MULTILEVEL VERIFICATION SYSTEM FOR MITIGATING CYBER RISKS IN UPSTREAM OPERATIONS OF SMART OILFIELDS

Authors

  • Promise Anebo Nlerum
    Federal University Otuoke, Bayelsa State
  • Chinwendu Best Eleje
    Department of Computer Science and Informatics Department, Federal University Otuoke, Bayelsa State, Nigeria

Keywords:

Cyberattack Detection, Deep Learning, Industrial Control Systems (ICS), LSTM, Multilevel Verification, Operational Technology (OT), Smart Oilfields

Abstract

The increasing digitalization of upstream oil and gas operations into "smart oilfields" has introduced significant cyber vulnerabilities, necessitating advanced mitigation strategies. This research proposes a multilevel verification system, integrating a Long Short-Term Memory (LSTM) deep learning model for real-time cyberattack detection. Utilizing synthetically generated multisource data (sensor readings, network traffic, system logs, and device metadata), the system employs rigorous preprocessing, feature engineering, and temporal splitting to prevent data leakage and address class imbalance via SMOTE. The LSTM model achieves near-perfect performance, with 99.71% testing accuracy, 100% recall, and zero false negatives on an independent test set. Simulated real-time monitoring demonstrates high-confidence alerts and conceptual automated responses, enhancing operational resilience. This framework provides a robust blueprint for securing critical energy infrastructure against evolving threats, particularly in oil-producing nations like Nigeria.

Dimensions

Al-Abassi, A., Karimipour, H., Dehghantanha, A., & Parizi, R. M. (2019). An Ensemble Deep Learning-Based Cyber-Attack Detection in Industrial Control System. IEEE Access. 8(8) 83965 - 83973

Alkahtani, H., & Aldhyani, T. H. H. (2022). Developing Cybersecurity Systems Based on Machine Learning and Deep Learning Algorithms for Protecting Food Security Systems: Industrial Control Systems. Electronics. 11(11), 1-25.

Al-kahtani, M. S., Mehmood, Z., Sadad, T., Zada, I., Ali, G., & ElAffendi, M. (2023). Intrusion Detection in the Internet of Things Using Fusion of GRU-LSTM Deep Learning Model. Intelligent Automation and Soft Computing (IASC). 37(2), 2279-2290.

Banaamah, A. M., & Ahmad, I. (2022). Intrusion Detection in IoT Using Deep Learning. Sensors. 22(21), 8417.

Butun, I., Morgera, S. D., & Nadeem, T. (2019). A survey of security in wireless sensor networks. Ad Hoc Networks. 9(1), 25-32.

Cardenas, A. A., Amin, S., & Sastry, S. (2011). Research challenges for the security of control systems. HotSec’08: Proceedings of the 3rd conference on Hot topics in security. Article No.: 6, Pages 1 – 6.

Ghani, A. A., & Alasadi, S. A. (2025). A Deep Learning Algorithm to Cybersecurity: Enhancing Intrusion Detection with a Hybrid GRU and BiLSTM Model. Engineering, Technology & Applied Science Research. 15(3), 23605-23612.

Ghasemi, S., Dehghantanha, A., Conti, M., & Choo, K. R. (2024). Federated Learning for Cyber Attack Detection in IoT: A Customized Temporal Federated Learning through Adversarial Networks. Journal UMY. Retrieved from https://journal.umy.ac.id/index.php/jrc/article/download/24529/11301/93769

Harshavardhan, A., Sree Vani, M., Patil, A., Yamsani, N., & Archana, K. (2025). Hybrid Deep Learning Framework for Intrusion Detection: Integrating CNN, LSTM, and Attention Mechanisms to Enhance Cybersecurity. Journal of Theoretical and Applied Information Technology. 103(1), 63-79.

Humayed, A., Lin, D., Li, F., & G. O. M. (2017). Cyberphysical systems security: A survey. IEEE Communications Surveys & Tutorials. 4(6), 1802 – 1831.

Igure, V. M., Laughter, D. R., & Williams, R. D. (2006). Security issues in SCADA networks. Computers & Security. 25(7), 498-506.

Isaac, S., Ayodeji, D. K., Luqman, Y., Karma, S. M., & Aminu, J. (2024). Cyber security Attack Detection Model Using Semi-Supervised Learning. FUDMA Journal of Sciences. 8(2), 92-100.

Kuzyakov, O. N., Gluhih, I. & Andreeva, M., (2021). Cyber-Physical System for Pipeline Monitoring as a Component of Smart Oil Field. 394-403.

LeCun, Y., Bengio, Y., & Hinton, G. (2015). Deep learning. Nature. 521(7553):436-443.

Mohamad, H. S., & Mohammad, S. (2017). A survey on machine learning based intrusion detection systems. International Journal of Computer Network and Information Security, 9(1), 113.

Yan, H., & Han, M. (2020). Anomaly detection for industrial control systems using deep neural networks with class imbalance learning. Sensors, 20(22), 6527.

Yan, H., An, Y., Hong, L., Yuyan, S. & Limin, S. (2018). A survey of intrusion detection on industrial control systems. International Journal of Distributed Sensor Networks. 14(8), 1-14.

Real-Time Monitoring Simulation

Published

03-11-2025

How to Cite

Nlerum, P. A., & Eleje, C. B. (2025). MULTILEVEL VERIFICATION SYSTEM FOR MITIGATING CYBER RISKS IN UPSTREAM OPERATIONS OF SMART OILFIELDS. FUDMA JOURNAL OF SCIENCES, 9(11), 335 – 344. https://doi.org/10.33003/fjs-2025-0911-4007

How to Cite

Nlerum, P. A., & Eleje, C. B. (2025). MULTILEVEL VERIFICATION SYSTEM FOR MITIGATING CYBER RISKS IN UPSTREAM OPERATIONS OF SMART OILFIELDS. FUDMA JOURNAL OF SCIENCES, 9(11), 335 – 344. https://doi.org/10.33003/fjs-2025-0911-4007