IEEE Access,
Год журнала:
2024,
Номер
12, С. 12229 - 12256
Опубликована: Янв. 1, 2024
Given
the
continually
rising
frequency
of
cyberattacks,
adoption
artificial
intelligence
methods,
particularly
Machine
Learning
(ML),
Deep
(DL),
and
Reinforcement
(RL),
has
become
essential
in
realm
cybersecurity.
These
techniques
have
proven
to
be
effective
detecting
mitigating
which
can
cause
significant
harm
individuals,
organizations,
even
countries.
learning
algorithms
use
statistical
methods
identify
patterns
anomalies
large
datasets,
enabling
security
analysts
detect
previously
unknown
threats.
learning,
a
subfield
ML,
shown
great
potential
improving
accuracy
efficiency
cybersecurity
systems,
image
speech
recognition.
On
other
hand,
RL
is
again
machine
that
trains
learn
through
trial
error,
making
it
dynamic
environments.
We
also
evaluated
usage
ChatGPT-like
AI
tools
cyber-related
problem
domains
on
both
sides,
positive
negative.
This
article
provides
an
overview
how
DL,
are
applied
cybersecurity,
including
their
malware
detection,
intrusion
vulnerability
assessment,
areas.
The
state-of-the-art
studies
using
models
each
section
based
main
idea,
techniques,
important
findings.
It
discusses
these
techniques'
challenges
limitations,
data
quality,
interpretability,
adversarial
attacks.
Overall,
holds
promise
for
effectiveness
systems
enhancing
our
ability
protect
against
cyberattacks.
However,
continue
developing
refining
address
ever-evolving
nature
cyber
Besides,
some
promising
solutions
rely
deep
reinforcement
susceptible
attacks,
underscoring
importance
factoring
this
when
devising
countermeasures
sophisticated
concluded
ChatGPT
valuable
tool
but
should
noted
manipulated
threaten
integrity,
confidentiality,
availability
data.
Journal Of Big Data,
Год журнала:
2024,
Номер
11(1)
Опубликована: Авг. 4, 2024
Abstract
As
the
number
and
cleverness
of
cyber-attacks
keep
increasing
rapidly,
it's
more
important
than
ever
to
have
good
ways
detect
prevent
them.
Recognizing
cyber
threats
quickly
accurately
is
crucial
because
they
can
cause
severe
damage
individuals
businesses.
This
paper
takes
a
close
look
at
how
we
use
artificial
intelligence
(AI),
including
machine
learning
(ML)
deep
(DL),
alongside
metaheuristic
algorithms
better.
We've
thoroughly
examined
over
sixty
recent
studies
measure
effective
these
AI
tools
are
identifying
fighting
wide
range
threats.
Our
research
includes
diverse
array
cyberattacks
such
as
malware
attacks,
network
intrusions,
spam,
others,
showing
that
ML
DL
methods,
together
with
algorithms,
significantly
improve
well
find
respond
We
compare
methods
out
what
they're
where
could
improve,
especially
face
new
changing
cyber-attacks.
presents
straightforward
framework
for
assessing
Methods
in
threat
detection.
Given
complexity
threats,
enhancing
regularly
ensuring
strong
protection
critical.
evaluate
effectiveness
limitations
current
proposed
models,
addition
algorithms.
vital
guiding
future
enhancements.
We're
pushing
smart
flexible
solutions
adapt
challenges.
The
findings
from
our
suggest
protecting
against
will
rely
on
continuously
updating
stay
ahead
hackers'
latest
tricks.
IEEE Access,
Год журнала:
2024,
Номер
12, С. 8846 - 8874
Опубликована: Янв. 1, 2024
The
adoption
of
cloud
computing
has
become
increasingly
widespread
across
various
domains.
However,
the
inherent
security
vulnerabilities
pose
significant
risks
to
its
overall
safety.
Consequently,
intrusion
detection
systems
(IDS)
play
a
pivotal
role
in
identifying
malicious
activities
within
system.
considerable
volume
network
traffic
data
may
contain
redundant
and
irrelevant
features
that
can
impact
classification
performance
classifier.
In
addition,
complexity
time
consumption
increase
while
processing
such
substantial
process.
To
enhance
IDS,
this
study
proposes
hybrid
feature
selection
approach,
combining
two
bio-inspired
algorithms,
namely
grasshopper
optimization
algorithm
(GOA)
genetic
(GA).
combination
these
algorithms
ensures
more
efficient
search
for
optimal
solutions.
A
random
forest
(RF)
classifier
is
trained
using
those
features.
Moreover,
proposal
addresses
challenge
imbalanced
by
employing
approach:
over-sampling
minority
classes
an
adaptive
synthetic
(ADASYN)
algorithm,
implementing
under-sampling
(RUS)
majority
class
as
needed.
This
integrated
strategy
significantly
influences
each
category,
enhancing
true
positive
rate
(TPR)
minimizing
false
(FPR),
thus
improving
system
performance.
proposed
approach
was
evaluated
three
datasets:
UNSW-NB15,
CIC-DDoS2019,
CIC
Bell
DNS
EXF
2021.
recorded
accuracies
datasets
were
98%,
99%,
92%,
respectively.
selection-based
IDS
demonstrated
superior
multi-class
classification,
along
with
exemplary
results
individual
datasets.
exhibited
marked
superiority
classifier,
especially
when
compared
other
classifiers
including
SVM,
LR,
FLN,
LSTM,
AlexNet,
DNN,
DBN,
DT,
XGBoost.
remained
consistent
commendable
even
benchmarked
against
contemporary
state-of-the-art
methodologies
multiple
evaluation
metrics.
International Journal of Computational and Experimental Science and Engineering,
Год журнала:
2025,
Номер
11(1)
Опубликована: Фев. 28, 2025
Internet
of
Things
(IoT)
applications
have
made
inroads
into
different
domains,
providing
unique
solutions—Internet
technology
offers
seamless
integration
physical
and
digital
worlds.
However,
the
broad
nature
technologies
protocols
used
in
IoT
has
increased
vulnerability
from
malicious
attackers.
Hence,
protecting
cyber-attacks
is
imperative.
Researchers
implemented
intrusion
detection
systems
to
overcome
this
issue
improve
cybersecurity
scenarios.
With
new
threats
cybercrime
emerging,
a
continuous
effort
required
enhance
security
applications.
To
address
pressing
need,
we
present
our
study
that
proposes
deep
learning-based
framework
bolster
at
use
cases
level
by
exploiting
power
transfer
learning
ensembling
it
models
pre-trained
larger
datasets.
Deep
attain
high
performance
with
help
hyperparameter
tuning,
achieve
through
PSO
proposed
system.
Our
ensemble
system
shows
how
individual
can
outperform
using
best-performing
as
constituents
approach.
We
introduce
an
algorithm
called
—
Optimized
Ensemble
Learning-Based
Intrusion
Detection
(OEL-ID).
This
leverages
corresponding
optimization
strategies
boost
for
improved
cyber
Using
UNSW-NB15
benchmark
dataset,
empirical
demonstrates
method,
compared
some
existing
models,
obtained
accuracy
98.89%,
which,
turn,
provided
highest
comparative
accuracy.
Therefore,
be
allows
significant
system's
underlying
Sensors,
Год журнала:
2023,
Номер
23(13), С. 6176 - 6176
Опубликована: Июль 5, 2023
Distributed
denial-of-service
(DDoS)
attacks
pose
a
significant
cybersecurity
threat
to
software-defined
networks
(SDNs).
This
paper
proposes
feature-engineering-
and
machine-learning-based
approach
detect
DDoS
in
SDNs.
First,
the
CSE-CIC-IDS2018
dataset
was
cleaned
normalized,
optimal
feature
subset
found
using
an
improved
binary
grey
wolf
optimization
algorithm.
Next,
trained
tested
Random
Forest
(RF),
Support
Vector
Machine
(SVM),
K-Nearest
Neighbor
(k-NN),
Decision
Tree,
XGBoost
machine
learning
algorithms,
from
which
best
classifier
selected
for
attack
detection
deployed
SDN
controller.
The
results
show
that
RF
performs
when
compared
across
several
performance
metrics
(e.g.,
accuracy,
precision,
recall,
F1
AUC
values).
We
also
explore
comparison
between
different
models
algorithms.
our
proposed
method
performed
can
effectively
identify
SDNs,
providing
new
idea
solution
security
of