A Hybrid Support Vector Machine and Artificial Neural Network Based Cyber Security Framework
International Journal of Electronics and Communication Engineering |
© 2024 by SSRG - IJECE Journal |
Volume 11 Issue 1 |
Year of Publication : 2024 |
Authors : Mohammed Ahmed, G. Rama Mohan Babu |
How to Cite?
Mohammed Ahmed, G. Rama Mohan Babu, "A Hybrid Support Vector Machine and Artificial Neural Network Based Cyber Security Framework," SSRG International Journal of Electronics and Communication Engineering, vol. 11, no. 1, pp. 143-149, 2024. Crossref, https://doi.org/10.14445/23488549/IJECE-V11I1P111
Abstract:
Cyber security issues are frequently present in big organizations and government sectors. Cyber security threats would attempt to steal sensitive information from the organization. Thus, it is necessary to avoid the cyber security risks happening on the network to provide users with a secure environment. This was done in our previous research method by introducing the method, namely Big Data Cyber Security Framework (BDCSF). The classification technique used in this work tends to have more computational overhead and might reduce its accuracy with the presence of a large volume of data. These issues are focused on and avoided by proposing a Hybrid Support Vector Machine and Artificial Neural Network Threat Detection Method (HSVMANN-TDM). In this research work, feature selection is initially made at two levels. In the first level, clustering-based feature selection is made using the Improved K means algorithm. The second level cluster of features is given as input to the improved cat swarm algorithm to extract the final selected features. After feature selection, a hybrid SVM ANN algorithm is introduced for threat detection. Here, the output layer of the ANN algorithm will be given as input to the SVM algorithm. This research can predict the fraudulent transactions happening on the network more accurately. The numerical assessment of this research work proves that the proposed research method can perform better than previous works.
Keywords:
Cyber security framework, Optimal feature selection, Clustering-based feature selection, Classification framework, Credit card fraudulent detection.
References:
[1] T.T. Teoh et al., “Analyst Intuition Inspired High Velocity Big Data Analysis Using PCA Ranked Fuzzy k-Means Clustering with Multi-Layer Perceptron (MLP) to Obviate Cyber Security Risk,” 2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD), Guilin, China, pp. 1790-1793, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[2] R. Senthamil Selvi, and M.L. Valarmathi, “Enabling Data Security in Data Using Vertical Split with Parallel Feature Selection Using Meta Heuristic Algorithms,” Concurrency and Computation: Practice and Experience, vol. 33, no. 3, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[3] P. Venkata Krishna, K. Venkatesh Sharma, and A. MallaReddy, “A Machine Learning-Based Approach for Detecting Network Intrusions in Large-scale Networks,” International Journal of Computer Engineering in Research Trends, vol. 10, no. 2, pp. 69-76, 2023.
[CrossRef] [Publisher Link]
[4] Daniel Peralta et al., “Evolutionary Feature Selection for Big Data Classification: A MapReduce Approach,” Mathematical Problems in Engineering, vol. 2015, pp. 1-12, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[5] T. Mohana Priya, and A. Saradha, “An Improved K-means Cluster Algorithm Using Map Reduce Techniques to Mining of Inter and Intra Cluster Data in Big Data Analytics,” International Journal of Pure and Applied Mathematics, vol. 119, no. 7, pp. 679-690, 2108.
[Google Scholar] [Publisher Link]
[6] Mohiuddin Ahmed, Abdun Naser Mahmood, and Md. Rafiqul Islam, “A Survey of Anomaly Detection Techniques in Financial Domain,” Future Generation Computer Systems, vol. 55, pp. 278-288, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Samaneh Sorournejad et al., “A Survey of Credit Card Fraud Detection Techniques: Data and Technique Oriented Perspective,” arXiv, pp. 1-26, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[8] K. Thejeswari, K. Sreenivasulu, and B. Sowjanya, “Cyber Threat Security System Using Artificial Intelligence for Android-Operated Mobile Devices,” International Journal of Computer Engineering in Research Trends, vol. 9, no. 12, pp. 275-280, 2022.
[CrossRef] [Publisher Link]
[9] Kamran Hassani, and Kamal Jafarian, “An Intelligent Method for Breast Cancer Diagnosis Based on Fuzzy ART and Metaheuristic Optimization,” XIV Mediterranean Conference on Medical and Biological Engineering and Computing, pp. 200-204, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Tu N. Nguyen et al., “Cyber Security of Smart Grid: Attacks and Defenses,” ICC 2020 - 2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, pp. 1-6, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Shanying Zhu, Vijayalakshmi Saravanan, and Bala Anand Muthu, “Achieving Data Security and Privacy Across Healthcare Applications Using Cyber Security Mechanisms,” The Electronic Library, vol. 38, no. 5/6, pp. 979-995, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Sherin Zafar, and M.K. Soni, “A Novel Crypt-Biometric Perception Algorithm to Protract Security in MANET,” International Journal of Computer Network and Information Security, vol. 6, no. 12, pp. 64-71, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Tahira Khorram, and Nurdan Akhan Baykan, “Feature Selection in Network Intrusion Detection Using Metaheuristic Algorithms,” International Journal of Advance Research, Ideas and Innovations in Technology, vol. 4, no. 4, pp. 704-710, 2018.
[Google Scholar] [Publisher Link]
[14] Priyan Malarvizhi Kumar et al., “Intelligent Face Recognition and Navigation System Using Neural Learning for Smart Security in Internet of Things,” Cluster Computing, vol. 22, pp. 7733-7744, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[15] A. Shanthini et al., “Threshold Segmentation Based Multi-Layer Analysis for Detecting Diabetic Retinopathy Using Convolution Neural Network,” Journal of Ambient Intelligence and Humanized Computing, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Ravi Kumar Saidala, and Naga Raju Devarakonda, “A New Parallel Metaheuristic Optimization Algorithm and Its Application in CDM,” 2017 2nd International Conference for Convergence in Technology (I2CT), Mumbai, India, pp. 667-674, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Chun Wei Tsai, “Metaheuristic Algorithms for Healthcare: Open Issues and Challenges,” Computers & Electrical Engineering, vol. 53, pp. 421-434, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Pelin Angin, Bharat Bhargava, and Rohit Ranchal, “Big Data Analytics for Cyber Security,” Security and Communication Networks, vol. 2019, pp. 1-3, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Plabon Bhandari Abhi et al., “A Novel Lightweight Cryptographic Protocol for Securing IoT Devices,” International Journal of Computer Engineering in Research Trends, vol. 10, no. 10, pp. 24-30, 2023.
[CrossRef] [Publisher Link]
[20] Yassine Maleh et al., “Machine Intelligence and Big Data Analytics for Cybersecurity Applications,” Studies in Computational Intelligence, vol. 919, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Nasser R. Sabar, Xun Yi, and Andy Song, “A Bi-Objective Hyper-Heuristic Support Vector Machines for Big Data Cyber-Security,” IEEE Access, vol. 6, pp. 10421-10431, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Hung-Yi Lin, “Feature Selection Based on Cluster and Variability Analyses for Ordinal Multi-Class Classification Problems,” Knowledge-Based Systems, vol. 37, pp. 94-104, 2013.
[CrossRef] [Google Scholar] [Publisher Link]