Binary Hunter-Prey Optimization with Machine Learning-Based Cybersecurity Solution on Internet of Things Environment

被引:2
|
作者
Khadidos, Adil O. [1 ]
Alkubaisy, Zenah Mahmoud [2 ,3 ]
Khadidos, Alaa O. [4 ,5 ]
Alyoubi, Khaled H. [4 ]
Alshareef, Abdulrhman M. [4 ]
Ragab, Mahmoud [1 ,6 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Informat Technol Dept, Jeddah 21589, Saudi Arabia
[2] King Abdulaziz Univ, Fac Econ & Adm, Management Digital Transformat & Innovat Syst Org, Jeddah 21589, Saudi Arabia
[3] King Abdulaziz Univ, Fac Econ & Adm, Dept Management Informat Syst, Jeddah 21589, Saudi Arabia
[4] King Abdulaziz Univ, Fac Comp & Informat Technol, Informat Syst Dept, Jeddah 21589, Saudi Arabia
[5] King Abdulaziz Univ, Ctr Res Excellence Artificial Intelligence & Data, Jeddah 21589, Saudi Arabia
[6] Al Azhar Univ, Fac Sci, Math Dept, Nasr City 11884, Cairo, Egypt
关键词
Internet of Things; phishing attack; machine learning; hunter prey optimization; feature selection; ALGORITHM;
D O I
10.3390/s23167207
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Internet of Things (IoT) enables day-to-day objects to connect with the Internet and transmit and receive data for meaningful purposes. Recently, IoT has resulted in many revolutions in all sectors. Nonetheless, security risks to IoT networks and devices are persistently disruptive due to the growth of Internet technology. Phishing becomes a common threat to Internet users, where the attacker aims to fraudulently extract confidential data of the system or user by using websites, fictitious emails, etc. Due to the dramatic growth in IoT devices, hackers target IoT gadgets, including smart cars, security cameras, and so on, and perpetrate phishing attacks to gain control over the vulnerable device for malicious purposes. These scams have been increasing and advancing over the last few years. To resolve these problems, this paper presents a binary Hunter-prey optimization with a machine learning-based phishing attack detection (BHPO-MLPAD) method in the IoT environment. The BHPO-MLPAD technique can find phishing attacks through feature selection and classification. In the presented BHPO-MLPAD technique, the BHPO algorithm primarily chooses an optimal subset of features. The cascaded forward neural network (CFNN) model is employed for phishing attack detection. To adjust the parameter values of the CFNN model, the variable step fruit fly optimization (VFFO) algorithm is utilized. The performance assessment of the BHPO-MLPAD method takes place on the benchmark dataset. The results inferred the betterment of the BHPO-MLPAD technique over compared approaches in different evaluation measures.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] Design Guidelines for Machine Learning-based Cybersecurity in Internet of Things
    Boukerche, Azzedine
    Coutinho, Rodolfo W. L.
    [J]. IEEE NETWORK, 2021, 35 (01): : 393 - 399
  • [2] Topology Optimization of Continuum Structures Based on Binary Hunter-Prey Optimization Algorithm
    Zhao, Zhuanzhe
    Rui, Yujian
    Liu, Yongming
    Liu, Zhibo
    Tu, Zhijian
    [J]. SYMMETRY-BASEL, 2023, 15 (05):
  • [3] Golden Jackal Optimization with a Deep Learning-Based Cybersecurity Solution in Industrial Internet of Things Systems
    Maghrabi, Louai A.
    Alzahrani, Ibrahim R.
    Alsalman, Dheyaaldin
    Alkubaisy, Zenah Mahmoud
    Hamed, Diaa
    Ragab, Mahmoud
    [J]. ELECTRONICS, 2023, 12 (19)
  • [4] Hybrid Hunter-Prey Optimization with Deep Learning-Based Fintech for Predicting Financial Crises in the Economy and Society
    Katib, Iyad
    Assiri, Fatmah Y.
    Althaqafi, Turki
    Alkubaisy, Zenah Mahmoud
    Hamed, Diaa
    Ragab, Mahmoud
    [J]. ELECTRONICS, 2023, 12 (16)
  • [5] Short-Term Wind Power Prediction by an Extreme Learning Machine Based on an Improved Hunter-Prey Optimization Algorithm
    Wang, Xiangyue
    Li, Ji
    Shao, Lei
    Liu, Hongli
    Ren, Lei
    Zhu, Lihua
    [J]. SUSTAINABILITY, 2023, 15 (02)
  • [6] Automated Machine Learning Enabled Cybersecurity Threat Detection in Internet of Things Environment
    Alrowais, Fadwa
    Althahabi, Sami
    Alotaibi, Saud S.
    Mohamed, Abdullah
    Hamza, Manar Ahmed
    Marzouk, Radwa
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2023, 45 (01): : 687 - 700
  • [7] Machine Learning Based Network Intrusion Detection System for Internet of Things Cybersecurity
    Molcer, Piroska Stanic
    Pejic, Aleksandar
    Gulaci, Kristian
    Szalma, Reka
    [J]. SECURITY-RELATED ADVANCED TECHNOLOGIES IN CRITICAL INFRASTRUCTURE PROTECTION: THEORETICAL AND PRACTICAL APPROACH, 2022, : 95 - 110
  • [8] Machine Learning-based Optimal Framework for Internet of Things Networks
    Alsafasfeh, Moath
    Arida, Zaid A.
    Saraereh, Omar A.
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 71 (03): : 5355 - 5380
  • [9] A Machine Learning-based Intelligent ID System for the Internet of Things
    Bacha, Sawssen
    Liouane, Noureeddine
    [J]. 2024 IEEE INTERNATIONAL CONFERENCE ON ADVANCED SYSTEMS AND EMERGENT TECHNOLOGIES, ICASET 2024, 2024,
  • [10] Security, Trust, and Privacy in Machine Learning-Based Internet of Things
    Meng, Weizhi
    Li, Wenjuan
    Han, Jinguang
    Su, Chunhua
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022