Back to Search Start Over

Improved sand cat swarm optimization with deep learning based enhanced malicious activity recognition for cybersecurity.

Authors :
Devi E. M, Roopa
Almakayeel, Naif
Lydia, E. Laxmi
Source :
Alexandria Engineering Journal; Jul2024, Vol. 98, p187-198, 12p
Publication Year :
2024

Abstract

The main concept of a smart city is to join manual items with electronics, software, sensors, and network connectivity for data contact via Internet of Things (IoT) gadgets. IoT improves production and efficiency by cleverly utilizing remote management, but security as well as privacy risk, rises. Cyber threats are progressing every day, affecting inadequate actions of safety and privacy. In a smart city, the exposed action of an individual or business can keep the whole city in danger. Owing to the trust of numerous modules of smart cities on data and communication techniques, cybersecurity tasks like information leakage and mischievous cyber-attacks. Malicious Activity Detection in the area of cybersecurity for smart cities is dominant in protecting the consistent organization of urban atmospheres. Leveraging innovative machine learning (ML) and deep learning (DL) approaches, mainly anomaly detection methods permits the identification of abnormal patterns and probable threats within the massive streams of data produced by smart city methods. So, this paper designs a Fusion of Optimization Algorithms and DL for Enhanced Malicious Activity Recognition (FOADL-EMAR) technique for cybersecurity in smart cities. The purpose of the FOADL-EMAR technique is to recognize the presence of malicious activities using optimal DL techniques in the environment of a smart city. To accomplish this, the FOADL-EMAR technique uses a Z-score data normalization model to measure the input dataset into a useful format. In addition, the FOADL-EMAR technique uses an improved sand cat swarm optimization (ISCSO) algorithm that can be applied to select an optimal subset of features. An ensemble of three DL techniques is used namely long short-term memory (LSTM), deep neural networks (DNNs), and extreme learning machine (ELM) for malicious activity detection. The Harris Hawks Optimization (HHO) approach has been applied to improve the detection results of the ensemble models. The simulation analysis of the FOADL-EMAR methodology occurs utilizing a benchmark database. The experimentation values demonstrate the improved detection outcomes of the FOADL-EMAR algorithm over other existing methods in terms of different measures. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
11100168
Volume :
98
Database :
Supplemental Index
Journal :
Alexandria Engineering Journal
Publication Type :
Academic Journal
Accession number :
177926543
Full Text :
https://doi.org/10.1016/j.aej.2024.04.053