Stochastic gradient boosted distributed decision trees security approach for detecting cyber anomalies and classifying multiclass cyber-attacks

被引:0
|
作者
Sekhar, J.C. [1 ]
Priyanka, R. [2 ]
Nanda, Ashok Kumar [3 ]
Josephson, P Joel [4 ]
Ebinezer, M.J.D. [5 ]
Devi, T Kalavathi [6 ]
机构
[1] Department of Computer Science and Engineering, NRI Institute of Technology, Andhra Pradesh, Guntur, India
[2] Department of Networking and Communications, School of Computing, Faculty of Engineering and Technology, SRM Institute of Science and Technology, Kattankulathur, Tamilnadu, 603203, India
[3] Department of Computer Science and Engineering, B V Raju Institute of Technology, Telangana, Narsapur, India
[4] Department of Electronics and Communication Engineering, Malla Reddy Engineering College, Telangana, Hyderabad, India
[5] Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Andhra Pradesh, Vaddeswaram, India
[6] Department of Electronics and Instrumentation Engineering, Kongu Engineering College, Perundurai, India
来源
Computers and Security | 2025年 / 151卷
关键词
Adversarial machine learning - Phishing - Random forests;
D O I
10.1016/j.cose.2025.104320
中图分类号
学科分类号
摘要
Identifying cyber anomalies and attacks in today's cybersecurity environment is essential. We can solve these difficulties by combining artificial intelligence (AL) and machine learning (ML) methods. The specifics of the existing security mechanisms and the supply quality define how effective ML-based security systems will be in strengthening such measures. Developing a security system to identify unusual activity and classify threats in the growing complexity and regularity of attacks is essential. This article provides a successful method to identify and classify cyber anomalies. We use a novel method in combination with Stochastic Gradient Boosted Distributed Decision Trees (SGB-DDT) with Honeybees Mating Optimisation (HBMO). To improve the detection accuracy, we use SGD-DDT, a distributed learning technique that is both highly scalable and effective by combining the collective wisdom of several decision trees. The SGB approach's adaptability and error-learning properties make the model less vulnerable to dynamic cyberattacks. The complications of classifying cyberattacks into different types have prompted this research to propose an enhanced HBMO method. The HBMO method aims to improve model performance while reducing processing overhead, which takes inspiration from honeybee mating behaviour. This proposed method, SGB-DDT, can accurately identify several categories of cyberattacks using the enhanced HBMO method. We assess the proposed method using a large and varied dataset of cyberattack incidents from NSL-KDD and UNSW-NB15, encompassing common and uncommon attack types. The experiment results show that the SGB-DDT with higher HBMO outperforms traditional ML techniques. © 2025
引用
收藏
相关论文
共 27 条
  • [1] On the Security of Cyber-Physical Systems Against Stochastic Cyber-Attacks Models
    Abu Al-Haija, Qasem
    2021 IEEE INTERNATIONAL IOT, ELECTRONICS AND MECHATRONICS CONFERENCE (IEMTRONICS), 2021, : 155 - 160
  • [2] A Proposal for Detecting Distributed Cyber-Attacks Using Automatic Thresholding
    Feng, Yaokai
    Hori, Yoshiaki
    Sakurai, Kouichi
    2015 10TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2015, : 152 - 159
  • [3] Detecting network cyber-attacks using an integrated statistical approach
    Bouyeddou, Benamar
    Harrou, Fouzi
    Kadri, Benamar
    Sun, Ying
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (02): : 1435 - 1453
  • [4] Detecting network cyber-attacks using an integrated statistical approach
    Benamar Bouyeddou
    Fouzi Harrou
    Benamar Kadri
    Ying Sun
    Cluster Computing, 2021, 24 : 1435 - 1453
  • [5] A Behavior-Based Online Engine for Detecting Distributed Cyber-Attacks
    Feng, Yaokai
    Hori, Yoshiaki
    Sakurai, Kouichi
    INFORMATION SECURITY APPLICATIONS, WISA 2016, 2017, 10144 : 79 - 89
  • [6] Detecting cyber-attacks using a CRPS-based monitoring approach
    Harrou, Fouzi
    Bouyeddou, Benamar
    Sun, Ying
    Kadri, Benamar
    2018 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI), 2018, : 618 - 622
  • [7] Detecting Cyber-Attacks Against Cyber-Physical Manufacturing System: A Machining Process Invariant Approach
    Li, Zedong
    Chen, Xin
    Chen, Yuqi
    Li, Shijie
    Wang, Hangyu
    Lv, Shichao
    Sun, Limin
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (10): : 17602 - 17614
  • [8] Securing Smart Grids: Deep Reinforcement Learning Approach for Detecting Cyber-Attacks
    El-Toukhy, Ahmed T.
    Elgarhy, Islam
    Badr, Mahmoud M.
    Mahmoud, Mohamed
    Fouda, Mostafa M.
    Ibrahem, Mohamed I.
    Amsaad, Fathi
    2024 INTERNATIONAL CONFERENCE ON SMART APPLICATIONS, COMMUNICATIONS AND NETWORKING, SMARTNETS-2024, 2024,
  • [9] Detecting Phishing URLs Based on a Deep Learning Approach to Prevent Cyber-Attacks
    ul Haq, Qazi Emad
    Faheem, Muhammad Hamza
    Ahmad, Iftikhar
    APPLIED SCIENCES-BASEL, 2024, 14 (22):
  • [10] An algebraic detection approach for control systems under multiple stochastic cyber-attacks
    Li, Yumei
    Voos, Holger
    Darouach, Mohamed
    Hua, Changchun
    IEEE/CAA Journal of Automatica Sinica, 2015, 2 (03) : 258 - 266