An optimal hybrid cascade regional convolutional network for cyberattack detection

Author:

Alqahtani Ali1,Khan Surbhi Bhatia23

Affiliation:

1. Department of Networks and Communications Engineering, College of Computer Science and Information Systems Najran University Najran Saudi Arabia

2. Department of Data Science, School of Science, Engineering and Environment University of Salford Salford UK

3. Department of Electrical and Computer Engineering Lebanese American University Byblos Lebanon

Abstract

AbstractCyber‐physical systems (CPS) and the Internet of Things (IoT) technologies link urban systems through networks and improve the delivery of quality services to residents. To enhance municipality services, information and communication technologies (ICTs) are integrated with urban systems. However, the large number of sensors in a smart city generates a significant amount of delicate data, like medical records, credit card numerics, and location coordinates, which are transported across a network to data centers for analysis and processing. This makes smart cities vulnerable to cyberattacks because of the resource constraints of their technology infrastructure. Applications for smart cities pose many security challenges, such as zero‐day attacks resulting from exploiting weaknesses in various protocols. Therefore, this paper proposes an optimal hybrid transit search‐cascade regional convolutional neural network (hybrid TS‐Cascade R‐CNN) to detect cyberattacks. The proposed model combines the hybrid transit‐search approach with the cascade regional convolutional neural network to create an optimal solution for cyberattack detection. The cascade regional convolutional network uses a hybrid transit search algorithm to enhance the effectiveness of cyberattack detection. By integrating these two approaches, the system can leverage both global traffic patterns and local indicators to improve the accuracy of attack detection. During the training process, the proposed model recognizes and classifies malicious input even in the presence of sophisticated attacks. Finally, the experimental analysis is carried out for various attacks based on different metrics. The accuracy rate attained by the proposed approach is 99.2%, which is acceptable according to standards.

Funder

Najran University

Publisher

Wiley

Subject

Computer Networks and Communications,Computer Science Applications

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3