2022 IEEE World Conference on Applied Intelligence and Computing (AIC),
Journal Year:
2023,
Volume and Issue:
unknown
Published: July 29, 2023
Efficient
malware
identification
is
essential
to
safe
the
system
resources
and
privacy
of
data
for
cybersecurity
system.
The
use
android
smartphones
has
increased
tremendously
that
attracting
various
types
attacks.
Nowadays,
writers
Artificial
Intelligence
(AI)-enabled
attack
techniques
bypass
detection
malicious
activities.
Hence,
designing
an
efficient,
effective
robust
identify
variants
remains
a
critical
problem
challenge.
However,
number
deep
learning
(DL)
models
applied
in
existing
methods
at
large
scale,
but
these
actually
lacks
interpretability
explain
contribution
each
features
Therefore,
this
paper
propose
Explainable
(XAI)
based
hybrid
Convolutional
Neural
network
(CNN)
Bi-Gated
Recurrent
Unit
(Bi-GRU)
Android
Malware
Detection
(AMD)
System
using
DL
named
as
XAI-AMD-DL.
proposed
model
evaluated
CICAndMal2019
dataset.
results
obtained
by
XAI-AMD-DL
97.98%
accuracy,
97.75
%,
97.76%,
97.75%
precision,
recall
f1score,
respectively
outperforms
models.
Decision Analytics Journal,
Journal Year:
2023,
Volume and Issue:
7, P. 100206 - 100206
Published: March 24, 2023
Internet
of
Things
(IoT)
enabled
networks
are
highly
vulnerable
to
cyber
threats
due
insecure
wireless
communication,
resource
constraint
architecture,
different
types
IoT
devices,
and
a
high
volume
sensor
data
being
transported
across
the
network.
Therefore,
IoT-compatible
cybersecurity
solutions
required.
An
intrusion
detection
system
is
one
most
common
for
detecting
in
IoT-enabled
networks.
However,
existing
threat
suffer
from
many
issues
like
poor
accuracy,
learning
complexity,
low
scalability,
false
positive
rate
(FPR).
We
propose
metaheuristic-based
intelligent
novel
framework
using
ensemble
feature
selection
classification
approaches
overcome
these
issues.
First,
designed
Binary
Gravitational
Search
Algorithm
(BGSA)
Grey
Wolf
Optimization
(BGWO)
get
an
optimized
set
features
avoid
curse
dimensionality
efficient
learning.
Next,
Decision
Tree
learning-based
techniques
such
as
AdaBoost
Random
Forest
(RF)
employed
separately
detect
classify
threats.
The
UNSW-NB15
dataset
assesses
effectiveness
proposed
framework,
its
performance
evaluated
against
recent
state-of-the-art
frameworks.
Based
on
result
analysis,
it
found
that
RF
outperforms
modern
methods
subset
(4
out
42),
maximum
accuracy
(99.41%),
(99.09%),
F1-score
(99.33%)
with
lowest
FPR
(0.03%).
Journal Of Big Data,
Journal Year:
2024,
Volume and Issue:
11(1)
Published: Aug. 4, 2024
Abstract
As
the
number
and
cleverness
of
cyber-attacks
keep
increasing
rapidly,
it's
more
important
than
ever
to
have
good
ways
detect
prevent
them.
Recognizing
cyber
threats
quickly
accurately
is
crucial
because
they
can
cause
severe
damage
individuals
businesses.
This
paper
takes
a
close
look
at
how
we
use
artificial
intelligence
(AI),
including
machine
learning
(ML)
deep
(DL),
alongside
metaheuristic
algorithms
better.
We've
thoroughly
examined
over
sixty
recent
studies
measure
effective
these
AI
tools
are
identifying
fighting
wide
range
threats.
Our
research
includes
diverse
array
cyberattacks
such
as
malware
attacks,
network
intrusions,
spam,
others,
showing
that
ML
DL
methods,
together
with
algorithms,
significantly
improve
well
find
respond
We
compare
methods
out
what
they're
where
could
improve,
especially
face
new
changing
cyber-attacks.
presents
straightforward
framework
for
assessing
Methods
in
threat
detection.
Given
complexity
threats,
enhancing
regularly
ensuring
strong
protection
critical.
evaluate
effectiveness
limitations
current
proposed
models,
addition
algorithms.
vital
guiding
future
enhancements.
We're
pushing
smart
flexible
solutions
adapt
challenges.
The
findings
from
our
suggest
protecting
against
will
rely
on
continuously
updating
stay
ahead
hackers'
latest
tricks.
Journal of Cancer Research and Clinical Oncology,
Journal Year:
2024,
Volume and Issue:
150(10)
Published: Oct. 10, 2024
Breast
cancer
is
a
leading
global
health
issue,
contributing
to
high
mortality
rates
among
women.
The
challenge
of
early
detection
exacerbated
by
the
dimensionality
and
complexity
gene
expression
data,
which
complicates
classification
process.
Internet of Things and Cyber-Physical Systems,
Journal Year:
2024,
Volume and Issue:
4, P. 258 - 267
Published: Jan. 1, 2024
The
significance
of
intrusion
detection
systems
in
networks
has
grown
because
the
digital
revolution
and
increased
operations.
method
classifies
network
traffic
as
threat
or
normal
based
on
data
features.
Intrusion
system
faces
a
trade-off
between
various
parameters
such
accuracy,
relevance,
redundancy,
false
alarm
rate,
other
objectives.
paper
presents
systematic
review
Internet
Things
(IoT)
using
multi-objective
optimization
algorithms
(MOA),
to
identify
attempts
at
exploiting
security
vulnerabilities
reducing
chances
attacks.
MOAs
provide
set
optimized
solutions
for
process
highly
complex
IoT
networks.
This
identification
multiple
objectives
detection,
comparative
analysis
their
approaches,
datasets
used
evaluation.
show
encouraging
potential
enhance
conflicting
detection.
Additionally,
current
challenges
future
research
ideas
are
identified.
In
addition
demonstrating
new
advancements
techniques,
this
study
gaps
that
can
be
addressed
while
designing
The Journal of Supercomputing,
Journal Year:
2024,
Volume and Issue:
80(19), P. 26942 - 26984
Published: Aug. 29, 2024
Abstract
The
exponential
growth
of
Internet
Things
(IoT)
devices
underscores
the
need
for
robust
security
measures
against
cyber-attacks.
Extensive
research
in
IoT
community
has
centered
on
effective
traffic
detection
models,
with
a
particular
focus
anomaly
intrusion
systems
(AIDS).
This
paper
specifically
addresses
preprocessing
stage
datasets
and
feature
selection
approaches
to
reduce
complexity
data.
goal
is
develop
an
efficient
AIDS
that
strikes
balance
between
high
accuracy
low
time.
To
achieve
this
goal,
we
propose
hybrid
approach
combines
filter
wrapper
methods.
integrated
into
two-level
system.
At
level
1,
our
classifies
network
packets
normal
or
attack,
2
further
classifying
attack
determine
its
specific
category.
One
critical
aspect
consider
imbalance
these
datasets,
which
addressed
using
Synthetic
Minority
Over-sampling
Technique
(SMOTE).
evaluate
how
selected
features
affect
performance
machine
learning
model
across
different
algorithms,
namely
Decision
Tree,
Random
Forest,
Gaussian
Naive
Bayes,
k-Nearest
Neighbor,
employ
benchmark
datasets:
BoT-IoT,
TON-IoT,
CIC-DDoS2019.
Evaluation
metrics
encompass
accuracy,
precision,
recall,
F1-score.
Results
indicate
decision
tree
achieves
ranging
99.82
100%,
short
times
0.02
0.15
s,
outperforming
existing
architectures
networks
establishing
superiority
achieving
both
times.
Scientific Reports,
Journal Year:
2025,
Volume and Issue:
15(1)
Published: Jan. 14, 2025
Smart
devices
are
enabled
via
the
Internet
of
Things
(IoT)
and
connected
in
an
uninterrupted
world.
These
pose
a
challenge
to
cybersecurity
systems
due
attacks
network
communications.
Such
have
continued
threaten
operation
end-users.
Therefore,
Intrusion
Detection
Systems
(IDS)
remain
one
most
used
tools
for
maintaining
such
flaws
against
cyber-attacks.
The
dynamic
multi-dimensional
threat
landscape
IoT
increases
Traditional
IDS.
focus
this
paper
aims
find
key
features
developing
IDS
that
is
reliable
but
also
efficient
terms
computation.
Enhanced
Grey
Wolf
Optimization
(EGWO)
Feature
Selection
(FS)
implemented.
function
EGWO
remove
unnecessary
from
datasets
intrusion
detection.
To
test
new
FS
technique
decide
on
optimal
set
based
accuracy
achieved
feature
taking
filters,
recent
approach
relies
NF-ToN-IoT
dataset.
selected
evaluated
by
using
Random
Forest
(RF)
algorithm
combine
multiple
decision
trees
create
accurate
result.
experimental
outcomes
procedures
demonstrate
capacity
recommended
classification
methods
determine
Analysis
results
presents
performs
more
effectively
than
other
techniques
with
optimized
(i.e.,
23
out
43
features),
high
99.93%
improved
convergence.
Journal of Information and Telecommunication,
Journal Year:
2023,
Volume and Issue:
8(2), P. 189 - 207
Published: Nov. 6, 2023
This
research
introduces
innovative
approaches
to
enhance
intrusion
detection
systems
(IDSs)
by
addressing
critical
challenges
in
existing
methods.
Various
machine-learning
techniques,
including
nature-inspired
metaheuristics,
Bayesian
algorithms,
and
swarm
intelligence,
have
been
proposed
the
past
for
attribute
selection
IDS
performance
improvement.
However,
these
methods
often
fallen
short
terms
of
accuracy,
rate,
precision,
F-score.
To
tackle
issues,
paper
presents
a
novel
hybrid
feature
approach
combining
Bat
metaheuristic
algorithm
with
Residue
Number
System
(RNS).
Initially,
is
utilized
partition
training
data
eliminate
irrelevant
attributes.
Recognizing
algorithm's
slower
testing
times,
RNS
incorporated
processing
speed.
Additionally,
principal
component
analysis
(PCA)
employed
extraction.
In
second
phase,
excluded
selection,
allowing
perform
this
task
while
PCA
handles
Subsequently,
classification
conducted
using
naive
bayes,
k-Nearest
Neighbors.
Experimental
results
demonstrate
remarkable
effectiveness
algorithm,
achieving
outstanding
rates,
F-scores.
Notably,
fusion
doubles
The
findings
are
further
validated
through
benchmarking
against
methods,
establishing
their
competitiveness.
IEEE Access,
Journal Year:
2024,
Volume and Issue:
12, P. 21745 - 21764
Published: Jan. 1, 2024
Robust
Intrusion
Detection
Systems
(IDS)
are
increasingly
necessary
in
the
age
of
big
data
due
to
growing
volume,
velocity,
and
variety
generated
by
modern
networks.
Metaheuristic
algorithms
offer
a
promising
approach
enhance
IDS
performance
terms
optimal
feature
selection.
Combining
these
along
with
Machine
learning
(ML)
for
creation
an
makes
it
possible
improve
detection
accuracy,
reduce
false
positives
negatives,
efficiency
network
monitoring.
Our
study
proposes
using
metaheuristic
machine
classifiers
selection
optimize
number
features
from
set
computer
traffic.
We
have
tested
several
combinations
viz.,
Genetic
Algorithm
(GA),
Particle
Swarm
Optimization
(PSO)
Grey
Wolf
Optimizer
(GWO)
ML
Decision
Tree
(DT),
Random
Forest
(RF),
Gaussian
Naïve
Bayes
(GNB)
Logistic
Regression
(LR).
The
been
over
NSS-KDD
kddcupdata_10%
sets.
drawn
insights
on
scores
respect
test
scores,
FI
recall
precision
various
algorithm
combinations.
time
has
also
highlighted
showcase
fastest-performing
Ultimately,
we
presented
three
depending
organizational
requirements
provided
separate
solutions
each.