Volume 15 , Issue 2 , PP: 115-130, 2025 | Cite this article as | XML | Html | PDF | Full Length Article
K. Anitha 1 * , K. Rajiv Gandhi 2 *
Doi: https://doi.org/10.54216/JCIM.150210
Cybersecurity is advancing and the rate of cybercrime, which is always rising. Advanced attacks are measured as the novel normal as they are one of the more normal and extensive. Cybersecurity threats have risen promptly in many areas like healthcare, smart homes, energy, automation, agriculture, and industrial processes. An intrusion detection system (IDS) discovers intrusions by analyzing attack designs or mining signatures from system packets. To assess an IDS model, use Machine Learning (ML) and deep learning (DL) approaches for recognizing data traffic into malicious and healthy. ML and DL techniques has earned an extensive interest on countless applications and domains of study, mostly in Cybersecurity. With computing power and hardware becoming more available, ML and DL systems can be employed in order to classify and analyze corrupt actors from a massive group of accessible data. This manuscript presents an Enhancing Detection of Cybersecurity Attack Using Multiplayer Battle Game Optimizer with Hybrid Deep Learning (EDCA-MBGOHDL) technique. The main intention of the EDCA-MBGOHDL technique is to provide a robust framework for cyberattack detection using deep learning integrated with a hyperparameter tuning approach. At first, the feature selection process is implemented by applying improved Harris hawk optimization (IHHO) algorithm for ensuring that only the most relevant features are fed into the model. Furthermore, the hybrid of convolutional neural network, bidirectional long short-term memory and attention mechanism (CNN-BiLSTM-AM) model is employed for the classification of cybersecurity threats. Eventually, the multiplayer battle game optimizer (MBGO) algorithm adjusts the hyperparameter values of the CNN-BiLSTM-AM classifier optimally and outcomes in greater classification performance. The wide range of analysis of the EDCA-MBGOHDL technique takes place using a benchmark dataset. The outcomes pointed out the superior performance of the EDCA-MBGOHDL system across existing models
Cybersecurity Attack Detection , Multiplayer Battle Game Optimizer , Hybrid Deep Learning Models , Feature Selection
[1] Ahsan, M., Nygard, K.E., Gomes, R., Chowdhury, M.M., Rifat, N. and Connolly, J.F., 2022. Cybersecurity threats and their mitigation approaches using Machine Learning—A Review. Journal of Cybersecurity and Privacy, 2(3), pp.527-555.
[2] Gümüşbaş, D., Yıldırım, T., Genovese, A. and Scotti, F., 2020. A comprehensive survey of databases and deep learning methods for cybersecurity and intrusion detection systems. IEEE Systems Journal, 15(2), pp.1717-1731.
[3] Trong, H.M.D., Le, D.T., Veyseh, A.P.B., Nguyễn, T. and Nguyen, T.H., 2020, November. Introducing a new dataset for event detection in cybersecurity texts. In Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing (EMNLP) (pp. 5381-5390).
[4] Sun, C.C., Cardenas, D.J.S., Hahn, A. and Liu, C.C., 2020. Intrusion detection for cybersecurity of smart meters. IEEE Transactions on Smart Grid, 12(1), pp.612-622.
[5] Khandpur, R.P., Ji, T., Jan, S., Wang, G., Lu, C.T. and Ramakrishnan, N., 2017, November. Crowdsourcing cybersecurity: Cyber-attack detection using social media. In Proceedings of the 2017 ACM on Conference on Information and Knowledge Management (pp. 1049-1057).
[6] Narayanan, S.N., Ganesan, A., Joshi, K., Oates, T., Joshi, A. and Finin, T., 2018, October. Early detection of cybersecurity threats using collaborative cognition. In 2018 IEEE 4th international conference on collaboration and internet computing (CIC) (pp. 354-363). IEEE.
[7] Shaukat, K., Luo, S., Varadharajan, V., Hameed, I.A., Chen, S., Liu, D. and Li, J., 2020. Performance comparison and current challenges of using machine learning techniques in cybersecurity. Energies, 13(10), p.2509.
[8] Handa, A., Sharma, A. and Shukla, S.K., 2019. Machine learning in cybersecurity: A review. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 9(4), p.e1306.
[9] Mahdavifar, S. and Ghorbani, A.A., 2019. Application of deep learning to cybersecurity: A survey. Neurocomputing, 347, pp.149-176.
[10] Han, Y. , M., I. , Cai, W. (2019) . Dragonfly Algorithm with Gated Recurrent Unit for Cybersecurity in Social Networking. Journal of Cybersecurity and Information Management, 75-88.
[11] Duraibi, S. and Alashjaee, A.M., 2024. Enhancing Cyberattack Detection Using Dimensionality Reduction with Hybrid Deep Learning on Internet of Things Environment. IEEE Access.
[12] Awajan, A., 2023. A novel deep learning-based intrusion detection system for IOT networks. Computers, 12(2), p.34.
[13] Maddu, M. and Rao, Y.N., 2024. Res2Net-ERNN: deep learning based cyberattack classification in software defined network. Cluster Computing, pp.1-19.
[14] Gueye, T., Wang, Y., Rehman, M., Mushtaq, R.T. and Zahoor, S., 2023. A novel method to detect cyber-attacks in IoT/IIoT devices on the modbus protocol using deep learning. Cluster Computing, 26(5), pp.2947-2973.
[15] Vaiyapuri, T., Shankar, K., Rajendran, S., Kumar, S., Gaur, V., Gupta, D. and Alharbi, M., 2024. Automated cyberattack detection using optimal ensemble deep learning model. Transactions on Emerging Telecommunications Technologies, 35(4), p.e4899.
[16] Prabakar, D., Sundarrajan, M., Manikandan, R., Jhanjhi, N.Z., Masud, M. and Alqhatani, A., 2023. Energy analysis-based cyber-attack detection by IoT with artificial intelligence in a sustainable smart city. Sustainability, 15(7), p.6031.
[17] Alrayes, F.S., Nemri, N., Aljaffan, N., Alshuhail, A., Alhashmi, A.A. and Mahmud, A., 2024. Distributed Multiclass Cyberattack Detection using Golden Jackal Optimization with Deep Learning Model for Securing IoT Networks. IEEE Access.
[18] Jia, D. and Wang, D., 2024, October. A Maximum Power Point Tracking (MPPT) Strategy Based on Harris Hawk Optimization (HHO) Algorithm. In Actuators (Vol. 13, No. 11, p. 431). MDPI.
[19] Gu, D., Zheng, R., Cheng, P., Zhou, S., Yan, G., Liu, H., Yang, K., Wang, J., Zhu, Y. and Liao, M., 2024. Single Well Production Prediction Model of Gas Reservoir Based on CNN-BILSTM-AM. Energies, 17(22), p.5674.
[20] Zhong, R., Xu, Y., Zhang, C. and Yu, J., 2025. Efficient multiplayer battle game optimizer for numerical optimization and adversarial robust neural architecture search. Alexandria Engineering Journal, 113, pp.150-168.
[21] https://www.kaggle.com/datasets/chethuhn/network-intrusion-dataset
[22] N. Moustafa, ‘‘A new distributed architecture for evaluating AI-based security systems at the edge: Network TON_IoT datasets,’’ Sustain. Cities Soc., vol. 72, Sep. 2021, Art. no.102994.
[23] Park, C., Lee, J., Kim, Y., Park, J.G., Kim, H. and Hong, D., 2022. An enhanced AI-based network intrusion detection system using generative adversarial networks. IEEE Internet of Things Journal, 10(3), pp.2330-2345
[24] Alrayes, F.S., Aljebreen, M., Maray, M., Alshuhail, A., Alrslani, F.A. and Salama, A.S., 2024. Optimizing Security Protocol: A Synergy of Bio-inspired Planet Optimization Algorithm with Ensemble Learning-based Attack Detection for Connected and Autonomous Vehicles. IEEE Access.
[25] Aburasain, R.Y., 2024. Enhanced Black Widow Optimization with Hybrid Deep Learning Enabled Intrusion Detection in Internet of Things-based Smart Farming. IEEE Access.