版权所有:内蒙古大学图书馆 技术提供:维普资讯• 智图
内蒙古自治区呼和浩特市赛罕区大学西街235号 邮编: 010021
作者机构:Al Balqa Appl Univ Fac Engn Al Salt 19117 Jordan Al Balqa Appl Univ Fac Artificial Intelligence Al Salt 19117 Jordan Sreenidhi Inst Sci & Technol Dept CSE Hyderabad India Al Zaytoonah Univ Jordan Dept Data Sci & Artificial Intelligence Amman Jordan
出 版 物:《ALEXANDRIA ENGINEERING JOURNAL》 (Alexandria Engineering Journal)
年 卷 期:2025年第115卷
页 面:553-563页
核心收录:
学科分类:12[管理学] 1201[管理学-管理科学与工程(可授管理学、工学学位)] 08[工学]
基 金:Deanship of Scientific Research and Innovation at Al-Balqa Applied University [DSR - 2021#380]
主 题:Cyber threats Detection Optimization algorithms Fake news IoT intrusion Malicious URLs Spam emails
摘 要:Cyber threats are an ongoing problem that is hard to prevent completely. This can occur for various reasons, but the main causes are the evolving techniques of hackers and the neglect of security measures when developing software or hardware. Asa result, several countermeasures will need to be applied to mitigate these threats. Cyber-threat detection techniques can fulfill this role by utilizing different identification methods for various cyber threats. In this work, an intelligent cyber threat detection system employing a swarm-based machine learning approach is proposed. The approach involves using Harris Hawks Optimization (HHO) to enhance the Support Vector Machine (SVM) for improved threat detection through parameter tuning and feature weighting. Furthermore, various cyber-threat types have been considered, including Fake News, IoT Intrusion, Malicious URLs, Spam Emails, and Spam Websites. The proposed HHO-SVM has been compared to other approaches for detecting all these types collectively. The HHO-SVM outperforms all algorithms inmost types (datasets). The proposed approach demonstrated the highest accuracy across seven datasets: FakeNews-1, FakeNews-2, FakeNews-3, IoT-ID, URL, SpamEmail-2, and SpamWebsites, achieving average accuracy of 68.251%, 68.729%, 79.049%, 95.254%, 100%, 96.681%, and 93.975%, respectively. Additionally, a thorough analysis of each cyber-threat type has been conducted to understand their characteristics and detection strategies.