Open Access iconOpen Access

ARTICLE

crossmark

Glowworm Optimization with Deep Learning Enabled Cybersecurity in Social Networks

Ashit Kumar Dutta1,*, Basit Qureshi2, Yasser Albagory3, Majed Alsanea4, Anas Waleed AbulFaraj5, Abdul Rahaman Wahab Sait6

1 Department of Computer Science and Information Systems, College of Applied Sciences, AlMaarefa University, Ad Diriyah, Riyadh, 13713, Kingdom of Saudi Arabia
2 Department of Computer Science, Prince Sultan University, Riyadh, 11586, Kingdom of Saudi Arabia
3 Department of Computer Engineering, College of Computers and Information Technology, Taif University, Taif, 21944, Kingdom of Saudi Arabia
4 Department of Computing, Arabeast Colleges, Riyadh, 11583, Kingdom of Saudi Arabia
5 Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, 23613, Kingdom of Saudi Arabia
6 Department of Archives and Communication, King Faisal University, Al Ahsa, Hofuf, 31982, Kingdom of Saudi Arabia

* Corresponding Author: Ashit Kumar Dutta. Email: email

Intelligent Automation & Soft Computing 2022, 34(3), 2097-2110. https://doi.org/10.32604/iasc.2022.027500

Abstract

Recently, the exponential utilization of Internet has posed several cybersecurity issues in social networks. Particularly, cyberbulling becomes a common threat to users in real time environment. Automated detection and classification of cyberbullying in social networks become an essential task, which can be derived by the use of machine learning (ML) and deep learning (DL) approaches. Since the hyperparameters of the DL model are important for optimal outcomes, appropriate tuning strategy becomes important by the use of metaheuristic optimization algorithms. In this study, an effective glowworm swarm optimization (GSO) with deep neural network (DNN) model named EGSO-DNN is derived for cybersecurity in social networks. The proposed EGSO-DNN technique is mainly intended to identify the presence of cyberbullying on social networking sites. Besides, the EGSO-DNN technique involves different levels of pre-processing to transform the raw data into useful format. In addition, word2vec based feature extraction technique is applied to generate a set of feature vectors. Finally, the DNN model is used for the detection and classification of the DNN model where the hyperparameters of the DNN model are adjusted proficiently by the use of GSO algorithm. In order to ensure the supremacy of the EGSO-DNN technique, a series of simulations were carried out and the results are tested using benchmark datasets. The comparative analysis reported the improvements of the EGSO-DNN technique over the recent approaches maximum prec_n, reca_l, and F1_score of 0.9974, 0.9959, and 0.9966.

Keywords


Cite This Article

APA Style
Dutta, A.K., Qureshi, B., Albagory, Y., Alsanea, M., AbulFaraj, A.W. et al. (2022). Glowworm optimization with deep learning enabled cybersecurity in social networks. Intelligent Automation & Soft Computing, 34(3), 2097-2110. https://doi.org/10.32604/iasc.2022.027500
Vancouver Style
Dutta AK, Qureshi B, Albagory Y, Alsanea M, AbulFaraj AW, Sait ARW. Glowworm optimization with deep learning enabled cybersecurity in social networks. Intell Automat Soft Comput . 2022;34(3):2097-2110 https://doi.org/10.32604/iasc.2022.027500
IEEE Style
A.K. Dutta, B. Qureshi, Y. Albagory, M. Alsanea, A.W. AbulFaraj, and A.R.W. Sait "Glowworm Optimization with Deep Learning Enabled Cybersecurity in Social Networks," Intell. Automat. Soft Comput. , vol. 34, no. 3, pp. 2097-2110. 2022. https://doi.org/10.32604/iasc.2022.027500



cc Copyright © 2022 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1562

    View

  • 664

    Download

  • 0

    Like

Share Link