Open Access iconOpen Access

ARTICLE

crossmark

A Cyber-Attack Detection System Using Late Fusion Aggregation Enabled Cyber-Net

P. Shanmuga Prabha*, S. Magesh Kumar

Department of Computer Science and Engineering, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences (Deemed to be University), Chennai, Tamilnadu, India

* Corresponding Author: P. Shanmuga Prabha. Email: email

Intelligent Automation & Soft Computing 2023, 36(3), 3101-3119. https://doi.org/10.32604/iasc.2023.034885

Abstract

Today, securing devices connected to the internet is challenging as security threats are generated through various sources. The protection of cyber-physical systems from external attacks is a primary task. The presented method is planned on the prime motive of detecting cybersecurity attacks and their impacted parameters. The proposed architecture employs the LYSIS dataset and formulates Multi Variant Exploratory Data Analysis (MEDA) through Principle Component Analysis (PCA) and Singular Value Decomposition (SVD) for the extraction of unique parameters. The feature mappings are analyzed with Recurrent 2 Convolutional Neural Network (R2CNN) and Gradient Boost Regression (GBR) to identify the maximum correlation. Novel Late Fusion Aggregation enabled with Cyber-Net (LFAEC) is the robust derived algorithm. The quantitative analysis uses predicted threat points with actual threat variables from which mean and difference vectors are evaluated. The performance of the presented system is assessed against the parameters such as Accuracy, Precision, Recall, and F1 Score. The proposed method outperformed by 98% to 100% in all quality measures compared to existing methods.

Keywords


Cite This Article

P. Shanmuga Prabha and S. Magesh Kumar, "A cyber-attack detection system using late fusion aggregation enabled cyber-net," Intelligent Automation & Soft Computing, vol. 36, no.3, pp. 3101–3119, 2023.



cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 729

    View

  • 386

    Download

  • 0

    Like

Share Link