An optimized neural network for prediction of security threats on software testing

被引:2
|
作者
Suman [1 ]
Khan, Raees Ahmad [1 ]
机构
[1] Babasaheb Bhimrao Ambedkar Univ, Dept Informat Technol, Lucknow, India
关键词
Intrusion data; Optimized; Attacks; Security; Preprocessing; Prediction; High quality; ATTACK DETECTION; INTERNET; THINGS;
D O I
10.1016/j.cose.2023.103626
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software testing involves evaluating and confirming a software program or product to ensure it operates according to its intended functionality. Testing offers advantages like bug prevention, reduced development expenses, and improved performance. The problems are dialogue gap, ecological danger, creation of software quickly, cost of operation and upkeep, inadequate assessment, and incorrect testing estimates. The structure was initially educated using internet presentation data that included intrusion information. A novel Dove Swarmbased Deep Neural Method (DSbDNM) with the required traits and stages of processing has been developed. Moving forward, feature extraction and malicious behaviour forecast have both been completed. Also, the different types of assaults and negative behaviours were categorized. The developed prediction model is also examined by initiating and detecting an unidentified assault. Finally, the performance measures' accuracy, error rate, Precision, Recall and f-measure were computed. Moreover, the proposed system implementation is done in Python. Therefore, the proposed work performance can be enhanced and attain high accuracy in low computational time. For the DSbDNM dataset, the designed prototypical achieved 94.65 accuracy, 94.95 precision, 90.16 Recall and 92.02 F-measure for the NF-UQ-NIDS-v2 Dataset. Moreover, the Intrusion Detection Dataset attained an accuracy of 98, Precision of 98.8, Recall of 94.2, and F-score of 96 in the developed model. Subsequently, the Network Intrusion Detection Dataset attained an accuracy of 99, a precision of 99.2, a Recall of 95.8 and an F-measure of 97.1
引用
收藏
页数:16
相关论文
共 50 条
  • [1] Survey on identification and prediction of security threats using various deep learning models on software testing
    Suman
    Khan, Raees Ahmad
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (27) : 69863 - 69874
  • [2] Security in Software-Defined Networking: Threats and Countermeasures
    Shu, Zhaogang
    Wan, Jiafu
    Li, Di
    Lin, Jiaxiang
    Vasilakos, Athanasios V.
    Imran, Muhammad
    MOBILE NETWORKS & APPLICATIONS, 2016, 21 (05) : 764 - 776
  • [3] A Survey: Security Threats and Countermeasures in Software Defined Networking
    Mubarakali, Azath
    Alqahtani, Abdulrahman Saad
    2019 IEEE 2ND INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTER TECHNOLOGIES (ICICT), 2019, : 180 - 185
  • [4] Network Security Situation Prediction Model Based on EMD and ELPSO Optimized BiGRU Neural Network
    Zhang, Biao
    Jia, Mingqi
    Xu, Jiazhong
    Zhao, Wanzhao
    Deng, Liwei
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [5] Cyber Security Threats Detection in IoT Using Krill Based Deep Neural Network Stacked Auto Encoders
    Rana, Pragati
    Chauhan, Sanjeev
    Patil, B. P.
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 135 (01) : 299 - 322
  • [6] Comparative Analysis on Network Attack Prediction Used Deep Learning Approaches on Software Security Testing
    Suman
    Khan, R. A.
    ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2023, PT I, 2024, 2090 : 366 - 380
  • [7] Network Security Situation Prediction Model Based on VMD Decomposition and DWOA Optimized BiGRU-ATTN Neural Network
    Zhang, Shengcai
    Fu, Qiming
    An, Dezhi
    IEEE ACCESS, 2023, 11 : 129507 - 129535
  • [8] Recurrent neural network for software failure prediction
    Benaddy, Mohamed
    El Habil, Brahim
    El Meslouhi, Othmane
    Krit, Salah-Ddine
    ICEMIS'18: PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON ENGINEERING AND MIS, 2018,
  • [9] Rough neural network for software change prediction
    Ramanna, S
    ROUGH SETS AND CURRENT TRENDS IN COMPUTING, PROCEEDINGS, 2002, 2475 : 602 - 609
  • [10] Problem of Network Security Threats
    Mendyk-Krajewska, Teresa
    Mazur, Zygmunt
    3RD INTERNATIONAL CONFERENCE ON HUMAN SYSTEM INTERACTION, 2010, : 436 - 443