Artificial intelligence-driven cybersecurity: enhancing malicious domain detection using attention-based deep learning model with optimization algorithms

被引:0
作者
Alhayan, Fatimah [1 ]
Alshuhail, Asma [2 ]
Ismail, Ahmed Omer Ahmed [3 ]
Alrusaini, Othman [4 ]
Alahmari, Sultan [5 ]
Yahya, Abdulsamad Ebrahim [6 ]
Abdullah, Monir [7 ]
Al Zanin, Samah [8 ]
机构
[1] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Syst, POB 84428, Riyadh 11671, Saudi Arabia
[2] King Faisal Univ, Coll Comp Sci & Informat Technol, Dept Informat Syst, Al Hufuf, Saudi Arabia
[3] King Khalid Univ, Appl Coll Mahayil, Dept Informat Syst, Abha, Saudi Arabia
[4] Umm Al Qura Univ, Appl Coll, Dept Engn & Appl Sci, Mecca, Saudi Arabia
[5] King Abdul Aziz City Sci & Technol KACST, Cybersecur Inst, Riyadh, Saudi Arabia
[6] Univ Northern Border, Coll Comp & Informat Technol, Informat Technol Dept, Ar Ar, Saudi Arabia
[7] Univ Bisha, Coll Comp & Informat Technol, Dept Comp Sci & Artificial Intelligence, Bisha 67714, Saudi Arabia
[8] Prince Sattam Bin Abdulaziz Univ, Dept Comp Sci, Apppl Coll, Kharj, Saudi Arabia
来源
SCIENTIFIC REPORTS | 2025年 / 15卷 / 01期
关键词
Malicious domain detection; Deep learning; Cybersecurity; Artificial intelligence; Feature selection; NAMES;
D O I
10.1038/s41598-025-99420-y
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Malicious domains are one of the main resources mandatory for adversaries to run attacks over the Internet. Owing to the significant part of the domain name system (DNS), detailed research has been performed to detect malicious fields according to their unique behaviour, which is considered in dissimilar stages of the DNS life cycle queries and explanations. The DNS has played a crucial role in the evolution of the Internet. Its primary objective is to simplify user experience by converting a website's Internet Protocol (IP) address into a recognizable domain name and vice versa. Identifying these adverse fields is meaningful in contesting increased network attacks. Artificial intelligence (AI) is applied to develop the areas of malicious domain recognition and hindrance by the probability to improve robust, efficient, and scalable malware detection units. AI methods have expressed significant results in malicious domain detection. This manuscript presents an Enhance Malicious Domain Detection Using an Attention-Based Deep Learning Model with Optimization Algorithms (EMDD-ADLMOA) technique. The proposed EMDD-ADLMOA technique relies on improving malicious domain detection in cybersecurity. Initially, the min-max scaling method is utilized in the pre-processing phase to convert input data into an appropriate design. For feature selection (FS), the proposed EMDD-ADLMOA technique utilizes the quantum-inspired firefly algorithm (QIFA) model. Furthermore, the hybrid model of a temporal convolutional network and bi-directional long short-term memory with squeeze-and-excitation Attention (TCN-BiLSTM-SEA) model is employed for the classification process. Finally, the parrot optimization (PO) model optimally fine-tunes the hyperparameter values of the TCN-BiLSTM-SEA model. The performance results of the EMDD-ADLMOA approach are verified under a malicious dataset. The experimental validation of the EMDD-ADLMOA approach portrayed a superior accuracy value of 98.52% over existing techniques.
引用
收藏
页数:18
相关论文
共 40 条
[31]   Identifying malicious accounts in blockchains using domain names and associated temporal properties [J].
Sachan, Rohit Kumar ;
Agarwal, Rachit ;
Shukla, Sandeep Kumar .
BLOCKCHAIN-RESEARCH AND APPLICATIONS, 2023, 4 (03)
[32]  
Sait ARW., 2021, Full Length Article, V2, P65
[33]   Detection of algorithmically generated malicious domain names using masked N-grams [J].
Selvi, Jose ;
Rodriguez, Ricardo J. ;
Soria-Olivas, Emilio .
EXPERT SYSTEMS WITH APPLICATIONS, 2019, 124 :156-163
[34]  
Subbarao K.V.V., 2025, Machine Intelligence Applications in Cyber-Risk Management., P135
[35]  
Sun XQ, 2020, COMPUT SECUR, V99, DOI 10.1016/j.cose.2020.102067
[36]   A new service composition method in the cloud-based Internet of things environment using a grey wolf optimization algorithm and MapReduce framework [J].
Vakili, Asrin ;
Al-Khafaji, Hamza Mohammed Ridha ;
Darbandi, Mehdi ;
Heidari, Arash ;
Jafari Navimipour, Nima ;
Unal, Mehmet .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (16)
[37]  
Zaher MA., 2022, J. Cybersecurity Inform. Manage., V9, P20, DOI [10.54216/JCIM.090202, DOI 10.54216/JCIM.090202]
[38]   A GSO-based multi-objective technique for performance optimization of blockchain-based industrial Internet of things [J].
Zanbouri, Kouros ;
Darbandi, Mehdi ;
Nassr, Mohammad ;
Heidari, Arash ;
Navimipour, Nima Jafari ;
Yalcin, Senay .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2024, 37 (15)
[39]   Towards a conceptual framework for AI-driven anomaly detection in smart city IoT networks for enhanced cybersecurity [J].
Zeng, Heng ;
Yunis, Manal ;
Khalil, Ayman ;
Mirza, Nawazish .
JOURNAL OF INNOVATION & KNOWLEDGE, 2024, 9 (04)
[40]   Prediction of mechanical characteristics of shearer intelligent cables under bending conditions [J].
Zhao, Lijuan ;
Wang, Dongyang ;
Lin, Guocong ;
Tian, Shuo ;
Zhang, Hongqiang ;
Wang, Yadong .
PLOS ONE, 2025, 20 (02)