Skip to content
2000
Volume 15, Issue 3
  • ISSN: 2210-3279
  • E-ISSN: 2210-3287

Abstract

Aims and Background

Network security detection has become increasingly complex due to the proliferation of Internet nodes and the ever-changing nature of network architecture. To address this, a multi-layer feedforward neural-network has been employed to construct a model for security threat detection, which has enhanced network security protection.

Objectives and Methods

Improving prediction accuracy and real-time performance, this research suggests an optimal strategy based on Clockwork Recurrent-Neural-Networks (CW-RNNs) to handle nonlinearity and temporal dynamics in network security circumstances. We get the model to pick up on both the short-term and long-term temporal aspects of network-security situations by using the clock-cycle RNN. To further improve the network security scenario prediction model, we tune the network hyperparameters using the Grey-Wolf-Optimization (GWO) technique. By incorporating a clock-cycle for hidden units, the model can improve its pattern recognition capabilities by learning short-term knowledge from high-frequency update modules and preserving long-term memory from low-frequency update modules.

Results and Discussion

The optimized clock-cycle RNN achieves better prediction accuracy than competing network models when it comes to extracting nonlinear and temporal characteristics of network security scenarios, according to the experimental data.

Conclusion

In addition, our method is perfect for tracking massive amounts of data transmitted by sensor networks because of its minimal time complexity and outstanding real-time performance.

Loading

Article metrics loading...

/content/journals/swcc/10.2174/0122103279332710240919091605
2024-10-11
2026-02-16
Loading full text...

Full text loading...

References

  1. DuX. DingX. TaoF. Network security situation prediction based on optimized clock-cycle recurrent neural network for sensor-enabled networks.Sensors20232313608710.3390/s23136087 37447936
    [Google Scholar]
  2. AltanG. SecureDeepNet‐IoT: A deep learning application for invasion detection in industrial Internet of Things sensing systems.Trans. Emerg. Telecommun. Technol.2021324e422810.1002/ett.4228
    [Google Scholar]
  3. LiW. ChaiY. KhanF. A comprehensive survey on machine learning-based big data analytics for IoT-enabled smart healthcare system.Mob. Netw. Appl.202126123425210.1007/s11036‑020‑01700‑6
    [Google Scholar]
  4. EshmawiA.A. KhayyatM. Abdel-KhalekS. Deep learning with metaheuristics based data sensing and encoding scheme for secure cyber physical sensor systems.Cluster Comput.20232642245225710.1007/s10586‑022‑03654‑8
    [Google Scholar]
  5. Al-WesabiFN AlbraikanAA HilalAM Design of optimal deep learning based human activity recognition on sensor enabled internet of things environment.IEEE Access2021914398814399610.1109/ACCESS.2021.3112973
    [Google Scholar]
  6. TownsendJ. Interconnected sensor networks and machine learning-based analytics in data-driven smart sustainable cities.Geopolitics, History, and International Relations20211313141
    [Google Scholar]
  7. Shaker ReddyP.C. SucharithaY. IoT-enabled energy-efficient multipath power control for underwater sensor networks.Int. J. Sensors Wirel. Commun. Control202212647849410.2174/2210327912666220615103257
    [Google Scholar]
  8. KimT.H. LeeJ.H. LeeJ.H. KimM.Y. Deep Learning-Based QoS Prediction for Optimization of Robotic Communication.2024 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)Osaka, Japan, 19-22 February 2024, pp. 301-306.10.1109/ICAIIC60209.2024.10463315
    [Google Scholar]
  9. HanJ.H. BaeK.M. HongS.K. Machine learning-based self-powered acoustic sensor for speaker recognition.Nano Energy20185365866510.1016/j.nanoen.2018.09.030
    [Google Scholar]
  10. NaoumiS. BazziA. BomfinR. ChafiiM. Complex neural network based joint AoA and AoD estimation for bistatic ISAC.IEEE J. Sel. Top. Signal Process.202411510.1109/JSTSP.2024.3387299
    [Google Scholar]
  11. DelamouM. BazziA. ChafiiM. AmhoudE.M. Deep learning-based estimation for multitarget radar detection.2023 IEEE 97th Vehicular Technology Conference (VTC2023-Spring)Florence, Italy, 20-23 June 2023, pp. 1-5.10.1109/VTC2023‑Spring57618.2023.10200157
    [Google Scholar]
  12. NaoumiS BazziA BomfinR ChafiiM Deep learning-enabled angle estimation in bistatic ISAC systems.2023 IEEE Globecom Workshops (GC Wkshps), 2023Kuala Lumpur, Malaysia, 04-08 December 2023, pp. 854-859.10.1109/GCWkshps58843.2023.10464930
    [Google Scholar]
  13. IslamS. BhattacharjeeA. BadshaS. Toward secure cyber infrastructure for smart cities: Learning-based intelligent solutions.In: IoT and WSN based Smart Cities: A Machine Learning Perspective.ChamSpringer International Publishing202221522410.1007/978‑3‑030‑84182‑9_13
    [Google Scholar]
  14. VyasS. GuptaS. WBAN-based remote monitoring system utilising machine learning for healthcare services.IJSoSE202313110010810.1504/IJSSE.2023.129054
    [Google Scholar]
  15. ZhouL. LiuQ. WuF. WeiY. Deep learning based sensing resource allocation for mobile target tracking.2020 IEEE 20th International Conference on Communication Technology (ICCT).Nanning, China, 28-31 October 2020, pp. 430-435.10.1109/ICCT50939.2020.9295877
    [Google Scholar]
  16. MirshekaliH. DashtiR. KeshavarzA. ShakerH.R. Machine learning-based fault location for smart distribution networks equipped with micro-PMU.Sensors202222394510.3390/s22030945 35161696
    [Google Scholar]
  17. KhanM.F. GhazalT.M. SaidR.A. An iomt-enabled smart healthcare model to monitor elderly people using machine learning technique.Comput. Intell. Neurosci.202120211248775910.1155/2021/2487759 34868288
    [Google Scholar]
  18. SuneelS. BalaramA. Amina BegumM. UmapathyK. ReddyP.C.S. TalasilaV. Quantum mesh neural network model in precise image diagnosing.Opt. Quantum Electron.202456455910.1007/s11082‑023‑06245‑y
    [Google Scholar]
  19. NirmalI. KhamisA. HassanM. HuW. ZhuX. Deep learning for radio-based human sensing: Recent advances and future directions.IEEE Commun. Surv. Tutor.2021232995101910.1109/COMST.2021.3058333
    [Google Scholar]
  20. DongZ. LiangW. LiangY. GaoW. LuY. Blockchained supply chain management based on IoT tracking and machine learning.EURASIP J. Wirel. Commun. Netw.20222022112710.1186/s13638‑022‑02209‑0 36597502
    [Google Scholar]
  21. KumarG.R. LathaS.B. Shaker ReddyP.C. SucharithaY. Multi-agent IoT-based system for intelligent vehicle traffic management using wireless sensor networks.Recent Adv. Electr. Electron. Eng.202417551552210.2174/2352096516666230719114956
    [Google Scholar]
  22. JawarnehIMA BellavistaP CorradiA A pre-filtering approach for incorporating contextual information into deep learning based recommender systems.IEEE Access20208404854049810.1109/ACCESS.2020.2975167
    [Google Scholar]
  23. VermaP. DumkaA. SinghR. A novel intrusion detection approach using machine learning ensemble for IoT environments.Appl. Sci.202111211026810.3390/app112110268
    [Google Scholar]
  24. GugueothV. SafavatS. ShettyS. Security of Internet of Things (IoT) using federated learning and deep learning-Recent advancements, issues and prospects.ICT Express202310.1016/j.icte.2023.03.006
    [Google Scholar]
  25. SudhakarB. SikrantP.A. PrasadM.L. Brain tumor image prediction from mr images using CNN based deep learning networks.J. Inf. Technol. Manage.20241614460
    [Google Scholar]
  26. LiJ. JiS. JiangY. Development of network security based on the neural network PSD algorithm.Comput. Intell. Neurosci.202220221910.1155/2022/9460985 36211000
    [Google Scholar]
  27. PandharipandeA. ChengC.H. DauwelsJ. Sensing and machine learning for automotive perception: A review.IEEE Sens. J.20232311110971111510.1109/JSEN.2023.3262134
    [Google Scholar]
  28. LanZ. RETRACTED ARTICLE: Network security threat detection technology based on EPSO-BP algorithm.EURASIP J. Inf. Secur.202420241610.1186/s13635‑024‑00152‑9
    [Google Scholar]
  29. KumarN. MittalS. GargV. KumarN. Deep reinforcement learning-based traffic light scheduling framework for sdn-enabled smart transportation system.IEEE Trans. Intell. Transp. Syst.20222332411242110.1109/TITS.2021.3095161
    [Google Scholar]
  30. YangS. MaW. PiX. QianS. A deep learning approach to real-time parking occupancy prediction in transportation networks incorporating multiple spatio-temporal data sources.Transp. Res., Part C Emerg. Technol.201910724826510.1016/j.trc.2019.08.010
    [Google Scholar]
  31. CuiX. ZhouY. LiuR. Self‐powered wireless temperature monitor system based on triboelectric nanogenerator with machine learning.Adv. Energy Sustain. Res.202453230023310.1002/aesr.202300233
    [Google Scholar]
  32. ProvoostJ.C. KamilarisA. WismansL.J.J. van der DriftS.J. van KeulenM. Predicting parking occupancy via machine learning in the web of things.Internet of Things20201210030110.1016/j.iot.2020.100301
    [Google Scholar]
  33. KavithaM. SrinivasP.V.V.S. KalyampudiP.L. SrinivasuluS. Machine learning techniques for anomaly detection in smart healthcare.2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)Coimbatore, India, 02-04 September 2021, pp. 1350-1356.
    [Google Scholar]
  34. ChamolaV. HassijaV. GuptaS. GoyalA. GuizaniM. SikdarB. Disaster and pandemic management using machine learning: A survey.IEEE Internet Things J.2021821160471607110.1109/JIOT.2020.3044966 35782181
    [Google Scholar]
  35. ManimaranS. SastryV.N. GopalanN.P. SBTDDL: A novel framework for sensor-based threats detection on Android smartphones using deep learning.Comput. Secur.202211810272910.1016/j.cose.2022.102729
    [Google Scholar]
  36. SaranN. KesswaniN. A comparative study of supervised Machine Learning classifiers for intrusion detection in internet of things.Procedia Comput. Sci.20232182049205710.1016/j.procs.2023.01.181
    [Google Scholar]
  37. PrasadM.L. KiranA. Shaker ReddyP.C. Chronic kidney disease risk prediction using machine learning techniques.J. Inf. Technol. Manage.2024161118134
    [Google Scholar]
  38. JoshiS. ThakarA. PatelC. Applications of machine learning and deep learning in securing internet of battlefield things: A futuristic perspective.2023 10th International Conference on Computing for Sustainable Global Development (INDIACom)New Delhi, India, 15-17 March 2023, pp. 333-338.
    [Google Scholar]
  39. CanlıH. TokluS. Design and implementation of a prediction approach using big data and deep learning techniques for parking occupancy.Arab. J. Sci. Eng.20224721955197010.1007/s13369‑021‑06125‑1
    [Google Scholar]
  40. SodhroA.H. ZahidN. WangL. Toward ML-based energy-efficient mechanism for 6G enabled industrial network in box systems.IEEE Trans. Industr. Inform.202117107185719210.1109/TII.2020.3026663
    [Google Scholar]
  41. YogeeshN. WilliamP. Sensor-enabled biomedical decision support system using deep learning and fuzzy logic.In: Deep Learning Applications in Translational BioinformaticsAcademic Press202415335310.1016/B978‑0‑443‑22299‑3.00003‑7
    [Google Scholar]
  42. ChardeP. LonkarB.B. An empirical review of machine learning models for energy optimizations in IoT networks.2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT)Delhi, India,20231710.1109/ICCCNT56998.2023.10307631
    [Google Scholar]
  43. JyothiE.V.N. KranthiM. SailajaS. SesadriU. KokaS.N. ReddyP.C.S. An adaptive intrusion detection system in industrial internet of things (IIoT) using deep learning.2024 1st International Conference on Innovative Sustainable Technologies for Energy, Mechatronics, and Smart Systems (ISTEMS)April 2024, pp. 1-6.
    [Google Scholar]
  44. BrayyichM. HusseinA.H.A. MadhloomW.H. JeburM.A. HussanM. Bamboo forest growth optimization with deep learning for intrusion detection in IoT-assisted wireless sensor networks.2023 6th International Conference on Engineering Technology and its Applications (IICETA)Al-Najaf, Iraq, 15-16 July 2023, pp. 892-898.
    [Google Scholar]
  45. GokulakrishnanS. JarwarM.A. AliM.H. Maliciously roaming person’s detection around hospital surface using intelligent cloud-edge based federated learning.J. Comb. Optim.20234511310.1007/s10878‑022‑00939‑x
    [Google Scholar]
  46. DongB. ZhangZ. ShiQ. Biometrics-protected optical communication enabled by deep learning–enhanced triboelectric/photonic synergistic interface.Sci. Adv.202283eabl987410.1126/sciadv.abl9874 35044819
    [Google Scholar]
  47. YonbawiS. AlahmariS. RajuB.R.S.S. Modeling of sensor enabled irrigation management for intelligent agriculture using hybrid deep belief network.Comput. Syst. Sci. Eng.202346210.32604/csse.2023.036721
    [Google Scholar]
  48. LiangW. ZhangL. KadochM. 6G IoT tracking-and machine learning-enhanced blockchained supply chain management.Electronics20221214010.3390/electronics12010040
    [Google Scholar]
  49. JaneeraD.A. GnanamalarS.S.R. RamyaK.C. KumarA.A. Internet of things and artificial intelligence-enabled secure autonomous vehicles for smart cities.In: Automotive Embedded Systems: Key Technologies, Innovations, and Applications.ChamSpringer International Publishing202120121810.1007/978‑3‑030‑59897‑6_11
    [Google Scholar]
  50. AshikuL. DagliC. Network intrusion detection system using deep learning.Procedia Comput. Sci.202118523924710.1016/j.procs.2021.05.025
    [Google Scholar]
  51. VasoyaS. PatelN. RamoliyaD. PatelK. Potentials of machine learning for data analysis in iot: A detailed survey.2020 3rd International Conference on Intelligent Sustainable Systems (ICISS)Thoothukudi, India, 03-05 December 2020, pp. 291-296.10.1109/ICISS49785.2020.9316074
    [Google Scholar]
  52. LiuL. LinJ. WangP. LiuL. ZhouR. Deep learning-based network security data sampling and anomaly prediction in future network.Discrete Dyn. Nat. Soc.202020201910.1155/2020/4163825
    [Google Scholar]
  53. SodhroA.H. PirbhulalS. MuzammalM. ZongweiL. Towards blockchain-enabled security technique for industrial internet of things based decentralized applications.J. Grid Comput.202018461562810.1007/s10723‑020‑09527‑x
    [Google Scholar]
  54. bin ZainuddinAA Enhancing IoT security: A synergy of machine learning, artificial intelligence, and blockchain.Data Sci Insights202421
    [Google Scholar]
/content/journals/swcc/10.2174/0122103279332710240919091605
Loading
/content/journals/swcc/10.2174/0122103279332710240919091605
Loading

Data & Media loading...


  • Article Type:
    Research Article
Keyword(s): CW-RNN; deep learning; GWO; Neural network; Security threat detection; situation prediction
This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error
Please enter a valid_number test