999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Enhanced Artificial Intelligence-based Cybersecurity Intrusion Detection for Higher Education Institutions

2022-08-24 06:59:58AbdullahALMalaiseALGhamdiMahmoudRagabandMahaFaroukSabir
Computers Materials&Continua 2022年8期

Abdullah S.AL-Malaise AL-Ghamdi,Mahmoud Ragaband Maha Farouk S.Sabir

1Information Systems Department,Faculty of Computing and Information Technology,King Abdulaziz University,Jeddah,21589,Saudi Arabia

2Information Technology Department,Faculty of Computing and Information Technology,King Abdulaziz University,Jeddah,21589,Saudi Arabia

3Centre of Artificial Intelligence for Precision Medicines,King Abdulaziz University,Jeddah,21589,Saudi Arabia

4Mathematics Department,Faculty of Science,Al-Azhar University,Naser City,11884,Cairo,Egypt

Abstract: As higher education institutions (HEIs) go online,several benefits are attained,and also it is vulnerable to several kinds of attacks.To accomplish security,this paper presents artificial intelligence based cybersecurity intrusion detection models to accomplish security.The incorporation of the strategies into business is a tendency among several distinct industries,comprising education,have recognized as game changer.Consequently,the HEIs are highly related to the requirement and knowledge of the learner,making the education procedure highly effective.Thus,artificial intelligence(AI) and machine learning (ML) models have shown significant interest in HEIs.This study designs a novel Artificial Intelligence based Cybersecurity Intrusion Detection Model for Higher Education Institutions named AICIDHEI technique.The goal of the AICID-HEI technique is to determine the occurrence of distinct kinds of intrusions in higher education institutes.The AICID-HEI technique encompasses min-max normalization approach to preprocess the data.Besides,the AICID-HEI technique involves the design of improved differential evolution algorithm based feature selection(IDEA-FS)technique is applied to choose the feature subsets.Moreover,the bidirectional long short-term memory (BiLSTM) model is utilized for the detection and classification of intrusions in the network.Furthermore,the Adam optimizer is applied for hyperparameter tuning to properly adjust the hyperparameters in higher educational institutions.In order to validate the experimental results of the proposed AICID-HEI technique,the simulation results of the AICIDHEI technique take place by the use of benchmark dataset.The experimental results reported the betterment of the AICID-HEI technique over the other methods interms of different measures.

Keywords: Higher education institutions;deep learning;machine learning;cybersecurity;intrusion detection

1 Introduction

Owing to the benefits provided by the Internet,business has become more open to supporting Internet driven enterprises like extranet collaboration,customer care,and e-commerce.Academic institution is considered resource limited and thus lot of times is needed to have this resource distributed among the students,lecturers,part time staff,and permanent.Additionally,students include postgraduate,Diplomas,and undergraduate students at distinct stages of education [1].Likewise,full-time and part time lecturers need distinct network access stages.Several internet websites like pornographic and those that offer immediate solutions to online examination might need to be restricted or controlled.This will enhance bandwidth utilization and network security[2].Many times,Students become so intrusive to explore all the areas of the network,and therefore it was necessary to defend network with crucial data,and part time staff needn’t be trusted with this network resource.This emphasizes the requirement for a proper scheme to identify illegal accessing to this resource on quantified section beforehand experiencing severe damage.The organization is struggling to preserve availability,confidentiality,and integrity of the network resource and various technologies have been applied for guarding against network intrusions[3].Fig.1 illustrates the different modules contained in cybersecurity.

Figure 1:Different components involved in cybersecurity

Intrusion prevention systems (IPS) techniques work by surveilling system action and network traffics for the sign of malicious activities namely intrusion [4].Mostly,IPS technique depends on signature detection technique which consults a dataset of well-known attack flags and patterns.Once the IPS identifies the matching,it chooses an automatic response from a collection of choices,ranging from alerting an administrator and logging the activity to manually blocking the traffics to preventing network intrusion.In a standard IPS positioning,the organization place devoted IPS network devices in line with the external internet access.This needs a device which is able to keep up with the scale of the institution network traffics[5].Then,the device checks all the network packets when it blocks and passes suspected activity beforehand it accesses the network.This technique provides automated,rapid responses to security threats on campus networks.That move the event response posture from the reactive method utilized while examining a suspicious event to a proactive method which blocks the incidents from taking place primarily.

Machine learning (ML) and Artificial intelligence (AI) development help individuals exceed classical computers to surpass and simulate human intelligence.The advancement of this technology has considerably modified the educational system,providing students a collaborative learning environment and further knowledge in the HEI with greater implications for the upcoming days[6].Mostly,reputable higher education institution has realized that ML and AI represent the future and present in education and the world advanced evolution.This technology provides advanced and interactive education knowledge to the student[7].The result is remarkable:65%of university in the America supports AI-and ML-enabled learning.Furthermore,this system provides essential support to lecturers and teachers in the schools,facilitating and improving learning in different manners[8].Kumar has proven that AI and ML are enhancing and efficient security of the institutions,providing an accessible,peaceful,and flexible computing platform for the study and developing skills amongst students[9],and collaborative learning environments in the HEI reinforce the significance of ML and AI to increase customized learning.

This study designs a novel Artificial Intelligence based Cybersecurity Intrusion Detection Model for Higher Education Institutions named AICID-HEI technique.The AICID-HEI technique encompasses min-max normalization approach to pre-process the data.In addition,the AICID-HEI technique involves the design of improved differential evolution based feature selection (IDEAFS) technique is applied to choose the feature subsets.Followed by,the bidirectional long short term memory (BiLSTM) model is utilized for the detection and classification of intrusions in the network.Finally,the Adam optimizer is applied for hyperparameter tuning to properly adjust the hyperparameters in higher educational institutions.In order to validate the experimental results of the proposed AICID-HEI technique,the simulation results of the AICID-HEI technique take place by the use of benchmark dataset.

2 Related Works

DeCusatis et al.[10]introduced the implementation and design of a cyber-security framework for a Linux community public cloud assisting research and education.The method integrates packet authentication and transport layer access control gateway for blocking fingerprints of key network resources.Stimulation outcomes are provided for the connected data centres in New York.They demonstrate that our technique is capable of blocking Denial of Service(DoS)attacks and network scanners,and offer geo-location attribution based syslog classification.

Aggrey [11]adapt an intrusion detection system (IDS) for academic institutions to prevent network intrusion and provide early detection.The concept is to offer a combined scheme which reduces the weakness of the intrusion prevention technique.They determine IDS,discuss the various IDS architecture,types,compare distinct IDSs,and investigate an efficient execution approach.Othman et al.[12]present Spark-Chi-support vector machine(SVM)method for detecting intrusions.In this method,we employed ChiSqSelector for selecting features and constructed an IDS by utilizing SVM classifiers on Apache Spark Big Data.They utilized KDD99 for training and testing the models.In this work,we presented a comparison among Chi-logistic regression(LR)and Chi-SVM classifiers.

Yahia et al.[13]examined the various kinds of network intrusion data sets and highlight the fact that students could simply generate a network intrusion data set i.e.,illustrative of the network.Intrusion is in form of network signature or anomaly;the student could not grasp each type but they must have the capability of detecting malicious packets with this network.Gao et al.[14]take benchmark dataset as the object of research,analyzed the existing problems and latest progress in the fields of IDS,and presented an adoptive ensemble learning model.By altering the amount of trained information and setting up various decision trees (DTs),we constructed a MultiTree approach.For improving the entire detection effects,we select many base classifications and developed an ensemble adoptive voting method.

In Mishra et al.[15],a comprehensive analysis and investigation of different ML methods were conducted to find the reason for problems related to different ML methods in intrusion activity detection.Attack mapping and classification of the attack feature are given to all the attacks.Problems that are associated with lower-frequency attack detection using network attack data set are considered and feasible methodologies are recommended for development.

3 The Proposed Model

This study has designed an effective AICID-HEI technique is to determine the occurrence of distinct kinds of intrusions in higher education institutes.The AICID-HEI technique encompasses min-max normalization based pre-processing,IDEA-FS based election of features,BiLSTM based classification,and Adam optimizer based hyperparameter tuning.The choice of IDEA-FS and Adam optimizer assist to enhance the intrusion detection performance in higher educational institutions.

3.1 Data Pre-Processing

Primarily,the input data is transformed into a meaningful format by the use of min-max normalization approach.It is generally utilized for reducing the diversifying scaling of the dimensionality.The normalization process converts the data in a particular range by performing the linear conversion on the input data.The dimensionality of the data can be transformed in the interval of[0,1]by the use of min-max normalization.It carries out the conversion process using Eq.(6):

wheretindicates transformed datavin dimensiond,implies the actual lower value and maxddenotes the actual higher value of the dimensiond.Likewise,tran-minddefines the converted lower value andtran-maxdindicates the converted higher value of the dimensiond.

3.2 Design of IDEA-FS Technique

During the feature selection process,the normalized data is fed into the IDEA-FS technique and derive a useful subset of features.DEA technique is assumed as population based search method that is primary established by Storn et al.[16].

During this phase of the current analysis,a 3 phases altering method was established utilizing the DE approach for resolving an optimized issue.For implementing this task,a particular amount of solution vectors were arbitrarily initialized afterward upgraded iteratively utilizing genetic operators(mutation as well as crossover) and selective operators.A primary step,the mutation operators are executed utilizing 3 distinct arbitrarily chosen solution vectors(represented asr1,r2,andr3vectors)in the DE population.Afterward,the variance amongst 2 vectors(r2andr3)multiplied by scaling factor

(F)has added to the primary vector(r1).Therefore,all the target solutionsis changed as to mutant solution vectoras follows.

In the secondary phase,the crossover operator was implemented for calculating a trial vectorit is implemented by integrating the destination solution vector with mutated vector dependent upon the subsequent technique.

wherej=1,2,...,D,rand(j)∈[0,1]denotes thejthestimation of uniform arbitrary generator number.CRindicates the crossover probability that is an arbitrary vector range in[0-1].r and n(i)∈{1,2,...,D}signifies the arbitrary value that makes sureobtains one or more elements inelse no novel parent vector was created,and so the population remains unchanging.Fig.2 illustrates the flowchart of DE technique.

Figure 2:Flowchart of differential evolution

Lastly,in selective sections if and only if the trial vectorsproduces an optimum FF value related to,thenis fixed to.Else,the old vectorhas reserved.The selective method is as follows[17].

During the IDEA,the Cauchy mutation operators are utilized that typical DEA of enhancements from solution diversity.Its purpose is for enhancing the exploration capability and solution diversity of raw DEA from the previous phases of operation with the combination of incorporate Cauchy mutation operators.Also,the Cauchy distribution was executed to perform Cauchy variation on solution that doesn’t converge fromc isfollowing rounds.The basic method is that its influence stuck with local optimum and so,an exterior association was needed and so the search procedure moved from the direction of exploration procedure.During this case,all dimensions an arbitrary parameter of Cauchy distribution,the density function is signified as follows:

whereσ=1 indicates the traditional Cauchy distribution.

The FS technique is represented asNsized vectors whereNrefers to the feature counts.At this point,all place of vector is assumed the values aszeroor one wherezeroimplies the feature that is unselective and one refers to the selective features.Based on the above-mentioned,the fitness function(FF)is to define solution in this state crated to obtain a balance among 2 purposes:

ΔR(D)stands for the classifying error rate.|Y| denotes the size of subsets that this technique selects and|T|whole amount of features contained in the present datasets.αdetermines the parameter∈[0,1]relating to the weight of error rate of classification correspondingly howeverβ=1-αrefers the importance of reducing feature.

3.3 Hyperparameter Tuned BiLSTM Based Classification Model

At the time of data classification,the features are passed into the BiLSTM model to carry out the classification process.The long short term memory (LSTM) network is a kind of recurrent neural network (RNN) primarily structured for solving the vanishing gradient issue of RNNs if concerning long orders [18].The LSTM network structure has of layer of LSTM unit afterward a typical feedforward network.In a general viewpoint,an LSTM unit functions as follows:assumextbe the present input at timet,the resultant of input gate as:

whereWixandWihimplies the weight matrices,ht-1represents the preceding hidden state of units,andbirefers the bias vector.The functionσ(x)∈(0,1)has sigmoid function utilized to gate.

Likewise,the resultant of forget gatefthas estimated as:

Eventually,the resultants of output gate otand cell statectare as follows:

where ⊙refers the Hadamard product.The BiLSTM has 2 parallel LSTM layers such as forward and backward directions.As the input was treated twice,BiLSTM remove further data in the input.Therefore,an enhancing contextual data for making optimum forecasts than LSTM.So,BiLSTMs current has faster convergence and accuracy than LSTM.The BiLSTM structure containing 2 LSTM layers,maintains past as well as future context at whenever of order [19].The output of all LSTMs was integrated based on the subsequent formula:

For optimally altering the hyperparameters of the BiLSTM model,the Adam optimizer can be utilized and thereby boost the classification outcomes.

Adam is another widely utilized technique that alters the rate of learning adaptive to all the parameters.The Adam is a group of distinct gradient optimized techniques.Besides is an exponentially decaying average of past squared gradient calculated namely Adadelta,along with Adam gets an exponentially decaying average of past gradients that is same as Momentum.

whereβ1andβ2implies the decay rate that is suggested to follow the default value.MtandGtare determined for estimating the mean of past gradients(a primary moment)and uncentered difference of past gradients(the secondary moment)correspondingly[20].Since the decay rates generally cause any bias issue,it can be essential to perform the bias-correction work.

So,the upgrade value of Adam was determined as:

The gradient part of △θtalso is determined as:

In Eq.(16),it could be established that every function was dependent upon past gradient of present parameter that has no connection to rate of learning.Therefore,Adam is an optimum efficiency with the support of learning rate techniques.

4 Performance Validation

The simulation analysis of the AICID-HEI technique takes place using the KDDCup99 dataset,which contains a set of 41 attributes where 39 among them are numerical records and rest of them are symbolic records.The dataset comprises two major classes namely normal and anomaly.Besides,the anomaly class includes four kinds of attacks namely DoS,R2l,Probe,and U2r attacks.The best cost analysis of the IDEA-FS technique with recent approaches is carried out in Tab.1 and Fig.3.The IDEA-FS technique has chosen the feature subset of(1,5,6,7,9,11,13,15,16,19,26,28,31,37,40).The experimental values proved that the ant colony optimization (ACO)-FS,butterfly optimization algorithm(BOA)-FS,and particle swarm optimization (PSO)-FS techniques have reached to higher best cost(BC)of 0.0008754,0.0009467,and 0.0009865 respectively.

Table 1:Best cost analysis of IDEA-FS with other FS techniques

Figure 3:Best cost analysis of AICID-HEI technique

The intrusion detection results obtained by the AICID-HEI technique under various types of attacks are provided in Tab.2 and Figs.4-5.The experimental values reported that the AICID-HEI technique has identified all the class labels effectively.

Table 2:Result analysis of proposed model

Figure 4:Result analysis of AICID-HEI technique with different measures

Figure 5:Accuracy analysis of AICID-HEI technique with distinct attacks

For instance,under DoS attack,the AICID-HEI technique has attainedsensy,specy,accuy,Fmeasure,and kappa of 99.020%,99.300%,98.540%,97.480%,and 97.300%respectively.Besides,under Probe attack,the AICID-HEI approach has achievedsensy,specy,accuy,Fmeasure,and kappa of 99.100%,99.410%,99.020%,98.750%,and 98.350% correspondingly.In addition,under Normal attack,the AICID-HEI methodology has reachedsensy,specy,accuy,Fmeasure,and kappa of 99.390%,99.750%,99.380%,99.440%,and 99.240%correspondingly.Average result analysis of the AICID-HEI technique under all kinds of attacks.The experimental results reported the betterment of the AICID-HEI technique with averagesensy,specy,accuy,Fmeasure,and kappa of 99.014%,99.540%,99.018%,98.822%,and 98.478%respectively.

Fig.6 illustrates the accuracy analysis of the AICID-HEI technique on the test dataset.The results outperformed that the AICID-HEI system has accomplished higher performance with superior training and validation accuracy.It can be stated noticed that the AICID-HEI technique has gained improved validation accuracy over the training accuracy.

Figure 6:Accuracy graph analysis of AICID-HEI technique

Fig.7 showcases the loss analysis of the AICID-HEI approach on the test dataset.The outcomes established that the AICID-HEI technique has resulted in a proficient outcome with the reduced training and validation loss.It can be clear that the AICID-HEI technique has offered reduced validation loss over the training loss.

The detailed comparative study of the AICID-HEI technique with recent methods takes place in Tab.3 and Fig.8[21,22].The experimental results stated that the RBF Network and Random(RAND)Forest models have obtained lower intrusion detection performance.At the same time,the Random Tree and Decision Tree models have attained slightly increased intrusion detection outcomes.In line with,the logistic regression (LOGR) technique has accomplished somewhat acceptable intrusion detection outcomes.However,the AICID-HEI technique has outperformed the other methods with the increasedsensy,specy,accuy,Fmeasure,and kappa of 99.014%,99.540%,99.018%,98.822%,and 98.478%respectively.From the above mentioned tables and figures,it is ensured that the AICID-HEI technique has resulted in effective classification performance and accomplishes security.

Figure 7:Loss graph analysis of AICID-HEI technique

Table 3:Performance analysis of various methods with proposed AICID-HEI model

Figure 8:Comparative analysis of AICID-HEI technique with existing approaches

5 Conclusion

This study has designed an effective AICID-HEI technique is to determine the occurrence of distinct kinds of intrusions in higher education institutes.The AICID-HEI technique encompasses min-max normalization based pre-processing,IDEA-FS based election of features,BiLSTM based classification,and Adam optimizer based hyperparameter tuning.The choice of IDEA-FS and Adam optimizer assist to enhance the intrusion detection performance in higher educational institutions.In order to validate the experimental results of the proposed AICID-HEI technique,the simulation results of the AICID-HEI technique take place by the use of benchmark dataset.The experimental results reported the betterment of the AICID-HEI technique over the other methods interms of different measures.As a part of future extensions,clustering techniques can be included to boost the detection rate.

Acknowledgement:The authors extend their appreciation to the Deputyship for Research &Innovation,Ministry of Education in Saudi Arabia for funding this research work through the Project Number(IFPRC-154-611-2020)and King Abdulaziz University,DSR,Jeddah,Saudi Arabia.

Funding Statement:This project was supported financially by Institution Fund projects under Grant No.(IFPRC-154-611-2020).

Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

主站蜘蛛池模板: 69综合网| 青草视频免费在线观看| 丁香婷婷激情综合激情| 97人妻精品专区久久久久| 久爱午夜精品免费视频| 四虎影视国产精品| 毛片国产精品完整版| 久久久久久久久亚洲精品| 婷婷丁香在线观看| 亚洲码在线中文在线观看| 日本人又色又爽的视频| 国产Av无码精品色午夜| 成人国产精品网站在线看| 黄色网址手机国内免费在线观看| 亚洲成人www| a级免费视频| 亚洲国产欧洲精品路线久久| 天天色天天操综合网| 欧美中文一区| 亚洲va精品中文字幕| 一级做a爰片久久免费| 尤物特级无码毛片免费| 免费日韩在线视频| 国产成人1024精品| 欧美日本视频在线观看| 91在线精品免费免费播放| 91精品视频播放| 精品国产Av电影无码久久久| 亚洲天堂网在线观看视频| 国产成+人+综合+亚洲欧美| 91在线视频福利| 在线观看免费人成视频色快速| 亚洲一区第一页| 国产一区在线观看无码| 日本欧美中文字幕精品亚洲| 亚洲精品在线影院| 99视频在线看| 人人艹人人爽| 国产无码精品在线| 中文字幕在线看| 亚洲天堂网站在线| 国产一二三区视频| 扒开粉嫩的小缝隙喷白浆视频| 成人免费午夜视频| 福利一区三区| 日韩在线永久免费播放| 国产美女精品人人做人人爽| 国产主播在线一区| 国产在线欧美| 特级精品毛片免费观看| 热99精品视频| 国产成人精品一区二区三区| 在线毛片网站| 2020极品精品国产 | 亚洲日本中文字幕天堂网| 黄色网址免费在线| 亚洲av色吊丝无码| 欧美日韩精品在线播放| 精品国产一区二区三区在线观看| 国产精品视频久| 青青国产成人免费精品视频| 色悠久久久久久久综合网伊人| 精品无码国产自产野外拍在线| 巨熟乳波霸若妻中文观看免费| 伊人无码视屏| 国产乱子伦精品视频| 国产精品美女在线| 欧美午夜在线播放| 国产成熟女人性满足视频| 无遮挡国产高潮视频免费观看 | 国产爽爽视频| 国产99在线| а∨天堂一区中文字幕| 亚洲色欲色欲www在线观看| 毛片手机在线看| 激情爆乳一区二区| 自慰高潮喷白浆在线观看| 欧美性色综合网| a天堂视频| 四虎亚洲国产成人久久精品| 直接黄91麻豆网站| 精品丝袜美腿国产一区|