Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

Volume 0 , Issue 2 , PP: 75-88, 2019 | Cite this article as | XML | Html | PDF | Full Length Article

Dragonfly Algorithm with Gated Recurrent Unit for Cybersecurity in Social Networking

Yutao Han 1 * , Ibrahim M. EL-Hasnony 2 , Wenbo Cai 3

  • 1 North China University of Science and Technology, China - (hanyutao@ncst.edu.cn)
  • 2 Faculty of Computers and Information, Mansoura University, Egypt - (ibrahimhesin2005@mans.edu.eg)
  • 3 Northwest Normal University, China - (caiwenbo@nwnu.edu.cn)
  • Doi: https://doi.org/10.54216/JCIM.000107

    Abstract

    The advancements of information technologies and wireless networks have created open online communication channels. Inappropriately, trolls have abused the technologies to impose cyberattacks and threats. Automated cybersecurity solutions are essential to avoid the threats and security issues in social media. This paper presents an efficient dragonfly algorithm (DFA) with gated recurrent unit (GRU) for cybersecurity in social networking. The proposed DFA-GRU model aims to determine the social networking data into neural statements or insult (cyberbullying) statements. Besides, the DFA-GRU model primarily undergoes preprocessing to get rid of unwanted data and TF-IDF vectorizer is used. In addition, the GRU model is employed for the classification process in which the hyperparameters are optimally adjusted by the use of DFA, and thereby the overall classification results get improved. The performance validation of the DFA-GRU model is carried out using benchmark dataset and the results are examined under varying aspects. The experimental outcome highlighted the enhanced performance of the DFA-GRU model interms of distinct measures.

    Keywords :

    Social media, Cyberbullying, Cybersecurity, Machine learning, Word embedding, Dragonfly algorithm.

    References

     

     

    [1]      Da Veiga, A., 2016, July. A cybersecurity culture research philosophy and approach to develop a valid and reliable measuring instrument. In 2016 SAI Computing Conference (SAI) (pp. 1006-1015). IEEE.

    [2]      Hryshchuk, R. and Molodetska, K., 2016, May. Synergetic control of social networking services actors’ interactions. In International Conference on Systems, Control and Information Technologies 2016 (pp. 34-42). Springer, Cham.

    [3]      Anwar, M., He, W., Ash, I., Yuan, X., Li, L. and Xu, L., 2017. Gender difference and employees' cybersecurity behaviors. Computers in Human Behavior, 69, pp.437-443.

    [4]      Abd Rahim, N.H., Hamid, S., Kiah, M.L.M., Shamshirband, S. and Furnell, S., 2015. A systematic review of approaches to assessing cybersecurity awareness. Kybernetes.

    [5]      Li, J.S., Chen, L.C., Monaco, J.V., Singh, P. and Tappert, C.C., 2017. A comparison of classifiers and features for authorship authentication of social networking messages. Concurrency and Computation: Practice and Experience, 29(14), p.e3918.

    [6]      Liu, Y. and Hu, S., 2015. Cyberthreat analysis and detection for energy theft in social networking of smart homes. IEEE Transactions on Computational Social Systems, 2(4), pp.148-158.

    [7]      Dorsey, D.W., Martin, J., Howard, D.J. and Coovert, M.D., 2017. Cybersecurity issues in selection. In Handbook of employee selection (pp. 913-930). Routledge.

    [8]      Walters, I., 2017. Strategies for recruiting cybersecurity professionals in the financial service industry (Doctoral dissertation, Walden University).

    [9]      Tucker, C.S., Burrows, M., Lesniak, K. and Klein, S., 2017, September. Cybersecurity policies and their impact on dynamic data driven application systems. In 2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems (FAS* W) (pp. 363-365). IEEE.

    [10]   Sharma, H.K. and Kshitiz, K., 2018, June. Nlp and machine learning techniques for detecting insulting comments on social networking platforms. In 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE) (pp. 265-272). IEEE.

    [11]   Silva, Y.N., Rich, C. and Hall, D., 2016, August. BullyBlocker: Towards the identification of cyberbullying in social networking sites. In 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) (pp. 1377-1379). IEEE.

    [12]   Nakano, T., Suda, T., Okaie, Y. and Moore, M.J., 2016, February. Analysis of cyber aggression and cyber-bullying in social networking. In 2016 IEEE Tenth International Conference on Semantic Computing (ICSC) (pp. 337-341). IEEE.

    [13]   Altay, E.V. and Alatas, B., 2018, December. Detection of cyberbullying in social networks using machine learning methods. In 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT) (pp. 87-91). IEEE.

    [14]   Chavan, V.S. and Shylaja, S.S., 2015, August. Machine learning approach for detection of cyber-aggressive comments by peers on social media network. In 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 2354-2358). IEEE.

    [15]   Galán-García, P., Puerta, J.G.D.L., Gómez, C.L., Santos, I. and Bringas, P.G., 2016. Supervised machine learning for the detection of troll profiles in twitter social network: Application to a real case of cyberbullying. Logic Journal of the IGPL, 24(1), pp.42-53.

    [16]   Hakim, A.A., Erwin, A., Eng, K.I., Galinium, M. and Muliady, W., 2014, October. Automated document classification for news article in Bahasa Indonesia based on term frequency inverse document frequency (TF-IDF) approach. In 2014 6th international conference on information technology and electrical engineering (ICITEE) (pp. 1-4). IEEE.

    [17]   Dey, R. and Salem, F.M., 2017, August. Gate-variants of gated recurrent unit (GRU) neural networks. In 2017 IEEE 60th international midwest symposium on circuits and systems (MWSCAS) (pp. 1597-1600). IEEE.

    [18]   Mafarja, M.M., Eleyan, D., Jaber, I., Hammouri, A. and Mirjalili, S., 2017, October. Binary dragonfly algorithm for feature selection. In 2017 International conference on new trends in computing sciences (ICTCS) (pp. 12-17). IEEE.

    Cite This Article As :
    Han, Yutao. , M., Ibrahim. , Cai, Wenbo. Dragonfly Algorithm with Gated Recurrent Unit for Cybersecurity in Social Networking. Journal of Cybersecurity and Information Management, vol. , no. , 2019, pp. 75-88. DOI: https://doi.org/10.54216/JCIM.000107
    Han, Y. M., I. Cai, W. (2019). Dragonfly Algorithm with Gated Recurrent Unit for Cybersecurity in Social Networking. Journal of Cybersecurity and Information Management, (), 75-88. DOI: https://doi.org/10.54216/JCIM.000107
    Han, Yutao. M., Ibrahim. Cai, Wenbo. Dragonfly Algorithm with Gated Recurrent Unit for Cybersecurity in Social Networking. Journal of Cybersecurity and Information Management , no. (2019): 75-88. DOI: https://doi.org/10.54216/JCIM.000107
    Han, Y. , M., I. , Cai, W. (2019) . Dragonfly Algorithm with Gated Recurrent Unit for Cybersecurity in Social Networking. Journal of Cybersecurity and Information Management , () , 75-88 . DOI: https://doi.org/10.54216/JCIM.000107
    Han Y. , M. I. , Cai W. [2019]. Dragonfly Algorithm with Gated Recurrent Unit for Cybersecurity in Social Networking. Journal of Cybersecurity and Information Management. (): 75-88. DOI: https://doi.org/10.54216/JCIM.000107
    Han, Y. M., I. Cai, W. "Dragonfly Algorithm with Gated Recurrent Unit for Cybersecurity in Social Networking," Journal of Cybersecurity and Information Management, vol. , no. , pp. 75-88, 2019. DOI: https://doi.org/10.54216/JCIM.000107