Stochastic gradient boosted distributed decision trees security approach for detecting cyber anomalies and classifying multiclass cyber-attacks

被引:0
|
作者
Sekhar, J.C. [1 ]
Priyanka, R. [2 ]
Nanda, Ashok Kumar [3 ]
Josephson, P Joel [4 ]
Ebinezer, M.J.D. [5 ]
Devi, T Kalavathi [6 ]
机构
[1] Department of Computer Science and Engineering, NRI Institute of Technology, Andhra Pradesh, Guntur, India
[2] Department of Networking and Communications, School of Computing, Faculty of Engineering and Technology, SRM Institute of Science and Technology, Kattankulathur, Tamilnadu, 603203, India
[3] Department of Computer Science and Engineering, B V Raju Institute of Technology, Telangana, Narsapur, India
[4] Department of Electronics and Communication Engineering, Malla Reddy Engineering College, Telangana, Hyderabad, India
[5] Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Andhra Pradesh, Vaddeswaram, India
[6] Department of Electronics and Instrumentation Engineering, Kongu Engineering College, Perundurai, India
来源
Computers and Security | 2025年 / 151卷
关键词
Adversarial machine learning - Phishing - Random forests;
D O I
10.1016/j.cose.2025.104320
中图分类号
学科分类号
摘要
Identifying cyber anomalies and attacks in today's cybersecurity environment is essential. We can solve these difficulties by combining artificial intelligence (AL) and machine learning (ML) methods. The specifics of the existing security mechanisms and the supply quality define how effective ML-based security systems will be in strengthening such measures. Developing a security system to identify unusual activity and classify threats in the growing complexity and regularity of attacks is essential. This article provides a successful method to identify and classify cyber anomalies. We use a novel method in combination with Stochastic Gradient Boosted Distributed Decision Trees (SGB-DDT) with Honeybees Mating Optimisation (HBMO). To improve the detection accuracy, we use SGD-DDT, a distributed learning technique that is both highly scalable and effective by combining the collective wisdom of several decision trees. The SGB approach's adaptability and error-learning properties make the model less vulnerable to dynamic cyberattacks. The complications of classifying cyberattacks into different types have prompted this research to propose an enhanced HBMO method. The HBMO method aims to improve model performance while reducing processing overhead, which takes inspiration from honeybee mating behaviour. This proposed method, SGB-DDT, can accurately identify several categories of cyberattacks using the enhanced HBMO method. We assess the proposed method using a large and varied dataset of cyberattack incidents from NSL-KDD and UNSW-NB15, encompassing common and uncommon attack types. The experiment results show that the SGB-DDT with higher HBMO outperforms traditional ML techniques. © 2025
引用
收藏
相关论文
共 27 条
  • [21] Gradient boosting decision trees for cyber security threats detection based on network events logs
    Quang Hieu Vu
    Ruta, Dymitr
    Cen, Ling
    2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 5921 - 5928
  • [22] Anomalous distributed traffic: Detecting cyber security attacks amongst microservices using graph convolutional networks
    Jacob, Stephen
    Qiao, Yuansong
    Ye, Yuhang
    Lee, Brian
    COMPUTERS & SECURITY, 2022, 118
  • [23] AI-Driven Approach for Detecting Cyber-Attacks Targeting Two-Area Four-Machine System
    Elshamy, Ahmed
    Abughali, Ahmed
    Alansari, Mohamad
    Habash, Obadah
    Al Sumaiti, Ameena
    Svetinovic, Davor
    2024 IEEE KANSAS POWER AND ENERGY CONFERENCE, KPEC 2024, 2024,
  • [24] Dynamic event-triggered security control for networked control systems with cyber-attacks: A model predictive control approach
    Li, Bin
    Zhou, Xinglian
    Ning, Zhaoke
    Guan, Xiaoyi
    Yiu, Ka-Fai Cedric
    INFORMATION SCIENCES, 2022, 612 : 384 - 398
  • [25] Detecting and mitigating security anomalies in Software-Defined Networking (SDN) using Gradient-Boosted Trees and Floodlight Controller characteristics
    Jafarian, Tohid
    Ghaffari, Ali
    Seyfollahi, Ali
    Arasteh, Bahman
    COMPUTER STANDARDS & INTERFACES, 2025, 91
  • [26] Evading Cyber-Attacks on Hadoop Ecosystem: A Novel Machine Learning-Based Security-Centric Approach towards Big Data Cloud
    Sharma, Neeraj A.
    Kumar, Kunal
    Khorshed, Tanzim
    Ali, A. B. M. Shawkat
    Khalid, Haris M.
    Muyeen, S. M.
    Jose, Linju
    INFORMATION, 2024, 15 (09)
  • [27] Distributed Deep Neural-Network-Based Middleware for Cyber-Attacks Detection in Smart IoT Ecosystem: A Novel Framework and Performance Evaluation Approach
    Bhandari, Guru
    Lyth, Andreas
    Shalaginov, Andrii
    Gronli, Tor-Morten
    ELECTRONICS, 2023, 12 (02)