Artificial intelligence-driven cybersecurity: enhancing malicious domain detection using attention-based deep learning model with optimization algorithms

被引:0
作者
Alhayan, Fatimah [1 ]
Alshuhail, Asma [2 ]
Ismail, Ahmed Omer Ahmed [3 ]
Alrusaini, Othman [4 ]
Alahmari, Sultan [5 ]
Yahya, Abdulsamad Ebrahim [6 ]
Abdullah, Monir [7 ]
Al Zanin, Samah [8 ]
机构
[1] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Syst, POB 84428, Riyadh 11671, Saudi Arabia
[2] King Faisal Univ, Coll Comp Sci & Informat Technol, Dept Informat Syst, Al Hufuf, Saudi Arabia
[3] King Khalid Univ, Appl Coll Mahayil, Dept Informat Syst, Abha, Saudi Arabia
[4] Umm Al Qura Univ, Appl Coll, Dept Engn & Appl Sci, Mecca, Saudi Arabia
[5] King Abdul Aziz City Sci & Technol KACST, Cybersecur Inst, Riyadh, Saudi Arabia
[6] Univ Northern Border, Coll Comp & Informat Technol, Informat Technol Dept, Ar Ar, Saudi Arabia
[7] Univ Bisha, Coll Comp & Informat Technol, Dept Comp Sci & Artificial Intelligence, Bisha 67714, Saudi Arabia
[8] Prince Sattam Bin Abdulaziz Univ, Dept Comp Sci, Apppl Coll, Kharj, Saudi Arabia
来源
SCIENTIFIC REPORTS | 2025年 / 15卷 / 01期
关键词
Malicious domain detection; Deep learning; Cybersecurity; Artificial intelligence; Feature selection; NAMES;
D O I
10.1038/s41598-025-99420-y
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Malicious domains are one of the main resources mandatory for adversaries to run attacks over the Internet. Owing to the significant part of the domain name system (DNS), detailed research has been performed to detect malicious fields according to their unique behaviour, which is considered in dissimilar stages of the DNS life cycle queries and explanations. The DNS has played a crucial role in the evolution of the Internet. Its primary objective is to simplify user experience by converting a website's Internet Protocol (IP) address into a recognizable domain name and vice versa. Identifying these adverse fields is meaningful in contesting increased network attacks. Artificial intelligence (AI) is applied to develop the areas of malicious domain recognition and hindrance by the probability to improve robust, efficient, and scalable malware detection units. AI methods have expressed significant results in malicious domain detection. This manuscript presents an Enhance Malicious Domain Detection Using an Attention-Based Deep Learning Model with Optimization Algorithms (EMDD-ADLMOA) technique. The proposed EMDD-ADLMOA technique relies on improving malicious domain detection in cybersecurity. Initially, the min-max scaling method is utilized in the pre-processing phase to convert input data into an appropriate design. For feature selection (FS), the proposed EMDD-ADLMOA technique utilizes the quantum-inspired firefly algorithm (QIFA) model. Furthermore, the hybrid model of a temporal convolutional network and bi-directional long short-term memory with squeeze-and-excitation Attention (TCN-BiLSTM-SEA) model is employed for the classification process. Finally, the parrot optimization (PO) model optimally fine-tunes the hyperparameter values of the TCN-BiLSTM-SEA model. The performance results of the EMDD-ADLMOA approach are verified under a malicious dataset. The experimental validation of the EMDD-ADLMOA approach portrayed a superior accuracy value of 98.52% over existing techniques.
引用
收藏
页数:18
相关论文
共 40 条
[1]   Enhancing cybersecurity incident response: AI-driven optimization for strengthened advanced persistent threat detection [J].
Ali, Gauhar ;
Shah, Sajid ;
Elaffendi, Mohammed .
RESULTS IN ENGINEERING, 2025, 25
[2]   A Novel AI-Based Integrated Cybersecurity Risk Assessment Framework and Resilience of National Critical Infrastructure [J].
Ali, Sardar Muhammad ;
Razzaque, Abdul ;
Yousaf, Muhammad ;
Ali, Sardar Sadaqat .
IEEE ACCESS, 2025, 13 :12427-12446
[3]   MaldomDetector: A system for detecting algorithmically generated domain names with machine learning [J].
Almashhadani, Ahmad O. ;
Kaiiali, Mustafa ;
Carlin, Domhnall ;
Sezer, Sakir .
COMPUTERS & SECURITY, 2020, 93
[4]   Privacy-preserving approach for IoT networks using statistical learning with optimization algorithm on high-dimensional big data environment [J].
Alrayes, Fatma S. ;
Maray, Mohammed ;
Alshuhail, Asma ;
Almustafa, Khaled Mohamad ;
Darem, Abdulbasit A. ;
Al-Sharafi, Ali M. ;
Alotaibi, Shoayee Dlaim .
SCIENTIFIC REPORTS, 2025, 15 (01)
[5]   An AI-Driven Model to Enhance Sustainability for the Detection of Cyber Threats in IoT Environments [J].
Alsulami, Majid H. .
SENSORS, 2024, 24 (22)
[6]   Deep study on autonomous learning techniques for complex pattern recognition in interconnected information systems [J].
Amiri, Zahra ;
Heidari, Arash ;
Jafari, Nima ;
Hosseinzadeh, Mehdi .
COMPUTER SCIENCE REVIEW, 2024, 54
[7]   Interpretable Machine Learning Models for Malicious Domains Detection Using Explainable Artificial Intelligence (XAI) [J].
Aslam, Nida ;
Khan, Irfan Ullah ;
Mirza, Samiha ;
AlOwayed, Alanoud ;
Anis, Fatima M. ;
Aljuaid, Reef M. ;
Baageel, Reham .
SUSTAINABILITY, 2022, 14 (12)
[8]   Prediction of Heat-Treated Wood Adhesive Strength Using BP Neural Networks Optimized by Four Novel Metaheuristic Algorithms [J].
Cao, Ying ;
Wang, Wei ;
He, Yan .
FORESTS, 2025, 16 (02)
[9]   A blockchain and A-DCNN integrated framework for privacy protection and intrusion detection of industrial IoT [J].
Chen, Zhen ;
Huang, Jia ;
Liu, Shengzheng ;
Long, Haixia .
COMPUTING, 2025, 107 (01)
[10]   An Efficient Approach Based on RAE-GAMI-NET for Long Range Attack Detection on Blockchain [J].
Chithanuru, Vasavi ;
Ramaiah, Mangayarkarasi .
IEEE ACCESS, 2025, 13 :48106-48119