[BACK]
Computers, Materials & Continua
DOI:10.32604/cmc.2022.026405
images
Article

Enhanced Artificial Intelligence-based Cybersecurity Intrusion Detection for Higher Education Institutions

Abdullah S. AL-Malaise AL-Ghamdi1, Mahmoud Ragab2,3,4,* and Maha Farouk S. Sabir1

1Information Systems Department, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, 21589, Saudi Arabia
2Information Technology Department, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, 21589, Saudi Arabia
3Centre of Artificial Intelligence for Precision Medicines, King Abdulaziz University, Jeddah, 21589, Saudi Arabia
4Mathematics Department, Faculty of Science, Al-Azhar University, Naser City, 11884, Cairo, Egypt
*Corresponding Author: Mahmoud Ragab. Email: mragab@kau.edu.sa
Received: 24 December 2021; Accepted: 09 February 2022

Abstract: As higher education institutions (HEIs) go online, several benefits are attained, and also it is vulnerable to several kinds of attacks. To accomplish security, this paper presents artificial intelligence based cybersecurity intrusion detection models to accomplish security. The incorporation of the strategies into business is a tendency among several distinct industries, comprising education, have recognized as game changer. Consequently, the HEIs are highly related to the requirement and knowledge of the learner, making the education procedure highly effective. Thus, artificial intelligence (AI) and machine learning (ML) models have shown significant interest in HEIs. This study designs a novel Artificial Intelligence based Cybersecurity Intrusion Detection Model for Higher Education Institutions named AICID-HEI technique. The goal of the AICID-HEI technique is to determine the occurrence of distinct kinds of intrusions in higher education institutes. The AICID-HEI technique encompasses min-max normalization approach to pre-process the data. Besides, the AICID-HEI technique involves the design of improved differential evolution algorithm based feature selection (IDEA-FS) technique is applied to choose the feature subsets. Moreover, the bidirectional long short-term memory (BiLSTM) model is utilized for the detection and classification of intrusions in the network. Furthermore, the Adam optimizer is applied for hyperparameter tuning to properly adjust the hyperparameters in higher educational institutions. In order to validate the experimental results of the proposed AICID-HEI technique, the simulation results of the AICID-HEI technique take place by the use of benchmark dataset. The experimental results reported the betterment of the AICID-HEI technique over the other methods interms of different measures.

Keywords: Higher education institutions; deep learning; machine learning; cybersecurity; intrusion detection

1  Introduction

Owing to the benefits provided by the Internet, business has become more open to supporting Internet driven enterprises like extranet collaboration, customer care, and e-commerce. Academic institution is considered resource limited and thus lot of times is needed to have this resource distributed among the students, lecturers, part time staff, and permanent. Additionally, students include postgraduate, Diplomas, and undergraduate students at distinct stages of education [1]. Likewise, full-time and part time lecturers need distinct network access stages. Several internet websites like pornographic and those that offer immediate solutions to online examination might need to be restricted or controlled. This will enhance bandwidth utilization and network security [2]. Many times, Students become so intrusive to explore all the areas of the network, and therefore it was necessary to defend network with crucial data, and part time staff needn't be trusted with this network resource. This emphasizes the requirement for a proper scheme to identify illegal accessing to this resource on quantified section beforehand experiencing severe damage. The organization is struggling to preserve availability, confidentiality, and integrity of the network resource and various technologies have been applied for guarding against network intrusions [3]. Fig. 1 illustrates the different modules contained in cybersecurity.

images

Figure 1: Different components involved in cybersecurity

Intrusion prevention systems (IPS) techniques work by surveilling system action and network traffics for the sign of malicious activities namely intrusion [4]. Mostly, IPS technique depends on signature detection technique which consults a dataset of well-known attack flags and patterns. Once the IPS identifies the matching, it chooses an automatic response from a collection of choices, ranging from alerting an administrator and logging the activity to manually blocking the traffics to preventing network intrusion. In a standard IPS positioning, the organization place devoted IPS network devices in line with the external internet access. This needs a device which is able to keep up with the scale of the institution network traffics [5]. Then, the device checks all the network packets when it blocks and passes suspected activity beforehand it accesses the network. This technique provides automated, rapid responses to security threats on campus networks. That move the event response posture from the reactive method utilized while examining a suspicious event to a proactive method which blocks the incidents from taking place primarily.

Machine learning (ML) and Artificial intelligence (AI) development help individuals exceed classical computers to surpass and simulate human intelligence. The advancement of this technology has considerably modified the educational system, providing students a collaborative learning environment and further knowledge in the HEI with greater implications for the upcoming days [6]. Mostly, reputable higher education institution has realized that ML and AI represent the future and present in education and the world advanced evolution. This technology provides advanced and interactive education knowledge to the student [7]. The result is remarkable: 65% of university in the America supports AI- and ML-enabled learning. Furthermore, this system provides essential support to lecturers and teachers in the schools, facilitating and improving learning in different manners [8]. Kumar has proven that AI and ML are enhancing and efficient security of the institutions, providing an accessible, peaceful, and flexible computing platform for the study and developing skills amongst students [9], and collaborative learning environments in the HEI reinforce the significance of ML and AI to increase customized learning.

This study designs a novel Artificial Intelligence based Cybersecurity Intrusion Detection Model for Higher Education Institutions named AICID-HEI technique. The AICID-HEI technique encompasses min-max normalization approach to pre-process the data. In addition, the AICID-HEI technique involves the design of improved differential evolution based feature selection (IDEA-FS) technique is applied to choose the feature subsets. Followed by, the bidirectional long short term memory (BiLSTM) model is utilized for the detection and classification of intrusions in the network. Finally, the Adam optimizer is applied for hyperparameter tuning to properly adjust the hyperparameters in higher educational institutions. In order to validate the experimental results of the proposed AICID-HEI technique, the simulation results of the AICID-HEI technique take place by the use of benchmark dataset.

2  Related Works

DeCusatis et al. [10] introduced the implementation and design of a cyber-security framework for a Linux community public cloud assisting research and education. The method integrates packet authentication and transport layer access control gateway for blocking fingerprints of key network resources. Stimulation outcomes are provided for the connected data centres in New York. They demonstrate that our technique is capable of blocking Denial of Service (DoS) attacks and network scanners, and offer geo-location attribution based syslog classification.

Aggrey [11] adapt an intrusion detection system (IDS) for academic institutions to prevent network intrusion and provide early detection. The concept is to offer a combined scheme which reduces the weakness of the intrusion prevention technique. They determine IDS, discuss the various IDS architecture, types, compare distinct IDSs, and investigate an efficient execution approach. Othman et al. [12] present Spark-Chi-support vector machine (SVM) method for detecting intrusions. In this method, we employed ChiSqSelector for selecting features and constructed an IDS by utilizing SVM classifiers on Apache Spark Big Data. They utilized KDD99 for training and testing the models. In this work, we presented a comparison among Chi-logistic regression (LR) and Chi-SVM classifiers.

Yahia et al. [13] examined the various kinds of network intrusion data sets and highlight the fact that students could simply generate a network intrusion data set i.e., illustrative of the network. Intrusion is in form of network signature or anomaly; the student could not grasp each type but they must have the capability of detecting malicious packets with this network. Gao et al. [14] take benchmark dataset as the object of research, analyzed the existing problems and latest progress in the fields of IDS, and presented an adoptive ensemble learning model. By altering the amount of trained information and setting up various decision trees (DTs), we constructed a MultiTree approach. For improving the entire detection effects, we select many base classifications and developed an ensemble adoptive voting method.

In Mishra et al. [15], a comprehensive analysis and investigation of different ML methods were conducted to find the reason for problems related to different ML methods in intrusion activity detection. Attack mapping and classification of the attack feature are given to all the attacks. Problems that are associated with lower-frequency attack detection using network attack data set are considered and feasible methodologies are recommended for development.

3  The Proposed Model

This study has designed an effective AICID-HEI technique is to determine the occurrence of distinct kinds of intrusions in higher education institutes. The AICID-HEI technique encompasses min-max normalization based pre-processing, IDEA-FS based election of features, BiLSTM based classification, and Adam optimizer based hyperparameter tuning. The choice of IDEA-FS and Adam optimizer assist to enhance the intrusion detection performance in higher educational institutions.

3.1 Data Pre-Processing

Primarily, the input data is transformed into a meaningful format by the use of min-max normalization approach. It is generally utilized for reducing the diversifying scaling of the dimensionality. The normalization process converts the data in a particular range by performing the linear conversion on the input data. The dimensionality of the data can be transformed in the interval of [0, 1] by the use of min-max normalization. It carries out the conversion process using Eq. (6):

t=vmindmaxdmind(tranmaxdtranmind)+tranmind(1)

where t indicates transformed data v in dimension d, implies the actual lower value and maxd denotes the actual higher value of the dimension d. Likewise, tranmind defines the converted lower value and tranmaxd indicates the converted higher value of the dimension d.

3.2 Design of IDEA-FS Technique

During the feature selection process, the normalized data is fed into the IDEA-FS technique and derive a useful subset of features. DEA technique is assumed as population based search method that is primary established by Storn et al. [16].

During this phase of the current analysis, a 3 phases altering method was established utilizing the DE approach for resolving an optimized issue. For implementing this task, a particular amount of solution vectors were arbitrarily initialized afterward upgraded iteratively utilizing genetic operators (mutation as well as crossover) and selective operators. A primary step, the mutation operators are executed utilizing 3 distinct arbitrarily chosen solution vectors (represented as r1,r2, and r3 vectors) in the DE population. Afterward, the variance amongst 2 vectors (r2 and r3) multiplied by scaling factor (F) has added to the primary vector (r1). Therefore, all the target solutions XiG is changed as to mutant solution vector yiG+1 as follows.

ViG+1=Xr1G(t)+F  (Xr2GXr3G),r1r2r3i(2)

In the secondary phase, the crossover operator was implemented for calculating a trial vector uiG+1 it is implemented by integrating the destination solution vector with mutated vector dependent upon the subsequent technique.

uijG+1={vijG+1,  (rand(j)CR)  or  j=r andn(i)χijG  ,  (rand(j)>CR)and  jr andn(i)(3)

where j=1,2,,D, rand(j)[0,1] denotes the jth estimation of uniform arbitrary generator number. CR indicates the crossover probability that is an arbitrary vector range in [0–1]. r andn(i){1,2,,D} signifies the arbitrary value that makes sure uiG+1 obtains one or more elements in viG+1, else no novel parent vector was created, and so the population remains unchanging. Fig. 2 illustrates the flowchart of DE technique.

images

Figure 2: Flowchart of differential evolution

Lastly, in selective sections if and only if the trial vectors uiG+1 produces an optimum FF value related to xiG, then uiG+1 is fixed to xiG+1. Else, the old vector xiG has reserved. The selective method is as follows [17].

xiG+1={uiG+1(f(uiG+1)<f(xiG))xiG(f(uiG+1)f(xiG))(4)

During the IDEA, the Cauchy mutation operators are utilized that typical DEA of enhancements from solution diversity. Its purpose is for enhancing the exploration capability and solution diversity of raw DEA from the previous phases of operation with the combination of incorporate Cauchy mutation operators. Also, the Cauchy distribution was executed to perform Cauchy variation on solution that doesn't converge from c is following rounds. The basic method is that its influence stuck with local optimum and so, an exterior association was needed and so the search procedure moved from the direction of exploration procedure. During this case, all dimensions an arbitrary parameter of Cauchy distribution, the density function is signified as follows:

fc(x)=σ[π(σ2+x2)],inf<x<+inf,(5)

where σ= 1 indicates the traditional Cauchy distribution.

The FS technique is represented as Nsized vectors where N refers to the feature counts. At this point, all place of vector is assumed the values as zero or one where zero implies the feature that is unselective and one refers to the selective features. Based on the above-mentioned, the fitness function (FF) is to define solution in this state crated to obtain a balance among 2 purposes:

fitness  =αΔR(D)+β|Y||T|      (6)

ΔR(D) stands for the classifying error rate. |Y| denotes the size of subsets that this technique selects and |T| whole amount of features contained in the present datasets. α determines the parameter [0,  1] relating to the weight of error rate of classification correspondingly however β=1α refers the importance of reducing feature.

3.3 Hyperparameter Tuned BiLSTM Based Classification Model

At the time of data classification, the features are passed into the BiLSTM model to carry out the classification process. The long short term memory (LSTM) network is a kind of recurrent neural network (RNN) primarily structured for solving the vanishing gradient issue of RNNs if concerning long orders [18]. The LSTM network structure has of layer of LSTM unit afterward a typical feedforward network. In a general viewpoint, an LSTM unit functions as follows: assume xt be the present input at time t, the resultant of input gate as:

it=σ(Wixxt+Wihht1+bi),(7)

where Wix and Wih implies the weight matrices, ht1 represents the preceding hidden state of units, and bi refers the bias vector. The function σ(x)(0,1) has sigmoid function utilized to gate.

Likewise, the resultant of forget gate ft has estimated as:

ft=σ(Wfxxt+Wfhht1+bf).(8)

Eventually, the resultants of output gate ot and cell state ct are as follows:

ct  =  it  tanh  (Wcxxt+Wchht1+bc)+ct1,(9)

ot=  σ(Woxxt+Wohht1+bo),(10)

ht  =  ot  tanh  (ct),(11)

where refers the Hadamard product. The BiLSTM has 2 parallel LSTM layers such as forward and backward directions. As the input was treated twice, BiLSTM remove further data in the input. Therefore, an enhancing contextual data for making optimum forecasts than LSTM. So, BiLSTMs current has faster convergence and accuracy than LSTM. The BiLSTM structure containing 2 LSTM layers, maintains past as well as future context at whenever of order [19]. The output of all LSTMs was integrated based on the subsequent formula:

yt=Whyht+Whyht+by(12)

where htandht refers the outcomes of forward as well as backward LSTMs.

For optimally altering the hyperparameters of the BiLSTM model, the Adam optimizer can be utilized and thereby boost the classification outcomes.

Adam is another widely utilized technique that alters the rate of learning adaptive to all the parameters. The Adam is a group of distinct gradient optimized techniques. Besides is an exponentially decaying average of past squared gradient calculated namely Adadelta, along with Adam gets an exponentially decaying average of past gradients that is same as Momentum.

Mt=β1Mt1+(1β1)gt,(13)

Gt=β2Gt1+(1β2)gtgt,(14)

where β1 and β2 implies the decay rate that is suggested to follow the default value. Mt and Gt are determined for estimating the mean of past gradients (a primary moment) and uncentered difference of past gradients (the secondary moment) correspondingly [20]. Since the decay rates generally cause any bias issue, it can be essential to perform the bias-correction work.

M^=Mt1β1t,G^t=Gt1β2t.(15)

So, the upgrade value of Adam was determined as:

Δθt=αG^+εM^t.(16)

The gradient part of θt also is determined as:

gt=1G^t+εM^t,(17)

θt=α(1G^t+εM^t)=αgt.(18)

In Eq. (16), it could be established that every function was dependent upon past gradient of present parameter that has no connection to rate of learning. Therefore, Adam is an optimum efficiency with the support of learning rate techniques.

4  Performance Validation

The simulation analysis of the AICID-HEI technique takes place using the KDDCup99 dataset, which contains a set of 41 attributes where 39 among them are numerical records and rest of them are symbolic records. The dataset comprises two major classes namely normal and anomaly. Besides, the anomaly class includes four kinds of attacks namely DoS, R2l, Probe, and U2r attacks. The best cost analysis of the IDEA-FS technique with recent approaches is carried out in Tab. 1 and Fig. 3. The IDEA-FS technique has chosen the feature subset of (1, 5, 6, 7, 9, 11, 13, 15, 16, 19, 26, 28, 31, 37, 40). The experimental values proved that the ant colony optimization (ACO)-FS, butterfly optimization algorithm (BOA)-FS, and particle swarm optimization (PSO)-FS techniques have reached to higher best cost (BC) of 0.0008754, 0.0009467, and 0.0009865 respectively.

images

images

Figure 3: Best cost analysis of AICID-HEI technique

The intrusion detection results obtained by the AICID-HEI technique under various types of attacks are provided in Tab. 2 and Figs. 45. The experimental values reported that the AICID-HEI technique has identified all the class labels effectively.

images

images

Figure 4: Result analysis of AICID-HEI technique with different measures

images

Figure 5: Accuracy analysis of AICID-HEI technique with distinct attacks

For instance, under DoS attack, the AICID-HEI technique has attained sensy, specy, accuy, Fmeasure,and kappa of 99.020%, 99.300%, 98.540%, 97.480%, and 97.300% respectively. Besides, under Probe attack, the AICID-HEI approach has achieved sensy, specy, accuy, Fmeasure,and kappa of 99.100%, 99.410%, 99.020%, 98.750%, and 98.350% correspondingly. In addition, under Normal attack, the AICID-HEI methodology has reached sensy, specy, accuy, Fmeasure,and kappa of 99.390%, 99.750%, 99.380%, 99.440%, and 99.240% correspondingly. Average result analysis of the AICID-HEI technique under all kinds of attacks. The experimental results reported the betterment of the AICID-HEI technique with average sensy, specy, accuy, Fmeasure,and kappa of 99.014%, 99.540%, 99.018%, 98.822%, and 98.478% respectively.

Fig. 6 illustrates the accuracy analysis of the AICID-HEI technique on the test dataset. The results outperformed that the AICID-HEI system has accomplished higher performance with superior training and validation accuracy. It can be stated noticed that the AICID-HEI technique has gained improved validation accuracy over the training accuracy.

images

Figure 6: Accuracy graph analysis of AICID-HEI technique

Fig. 7 showcases the loss analysis of the AICID-HEI approach on the test dataset. The outcomes established that the AICID-HEI technique has resulted in a proficient outcome with the reduced training and validation loss. It can be clear that the AICID-HEI technique has offered reduced validation loss over the training loss.

images

Figure 7: Loss graph analysis of AICID-HEI technique

The detailed comparative study of the AICID-HEI technique with recent methods takes place in Tab. 3 and Fig. 8 [21,22]. The experimental results stated that the RBF Network and Random (RAND) Forest models have obtained lower intrusion detection performance. At the same time, the Random Tree and Decision Tree models have attained slightly increased intrusion detection outcomes. In line with, the logistic regression (LOGR) technique has accomplished somewhat acceptable intrusion detection outcomes. However, the AICID-HEI technique has outperformed the other methods with the increased sensy, specy, accuy, Fmeasure,and kappa of 99.014%, 99.540%, 99.018%, 98.822%, and 98.478% respectively. From the above mentioned tables and figures, it is ensured that the AICID-HEI technique has resulted in effective classification performance and accomplishes security.

images

images

Figure 8: Comparative analysis of AICID-HEI technique with existing approaches

5  Conclusion

This study has designed an effective AICID-HEI technique is to determine the occurrence of distinct kinds of intrusions in higher education institutes. The AICID-HEI technique encompasses min-max normalization based pre-processing, IDEA-FS based election of features, BiLSTM based classification, and Adam optimizer based hyperparameter tuning. The choice of IDEA-FS and Adam optimizer assist to enhance the intrusion detection performance in higher educational institutions. In order to validate the experimental results of the proposed AICID-HEI technique, the simulation results of the AICID-HEI technique take place by the use of benchmark dataset. The experimental results reported the betterment of the AICID-HEI technique over the other methods interms of different measures. As a part of future extensions, clustering techniques can be included to boost the detection rate.

Acknowledgement: The authors extend their appreciation to the Deputyship for Research & Innovation, Ministry of Education in Saudi Arabia for funding this research work through the Project Number (IFPRC-154-611-2020) and King Abdulaziz University, DSR, Jeddah, Saudi Arabia.

Funding Statement: This project was supported financially by Institution Fund projects under Grant No. (IFPRC-154-611-2020).

Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.

References

 1.  V. Kuleto, M. Ilić, M. Dumangiu, M. Ranković, O. M. D. Martins et al., “Exploring opportunities and challenges of artificial intelligence and machine learning in higher education institutions,” Sustainability, vol. 13, no. 18, pp. 10424, 2021. [Google Scholar]

 2.  S. Liu, Y. Chen, H. Huang, L. Xiao and X. Hei, “Towards smart educational recommendations with reinforcement learning in classroom,” in 2018 IEEE Int. Conf. on Teaching, Assessment, and Learning for Engineering (TALE), Wollongong, NSW, pp. 1079–1084, 2018. [Google Scholar]

 3.  H.-J. Liao, C.-H. Richard Lin, Y.-C. Lin and K.-Y. Tung, “Intrusion detection system: A comprehensive review,” Journal of Network and Computer Applications, vol. 36, no. 1, pp. 16–24, 2013. [Google Scholar]

 4.  S. Kholmuminov, S. Kholmuminov and R. E. Wright, “Resource dependence theory analysis of higher education institutions in Uzbekistan,” Higher Education, vol. 77, no. 1, pp. 59–79, 2019. [Google Scholar]

 5.  A. Aldhalemi, F. Abidy and A. Kadhim, “The statistical evaluation of e-exams in higher education institutions during COVID-19 pandemic: A case of Iraq,” Webology, vol. 18, no. 5, pp. 654–671, 2021. [Google Scholar]

 6.  P. J. Ramísio, L. M. C. Pinto, N. Gouveia, H. Costa and D. Arezes, “Sustainability strategy in higher education institutions: Lessons learned from a nine-year case study,” Journal of Cleaner Production, vol. 222, pp. 300–309, 2019. [Google Scholar]

 7.  J. M. F. Mendoza, A. G. Schmid and A. Azapagic, “Building a business case for implementation of a circular economy in higher education institutions,” Journal of Cleaner Production, vol. 220, pp. 553–567, 2019. [Google Scholar]

 8.  A. D. R. Fonseca, S. Jorge and C. Nascimento, “The role of internal auditing in promoting accountability in higher education institutions,” Revista de Administração Pública, vol. 54, no. 2, pp. 243–265, 2020. [Google Scholar]

 9.  C. Liu and K. Jayakar, “The evolution of telecommunications policy-making: Comparative analysis of China and India,” Telecommunications Policy, vol. 36, no. 1, pp. 13–28, 2012. [Google Scholar]

10. C. DeCusatis, P. Liengtiraphan and A. Sager, “Advanced intrusion prevention for geographically dispersed higher education cloud networks,” In Online Engineering & Internet of Things, Lecture Notes in Networks and Systems Book Series (LNNS), vol. 22, pp. 132–143, 2018. [Google Scholar]

11. O. Aggrey, “An intrusion detection system for academic institutions,” Master of Science Thesis, Makerere University, 2007. [Google Scholar]

12. S. M. Othman, F. M. B. Alwi, N. T. Alsohybe and A. Y. A. Hashida, “Intrusion detection model using machine learning algorithm on big data environment,” Journal of Big Data, vol. 5, no. 1, pp. 34, 2018. [Google Scholar]

13. A. Yahia and E. Atwell, “Network intrusion datasets used in network security education,” International Journal of Innovative Trends in Engineering, vol. 7, no. 3, pp. 43–50, 2018. [Google Scholar]

14. X. Gao, C. Shan, C. Hu, Z. Niu and Z. Liu, “An adaptive ensemble machine learning model for intrusion detection,” IEEE Access, vol. 7, pp. 82512–82521, 2019. [Google Scholar]

15. P. Mishra, V. Varadharajan, U. Tupakula and E. S. Pilli, “A detailed investigation and analysis of using machine learning techniques for intrusion detection,” IEEE Communications Surveys and Tutorials, vol. 21, no. 1, pp. 686–728, 2019. [Google Scholar]

16. R. Storn and K. Price, “Differential. evolution, differential evolution a simple and efficient heuristic strategy for global optimization over continuous spaces,” Journal of Global Optimization, vol. 11, pp. 341–359, 1997. [Google Scholar]

17. E. Y. Bejarbaneh, A. Bagheri, B. Y. Bejarbaneh, S. Buyamin and S. N. Chegini, “A new adjusting technique for PID type fuzzy logic controller using PSOSCALF optimization algorithm,” Applied Soft Computing, vol. 85, pp. 105822, 2019. [Google Scholar]

18. Y. Yu, X. Si, C. Hu and J. Zhang, “A review of recurrent neural networks: Lstm cells and network architectures,” Neural Computation, vol. 31, no. 7, pp. 1235–1270, 2019. [Google Scholar]

19. T. M. Velu, J. G. A. Cervantes, J. M. C. Duarte, H. R. Gonzalez and J. R. Pinales, “Imaginary finger movements decoding using empirical mode decomposition and a stacked BiLSTM architecture,” Mathematics, vol. 9, no. 24, pp. 3297, 2021. [Google Scholar]

20. C. Zhang, M. Yao, W. Chen, S. Zhang, D. Chen et al., “Gradient descent optimization in deep learning model training based on multistage and method combination strategy,” Security and Communication Networks, vol. 2021, pp. 1–15, 2021. [Google Scholar]

21. B. V. Kumar and S. Mohan, “A novel feature selection with fuzzy deep neural network for attack detection in big data environment,” Indian Journal of Computer Science and Engineering, vol. 12, no. 3, pp. 539–550, 2021. [Google Scholar]

22. M. Ragab, A. M. K. Abdel Aal, A. O. Jifri and N. F. Omran, “Enhancement of predicting students performance model using ensemble approaches and educational data mining techniques,” Wireless Communications and Mobile Computing, vol. 2021, pp. 1–9, 2021. [Google Scholar]

images This work is licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.