Next-Generation Cyber Threat Detection: Leveraging CNN-GRU Architecture and Honey Badger Algorithm Optimization for Network Security
Keywords:
Classification Accuracy, Cyber Threat Detection, Convolutional Neural Network, Feature Extraction, Gated Recurrent Unit, Honey Badger Optimization Algorithm, Network Security, OptimizationAbstract
The rising significance of Internet and Communication Technology (ICT) has resulted in the increased volume of transmitted data. The attackers gain unauthorized access to the network data and inject potential threats into the system for stealing or manipulating the data hence it is considered as a major obstacle for attack detection. This study offers an effective framework that combines the Gated Recurrent Unit (GRU) technique with a hybrid Convolutional Neural Network (CNN). This work's primary goal is to identify cyberthreats and categorize various attacks on security. The future hybrid CNN-GRU approach leverages the strengths of both CNN and GRU algorithms for attack detection. The hybrid model is optimized using a Honey Badger Optimization Algorithm (HBOA). The HBOA is used to adjust the model parameters in order to improve the performance metrics for different sorts of cyberattacks, such as Precision, Recall, f1-score, and others. The hybrid model is intended to extract high-level features from the network data. Simulation analysis is used to assess and validate the hybrid CNN-GRU model's effectiveness and support. The CNN-GRU model produces the classification output with an accuracy of 94.22% in terms of identifying various security attacks. The model is trained using input data taken from the CICIDS-2017 dataset.
Downloads
References
Nadir Omer a, *Ahmed H. Samak b, Ahmed I. Taloba c,d , Rasha M. Abd El-Aziz c A novel optimized probabilistic neural network approach for intrusion detection and categorization. Alexandria Engineering Journal (2023) 72, 351–361
Imrana, Y., Xiang, Y., Ali, L., Noor, A., Sarpong, K., & Abdullah, M. A. (2024). CNN-GRU- FF: a double-layer feature fusion-based network intrusion detection system using convolutional neural network and gated recurrent units. Complex & Intelligent Systems, 1-18.
Chethana, C., Pareek, P. K., de Albuquerque, V. H. C., Khanna, A., & Gupta, D. (2022, October). Deep learning technique-based intrusion detection in cyber-security networks. In 2022 IEEE 2nd Mysore Sub Section International Conference (MysuruCon) (pp. 1-7). IEEE.
Mughaid, A., AlZu’bi, S., Hnaif, A., Taamneh, S., Alnajjar, A., & Elsoud, E. A. (2022). An intelligent cyber security phishing detection system using deep learning techniques. Cluster Computing, 25(6), 3819-3828.
Shaukat, K., Luo, S., Chen, S., & Liu, D. (2020, October). Cyber threat detection using machine learning techniques: A performance evaluation perspective. In 2020 international conference on cyber warfare and security (ICCWS) (pp. 1-6). IEEE.
Ullah, F., Naeem, H., Jabbar, S., Khalid, S., Latif, M. A., Al-Turjman, F., & Mostarda, L. (2019). Cyber security threats detection in the internet of things using a deep learning approach. IEEE access, 7, 124379-124389.
Lee, J., Kim, J., Kim, I., & Han, K. (2019). Cyber threat detection based on artificial neural networks using event profiles. Ieee Access, 7, 165607-165626.
Sagduyu, Y. E., Shi, Y., & Erpek, T. (2019, June). IoT network security from the perspective of adversarial deep learning. In 2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON) (pp. 1-9). IEEE.
Kumar, C., Bharati, T. S., & Prakash, S. (2021). Online social network security: a comparative review using machine learning and deep learning. Neural Processing Letters, 53(1), 843-861.
Dixit, P., & Silakari, S. (2021). Deep learning algorithms for cybersecurity applications: A technological and status review. Computer Science Review, 39, 100317.
Sarker, I. H. (2021). Deep cybersecurity: a comprehensive overview from neural network and deep learning perspective. SN Computer Science, 2(3), 154.
Biju, J. M., Gopal, N., & Prakash, A. J. (2019). Cyber-attacks and its different types.
International Research Journal of Engineering and Technology, 6(3), 4849-4852.
Zaman, S., Alhazmi, K., Aseeri, M. A., Ahmed, M. R., Khan, R. T., Kaiser, M. S., & Mahmud, M. (2021). Security threats and artificial intelligence-based countermeasures for internet of things networks: a comprehensive survey. Ieee Access, 9, 94668-94690.
Mishra, N., & Pandya, S. (2021). Internet of things applications, security challenges, attacks, intrusion detection, and future visions: A systematic review. IEEE Access, 9, 59353-59377.
Malek, Z. S., Trivedi, B., & Shah, A. (2020, July). User behavior pattern-signature based intrusion detection. In 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4) (pp. 549-552). IEEE.
Soe, Y. N., Feng, Y., Santosa, P. I., Hartanto, R., & Sakurai, K. (2019). Rule generation for signature-based detection systems of cyber-attacks in iot environments. Bulletin of Networking, Computing, Systems, and Software, 8(2), 93-97.
Gupta, C., Johri, I., Srinivasan, K., Hu, Y. C., Qaisar, S. M., & Huang, K. Y. (2022). A systematic review on machine learning and deep learning models for electronic information security in mobile networks. Sensors, 22(5), 2017.
Halbouni, A., Gunawan, T. S., Habeebi, M. H., Halbouni, M., Kartiwi, M., & Ahmad, R. (2022). Machine learning and deep learning approaches for cybersecurity: A review. IEEE Access, 10, 19572-19585.
Geetha, R., & Thilagam, T. (2021). A review on the effectiveness of machine learning and deep learning algorithms for cyber security. Archives of Computational Methods in Engineering, 28(4), 2861-2879.
Choi, Y. H., Liu, P., Shang, Z., Wang, H., Wang, Z., Zhang, L., ... & Zou, Q. (2020). Using deep learning to solve computer security challenges: a survey. Cybersecurity, 3, 1-32.
Thakkar, A., & Lohiya, R. (2021). A review on machine learning and deep learning perspectives of IDS for IoT: recent updates, security issues, and challenges. Archives of Computational Methods in Engineering, 28(4), 3211-3243.
Chesney, S., Roy, K., & Khorsandroo, S. (2021). Machine learning algorithms for preventing IoT cybersecurity attacks. In Intelligent Systems and Applications: Proceedings of the 2020 Intelligent Systems Conference (IntelliSys) Volume 3 (pp. 679-686). Springer International Publishing.
Yang, H., Zeng, R., Xu, G., & Zhang, L. (2021). A network security situation assessment method based on adversarial deep learning. Applied Soft Computing, 102, 107096.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.