An Enhanced DNN Model for Cyber Attack Detection using Seagull Adapted Elephant Herding Optimization Algorithm
Keywords:
Cyber Attack Detection, Deep Neural Network, Seagull Adapted Elephant Herding Optimization Algorithm, Feature Selection, Categorization Accuracy, Network SecurityAbstract
Life today is significantly more comfortable thanks to numerous digital devices and the internet to support them. Every good thing has a bad side, and the same is true in today's digital world. The internet has made a beneficial difference to our lives today, but it also presents a significant difficulty in protecting private information. This gives rise to cyberattacks. Attack Detection is a major challenge in network security. Traditional Gradient Boosting Algorithms Such as GBM, XGBoost, LightGBM, CatBoost Algorithm Performs Poor Detection of Different attacks, such as malicious software attacks, phishing attacks, and denial-of-service attacks. This paper introduces a novel DNN- Seagull Adapted Elephant Herding Optimization Algorithm (DNN- SAEHOA) to Improve Detection Attacks automatically with Publicly Available Input dataset UNSW NB-15 with Variance Threshold (VT) is a simple approach to feature selection. It removes all features whose variance cannot meet a defined threshold. Improve accuracy.
Downloads
References
Pant M, Kumar S (2022) Particle swarm optimization and intuitionistic fuzzy set-based novel method for fuzzy time series forecasting. Granul Compute 7(2):285–303
Santucci, V.; Baioletti, M.; Milani, A. An algebraic framework for swarm and evolutionary algorithms in combinatorial optimization. Swarm Evol. Compute. 2020, 55, 100673.
Sarhan, Mohanad, Siamak Layeghy, Nour Moustafa, and Marius Portmann. NetFlow Datasets for Machine Learning-Based Network Intrusion Detection Systems. In Big Data Technologies and Applications: 10th EAI International Conference, BDTA 2020, and 13th EAI International Conference on Wireless Internet, WiCON 2020, Virtual Event, December 11, 2020, Proceedings (p. 117). Springer Nature.
Xu, H.; Cao, Q.; Fu, H.; Fu, C.; Chen, H.; Su, J. Application of Support Vector Machine Model Based on an Improved Elephant Herding Optimization Algorithm in Network Intrusion Detection; Springer: Singapore, 2019; pp. 283–295.
Prasad, C., Subbaramaiah, K. and Sujatha, P. (2019). Cost–benefit analysis for optimal DG placement in distribution systems by using elephant herding optimization algorithm. Renewables: Wind, Water, and Solar, 6(1).
Rizk-Allah, R.M.; El-Sehiemy, R.A.; Wang, G.-G. A novel parallel hurricane optimization algorithm for secure emission/economic load dispatch solution. Appl. Soft Comput. 2018, 63, 206–222.
Jino Ramson, S.R.; Lova Raju, K.; Vishnu, S.; Anagnostopoulos, T. Nature inspired optimization techniques for image processing-a short review. In Nature Inspired Optimization Techniques for Image Processing Applications; Springer: Cham, Switzerland, 20 September 2018; Volume 150, pp. 113–145.
Pan, Z., Guo, Q. and Sun, H. (2015). Impacts of optimization interval on home energy scheduling for thermostatically controlled appliances. CSEE Journal of Power and Energy Systems, 1(2), pp.90-100.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.