, 5377–5394. [Google Scholar] [CrossRef]
- Shin, H.-K.; Lee, W.; Yun, J.-H.; Min, B.-G. Two ICS security datasets and anomaly detection contest on the HIL-based augmented ICS testbed. In Proceedings of the 14th Cyber Security Experimentation and Test Workshop, Virtual, 9 August 2021. [Google Scholar]
- Liu, Y.; Meng, L.; Wang, X.; Qiu, S.; Lv, Z.; Liu, P.; Liu, T. PIL-MDRS: Physical Intrusion Localization Based on Multidevice Reflection Signals in ICS. IEEE Trans. Ind. Inform. 2024, 21, 2432–2441. [Google Scholar] [CrossRef]
- Noorizadeh, M.; Shakerpour, M.; Meskin, N.; Unal, D.; Khorasani, K. A cyber-security methodology for a cyber-physical industrial control system testbed. IEEe Access 2021, 9, 16239–16253. [Google Scholar] [CrossRef]
- Aslam, M.M.; Tufail, A.; De Silva, L.C.; Apong, R.A.A.H.M. Multi-Feature Hybrid Anomaly Detection in ICS: An Integration of ML, DL, and Statistical Techniques. In Proceedings of the 3rd ACM Workshop on Secure and Trustworthy Deep Learning Systems, (SecTL 2025), Hanoi, Vietnam, 26 August 2025. [Google Scholar]
- Gulzar, Q.; Mustafa, K. Interdisciplinary framework for cyber-attacks and anomaly detection in industrial control systems using deep learning. Sci. Rep. 2025, 15, 26575. [Google Scholar] [CrossRef]
- Filonov, P.; Lavrentyev, A.; Vorontsov, A. Multivariate industrial time series with cyber-attack simulation: Fault detection using an lstm-based predictive data model. arXiv 2016, arXiv:1612.06676. [Google Scholar]
- Ayas, S.; Ayas, M.S.; Cavdar, B.; Sahin, A.K. Detecting cyberattacks based on deep neural network approaches in industrial control systems. J. Inf. Secur. Appl. 2025, 94, 104206. [Google Scholar] [CrossRef]
- Ahmadi-Assalemi, G.; Al-Khateeb, H.; Benson, V.; Adamyk, B.; Ammi, M. Adaptive learning anomaly detection and classification model for cyber and physical threats in industrial control systems. IET Cyber-Phys. Syst. Theory Appl. 2025, 10, e70004. [Google Scholar] [CrossRef]
- Laso, P.M.; Brosset, D.; Puentes, J. Dataset of anomalies and malicious acts in a cyber-physical subsystem. Data Brief 2017, 14, 186–191. [Google Scholar] [CrossRef]
- Saheed, Y.K.; Omole, A.I.; Sabit, M.O. GA-mADAM-IIoT: A new lightweight threats detection in the industrial IoT via genetic algorithm with attention mechanism and LSTM on multivariate time series sensor data. Sens. Int. 2025, 6, 100297. [Google Scholar] [CrossRef]
- Li, D.; Tang, J.; Wu, S.; Zheng, Z.; Ng, S.-K. Cyber-Attack Detection and Localization for SCADA system of CPSs. In Proceedings of the 2025 IEEE/ACM Second International Conference on AI Foundation Models and Software Engineering ((FORGE 2025), Ottawa, ON, Canada, 27–28 April 2025; IEEE: New York, NY, USA, 2025. [Google Scholar]
- Ahmadi-Assalemi, G.; Al-Khateeb, H.; Epiphaniou, G.; Aggoun, A. Super learner ensemble for anomaly detection and cyber-risk quantification in industrial control systems. IEEE Internet Things J. 2022, 9, 13279–13297. [Google Scholar] [CrossRef]
- Liu, C.; He, S.; Li, S.; Shi, Z.; Meng, W. Time-Series Multi-Instance Learning for Weakly Supervised Industrial Fault Detection. IEEE Trans. Ind. Inform. 2025, 21, 3326–3335. [Google Scholar] [CrossRef]
- Wang, R.; Liu, C.; Mou, X.; Gao, K.; Guo, X.; Liu, P.; Wo, T.; Liu, X. Deep contrastive one-class time series anomaly detection. In Proceedings of the 2023 SIAM International Conference on Data Mining (SDM 2023), Minneapolis, MN, USA, 27–29 April 2023; SIAM: Philadelphia, PA, USA, 2023. [Google Scholar]
- Kim, K.-K.; Kim, J.-S.; Euom, I.-C. Explainable Anomaly Detection Based on Operational Sequences in Industrial Control Systems. IEEE Access 2025, 13, 66170–66187. [Google Scholar] [CrossRef]
- Robles-Durazno, A.; Moradpoor, N.; McWhinnie, J.; Russell, G.; Tan, Z. Newly engineered energy-based features for supervised anomaly detection in a physical model of a water supply system. Ad Hoc Netw. 2021, 120, 102590. [Google Scholar] [CrossRef]
- Ulybyshev, D.; Yilmaz, I.; Northern, B.; Kholodilo, V.; Rogers, M. Trustworthy data analysis and sensor data protection in cyber-physical systems. In Proceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SaT-CPS ’21), Online, 28 April 2021. [Google Scholar]
- Murugesan, N.; Velu, A.N.; Palaniappan, B.S.; Sukumar, B.; Hossain, M.J. Mitigating missing rate and early cyberattack discrimination using optimal statistical approach with machine learning techniques in a smart grid. Energies 2024, 17, 1965. [Google Scholar] [CrossRef]
- Beaver, J.M.; Borges-Hink, R.C.; Buckner, M.A. An evaluation of machine learning methods to detect malicious SCADA communications. In Proceedings of the 2013 12th International Conference on Machine Learning and Applications (ICMLA 2013), Miami, FL, USA, 4–7 December 2013; IEEE: New York, NY, USA, 2013. [Google Scholar]
- Sakhnini, J.; Karimipour, H.; Dehghantanha, A. Smart grid cyber attacks detection using supervised learning and heuristic feature selection. In Proceedings of the 2019 IEEE 7th International Conference on Smart Energy Grid Engineering (SEGE), 7 October 2019; IEEE: New York, NY, USA, 2019. [Google Scholar]
- McGuan, C.; Yu, C.; Lin, Q. Towards low-barrier cybersecurity research and education for industrial control systems. In Proceedings of the 2023 IEEE International Conference on Intelligence and Security Informatics (ISI 2023), Charlotte, NC, USA, 2–3 October 2023; IEEE: New York, NY, USA, 2023. [Google Scholar]
- Formby, D.; Rad, M.; Beyah, R. Lowering the barriers to industrial control system security with {GRFICS}. In Proceedings of the 2018 USENIX Workshop on Advances in Security Education (ASE 18), Baltimore, MD, USA, 13 August 2018. [Google Scholar]
- Balta, E.C.; Pease, M.; Moyne, J.; Barton, K.; Tilbury, D.M. Digital twin-based cyber-attack detection framework for cyber-physical manufacturing systems. IEEE Trans. Autom. Sci. Eng. 2023, 21, 1695–1712. [Google Scholar] [CrossRef]
- Basulaiman, K.; Albeladi, F.; Almutairi, F.M.; Saeed, A.; Barati, M. LBSCA: Learning Real-time Power System State Estimation Under Hidden Adversarial Attacks. IEEE Access 2025, 13, 169340–169351. [Google Scholar] [CrossRef]
- Ghorbani, M.; Ghassemi, A.; Alikhani, M.; Khaloozadeh, H.; Nikoofard, A. Using Kolmogorov–Arnold network for cyber-physical system security: A fast and efficient approach. Int. J. Crit. Infrastruct. Prot. 2025, 50, 100768. [Google Scholar] [CrossRef]
- Dehlaghi-Ghadim, A.; Moghadam, M.H.; Balador, A.; Hansson, H. Anomaly detection dataset for industrial control systems. IEEE Access 2023, 11, 107982–107996. [Google Scholar] [CrossRef]
- Li, Z.; Duan, M.; Xiao, B.; Yang, S. A novel anomaly detection method for digital twin data using deconvolution operation with attention mechanism. IEEE Trans. Ind. Inform. 2022, 19, 7278–7286. [Google Scholar] [CrossRef]
- Li, J.; Song, Y. Functional Pattern-Related Anomaly Detection Approach Collaborating Binary Segmentation with Finite State Machine. Comput. Mater. Contin. 2023, 77, 3573–3592. [Google Scholar] [CrossRef]
- MR, G.R.; Shrivastava, S.; Mathur, A.P. Assessing the Effectiveness of PCAT in Avoiding Process Anomalies in Water Treatment Plants. IEEE Trans. Ind. Inform. 2025, 99, 1–8. [Google Scholar]
- Cai, J.; Wei, Z.; Luo, J. ICS anomaly detection based on sensor patterns and actuator rules in spatiotemporal dependency. IEEE Trans. Ind. Inform. 2024, 20, 10647–10656. [Google Scholar] [CrossRef]
- Awaad, T.A.; El-Kharashi, M.W.; Taher, M.; Ammar, K.A. An intelligent, two-stage, in-vehicle diagnostic-based secured framework. IEEE Access 2022, 10, 88907–88919. [Google Scholar] [CrossRef]
- Weber, M. Automotive OBD-II Dataset; Karlsruhe Institute of Technology: Karlsruhe, Germany, 2019. [Google Scholar]
- Kwak, B.I.; Woo, J.; Kim, H. Driving Dataset. 2016. Available online: https://ocslab.hksecurity.net/Datasets/driving-dataset (accessed on 30 June 2022).
- Kumar, A.; Das, T.K.; Pandey, R.K. SRI: A Simple Rule Induction Method for improving resiliency of DNN based IDS against adversarial and zero-day attacks. In Proceedings of the 10th ACM Cyber-Physical System Security Workshop(CPSS 2024), Singapore, 2 July 2024. [Google Scholar]
- Nafees, M.N.; Saxena, N.; Burnap, P. On the efficacy of physics-informed context-based anomaly detection for power systems. In Proceedings of the 2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm 2022), Singapore, 25–28 October 2022; IEEE: New York, NY, USA, 2022. [Google Scholar]
- Chen, X.; Cao, W.; Chen, L.; Han, J.; Yang, M.; Wang, Z.; Wang, F.-Y. iCyberGuard: A FlipIt Game for Enhanced Cybersecurity in IIoT. IEEE Trans. Comput. Soc. Syst. 2024, 11, 8005–8014. [Google Scholar] [CrossRef]
- Yang, X.; Howley, E.; Schukat, M. ADT: Time series anomaly detection for cyber-physical systems via deep reinforcement learning. Comput. Secur. 2024, 141, 103825. [Google Scholar] [CrossRef]
- Woo, S.S.; Yoon, D.; Gim, Y.; Park, E. Raad: Reinforced adversarial anomaly detector. In Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing (SAC 2024), Ávila, Spain, 8–12 April 2024; IEEE: New York, NY, USA, 2024. [Google Scholar]
- Du, Y.; Huang, Y.; Wan, G.; He, P. Deep learning-based cyber–physical feature fusion for anomaly detection in industrial control systems. Mathematics 2022, 10, 4373. [Google Scholar] [CrossRef]
- Lin, X.; Yao, Y.; Hu, B.; Yang, W.; Zhou, X.; Li, G.; Zhang, W. A real-time anomaly detection method for industrial control systems based on long-short period deterministic finite automaton. IEEE Internet Things J. 2025, 12, 14599–14621. [Google Scholar] [CrossRef]
- Tang, W.; Liu, J.; Zhou, Y.; Ding, Z. Causality-guided counterfactual debiasing for anomaly detection of cyber-physical systems. IEEE Trans. Ind. Inform. 2023, 20, 4582–4593. [Google Scholar] [CrossRef]
- Pan, S.; Morris, T.; Adhikari, U. Classification of disturbances and cyber-attacks in power systems using heterogeneous time-synchronized data. IEEE Trans. Ind. Inform. 2015, 11, 650–662. [Google Scholar] [CrossRef]
- Wu, S.; Luo, H.; Jiang, Y.; Zhang, J.; Tian, J.; Yin, S. SIR-aided secure transmission and attack detection for security management of nonlinear cyber-physical system using GRU autoencoder. IEEE Trans. Ind. Inform. 2023, 20, 5529–5538. [Google Scholar] [CrossRef]
- Ali, M.H.; Malik, A.; Jyeniskhan, N.; Mahmood, M.A.; Shehab, E.; Liou, F. Development of Digital Twin for FDM Printer With Preventive Cyber-Attack and Control Algorithms. IEEE Access 2024, 12, 193594–193606. [Google Scholar] [CrossRef]
- Girdhar, M.; Hong, J.; Lee, H.; Song, T.-J. Hidden markov models-based anomaly correlations for the cyber-physical security of ev charging stations. IEEE Trans. Smart Grid 2021, 13, 3903–3914. [Google Scholar] [CrossRef]
- Baptiste, M.; Julien, F.; Franck, S. Systematic and efficient anomaly detection framework using machine learning on public ics datasets. In Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR 2021), Virtual Conference, Rhodes, Greece, 26–28 July 2021; IEEE: New York, NY, USA, 2021. [Google Scholar]
- Rieth, C.A.; Amsel, B.D.; Tran, R.; Cook, M.B. Additional tennessee eastman process simulation data for anomaly detection evaluation. Harv. Dataverse 2017, 1, 2017. [Google Scholar]
- Wang, R.; Zou, X.; Li, Y.; Li, F.; Liu, J.; Wang, R. Research on Power Terminal Attack Detection Technology Based on ATT&CK Multi-modal Perception. In Proceedings of the 2024 3rd International Conference on Cryptography, Network Security and Communication Technology, Harbin, China, 19–21 January 2024. [Google Scholar]
- Han, X.; Niu, Y.; Cao, Z.; Zhou, D.; Liu, B. RHAD: A Reinforced Heterogeneous Anomaly Detector for Robust Industrial Control System Security. Electronics 2025, 14, 2440. [Google Scholar] [CrossRef]
- Xue, Y.; Pan, J.; Geng, Y.; Yang, Z.; Liu, M.; Deng, R. Real-Time Intrusion Detection Based on Decision Fusion in Industrial Control Systems. IEEE Trans. Ind. Cyber-Phys. Syst. 2024, 2, 143–153. [Google Scholar] [CrossRef]
- Brenner, B.; Hollerer, S.; Bhosale, P.; Sauter, T.; Kastner, W.; Fabini, J.; Zseby, T. Better safe than sorry: Risk management based on a safety-augmented network intrusion detection system. IEEE Open J. Ind. Electron. Soc. 2023, 4, 287–303. [Google Scholar] [CrossRef]
- Karanfil, M.; Rebbah, D.E.; Debbabi, M.; Kassouf, M.; Ghafouri, M.; Youssef, E.-N.S.; Hanna, A. Detection of microgrid cyberattacks using network and system management. IEEE Trans. Smart Grid 2022, 14, 2390–2405. [Google Scholar] [CrossRef]
- Gao, B.; Bu, B.; Zhang, W.; Li, X. An intrusion detection method based on machine learning and state observer for train-ground communication systems. IEEE Trans. Intell. Transp. Syst. 2021, 23, 6608–6620. [Google Scholar] [CrossRef]
- Jadidi, Z.; Foo, E.; Hussain, M.; Fidge, C. Automated detection-in-depth in industrial control systems. Int. J. Adv. Manuf. Technol. 2022, 118, 2467–2479. [Google Scholar] [CrossRef]
- Myers, D.; Suriadi, S.; Radke, K.; Foo, E. Anomaly detection for industrial control systems using process mining. Comput. Secur. 2018, 78, 103–125. [Google Scholar] [CrossRef]
- Power Systems Management and Associated Information Exchange—Data and Communications Security—Part 7: Network and System Management (NSM) Data Object Models; International Electrotechnical Commission (IEC): Geneva, Switzerland, 2017.
- Telecontrol Equipment and Systems—Part 5-104: Transmission Protocols—Network Access for IEC 60870-5-101 Using Standard Transport Profiles; International Electrotechnical Commission (IEC): Geneva, Switzerland, 2006.
- IEEE Standard for Information Technology—Telecommunications and Information Exchange Between Systems—Local and Metropolitan Area Networks—Specific Requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications; Institute of Electrical and Electronics Engineers (IEEE): New York, NY, USA, 2020.
- Lee, J.H.; Ji, I.H.; Jeon, S.H.; Seo, J.T. Anomaly Detection Method Considering PLC Control Logic Structure for ICS Cyber Threat Detection. Appl. Sci. 2025, 15, 3507. [Google Scholar] [CrossRef]
- Iacobelli, A.; Rinieri, L.; Melis, A.; Al Sadi, A.; Prandini, M.; Callegati, F. Detection of Ladder Logic Bombs in PLC Control Programs: An Architecture based on Formal Verification. In Proceedings of the 2024 IEEE 7th International Conference on Industrial Cyber-Physical Systems (ICPS), St. Louis, MO, USA, 12–15 May 2024; IEEE: New York, NY, USA, 2024. [Google Scholar]
- Yang, K.; Zhang, Y.; Li, T.; Sun, L. ASIDS: Acoustic side-channel based intrusion detection system for industrial robotic arms. Comput. Secur. 2025, 157, 104586. [Google Scholar] [CrossRef]
- Mei, W.; Liu, W.; Chen, J.; Li, K. A physical signal-based anomaly detection for industrial terminal. In Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, 20–22 October 2023. [Google Scholar]
- Pu, H.; He, L.; Zhao, C.; Yau, D.K.; Cheng, P.; Chen, J. Fingerprinting movements of industrial robots for replay attack detection. IEEE Trans. Mob. Comput. 2021, 21, 3629–3643. [Google Scholar] [CrossRef]
- Programmable Controllers—Part 3: Programming Languages; International Electrotechnical Commission (IEC): Geneva, Switzerland, 2013.

| Database | Query |
|---|---|
| Web of Science | CPS OR Cyber Physical System (All Fields) AND anomaly OR anomalies OR abnormal) (All Fields) AND detection OR detecting OR detected OR detect (All Fields) AND model (All Fields) AND ICS OR Industrial Control System (All Fields) AND dataset (All Fields) AND Index Date: 1 January–31 October 2025 (https://www.webofscience.com/wos/woscc/summary/8736d9c6-5149-4370-9aa4-15b4cd2cd95d-0187350a57/relevance/1) (accessed on 1 November 2025) |
| Scopus | TITLE-ABS-KEY (ICS or Industrial Control System) AND TITLE-ABS-KEY (CPS or Cyber Physical System) AND TITLE-ABS-KEY (model) AND TITLE-ABS-KEY (dataset) AND TITLE-ABS-KEY (anomaly or anomalies or abnormal) AND TITLE-ABS-KEY (detection or detect or detecting or detected) AND PUBYEAR > 2020 AND PUBYEAR < 2026 |
| IEEE Xplore | (“All Metadata”: Industrial Control System) AND (“All Metadata”: Cyber Physical System) AND (“All Metadata”: anomaly) AND (“All Metadata”: detection) AND (“All Metadata”: dataset) (Journal) Filters Applied: 2021–2026, Journals |
| ACM | [All: cps or cyber physical system] AND [All: ics or industrial control system] AND [All: anomaly or anomalies or abnormal] AND [All: model] AND [All: detect or detection or detecting] AND [E-Publication Date: (1 January–31 October 2025)] |
| Year of Study Publication | The Number of Selected Studies |
|---|---|
| 2021 | 12 |
| 2022 | 16 |
| 2023 | 15 |
| 2024 | 23 |
| 2025 | 23 |
| Reference type | |
| Journal | 68 |
| Conference proceedings | 21 |
| Data Characteristics Utilized | List | D, C, P | Learning Method | Model Type | Attack Type | Dataset |
|---|---|---|---|---|---|---|
| Statistical Based | [13] | D | Sup | GCNN, RS, RT, XGBoost | Port Scanning, Botnet/Malware, DDoS, C & C, Malware Delivery | IoT-23 [14] |
| [15] | D | Sup | LSTM, XGBoost | DoS/DDoS, Brute Force | NF-BoT-IoT [16] | |
| [17] | D | Sup, Uns | DAE, DFFNN | DoS/DDoS, APT, Spyware | NSL-KDD [18], UNSW-NB15 [19] | |
| [20] | D | Sup, Uns, Semi | Decision Tree (DT), Random Forest (RF), K-NN, SVM, etc. | DDoS | Infineon Factory PCAP + DDoSDB | |
| [21] | D | Uns | DAGMM | DoS/DDoS, Flooding Attack, Malicious Operation | ICS-CPS Testbed (Zhejiang Univ.), CIC-IDS2017 [22] | |
| [23] | D, C | Sup | AE, PCA, DT, DNN | Replay, DoS, False Data Injection, Command Injection, Flow Manipulation | SWaT [24], Gas Pipeline | |
| [25] | D | Sup | DPL-FSAD | DoS/DDoS, Probe, R2L/U2R, Fuzzing, Malware, Information Theft, IEC-61850 Protocol Attacks | UNSW-NB15, NSL-KDD, TON_IoT [26], ERENO IEC-61850 [27] | |
| [28] | D | Uns | ST-OCBLS | Unknown/Zero-Day, Protocol Abuse, Port Misuse, DoS, Probe | NSL-KDD, UNSW-NB15 | |
| [29] | D | Semi | Lightweight 1D-CNN | Replay, DoS, FDI, Command Injection, Stealthy Multi-Point Attack, Sensor Spoofing, Adversarial Evasion | SWaT, BATADAL [30], WADI [31] | |
| [32] | D | Sup, Uns | RF, SVM, MLP, AE, K-Means | MITM, DoS | Cyber-Security Modbus ICS Dataset [33] | |
| [34] | D, C | Semi | ADESSA | DoS, Probe, R2L, U2R | NSL-KDD, SWaT |
| Data Characteristics Utilized | List | D, C, P | Learning Method | Model Type | Attack Type | Dataset |
|---|---|---|---|---|---|---|
| Time-Series-Based | [35] | D | Sup | DSAE + DNN + LSTM + LR | Botnet, Malware, DDoS, Probe, Scanning, Unknown/Zero-Day | IoT-23, LITNET-2020 [36], NetML-2020 [37] |
| [38] | D | Uns | FID-GAN | DoS, Backdoor, Worm, Reconnaissance/Probe, Generic/Exploit, Shellcode, Heartbleed, Fuzzers | CIC-IDS2017, UNSW-NB15 | |
| [39] | D | Sup | DT, LSTM, LM, VAE, KD | PacketLoss | Alstom TCMS | |
| [40] | D, C | Sup | BLSTM + GRU | DoS/DDoS, Port Scan/Probe, Protocol Exploit | CIC-DDoS2019 [41] | |
| [42] | D | Uns | AE | AVTP Frame Injection, PTP Sync Attack, CAM Table Overflow, CAN DoS, CAN Replay | TOW-IDS [43] | |
| [44] | D | Uns | SARIMA + LSTM | DoS/DDoS, ARP Spoofing, Ping of Death, Network Scanning, Remote Control Abuse, Configuration Tampering, Network Failure, Crash | Custom-built dataset | |
| [45] | C | Sup | 1D-CNN + Bi-GRU + F-test + XGBoost | Mirai·Gafgyt Botnet | N-BaIoT [46] |
| Data Characteristics Utilized | List | D, C, P | Learning Method | Model Type | Attack Type | Dataset |
|---|---|---|---|---|---|---|
| Protocol-Aware | [47] | D | Uns | Field-Semantic Inference, Multilevel Detection Model | Command Injection, Response Injection, DoS/DDoS, Reconnaissance | Gas Pipeline Dataset [48] |
| [49] | D | Sup | ML/DL Ensemble | MITM, DoS, Command Injection, Replay, Spoofing, Eavesdropping | CIC Modbus Dataset, CENTER SAU Water Dataset |
| Data Characteristics Utilized | List | D, C, P | Learning Method | Model Type | Attack Type | Dataset |
|---|---|---|---|---|---|---|
| Payload-Based | [50] | D | Uns | BECN-AE | FDI, DLL hijack | Custom-built dataset |
| Data Characteristics Utilized | List | D, C, P | Learning Method | Model Type | Attack Type | Dataset |
|---|---|---|---|---|---|---|
| Graph-Based | [51] | D | Sup + Fed | APPNP Graph Convolution + 1D-CNN | DDoS | CIC Modbus Dataset 2023 [52], Edge-IIoTset [53] |
| [54] | D | Uns | GNN based Hetero-SAGEConv | DDoS, Replay, Reconnaissance, Injection | CIC Modbus 2023 | |
| [55] | D | Uns | Bloom + Hypergraph Kohonen | Injection, DoS, Reconnaissance | Gas Pipeline, SWaT | |
| [56] | D, C, P | Uns | Ens | Intrusion, Error, Failure | ADFANet [57], AndMal17 [58], CICIDS2017/2018, etc. | |
| [59] | D | Sup | NN | DoS, Bruteforce | Custom-built dataset |
| Data Characteristics Utilized | List | D, C, P | Learning Method | Model Type | Attack Type | Dataset |
|---|---|---|---|---|---|---|
| Operational Integration-Based | [60] | D, C | Sup | RF, DT, KNN | DDoS, Intrusion, MITM | CICDDoS2019, SWaT |
| [61] | D, C | Sup + Uns | NDAE + RF | DDoS, Scan, Botnet, Malware, Brute Force | MUDgee PCAP/MUD Profiles [62], CICIDS2017, Bot-IoT, Hogzilla [63] | |
| [64] | D | Uns | KNN | DDoS | MAWI [65], Bot-IoT | |
| [66] | D | Sup | RF, SVM, BLSTM | NMRI, CMRI, MSCI, MPCI, MFCI, DoS, Recon | Gas Pipeline |
| Data Characteristics Utilized | List | D, C, P | Learning Method | Model Type | Attack Type | Dataset |
|---|---|---|---|---|---|---|
| Prediction-Residual-Based | [67] | D | Uns | MLP (Distributed Linear Deep Learning) | FDI, Replay, Command Injection, DoS | SWaT, WADI |
| [68] | D | Uns | MLP + LSTM | DoS Malicious Command, Script Injection Parameter Injection | SWaT | |
| [69] | D | Uns | 1D-CNN + Multi-head Self-Attention | FDI, Sensor Spoofing, Stealthy Attack | SWaT/WADI | |
| [70] | D | Uns | HMM | DoS, Noise Attack, Protocol Violation, Buffer Attack, Sensor·Actuator Physical Attack | Avionics Testbed, Consumer Robot Testbed–iRobot Create 2 [71] | |
| [72] | D | Uns | LSTM | Malicious Code Execution, Coordinated Stealthy Attack, Replay, Command Injection | Custom-built dataset | |
| [73] | D, P | Uns | FMI + FMRAC + ASC | Ramp Attack (Data Integrity Attack) | Offshore Wind Farm Benchmark [74] | |
| [75] | D | Uns | Temporal State-Transition based Process-aware IDS | Process-Oriented Attack | SWaT | |
| [76] | D | Semi, Uns | TCN + Trans | Global Anomaly, Contextual Anomaly, Seasonal Anomaly, Trend Anomaly | SWaT, WADI |
| Data Characteristics Utilized | List | D, C, P | Learning Method | Model Type | Attack Type | Dataset |
|---|---|---|---|---|---|---|
| Reconstruction-Error-Based | [77] | D | Uns | MM + AFA | Injection Attack | FCC Fractionator Simulation Dataset [78], BATADAL |
| [79] | D | Uns | CNN + LSTM AE | Step Injection, Slope Injection, DoS, Injection | HAI [80] | |
| [81] | D | Uns | NN-Oneclass | Sensor, Actuator Fault, FDI, Command Manipulation | SWaT | |
| [82] | D | Uns | VAE-LSTM | Sensor/Actuator Fault, False Data Injection, Command Manipulation | SWaT | |
| [83] | D | Uns | BiLSTM | Operational Anomaly, Contextual Sequence Deviation, Process Feedback Error | HAI [84] | |
| [85] | D | Uns | KNN, Linear SVM, AE | Physical intrusion devices on CAN fieldbus | Custom-built dataset | |
| [86] | D | Uns | PCA, OCSVM, LOF, kNN, IF | FDI | Custom-built dataset | |
| [87] | D | Sup + Uns | AE + IF + XGBoost + RF + LSTM | Injection, Tampering, DoS, Reconnaissance | SWaT, Wind Turbine SCADA |
| Data Characteristics Utilized | List | D, C, P | Learning Method | Model Type | Attack Type | Dataset |
|---|---|---|---|---|---|---|
| Sensor-Correlation-Based | [88] | D, C | Sup | Deep RNN based Attention, Deep LSTM, Deep Bi-LSTM | Injection, Spoofing Attack, Noise Attack | SWaT, WADI, GHL [89] |
| [90] | D | Uns | CNN, RNN, LSTM, GRU | Command Injection Replay, DoS, Physical Process Manipulation | SWaT/WADI | |
| [91] | D | Sup | ARF, HAT | DoS, Spoofing, Command Injection, Physical fault, sabotage, Insider Attack | aNormalies [92]/WDT/HAI | |
| [93] | D | Sup | GA-mADAM-LSTM | Injection, Tampering, DoS, Reconnaissance | SWaT/WADI | |
| [94] | D | Uns | GCN + LSTM VAE | Injection, Tampering, DoS, Multi-Stage | SWaT, BATADAL | |
| [95] | D, P | Sup + Uns | Super Learner Ensemble + Isolation Forest + BBN | Injection, Tampering, Sabotage, DoS | aNormalies | |
| [96] | D | Weak-Sup | C-ary Tree MIL Framework | Fault, Tampering, DoS, Overflow, Sensor Anomaly | SWaT/WADI/AIOPS [97]/GHL | |
| [98] | D | Sup + Uns | Trans, RF | FDI, Setpoint Manipulation, Sensor Fault, Controller Parameter Attack | HAI | |
| [99] | D | Sup | SVM, KNN, MLP, DT, RF, Gaussian Naïve Bayes | Memory, Parameter Tampering | Custom-built dataset | |
| [100] | D | Sup | RF, KNN, SVM, NN | FDI | Gas Pipeline Dataset | |
| [101] | D | Sup | Extra Trees, AdaBoost | FDI | ICS Cyber Attack Power System (Triple-Class) [102], IEEE 14-Bus FDI Dataset [103], IEEE 57-Bus FDI Dataset [103] | |
| [104] | D | Uns | OCSVM | FDI, Command Injection | GRFICSv2 [105] | |
| [106] | D | Sup | OCSVM | FDI, Replay, Command Injection | Custom-built dataset | |
| [107] | D | Sup | DNN | FDIA | IEEE 118-bus Simulation | |
| [108] | D | Sup | KAN | DDoS, Reconnaissance, Replay, MitM Injection | SWaT, WADI, ICS-Flow [109] | |
| [110] | D | Sup | CNN + Attn | FDI, Replay, Spoofing, Control Injection | SWaT, WADI |
| Data Characteristics Utilized | List | D, C, P | Learning Method | Model Type | Attack Type | Dataset |
|---|---|---|---|---|---|---|
| Leveraging Operational-Consistency | [111] | D | Uns | Bayesian network + FSM | FDI, Command Injection, Control Tampering, Sensor Spoofing | SWaT |
| [112] | D, P | Sup | Rule-based Function Simulator, DT | FDI, Command Injection, Control Tampering, Replay | SWaT | |
| [113] | D | Uns | PM-SEN, PM-ACT, ESR | FDI, Command Injection, Replay, Stealthy | SWaT, WADI | |
| [114] | D | Sup | XGBoost | Value Manipulation, Replay, Fuzzy, Zero-Day | Seat Leon 2018 OBD-II Dataset [115], KIA SOUL Dataset [116] | |
| [117] | D | Sup | Rule based SRI+DNN | Adversarial Attack, Zero-day, FDI, DoS, Spoofing, Replay | SWaT | |
| [118] | D | Sup | CNN+LSTM+DNN | FDI, Coordinated, Stealthy, Ramp, Random | IEEE 37-bus Simulation |
| List | D, C, P | Learning Method | Model Type | Attack Type | Dataset |
|---|---|---|---|---|---|
| [119] | D | RL | Double Deep Q-Learning | APT | CyberBattleSim |
| [120] | D | Semi | AE | FDI, DoS/DDoS, Replay, Command Injection, Spoofing | SWAT, WADI, HAI |
| [121] | D | Uns, RL | RAAD | DoS, MITM, Replay, FDI, Physical Fault | SWAT, HAI, UNSW-NB15 |
| Data Characteristics Utilized | List | D, C, P | Learning Method | Model Type | Attack Type | Dataset |
|---|---|---|---|---|---|---|
| Data Fusion-based | [122] | D | Uns | LSTM + GAN | MITM, DoS, Scan, Pump Failure, Sensor Breakdown, Leak | WDT |
| [123] | D | Uns | LSP-DFA | DoS, Replay, Command Injection, Long-duration Attack, Masquerade Transition Attack, System Recovery Attack | Custom-built dataset | |
| [124] | D | Semi | CDF | FDI, DoS/DDoS, Replay, Command Injection, Spoofing | NSL-KDD, ICS [125], etc. | |
| [126] | D | Uns | GRU + AE | Stealthy, Non-stealthy, Amplification, Replay, FDI | Custom-built dataset | |
| [127] | D | Sup+Uns | CNN + DBSCAN + MPC Control | Cyber-Attack, Sensor Anomaly, Defect Detection | Custom-built dataset | |
| [128] | D, P | Sup | HMM | FDI, DoS, MITM, Buffer Overflow, Backdoor, Spoofing | Custom-built dataset | |
| [129] | D | Sup/Uns/Semi | RF, Extra Trees, GB, MLP, AE, LOF | DoS, FDI, Replay, Probe, Injection, Reconnaissance | Water Storage Tank, New Gas Pipeline, Power System, WADI, BATADAL, Tennessee Eastman [130] | |
| [131] | D, P | Semi/Prob | Bayesian Network + Multi-modal Fusion + ATT&CK Mapping | Malware Injection, Lateral Movement, Privilege Escalation, Data Exfiltration | Power Terminal Network Simulation | |
| [132] | D | Sup + RL | Trans + LSTM AE + CANet + RF + SVM | DoS, MITM, Scan, Physic Fault | SCADA, WDT |
| Data Characteristics Utilized | List | D, C, P | Learning Method | Model Type | Attack Type | Dataset |
|---|---|---|---|---|---|---|
| Ensemble and Decision-Fusion-Based | [133] | D | Sup | DT, SVM, LSTM, XGBoost + Decision Fusion | Information Leakage, Replay, Command Injection, Sensor Tampering, Control Parameter Tampering, Multi-Point, Physical Attack | Custom-built dataset |
| [134] | D, C | Sup | RF + Risk Evaluation Engine | DoS, PortScan, Botnet, Remote Shell, Lateral Movement | Custom-built dataset | |
| [135] | D, P | Unsup | LSTM, GRU | Packet Corruption, Packet Modification, Packet Delay | Custom-built dataset | |
| [136] | D, C | Sup | RF, GBDT, AdaBoost, SVM + State Observer | DoS, Data Spoofing | Custom-built dataset | |
| [137] | D | Unsup | Clust + TS (HCA, ARIMA/GARCH) | DoS/DDoS, Spoofing, MITM | Factory Automation [138], Modbus, SWaT |
| List | D, C, P | Learning Method | Model Type | Attack Type | Dataset |
|---|---|---|---|---|---|
| [142] | D | Uns | LSTM, LSTM AE, Trans | PLC Ladder Logic Bomb | PLC control logic Ladder Logic Bombs [143] |
| [144] | D | Sup | NN | FDI | Custom-built dataset |
| [145] | D | Uns | Trans | Anomaly Execution | Custom-built dataset |
| [146] | D | Uns | ANN Regression, CUSUM | replay attack | Custom-built dataset |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Share and Cite
Seo, J.K.; Lee, J.; Kim, B.; Shim, W.; Seo, J.T. AI-Based Anomaly Detection in Industrial Control and Cyber–Physical Systems: A Data-Type-Oriented Systematic Review. Electronics 2026, 15, 20. https://doi.org/10.3390/electronics15010020
Seo JK, Lee J, Kim B, Shim W, Seo JT. AI-Based Anomaly Detection in Industrial Control and Cyber–Physical Systems: A Data-Type-Oriented Systematic Review. Electronics. 2026; 15(1):20. https://doi.org/10.3390/electronics15010020
Chicago/Turabian StyleSeo, Jung Kyu, JuHyeon Lee, Buyoung Kim, Wooseong Shim, and Jung Taek Seo. 2026. "AI-Based Anomaly Detection in Industrial Control and Cyber–Physical Systems: A Data-Type-Oriented Systematic Review" Electronics 15, no. 1: 20. https://doi.org/10.3390/electronics15010020
APA StyleSeo, J. K., Lee, J., Kim, B., Shim, W., & Seo, J. T. (2026). AI-Based Anomaly Detection in Industrial Control and Cyber–Physical Systems: A Data-Type-Oriented Systematic Review. Electronics, 15(1), 20. https://doi.org/10.3390/electronics15010020

