I. Introduction
The increasing integration of the state-of-the-art information and communication technologies (ICTs) in the processes of current industrial control systems (ICSs), e.g., the power generation systems, gas pipeline systems, and urban railway transportation systems, leads to the emergence of industrial cyber–physical system (ICPS) [1]. However, this brings about direct challenges to the safe and reliable operation of the industrial processes due to the threats and attacks from the cyberspace. Different forms of attacks are available in the current ICPS, including reconnaissance (e.g., port scanning and address sweeps), DDoS attack (e.g., TCP/UDP flooding and SYN flooding), spoofing attack (e.g., ARP spoofing and ICMP Smurf), and other attacks (e.g., replay attack, packet tampering, false data injection, and 0-day attack). These attacks are dedicated to causing network anomaly (e.g., information interception, privilege escalation, and remote control) that leads to disastrous physical damages [2].