Next-Generation Cyber Threat Detection: Leveraging CNN-GRU Architecture and Honey Badger Algorithm Optimization for Network Security

Authors

  • Katikam Mahesh, Kunjam Nageswara Rao

Keywords:

Classification Accuracy, Cyber Threat Detection, Convolutional Neural Network, Feature Extraction, Gated Recurrent Unit, Honey Badger Optimization Algorithm, Network Security, Optimization

Abstract

The rising significance of Internet and Communication Technology (ICT) has resulted in the increased volume of transmitted data. The attackers gain unauthorized access to the network data and inject potential threats into the system for stealing or manipulating the data hence it is considered as a major obstacle for attack detection. This study offers an effective framework that combines the Gated Recurrent Unit (GRU) technique with a hybrid Convolutional Neural Network (CNN). This work's primary goal is to identify cyberthreats and categorize various attacks on security. The future hybrid CNN-GRU approach leverages the strengths of both CNN and GRU algorithms for attack detection. The hybrid model is optimized using a Honey Badger Optimization Algorithm (HBOA). The HBOA is used to adjust the model parameters in order to improve the performance metrics for different sorts of cyberattacks, such as Precision, Recall, f1-score, and others. The hybrid model is intended to extract high-level features from the network data. Simulation analysis is used to assess and validate the hybrid CNN-GRU model's effectiveness and support. The CNN-GRU model produces the classification output with an accuracy of 94.22% in terms of identifying various security attacks. The model is trained using input data taken from the CICIDS-2017 dataset.

Downloads

Download data is not yet available.

References

Nadir Omer a, *Ahmed H. Samak b, Ahmed I. Taloba c,d , Rasha M. Abd El-Aziz c A novel optimized probabilistic neural network approach for intrusion detection and categorization. Alexandria Engineering Journal (2023) 72, 351–361

Imrana, Y., Xiang, Y., Ali, L., Noor, A., Sarpong, K., & Abdullah, M. A. (2024). CNN-GRU- FF: a double-layer feature fusion-based network intrusion detection system using convolutional neural network and gated recurrent units. Complex & Intelligent Systems, 1-18.

Chethana, C., Pareek, P. K., de Albuquerque, V. H. C., Khanna, A., & Gupta, D. (2022, October). Deep learning technique-based intrusion detection in cyber-security networks. In 2022 IEEE 2nd Mysore Sub Section International Conference (MysuruCon) (pp. 1-7). IEEE.

Mughaid, A., AlZu’bi, S., Hnaif, A., Taamneh, S., Alnajjar, A., & Elsoud, E. A. (2022). An intelligent cyber security phishing detection system using deep learning techniques. Cluster Computing, 25(6), 3819-3828.

Shaukat, K., Luo, S., Chen, S., & Liu, D. (2020, October). Cyber threat detection using machine learning techniques: A performance evaluation perspective. In 2020 international conference on cyber warfare and security (ICCWS) (pp. 1-6). IEEE.

Ullah, F., Naeem, H., Jabbar, S., Khalid, S., Latif, M. A., Al-Turjman, F., & Mostarda, L. (2019). Cyber security threats detection in the internet of things using a deep learning approach. IEEE access, 7, 124379-124389.

Lee, J., Kim, J., Kim, I., & Han, K. (2019). Cyber threat detection based on artificial neural networks using event profiles. Ieee Access, 7, 165607-165626.

Sagduyu, Y. E., Shi, Y., & Erpek, T. (2019, June). IoT network security from the perspective of adversarial deep learning. In 2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON) (pp. 1-9). IEEE.

Kumar, C., Bharati, T. S., & Prakash, S. (2021). Online social network security: a comparative review using machine learning and deep learning. Neural Processing Letters, 53(1), 843-861.

Dixit, P., & Silakari, S. (2021). Deep learning algorithms for cybersecurity applications: A technological and status review. Computer Science Review, 39, 100317.

Sarker, I. H. (2021). Deep cybersecurity: a comprehensive overview from neural network and deep learning perspective. SN Computer Science, 2(3), 154.

Biju, J. M., Gopal, N., & Prakash, A. J. (2019). Cyber-attacks and its different types.

International Research Journal of Engineering and Technology, 6(3), 4849-4852.

Zaman, S., Alhazmi, K., Aseeri, M. A., Ahmed, M. R., Khan, R. T., Kaiser, M. S., & Mahmud, M. (2021). Security threats and artificial intelligence-based countermeasures for internet of things networks: a comprehensive survey. Ieee Access, 9, 94668-94690.

Mishra, N., & Pandya, S. (2021). Internet of things applications, security challenges, attacks, intrusion detection, and future visions: A systematic review. IEEE Access, 9, 59353-59377.

Malek, Z. S., Trivedi, B., & Shah, A. (2020, July). User behavior pattern-signature based intrusion detection. In 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4) (pp. 549-552). IEEE.

Soe, Y. N., Feng, Y., Santosa, P. I., Hartanto, R., & Sakurai, K. (2019). Rule generation for signature-based detection systems of cyber-attacks in iot environments. Bulletin of Networking, Computing, Systems, and Software, 8(2), 93-97.

Gupta, C., Johri, I., Srinivasan, K., Hu, Y. C., Qaisar, S. M., & Huang, K. Y. (2022). A systematic review on machine learning and deep learning models for electronic information security in mobile networks. Sensors, 22(5), 2017.

Halbouni, A., Gunawan, T. S., Habeebi, M. H., Halbouni, M., Kartiwi, M., & Ahmad, R. (2022). Machine learning and deep learning approaches for cybersecurity: A review. IEEE Access, 10, 19572-19585.

Geetha, R., & Thilagam, T. (2021). A review on the effectiveness of machine learning and deep learning algorithms for cyber security. Archives of Computational Methods in Engineering, 28(4), 2861-2879.

Choi, Y. H., Liu, P., Shang, Z., Wang, H., Wang, Z., Zhang, L., ... & Zou, Q. (2020). Using deep learning to solve computer security challenges: a survey. Cybersecurity, 3, 1-32.

Thakkar, A., & Lohiya, R. (2021). A review on machine learning and deep learning perspectives of IDS for IoT: recent updates, security issues, and challenges. Archives of Computational Methods in Engineering, 28(4), 3211-3243.

Chesney, S., Roy, K., & Khorsandroo, S. (2021). Machine learning algorithms for preventing IoT cybersecurity attacks. In Intelligent Systems and Applications: Proceedings of the 2020 Intelligent Systems Conference (IntelliSys) Volume 3 (pp. 679-686). Springer International Publishing.

Yang, H., Zeng, R., Xu, G., & Zhang, L. (2021). A network security situation assessment method based on adversarial deep learning. Applied Soft Computing, 102, 107096.

Downloads

Published

12.06.2024

How to Cite

Katikam Mahesh. (2024). Next-Generation Cyber Threat Detection: Leveraging CNN-GRU Architecture and Honey Badger Algorithm Optimization for Network Security. International Journal of Intelligent Systems and Applications in Engineering, 12(4), 2422 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/6629

Issue

Section

Research Article