An optimized neural network for prediction of security threats on software testing

被引:2
|
作者
Suman [1 ]
Khan, Raees Ahmad [1 ]
机构
[1] Babasaheb Bhimrao Ambedkar Univ, Dept Informat Technol, Lucknow, India
关键词
Intrusion data; Optimized; Attacks; Security; Preprocessing; Prediction; High quality; ATTACK DETECTION; INTERNET; THINGS;
D O I
10.1016/j.cose.2023.103626
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software testing involves evaluating and confirming a software program or product to ensure it operates according to its intended functionality. Testing offers advantages like bug prevention, reduced development expenses, and improved performance. The problems are dialogue gap, ecological danger, creation of software quickly, cost of operation and upkeep, inadequate assessment, and incorrect testing estimates. The structure was initially educated using internet presentation data that included intrusion information. A novel Dove Swarmbased Deep Neural Method (DSbDNM) with the required traits and stages of processing has been developed. Moving forward, feature extraction and malicious behaviour forecast have both been completed. Also, the different types of assaults and negative behaviours were categorized. The developed prediction model is also examined by initiating and detecting an unidentified assault. Finally, the performance measures' accuracy, error rate, Precision, Recall and f-measure were computed. Moreover, the proposed system implementation is done in Python. Therefore, the proposed work performance can be enhanced and attain high accuracy in low computational time. For the DSbDNM dataset, the designed prototypical achieved 94.65 accuracy, 94.95 precision, 90.16 Recall and 92.02 F-measure for the NF-UQ-NIDS-v2 Dataset. Moreover, the Intrusion Detection Dataset attained an accuracy of 98, Precision of 98.8, Recall of 94.2, and F-score of 96 in the developed model. Subsequently, the Network Intrusion Detection Dataset attained an accuracy of 99, a precision of 99.2, a Recall of 95.8 and an F-measure of 97.1
引用
收藏
页数:16
相关论文
共 50 条
  • [21] A Character Prediction Approach in a Security Context using a Recurrent Neural Network
    Ghimes, Ana-Maria
    Avram, Andrei-Marius
    Vladuta, Valentin-Alexandru
    2018 13TH INTERNATIONAL SYMPOSIUM ON ELECTRONICS AND TELECOMMUNICATIONS (ISETC), 2018, : 110 - 113
  • [22] Modeling and evaluating the security threats of transient errors in firewall software
    Chen, S
    Xu, J
    Kalbarczyk, Z
    Iyer, RK
    Whisnant, K
    PERFORMANCE EVALUATION, 2004, 56 (1-4) : 53 - 72
  • [23] Research on neural networks in computer network security evaluation and prediction methods
    Wei, Hanyu
    Zhao, Xu
    Shi, Baolan
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2024, 28 (03) : 497 - 516
  • [24] Human ethnics prediction using facial features and optimized convolutional neural network
    Alotaibi, Saud S.
    NEURAL COMPUTING & APPLICATIONS, 2022, 34 (02) : 1181 - 1198
  • [25] PV power prediction based on Artificial Neural Network optimized by Genetic Algorithm
    Lmesri, Khadija
    Chabaa, Samira
    Jallal, Mohammed Ali
    Zeroual, Abdelouhab
    El Assri, Nasima
    Nachat, Sihame
    PROCEEDINGS OF 2021 9TH INTERNATIONAL RENEWABLE AND SUSTAINABLE ENERGY CONFERENCE (IRSEC), 2021, : 106 - 110
  • [26] BP neural network optimized by PSO algorithm on Ammunition storage reliability prediction
    Gong, Hua
    Zhang, Ermei
    Yao, Jun
    2017 CHINESE AUTOMATION CONGRESS (CAC), 2017, : 692 - 696
  • [27] Adaptive Entropy Lightweight Encryption Estimate for Software Defined Network to Mitigate Data Security Threats in Smart Cities
    Shah, Sunil Kumar
    Sharma, Raghavendra
    Shukla, Neeraj
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2025, 36 (02):
  • [28] Human ethnics prediction using facial features and optimized convolutional neural network
    Saud S. Alotaibi
    Neural Computing and Applications, 2022, 34 : 1181 - 1198
  • [29] Social network security: Issues, challenges, threats, and solutions
    Rathore, Shailendra
    Sharma, Pradip Kumar
    Loia, Vincenzo
    Jeong, Young-Sik
    Park, Jong Hyuk
    INFORMATION SCIENCES, 2017, 421 : 43 - 69
  • [30] IoT Network Security: Threats, Risks, and a Data-Driven Defense Framework
    Wheelus, Charles
    Zhu, Xingquan
    IOT, 2020, 1 (02): : 259 - 285