A Cyber-Attack Detection System Using Late Fusion Aggregation Enabled Cyber-Net

نویسندگان

چکیده

Today, securing devices connected to the internet is challenging as security threats are generated through various sources. The protection of cyber-physical systems from external attacks a primary task. presented method planned on prime motive detecting cybersecurity and their impacted parameters. proposed architecture employs LYSIS dataset formulates Multi Variant Exploratory Data Analysis (MEDA) Principle Component (PCA) Singular Value Decomposition (SVD) for extraction unique feature mappings analyzed with Recurrent 2 Convolutional Neural Network (R2CNN) Gradient Boost Regression (GBR) identify maximum correlation. Novel Late Fusion Aggregation enabled Cyber-Net (LFAEC) robust derived algorithm. quantitative analysis uses predicted threat points actual variables which mean difference vectors evaluated. performance system assessed against parameters such Accuracy, Precision, Recall, F1 Score. outperformed by 98% 100% in all quality measures compared existing methods.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A System for Cyber Attack Detection Using Contextual Semantics

In this paper, we present a layered cyber-attack detection system with semantics and context capabilities. The described approach has been implemented in a prototype system which uses semantic information about related attacks to infer all possible suspicious network activities from connections between hosts. The relevant attacks generated by semantic techniques are forwarded to context filters...

متن کامل

A survey of Cyber Attack Detection Strategies

Homeland security field deals with diverse subjects, audio processing, video surveillance, image detection, geolocation determination, and cyber attack detection. Audio processing and video surveillance area are significant for public places safety and land border area. However the big threat for homeland security is cyber attacks. Cyber terror attacks and cyber crime attacks may move over virt...

متن کامل

Advancing Cyber Security Using .NET

(2) We propose a new definition of the web services authentication token (i.e., SecureToken) that includes the concept of “trust level” that reflects the inherent reliability of the trust credential. Our new SecureToken normalizes the authentication process so that the tokens generated by new technologies (e.g., fingerprints, signature recognition) can be used seamlessly alongside traditional t...

متن کامل

Cyber Reconnaissance: An Alarm before Cyber Attack

Today’s cyber world is more than the internet. It is interdependent networks containing telecommunication network, embedded system and critical infrastructures. Malicious attacks on critical infrastructure become a major threat to business and government operations. An easy and fast access to network makes business successful and makes sensitive information more vulnerable to cyber thieves. Tod...

متن کامل

Review of Attack Detection Scheme for Cyber Physical Security System

Cyber-Physical Systems (CPSs) are characterized by integrating computation and physical processes. The theories and applications of CPSs face the enormous challenges that are (1) general workflow of cyber physical systems, (2) identifying the unique properties of cyber-physical systems and (3) discussing security mechanisms applicable to cyber physical systems. In particular, we analyze and we ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Intelligent Automation and Soft Computing

سال: 2023

ISSN: ['2326-005X', '1079-8587']

DOI: https://doi.org/10.32604/iasc.2023.034885