Adaptive Cybersecurity Neural Networks: An Evolutionary Approach for Enhanced Attack Detection and Classification

被引:3
|
作者
Al Hwaitat, Ahmad K. [1 ]
Fakhouri, Hussam N. [2 ]
机构
[1] Univ Jordan, King Abdullah II Sch Informat Technol, Comp Sci Dept, Amman 11942, Jordan
[2] Univ Petra, Fac Informat Technol, Data Sci & Artificial Intelligence Dept, Amman 11196, Jordan
来源
APPLIED SCIENCES-BASEL | 2024年 / 14卷 / 19期
关键词
cybersecurity; neural networks; attack detection; metaheuristic; OPTIMIZATION ALGORITHM; MACHINE; SECURITY; INFORMATION;
D O I
10.3390/app14199142
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The increasing sophistication and frequency of cyber threats necessitate the development of advanced techniques for detecting and mitigating attacks. This paper introduces a novel cybersecurity-focused Multi-Layer Perceptron (MLP) trainer that utilizes evolutionary computation methods, specifically tailored to improve the training process of neural networks in the cybersecurity domain. The proposed trainer dynamically optimizes the MLP's weights and biases, enhancing its accuracy and robustness in defending against various attack vectors. To evaluate its effectiveness, the trainer was tested on five widely recognized security-related datasets: NSL-KDD, CICIDS2017, UNSW-NB15, Bot-IoT, and CSE-CIC-IDS2018. Its performance was compared with several state-of-the-art optimization algorithms, including Cybersecurity Chimp, CPO, ROA, WOA, MFO, WSO, SHIO, ZOA, DOA, and HHO. The results demonstrated that the proposed trainer consistently outperformed the other algorithms, achieving the lowest Mean Square Error (MSE) and highest classification accuracy across all datasets. Notably, the trainer reached a classification rate of 99.5% on the Bot-IoT dataset and 98.8% on the CSE-CIC-IDS2018 dataset, underscoring its effectiveness in detecting and classifying diverse cyber threats.
引用
收藏
页数:45
相关论文
共 50 条
  • [21] Enhanced Approach to Detection of SQL Injection Attack
    Karuparthi, Raja Prasad
    Zhou, Bing
    2016 15TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2016), 2016, : 466 - 469
  • [22] Intrusion Detection Using Evolutionary Neural Networks
    Michailidis, Emmanuel
    Katsikas, Sokratis K.
    Georgopoulos, Efstratios
    PCI 2008: 12TH PAN-HELLENIC CONFERENCE ON INFORMATICS, PROCEEDINGS, 2008, : 8 - +
  • [23] ADMM Attack: An Enhanced Adversarial Attack for Deep Neural Networks with Undetectable Distortions
    Zhao, Pu
    Xu, Kaidi
    Liu, Sijia
    Wang, Yanzhi
    Lin, Xue
    24TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE (ASP-DAC 2019), 2019, : 499 - 505
  • [24] Evolutionary approach to design of Artificial Neural Networks
    de Campos, LML
    Roisenberg, M
    de Campos, GAL
    LOGIC, ARTIFICIAL INTELLIGENCE AND ROBOTICS, 2001, 7 : 35 - 42
  • [25] Botnet Attack Detection Approach in IoT Networks
    Tatarnikova, T. M.
    Sikarev, I. A.
    Bogdanov, P. Yu.
    Timochkina, T. V.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2022, 56 (08) : 838 - 846
  • [26] Botnet Attack Detection Approach in IoT Networks
    T. M. Tatarnikova
    I. A. Sikarev
    P. Yu. Bogdanov
    T. V. Timochkina
    Automatic Control and Computer Sciences, 2022, 56 : 838 - 846
  • [27] Classification optimization node injection attack on graph neural networks
    Ma, Mingda
    Xia, Hui
    Li, Xin
    Zhang, Rui
    Xu, Shuo
    KNOWLEDGE-BASED SYSTEMS, 2024, 301
  • [28] Dynamics-Aware Adversarial Attack of Adaptive Neural Networks
    Tao, An
    Duan, Yueqi
    Wang, Yingqi
    Lu, Jiwen
    Zhou, Jie
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2024, 34 (07) : 5505 - 5518
  • [29] Conformalized Adversarial Attack Detection for Graph Neural Networks
    Ennadir, Sofiane
    Alkhatib, Amr
    Bostrom, Henrik
    Vazirgiannis, Michalis
    CONFORMAL AND PROBABILISTIC PREDICTION WITH APPLICATIONS, VOL 204, 2023, 204 : 311 - 323
  • [30] A neural network application for attack detection in computer networks
    de Sá Silva, L
    dos Santos, ACF
    da Silva, JDS
    Montes, A
    2004 IEEE INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1-4, PROCEEDINGS, 2004, : 1569 - 1574