Back to Search Start Over

Cybersecurity Threats Detection Using Optimized Machine Learning Frameworks.

Authors :
Omer, Nadir
Samak, Ahmed H.
Taloba, Ahmed I.
Abd El-Aziz, Rasha M.
Source :
Computer Systems Science & Engineering; 2024, Vol. 48 Issue 1, p77-95, 19p
Publication Year :
2024

Abstract

Today’s world depends on the Internet to meet all its daily needs. The usage of the Internet is growing rapidly. The world is using the Internet more frequently than ever. The hazards of harmful attacks have also increased due to the growing reliance on the Internet. Hazards to cyber security are actions taken by someone withmalicious intent to steal data, destroy computer systems, or disrupt them. Due to rising cyber security concerns, cyber security has emerged as the key component in the fight against all online threats, forgeries, and assaults. A device capable of identifying network irregularities and cyber-attacks is intrusion detection. Several techniques have been created for Intrusion Detection Systems (IDS). There are elements in their effectiveness. Nevertheless, that provides room for more study. Finding an automatic method for detecting cyber-attacks is one of the biggest problems in cyber security. The recent trend is that the Machine Learning (ML) method has been demonstrated to be superior to conventionalmethods for IDS.Utilizingmachine learning approaches, an effective intrusion prevention systemwill be designed. This research assessed different intrusion detection classification systems with particular applications. Before using ML classifiers for the classification process, the matrix factorization step of the Particle Swarm Optimization (PSO) technique was carried out. The categorization methods used in this study to classify network abnormalities were taken into consideration. Particle Swarm Optimization and Support VectorMachine classifiers (PSO+SVM) will be utilized in the proposed approach. The KDD-CUP 99 dataset will be used to confirm the results of the recognition algorithms. Due to the implementation, several performance metrics will be evaluated for various cyber-attack types, including specificity, recall, F1-score, accuracy, precision, and reliability. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
02676192
Volume :
48
Issue :
1
Database :
Complementary Index
Journal :
Computer Systems Science & Engineering
Publication Type :
Academic Journal
Accession number :
175351668
Full Text :
https://doi.org/10.32604/csse.2023.039265