International Journal of Neutrosophic Science

Journal DOI

https://doi.org/10.54216/IJNS

Submit Your Paper

2690-6805ISSN (Online) 2692-6148ISSN (Print)

Volume 25 , Issue 2 , PP: 33-43, 2025 | Cite this article as | XML | Html | PDF | Full Length Article

Integrating Machine Learning with Two-Person Intuitionistic Neutrosophic Soft Games for Cyberthreat Detection in Blockchain Environment

Abdalla Ibrahim Abdalla Musa 1 * , Mohammed Abdullah Al-Hagery 2

  • 1 Department of Computer Science, College of Computer, Qassim University, Buraydah, Saudi Arabia - (ab.musa@qu.edu.sa)
  • 2 Department of Computer Science, College of Computer, Qassim University, Buraydah, Saudi Arabia - (hajry@qu.edu.sa)
  • Doi: https://doi.org/10.54216/IJNS.250204

    Received: January 30, 2024 Revised: April 27, 2024 Accepted: July 23, 2024
    Abstract

    Cyber-attacks involve a large number of malicious events including phishing, malware attacks, ransomware, social engineering, etc. Automatic cyber-attack recognition and classification are obtained by different technologies and techniques, including artificial intelligence (AI), data analytics, machine learning (ML), deep learning (DL), and other forward-thinking approaches. As a generality of the fuzzy set (FS) and intuitionistic FS (IFS), the Neutrosophic set (NS) can handle incongruous, uncertain, and indeterminacy data where the indeterminate is explicitly measured, and the degree of truth, indeterminacy, and false functions are liberated. It may successfully define inconsistent, uncertain, and incomplete data and overcome certain limitations of the present techniques in representing uncertain decision data. The indeterministic portion of uncertain information, presented in the NS concept, has been instrumented in proper decision-making that is impossible by the IFS concept. Cyber threat detection and classification is a crucial research area that develops intelligent systems that can identify and categorize a variety of cyber-attacks in real time. This article develops an Integrating Machine Learning with Two-Person Intuitionistic Neutrosophic Soft Games for Cyber threat Detection in Blockchain Environment (IMLTPIN-CDBE) system. The main aim of the IMLTPIN-CDBE methodology lies in the automatic recognition of the cyber-threat BC platform.  The initial phase of data normalization using a min-max scalar is conducted in the IMLTPIN-CDBE method. Moreover, the two-person intuitionistic neutrosophic soft games (TPINSSG) technique is applied for cyberattack recognition. Finally, the grasshopper optimization algorithm (GOA) technique is applied for fine-tuning the hyperparameter included in the TPINSSG classifiers. A sequence of experiments has been conducted on the ransomware database to exhibit the great performance of the IMLTPIN-CDBE method. The empirical findings show the supremacy of the IMLTPIN-CDBE method over other current approaches.

    Keywords :

    Cyberthreat Detection , Neutrosophic Soft Games, Grasshopper Optimization Algorithm , Fuzzy Set , Intuitionistic Fuzzy Sets

    References

    [1]          Dhanalakshmi, G., Sandhiya, S. and Smarandache, F., 2024. Selection of the best process for desalination under a Treesoft set environment using the multi-criteria decision-making method. International Journal of Neutrosophic Science, 23(3), pp.140-40.

    [2]          Almuhur, E., Miqdad, H., Al-labadi, M. and Idrisi, M.I., 2024. μ-L-Closed Subsets of Noetherian Generalized Topological Spaces. International Journal of Neutrosophic Science, 23(3), pp.148-48.

    [3]          Tashtemirovich, A.O., Balba, M.E., Ibrohimjon, F. and Batirova, N., Investigating the Impact of Artificial Intelligence on Digital Marketing Tactics Strategies Using Neutrosophic Set.

    [4]          Sivakumar, C., Al-Qadri, M.O., Alsaraireh, A.A., Al-Husban, A., Meenakshi, P.M., Rajesh, N. and Palanikumar, M., 2024. q-rung square root interval-valued neutrosophic sets with respect to aggregated operators using multiple attribute decision making. International Journal of Neutrosophic Science, 23(3), pp.154-54.

    [5]          Gharib, M., Fakhry, A.E., Ali, A.M., Abdelhafeez, A. and Elbehiery, H., 2024. Single Valued Neutrosophic Sets for Analysis Opinions of Customer in Waste Management. International Journal of Neutrosophic Science, 23(3), pp.184-84.

    [6]          Purohit, S., Calyam, P., Wang, S., Yempalla, R. and Varghese, J., 2020, September. Defensechain: Consortium blockchain for cyber threat intelligence sharing and defense. In 2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS) (pp. 112-119). IEEE.

    [7]          Gong, S. and Lee, C., 2020. Blocis: blockchain-based cyber threat intelligence sharing framework for sybil-resistance. Electronics, 9(3), p.521.

    [8]          Homan, D., Shiel, I. and Thorpe, C., 2019, June. A new network model for cyber threat intelligence sharing using blockchain technology. In 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS) (pp. 1-6). IEEE.

    [9]          Porkodi, S. and Kesavaraja, D., 2022. Intelligence on Situation Awareness and Cyberthreats Based on Blockchain and Neural Network. In Applications of Blockchain and Big IoT Systems (pp. 101-131). Apple Academic Press.

    [10]       Madaan, G., Bhushan, B. and Kumar, R., 2021. Blockchain-based cyberthreat mitigation systems for smart vehicles and industrial automation. Multimedia technologies in the Internet of Things environment, pp.13-32.

    [11]       Aladhadh, S., Alwabli, H., Moulahi, T. and Al Asqah, M., 2022. Bchainguard: a new framework for cyberthreats detection in blockchain using machine learning. Applied Sciences, 12(23), p.12026.

    [12]       Habib, S., Alsanea, M., Aloraini, M., Al-Rawashdeh, H.S., Islam, M. and Khan, S., 2022. An efficient and effective deep learning-based model for real-time face mask detection. Sensors, 22(7), p.2602.

    [13]       Alajlan, N.N. and Ibrahim, D.M., 2022. TinyML: Enabling of inference deep learning models on ultra-low-power IoT edge devices for AI applications. Micromachines, 13(6), p.851.

    [14]       Alsaheel, A., Alhassoun, R., Alrashed, R., Almatrafi, N., Almallouhi, N. and Albahli, S., 2023. Deep Fakes in Healthcare: How Deep Learning Can Help to Detect Forgeries. Computers, Materials & Continua, 76(2).

    [15]       Dornadula, V.N. and Geetha, S., 2019. Credit card fraud detection using machine learning algorithms. Procedia computer science, 165, pp.631-641.

    [16]       Faheem, M. and Al-Khasawneh, M.A., 2024. Multilayer cyberattacks identification and classification using machine learning in internet of blockchain (IoBC)-based energy networks. Data in Brief, 54, p.110461.

    [17]       Jiang, T., Shen, G., Guo, C., Cui, Y. and Xie, B., 2023. BFLS: Blockchain and Federated Learning for sharing threat detection models as Cyber Threat Intelligence. Computer Networks, 224, p.109604.

    [18]       Zkik, K., Sebbar, A., Fadi, O., Kamble, S. and Belhadi, A., 2024. Securing blockchain-based crowdfunding platforms: an integrated graph neural networks and machine learning approach. Electronic Commerce Research, 24(1), pp.497-533.

    [19]       Albakri, A., Alabdullah, B. and Alhayan, F., 2023. Blockchain-assisted machine learning with hybrid metaheuristics-empowered cyberattack detection and classification model. Sustainability, 15(18), p.13887.

    [20]       Aljabri, A., Jemili, F. and Korbaa, O., 2024. Intrusion detection in cyber-physical system using rsa blockchain technology. Multimedia Tools and Applications, 83(16), pp.48119-48140.

    [21]       Khan, Z.F., Alshahrani, S.M., Alghamdi, A.A., Alangari, S., Altamami, N.I., Alissa, K.A., Alazwari, S., Al Duhayyim, M. and Al-Wesabi, F.N., 2023. Machine Learning Based Cybersecurity Threat Detection for Secure IoT Assisted Cloud Environment. Comput. Syst. Sci. Eng., 47(1), pp.855-871.

    [22]       Deepa, B. and Ramesh, K., 2022. Epileptic seizure detection using deep learning through min max scaler normalization. Int. J. Health Sci, 6, pp.10981-10996.

    [23]       Mahzari, M., Hashim, A.H.A., Saeed, K.M.O. and Mokhtar, M.M.O., 2024. Two-Person Intuitionistic Neutrosophic Soft Games with Harris Hawks Optimizer based Tweets Classification on NLP Applications. Full Length Article, 24(1), pp.314-14.

    [24]       Gupta, R., Singh, P., Alam, T. and Agarwal, S., 2023. A deep neural network with hybrid spotted hyena optimizer and grasshopper optimization algorithm for copy move forgery detection. Multimedia Tools and Applications, 82(16), pp.24547-24572.

    [25]       https://www.unb.ca/cic/datasets/ids-2017.html

    Cite This Article As :
    Ibrahim, Abdalla. , Abdullah, Mohammed. Integrating Machine Learning with Two-Person Intuitionistic Neutrosophic Soft Games for Cyberthreat Detection in Blockchain Environment. International Journal of Neutrosophic Science, vol. , no. , 2025, pp. 33-43. DOI: https://doi.org/10.54216/IJNS.250204
    Ibrahim, A. Abdullah, M. (2025). Integrating Machine Learning with Two-Person Intuitionistic Neutrosophic Soft Games for Cyberthreat Detection in Blockchain Environment. International Journal of Neutrosophic Science, (), 33-43. DOI: https://doi.org/10.54216/IJNS.250204
    Ibrahim, Abdalla. Abdullah, Mohammed. Integrating Machine Learning with Two-Person Intuitionistic Neutrosophic Soft Games for Cyberthreat Detection in Blockchain Environment. International Journal of Neutrosophic Science , no. (2025): 33-43. DOI: https://doi.org/10.54216/IJNS.250204
    Ibrahim, A. , Abdullah, M. (2025) . Integrating Machine Learning with Two-Person Intuitionistic Neutrosophic Soft Games for Cyberthreat Detection in Blockchain Environment. International Journal of Neutrosophic Science , () , 33-43 . DOI: https://doi.org/10.54216/IJNS.250204
    Ibrahim A. , Abdullah M. [2025]. Integrating Machine Learning with Two-Person Intuitionistic Neutrosophic Soft Games for Cyberthreat Detection in Blockchain Environment. International Journal of Neutrosophic Science. (): 33-43. DOI: https://doi.org/10.54216/IJNS.250204
    Ibrahim, A. Abdullah, M. "Integrating Machine Learning with Two-Person Intuitionistic Neutrosophic Soft Games for Cyberthreat Detection in Blockchain Environment," International Journal of Neutrosophic Science, vol. , no. , pp. 33-43, 2025. DOI: https://doi.org/10.54216/IJNS.250204