Volume 25 , Issue 1 , PP: 38-50, 2025 | Cite this article as | XML | Html | PDF | Full Length Article
Mohammed Abdullah Al-Hagery 1 * , Abdalla I. Abdalla Musa 2
Doi: https://doi.org/10.54216/IJNS.250103
Network security is any endeavor intended to defend the integrity and usability of the data and network. Fast development in network technology and the scope and amount of information transported on a network is gradually growing. Based on these situations, the complexity and density of cyber-attacks and threats are also increasing. The constantly expanding connectivity makes it more difficult for cyber-security specialists to monitor all the movements on the network. More complex and frequent cyber-attack makes anomaly identification and detection in network events challenging. Machine learning (ML) provides different techniques and tools to automate cyber-attack detection and for prompt prognosis and analysis of attack types. The model of a neutrosophic hypersoft set (NHSS) is a combination of a neutrosophic set with a hypersoft set. It is a useful structure to handle multi-objective problems and multi-attributes with disjoint attributable values. This study derives the Possibility Neutrosophic Hypersoft Set for Cyberattack Detection (pNHSS-CAD) technique to improve network security. The pNHSS-CAD method has its formation in feature selection with the Whale Optimization Algorithm (WOA), which successfully recognizes the important features from the data, thus improving processing speed and reducing dimensionality. Following feature selection, the pNHs-set classifier is employed for the robust detection and identification of cyber-attacks, which leverages the power of the neutrosophic set to deal with ambiguity and uncertainty in the information. The Firefly (FF) technique is applied for hyperparameter fine-tuning, which ensures the model operates at maximum effectiveness to enhance the performance of the classification. This wide-ranging method leads to a very efficient cyberattack recognition method, which can able to accurately mitigate and identify risks in the real world
Network security , Artificial intelligence , Risk factors , Machine learning , Cyberattacks
[1] Smarandache, F., Neutrosophic set a generalization of the intuitionistic fuzzy sets. Inter. J. Pure Appl. Math., 24, 287 – 297, 2005.
[2] Das, S.K. and Edalatpanah, S.A., 2020. A new ranking function of triangular neutrosophic number and its application in integer programming. International Journal of Neutrosophic Science, 4(2), pp.82-92.
[3] Dhar, M., 2020. Neutrosophic soft block matrices and some of its properties. Int J Neutrosophic Sci, 12(1), pp.39-49.
[4] Chinnadurai, V. and Sindhu, M.P., 2020. An introduction to neutro-fine topology with separation axioms and decision making. International Journal of Neutrosophic Science (IJNS) Volume 12, 2020, p.11.
[5] Chinnadurai, V. and Sindhu, M.P., 2020. An introduction to neutro-fine topology with separation axioms and decision making. International Journal of Neutrosophic Science (IJNS) Volume 12, 2020, p.11.
[6] Edalatpanah, S.A., 2020. A direct model for triangular neutrosophic linear programming. International journal of neutrosophic science, 1(1), pp.19-28.
[7] Das, S.; Manchala, Y.; Rout, S.K.; Kumar Panda, S. Deep Learning and Metaheuristics based Cyber Threat Detection in Internet of Things Enabled Smart City Environment. Res. Sq. 2023. preprint.
[8] Asiri, M.M.; Mohamed, H.G.; Nour, M.K.; Al Duhayyim, M.; Aziz, A.S.A.; Motwakel, A.; Zamani, A.S.; Eldesouki, M.I. Hybrid Metaheuristics Feature Selection with Stacked Deep Learning-Enabled Cyber-Attack Detection Model. Comput. Syst. Sci. Eng. 2023, 45, 1679–1694.
[9] Alohali, M.A.; Elsadig, M.; Al-Wesabi, F.N.; Al Duhayyim, M.; Hilal, A.M.; Motwakel, A. Blockchain Assisted Op-timal Machine Learning Based Cyberattack Detection and Classification Scheme. Comput. Syst. Sci. Eng. 2023, 46, 3583–3598.
[10] Huma, Z.E.; Latif, S.; Ahmad, J.; Idrees, Z.; Ibrar, A.; Zou, Z.; Alqahtani, F.; Baothman, F. A Hybrid Deep Random Neural Network for Cyberattack Detection in the Industrial Internet of Things. IEEE Access 2021, 9, 55595–55605.
[11] Alkatheiri, M.S.; Alghamdi, A.S. Blockchain-Assisted Cybersecurity for the Internet of Medical Things in the Healthcare Industry. Electronics 2023, 12, 1801.
[12] Alajlan, N.N. and Ibrahim, D.M., 2022. TinyML: Enabling of inference deep learning models on ultra-low-power IoT edge devices for AI applications. Micromachines, 13(6), p.851.
[13] Dornadula, V.N. and Geetha, S., 2019. Credit card fraud detection using machine learning algorithms. Procedia computer science, 165, pp.631-641.
[14] Alsaheel, A., Alhassoun, R., Alrashed, R., Almatrafi, N., Almallouhi, N. and Albahli, S., 2023. Deep Fakes in Healthcare: How Deep Learning Can Help to Detect Forgeries. Computers, Materials & Continua, 76(2).
[15] Albahli, S. and Nawaz, M., 2023. MedNet: Medical deepfakes detection using an improved deep learning approach. Multimedia Tools and Applications, pp.1-19.
[16] Aladhadh, S., Alwabli, H., Moulahi, T. and Al Asqah, M., 2022. Bchainguard: a new framework for cyberthreats detection in blockchain using machine learning. Applied Sciences, 12(23), p.12026.
[17] Vaiyapuri, T., Shankar, K., Rajendran, S., Kumar, S., Gaur, V., Gupta, D. and Alharbi, M., 2024. Automated cyberattack detection using optimal ensemble deep learning model. Transactions on Emerging Telecommunications Technologies, 35(4), p.e4899.
[18] Ding, W., Abdel-Basset, M. and Mohamed, R., 2023. DeepAK-IoT: An effective deep learning model for cyberattack detection in IoT networks. Information Sciences, 634, pp.157-171.
[19] Rao, D.S. and Emerson, A.J., 2024. Cyberattack defense mechanism using deep learning techniques in software-defined networks. International Journal of Information Security, 23(2), pp.1279-1291.
[20] Assiri, F.Y. and Ragab, M., 2023. Optimal deep-learning-based cyberattack detection in a blockchain-assisted IoT environment. Mathematics, 11(19), p.4080.
[21] Hussain, M.M., Khalid, N., Amjad, A. and Shoaib, M., 2024, February. Cyber Attack Identification System Using Deep Learning. In 2024 5th International Conference on Advancements in Computational Sciences (ICACS) (pp. 1-13). IEEE.
[22] Motwakel, A., Alrowais, F., Tarmissi, K., Marzouk, R., Mohamed, A., Zamani, A.S., Yaseen, I. and Eldesouki, M.I., 2023. Enhanced Crow Search with Deep Learning-Based Cyberattack Detection in SDN-IoT Environment. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 36(3), pp.3157-3173.
[23] Saleh, I., Borhan, N., Yunus, A. and Rahiman, W., 2024. Comprehensive Technical Review of Recent Bio-Inspired Population-Based Optimization (BPO) Algorithms for Mobile Robot Path Planning. IEEE Access.
[24] Rahman, A.U., Saeed, M., Mohammed, M.A., Krishnamoorthy, S., Kadry, S. and Eid, F., 2022. An integrated algorithmic MADM approach for heart diseases’ diagnosis based on neutrosophic hypersoft set with possibility degree-based setting. Life, 12(5), p.729.
[25] Bacanin, N., Venkatachalam, K., Bezdan, T., Zivkovic, M. and Abouhawwash, M., 2023. A novel firefly algorithm approach for efficient feature selection with COVID-19 dataset. Microprocessors and Microsystems, 98, p.104778.