“…Privacypreservingtechniquesareintroducedforavoidingsensitiveinformation(PawarandAnuradha,2020 ;Jadhav et al, 2016). Asymmetric and symmetric encryption are the traditional tools to protect privacy,andisbroadlyutilizedforpreventingtheunauthorizedusersaccessingsensitiveinformation transmitted through the networks (Baby and Chandra, 2016). Identifying anomalous behavior of thephysicalprocesswithrespecttofaultidentificationwherebothcyber-attacksandfaultsproduce anomalyinthephysicalprocess.Moreover,thepatternsofcyber-attacksaswellasfaultsaredifferent andhence,theattacksarenottreatedasfaultsintheCPS (Basile,et al,2006).TheIDSisclassifiedto anomaly-basedandsignature-basedapproaches (VeeraiahandKrishna,2018).Here,theanomalyand signature-enabledIndustrialIDS(IIDS)arecomplementary.However,theSignature-enabledIIDSs removeanddetecttheillegalpacketsintheCPSinwhichtheanomaly-basedIIDSsisutilizedtoextract normalbehaviorandtodetecttheanomaly (Garcia-Teodoro,et al,2009;Liu,2020).Nowadays, thenetworkintrusiondetectionapproachesareprogressedtothehighlysophisticatedlevels,which involvesadvancedsignalprocessingmethods,butthetimeseriesanalysis,wavelets,andtheprincipal componentanalysis,whencomparedtoothertechniques,arenotlimited.Hence,thebroadlyutilized detectorsarenon-signatureandsignaturefordetectingnetworkanomalies (Sadreazami,et al,2017).…”