Volume 15 , Issue 1 , PP: 225-232, 2025 | Cite this article as | XML | Html | PDF | Full Length Article
Abdulrahman Fatikhan Ataala 1 , Khudhair Abed Thamer 2 , Ahmed Hikmat Saeed 3 , Mohammed Yousif 4 * , Ahmad Salim 5 , Qusay Hatem Alsultan 6 , Salim Bader 7
Doi: https://doi.org/10.54216/JCIM.150117
Currently, building a high-performance attack detector for cyber threat should be an essential and challenging task to secure cloud system from malicious activities. Traditional methodologies have become subject to the challenge of overfitting, distributive and intricate system layout, comprehensibility and more extended time particles. Therefore, the proposed contribution can be an efficient solution to design and develop a secure system, which is able to recognize cyber threats from cloud systems. It includes preprocessing and normalization, feature extraction, optimization as well prediction modules. Normalization with the relevant per batch fast Independent Component Analysis (ICA) model. A Genetic Algorithm (GA) - Gray Wolf Optimization (GWO) is then used to select the discriminatory features for training and testing phases. In the end, GAGWO- Random Forest (RF) is employed to classify the flow of data as insider or outsider. The detection system is implemented by taking popular and publicly available datasets like BoT-IoT, KDD Cup’99 etc. The various percentage indicators of feasibility are used as a validation purpose like detection accuracy measuring and comparing with the suggested GAGWO-RF system. Overall Accuracy: The proposed GAGWO-RF system achieved an average accuracy rate at 99.8% on all datasets the used. From the performance study, we have noted that GAGWO-RF security model performs better than other models.
Genetic Algorithm , Gray Wolf Optimization , Random Forest , Cyber Attacks , Independent Component Analysis
[1] Ahmed, O. (2024). Enhancing Intrusion Detection in Wireless Sensor Networks through Machine Learning Techniques and Context Awareness Integration. International Journal of Mathematics, Statistics, and Computer Science, 2, 244–258. https://doi.org/10.59543/ijmscs.v2i.10377
[2] V. S. Rajkumar, A. Stefanov, A. Presekal, P. Palensky, and J. L. R. Torres, “Cyber Attacks on Power Grids: Causes and Propagation of Cascading Failures,” IEEE Access, vol. 11, no. September, pp. 103154–103176, 2023, doi: 10.1109/ACCESS.2023.3317695.
[3] R. Shandler and M. A. Gomez, “The hidden threat of cyber-attacks–undermining public confidence in government,” J. Inf. Technol. Polit., vol. 20, no. 4, pp. 359–374, 2023, doi: 10.1080/19331681.2022.2112796.
[4] S. Conti, M., Dehghantanha, A., Franke, K., & Watson, “Internet of Things security and forensics: Challenges and opportunities,” Futur. Gener. Comput. Syst., vol. 78, pp. 544–549, 2018.
[5] N. Zhao, X. Zhao, N. Xu, and L. Zhang, “Resilient Event-Triggered Control of Connected Automated Vehicles Under Cyber Attacks,” IEEE/CAA J. Autom. Sin., vol. 10, no. 12, pp. 2300–2302, 2023, doi: 10.1109/JAS.2023.123483.
[6] R. R. Chandan et al., “Genetic Algorithm and Machine Learning,” pp. 167–182, 2023, doi: 10.4018/978-1-6684-5656-9.ch009.
[7] K. C. A. Khatri, K. B. Shah, J. Logeshwaran, and A. Shrestha, “Genetic Algorithm Based Techno-Economic Optimization of an Isolated Hybrid Energy System,” Online) Ictact J. Microelectron., vol. 1680, no. January, p. 4, 2023, doi: 10.21917/ijme.2023.0249.
[8] G. Shial, S. Sahoo, and S. Panigrahi, An Enhanced GWO Algorithm with Improved Explorative Search Capability for Global Optimization and Data Clustering, vol. 37, no. 1. Taylor & Francis, 2023. doi: 10.1080/08839514.2023.2166232.
[9] X. Yan, Z. Lin, Z. Lin, and B. Vucetic, “A Novel Exploitative and Explorative GWO-SVM Algorithm for Smart Emotion Recognition,” IEEE Internet Things J., vol. 10, no. 11, pp. 9999–10011, 2023, doi: 10.1109/JIOT.2023.3235356.
[10] R. Kumar, S., Choudhary, R., & Kumar, “Hybrid Genetic Algorithm and Particle Swarm Optimization for Intrusion Detection System,” Procedia Comput. Sci., vol. 167, pp. 1551–1558, 2019.
[11] J. Zheng, D. Xin, Q. Cheng, M. Tian, and L. Yang, “The Random Forest Model for analyzing and Forecasting the US Stock Market under the background of smart finance,” pp. 82–90, 2024, doi: 10.2991/978-94-6463-419-8_11.
[12] H. Liu, Y., & Yu, “Cybersecurity Threat Detection Using Hybrid Models: A Review,” IEEE Access, vol. 10, pp. 5037–5050, 2022.
[13] K. Zhang, Z., Wang, S., Ji, G., Sun, P., & Li, “A hybrid approach for feature selection based on brain storm optimization and grey wolf optimization,” Appl. Soft Comput., vol. 107, p. 107354, 2021.
[14] L. Breiman, “Random Forests,” Mach. Learn., vol. 45, no. 1, pp. 5–32, 2001.
[15] A. Geetha, T.Deepa, “A FKPCA-GWO WDBiLSTM classifier for intrusion detection system in cloud environments,” Knowl. Based Syst, vol. 253, p. 109557, 2022.
[16] F. Aldallal, A. Alisa, “Effective Intrusion Detection System to Secure Data in Cloud Using Machine Learning,” Symmetry (Basel)., vol. 13, p. 2306, 2021.
[17] R. Kumar, P. Gupta, G.P. Tripathi, “A distributed ensemble design based intrusion detection system using fog computing to protect the internet of things networks,” J. Ambient. Intell. Humaniz. Comput, vol. 12, pp. 9555–9572, 2021.
[18] F. S. Kilincer, I.F. Ertam, “A. Machine learning methods for cyber security intrusion detection: Datasets and comparative study,” Comput. Netw, vol. 188, p. 107840, 2021.
[19] E. C. Detection and U. G. Model, “Enhancing Cloud-Based Security : A Novel Approach for,” 2023.