Computers & Electrical Engineering, Год журнала: 2024, Номер 121, С. 109926 - 109926
Опубликована: Дек. 1, 2024
Язык: Английский
Computers & Electrical Engineering, Год журнала: 2024, Номер 121, С. 109926 - 109926
Опубликована: Дек. 1, 2024
Язык: Английский
Journal Of Big Data, Год журнала: 2024, Номер 11(1)
Опубликована: Авг. 4, 2024
Abstract As the number and cleverness of cyber-attacks keep increasing rapidly, it's more important than ever to have good ways detect prevent them. Recognizing cyber threats quickly accurately is crucial because they can cause severe damage individuals businesses. This paper takes a close look at how we use artificial intelligence (AI), including machine learning (ML) deep (DL), alongside metaheuristic algorithms better. We've thoroughly examined over sixty recent studies measure effective these AI tools are identifying fighting wide range threats. Our research includes diverse array cyberattacks such as malware attacks, network intrusions, spam, others, showing that ML DL methods, together with algorithms, significantly improve well find respond We compare methods out what they're where could improve, especially face new changing cyber-attacks. presents straightforward framework for assessing Methods in threat detection. Given complexity threats, enhancing regularly ensuring strong protection critical. evaluate effectiveness limitations current proposed models, addition algorithms. vital guiding future enhancements. We're pushing smart flexible solutions adapt challenges. The findings from our suggest protecting against will rely on continuously updating stay ahead hackers' latest tricks.
Язык: Английский
Процитировано
39Computers & Electrical Engineering, Год журнала: 2024, Номер 115, С. 109113 - 109113
Опубликована: Фев. 10, 2024
In the rapidly evolving landscape of Internet Things (IoT), ensuring robust intrusion detection is paramount for device and data security. This paper proposes a novel method in IoT networks that leverages unique blend subspace clustering ensemble learning. Our framework integrates three innovative strategies: Clustering Results as Features (CRF), Two-Level Decision Making (TDM), Iterative Feedback Loop (IFL). These strategies synergize to enhance performance model robustness. We employ mutual information feature selection utilize four algorithms – CLIQUE, PROCLUS, SUBCLU, LOF create additional sets. Three base learners NB, LGBM, XGB are used conjunction with Logistic Regression (LR) meta-learner. To fine-tune our model, we apply Particle Swarm Optimization (PSO) hyperparameter optimization. evaluate on UNSW-NB15 dataset, which contains realistic diverse network traffic data. The results show outperforms state-of-the-art methods terms accuracy (97.05%), precision (96.33%), recall (96.55%), F1-score (96.45%), false positive rate (0.029). can effectively detect both known unknown attacks achieve high low rate. contributes practical implications security theoretical advancements research.
Язык: Английский
Процитировано
7Computers, Год журнала: 2025, Номер 14(3), С. 82 - 82
Опубликована: Фев. 25, 2025
Recent advancements across various sectors have resulted in a significant increase the utilization of smart gadgets. This augmentation has an expansion network and devices linked to it. Nevertheless, development concurrently rise policy infractions impacting information security. Finding intruders immediately is critical component maintaining The intrusion detection system useful for security because it can quickly identify threats give alarms. In this paper, new approach was proposed. Combining results machine learning models like random forest, decision tree, k-nearest neighbors, XGBoost with logistic regression as meta-model what method based on. For feature selection technique, proposed creates advanced that combines correlation-based embedded technique on XGBoost. handling challenge imbalanced dataset, SMOTE-TOMEK used. suggested algorithm tested NSL-KDD CIC-IDS datasets. It shows high performance accuracy 99.99% both These prove effectiveness approach.
Язык: Английский
Процитировано
1Cyber Security and Applications, Год журнала: 2024, Номер 3, С. 100082 - 100082
Опубликована: Дек. 20, 2024
Язык: Английский
Процитировано
5Computers & Security, Год журнала: 2024, Номер 148, С. 104132 - 104132
Опубликована: Сен. 26, 2024
Язык: Английский
Процитировано
3Computers in Biology and Medicine, Год журнала: 2025, Номер 186, С. 109603 - 109603
Опубликована: Янв. 1, 2025
Язык: Английский
Процитировано
0Peer-to-Peer Networking and Applications, Год журнала: 2025, Номер 18(2)
Опубликована: Янв. 20, 2025
Язык: Английский
Процитировано
0International Journal of Recent Technology and Engineering (IJRTE), Год журнала: 2025, Номер 13(5), С. 27 - 42
Опубликована: Янв. 25, 2025
A considerable concern arises with the precise identification of brute-force threats within a networked environment. It emphasizes need for new methods, as existing ones often lead to many false alarms, well delays in real-time threat detection. To tackle these issues, this study proposes novel intrusion detection framework that utilizes deep learning models more accurate and efficient attacks. The framework’s structure includes data collection preprocessing components performed at outset using CSE-CICIDS2018 dataset. design architecture steps. Feature extraction selection techniques are employed optimize model training. Further, after building model, various attributes extracted from feature be used Then, construction multiple architectures algorithms, which include Artificial Neural Networks (ANN), Convolutional (CNN), Recurrent (RNN), Long Short-Term Memory (LSTM) models. Evaluation results show CNN LSTM achieved highest accuracy 99.995 Parsant 99.99 respectively. showcases its ability detect complex attack patterns network traffic. indicates got best optimum test time 9.94 seconds. This establishes an effective method, achieving high quickly. In comparison, we have surpassed current methods while addressing their weaknesses. findings consistent effectiveness frameworks faster alternative, increasing capability detecting intrusions on real-time.
Язык: Английский
Процитировано
0Engineering Technology & Applied Science Research, Год журнала: 2025, Номер 15(1), С. 19267 - 19272
Опубликована: Фев. 2, 2025
Intrusion Detection Systems (IDSs) are the cornerstone of cybersecurity, monitoring network traffic to find abnormal suspicious activities. Traditional IDSs usually face challenges in adapting cyber threats that evolve day by day, leading very high false positive rates and missed detections. This study focuses on enhancing performance an IDS system integrating deep learning techniques with time series data. The efficiency RNN, CNN, LSTM networks was evaluated detecting intrusions real-time. experimental results showed hybrid models, especially CNN+RNN+LSTM combination, performed best a 0.86 F1 score, 0.92 precision, 0.79 recall, indicating methods can improve detection accuracy while reducing alarms, opening resilient future for cybersecurity.
Язык: Английский
Процитировано
0Journal of Systems and Software, Год журнала: 2025, Номер 223, С. 112373 - 112373
Опубликована: Фев. 13, 2025
Язык: Английский
Процитировано
0