Fusion of deep learning based cyberattack detection and classification model for intelligent systems

被引:47
作者
Alzubi, Omar A. [1 ]
Qiqieh, Issa [2 ]
Alzubi, Jafar A. [2 ]
机构
[1] Al Balqa Appl Univ, Prince Abdullah bin Ghazi Fac Informat & Commun T, Al Salt, Jordan
[2] Al Balqa Appl Univ, Fac Engn, Al Salt, Jordan
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2023年 / 26卷 / 02期
关键词
Cyberattacks; Intelligent systems; Malware detection; Fusion learning; Deep learning; Ensemble; Black widow optimization;
D O I
10.1007/s10586-022-03686-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, the exponential growth of malware has posed a significant security threat to intelligent systems. Earlier static and dynamic analysis methods fail to achieve effective recognition rate and incurs high computational complexity. The recently developed machine learning (ML) and deep learning (DL) models can be employed to detect and classify cyberattacks and Malware efficiently. This paper presents a fusion of deep learning based cyberattack detection and classification model for intelligent systems named FDL-CADIS technique. The proposed FDL-CADIS technique transforms the Malware binary files into two-dimensional images, which are then classified by the fusion model. The FDL-CADIS technique employs the binary input images into the MobileNetv2 model for the extraction of features and the hyper parameter tuning process takes place utilizing the black widow optimization technique. The MobileNetv2 model derives all features from the Malware dataset and trains the model using the derived features. Finally, an ensemble of voting based classifiers, including gated recurrent unit and long short-term memory techniques, for Malware cyberattack detection and classification was developed. A comprehensive range of experimental analysis is performed against the benchmark dataset to demonstrate the FDL-CADIS technique's promising performance. According to the comparative analysis of the results, the FDL-CADIS technique outperformed current approaches.
引用
收藏
页码:1363 / 1374
页数:12
相关论文
共 29 条
[1]  
Ahmadi M, 2018, ABS180210135 CORR
[2]  
Akandwanaho Stephen M., 2019, AJIC, V24, P1
[3]   Cyber-Attack Prediction Based on Network Intrusion Detection Systems for Alert Correlation Techniques: A Survey [J].
Albasheer, Hashim ;
Siraj, Maheyzah Md ;
Mubarakali, Azath ;
Tayfour, Omer Elsier ;
Salih, Sayeed ;
Hamdan, Mosab ;
Khan, Suleman ;
Zainal, Anazida ;
Kamarudeen, Sameer .
SENSORS, 2022, 22 (04)
[4]   A deep learning- based frechet and dirichlet model for intrusion detection in IWSN [J].
Alzubi, Omar A. .
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2022, 42 (02) :873-883
[5]   An efficient malware detection approach with feature weighting based on Harris Hawks optimization [J].
Alzubi, Omar A. ;
Alzubi, Jafar A. ;
Al-Zoubi, Ala' M. ;
Hassonah, Mohammad A. ;
Kose, Utku .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (04) :2369-2387
[6]   SARCP: Exploiting Cyber-Attack Prediction Through Socially-Aware Recommendation [J].
Asabere, Nana Yaw ;
Fiamavle, Elikem ;
Agyiri, Joseph ;
Torgby, Wisdom Kwawu ;
Dzata, Joseph Eyram ;
Doe, Nina Pearl .
INTERNATIONAL JOURNAL OF DECISION SUPPORT SYSTEM TECHNOLOGY, 2022, 14 (01)
[7]   Utilization and Comparision of Convolutional Neural Networks in Malware Recognition [J].
Bozkir, Ahmet Selman ;
Cankaya, Ahmet Ogulcan ;
Aydos, Murat .
2019 27TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2019,
[8]   Stock Price Forecast Based on CNN-BiLSTM-ECA Model [J].
Chen, Yu ;
Fang, Ruixin ;
Liang, Ting ;
Sha, Zongyu ;
Li, Shicheng ;
Yi, Yugen ;
Zhou, Wei ;
Song, Huilin .
SCIENTIFIC PROGRAMMING, 2021, 2021
[9]   Short-Term Traffic Speed Prediction Method for Urban Road Sections Based on Wavelet Transform and Gated Recurrent Unit [J].
Fu, Xin ;
Luo, Wei ;
Xu, Chengyao ;
Zhao, Xiaoxuan .
MATHEMATICAL PROBLEMS IN ENGINEERING, 2020, 2020
[10]  
Handa A., 2022, Handbook of Big Data Analytics and Forensics, P105, DOI 10.1007/978-3-030-74753-4_7