基于深度逻辑稀疏自编码器和Kookaburra搜索的入侵检测优化区块链通信系统的安全性

IF 1.7 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC
Rakan A. Alsowail
{"title":"基于深度逻辑稀疏自编码器和Kookaburra搜索的入侵检测优化区块链通信系统的安全性","authors":"Rakan A. Alsowail","doi":"10.1002/dac.70071","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>Recently, the rapid expansion of blockchain technology has sparked a transformative wave across various sectors, prominently impacting cybersecurity. This paper introduces a pioneering intrusion detection model, the deep logic sparse autoencoder–based kookaburra search (DLSA-KS) algorithm. This innovative approach amalgamates advanced deep learning capabilities with an efficient initial search strategy, significantly enhancing the identification and mitigation of malicious activities within digital environments. The initial phase involves gathering input data from diverse datasets, including the Malware Executable Detection dataset, KDD Cup 1999 dataset, NSL-KDD dataset, Bot-IoT dataset, and UNSW-NB15 dataset. These datasets serve as foundational resources for training and evaluating the DLSA-KS model, ensuring its efficacy across varied cyber threat scenarios. This integration not only bolsters security but also enhances scalability and real-time detection capabilities, crucial for managing the voluminous data dynamics inherent in blockchain ecosystems. Moreover, the DLSA-KS model exhibits remarkable flexibility and optimization abilities, adapting proficiently to diverse network conditions. This adaptability contributes significantly to its overall performance, enabling robust intrusion detection across a spectrum of operational environments. In addition to this, the proposed DLSA-KS approach is evaluated across multiple performance metrics, including accuracy rate, detection rate, error rate, precision, and F-measure. The findings unequivocally demonstrate the model's superiority over existing methodologies, achieving exceptional metrics such as an accuracy rate of 98.7%, detection rate of 99.2%, error rate of 3%, precision of 97.8%, and F-measure of 98.7%. Thus, the results underscore the efficacy of the DLSA-KS algorithm in effectively detecting and mitigating intrusions, thereby affirming its potential as a pivotal advancement in cybersecurity defenses.</p>\n </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"38 7","pages":""},"PeriodicalIF":1.7000,"publicationDate":"2025-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Optimizing Blockchain Communication Systems Security With Deep Logic Sparse Autoencoder and Kookaburra Search–Based Intrusion Detection\",\"authors\":\"Rakan A. Alsowail\",\"doi\":\"10.1002/dac.70071\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div>\\n \\n <p>Recently, the rapid expansion of blockchain technology has sparked a transformative wave across various sectors, prominently impacting cybersecurity. This paper introduces a pioneering intrusion detection model, the deep logic sparse autoencoder–based kookaburra search (DLSA-KS) algorithm. This innovative approach amalgamates advanced deep learning capabilities with an efficient initial search strategy, significantly enhancing the identification and mitigation of malicious activities within digital environments. The initial phase involves gathering input data from diverse datasets, including the Malware Executable Detection dataset, KDD Cup 1999 dataset, NSL-KDD dataset, Bot-IoT dataset, and UNSW-NB15 dataset. These datasets serve as foundational resources for training and evaluating the DLSA-KS model, ensuring its efficacy across varied cyber threat scenarios. This integration not only bolsters security but also enhances scalability and real-time detection capabilities, crucial for managing the voluminous data dynamics inherent in blockchain ecosystems. Moreover, the DLSA-KS model exhibits remarkable flexibility and optimization abilities, adapting proficiently to diverse network conditions. This adaptability contributes significantly to its overall performance, enabling robust intrusion detection across a spectrum of operational environments. In addition to this, the proposed DLSA-KS approach is evaluated across multiple performance metrics, including accuracy rate, detection rate, error rate, precision, and F-measure. The findings unequivocally demonstrate the model's superiority over existing methodologies, achieving exceptional metrics such as an accuracy rate of 98.7%, detection rate of 99.2%, error rate of 3%, precision of 97.8%, and F-measure of 98.7%. Thus, the results underscore the efficacy of the DLSA-KS algorithm in effectively detecting and mitigating intrusions, thereby affirming its potential as a pivotal advancement in cybersecurity defenses.</p>\\n </div>\",\"PeriodicalId\":13946,\"journal\":{\"name\":\"International Journal of Communication Systems\",\"volume\":\"38 7\",\"pages\":\"\"},\"PeriodicalIF\":1.7000,\"publicationDate\":\"2025-04-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Communication Systems\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1002/dac.70071\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"ENGINEERING, ELECTRICAL & ELECTRONIC\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Communication Systems","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/dac.70071","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

摘要

最近,区块链技术的迅速发展在各行各业掀起了一股变革浪潮,对网络安全产生了突出影响。本文介绍了一种开创性的入侵检测模型--基于深度逻辑稀疏自动编码器的库卡布拉搜索(DLSA-KS)算法。这种创新方法将先进的深度学习能力与高效的初始搜索策略相结合,大大提高了对数字环境中恶意活动的识别和缓解能力。初始阶段涉及从各种数据集收集输入数据,包括恶意软件可执行文件检测数据集、KDD Cup 1999 数据集、NSL-KDD 数据集、Bot-IoT 数据集和新南威尔士大学-NB15 数据集。这些数据集是训练和评估 DLSA-KS 模型的基础资源,可确保其在各种网络威胁场景中的有效性。这种整合不仅增强了安全性,还提高了可扩展性和实时检测能力,这对于管理区块链生态系统固有的海量数据动态至关重要。此外,DLSA-KS 模型还具有出色的灵活性和优化能力,能熟练适应各种网络条件。这种适应性大大提高了其整体性能,使其能够在各种操作环境中进行稳健的入侵检测。此外,还对所提出的 DLSA-KS 方法进行了多项性能指标评估,包括准确率、检测率、错误率、精确度和 F 测量。评估结果明确表明,该模型优于现有方法,达到了 98.7% 的准确率、99.2% 的检测率、3% 的错误率、97.8% 的精确度和 98.7% 的 F 值等优异指标。因此,这些结果凸显了 DLSA-KS 算法在有效检测和缓解入侵方面的功效,从而肯定了其作为网络安全防御系统的重要进步的潜力。
本文章由计算机程序翻译,如有差异,请以英文原文为准。

Optimizing Blockchain Communication Systems Security With Deep Logic Sparse Autoencoder and Kookaburra Search–Based Intrusion Detection

Optimizing Blockchain Communication Systems Security With Deep Logic Sparse Autoencoder and Kookaburra Search–Based Intrusion Detection

Recently, the rapid expansion of blockchain technology has sparked a transformative wave across various sectors, prominently impacting cybersecurity. This paper introduces a pioneering intrusion detection model, the deep logic sparse autoencoder–based kookaburra search (DLSA-KS) algorithm. This innovative approach amalgamates advanced deep learning capabilities with an efficient initial search strategy, significantly enhancing the identification and mitigation of malicious activities within digital environments. The initial phase involves gathering input data from diverse datasets, including the Malware Executable Detection dataset, KDD Cup 1999 dataset, NSL-KDD dataset, Bot-IoT dataset, and UNSW-NB15 dataset. These datasets serve as foundational resources for training and evaluating the DLSA-KS model, ensuring its efficacy across varied cyber threat scenarios. This integration not only bolsters security but also enhances scalability and real-time detection capabilities, crucial for managing the voluminous data dynamics inherent in blockchain ecosystems. Moreover, the DLSA-KS model exhibits remarkable flexibility and optimization abilities, adapting proficiently to diverse network conditions. This adaptability contributes significantly to its overall performance, enabling robust intrusion detection across a spectrum of operational environments. In addition to this, the proposed DLSA-KS approach is evaluated across multiple performance metrics, including accuracy rate, detection rate, error rate, precision, and F-measure. The findings unequivocally demonstrate the model's superiority over existing methodologies, achieving exceptional metrics such as an accuracy rate of 98.7%, detection rate of 99.2%, error rate of 3%, precision of 97.8%, and F-measure of 98.7%. Thus, the results underscore the efficacy of the DLSA-KS algorithm in effectively detecting and mitigating intrusions, thereby affirming its potential as a pivotal advancement in cybersecurity defenses.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
5.90
自引率
9.50%
发文量
323
审稿时长
7.9 months
期刊介绍: The International Journal of Communication Systems provides a forum for R&D, open to researchers from all types of institutions and organisations worldwide, aimed at the increasingly important area of communication technology. The Journal''s emphasis is particularly on the issues impacting behaviour at the system, service and management levels. Published twelve times a year, it provides coverage of advances that have a significant potential to impact the immense technical and commercial opportunities in the communications sector. The International Journal of Communication Systems strives to select a balance of contributions that promotes technical innovation allied to practical relevance across the range of system types and issues. The Journal addresses both public communication systems (Telecommunication, mobile, Internet, and Cable TV) and private systems (Intranets, enterprise networks, LANs, MANs, WANs). The following key areas and issues are regularly covered: -Transmission/Switching/Distribution technologies (ATM, SDH, TCP/IP, routers, DSL, cable modems, VoD, VoIP, WDM, etc.) -System control, network/service management -Network and Internet protocols and standards -Client-server, distributed and Web-based communication systems -Broadband and multimedia systems and applications, with a focus on increased service variety and interactivity -Trials of advanced systems and services; their implementation and evaluation -Novel concepts and improvements in technique; their theoretical basis and performance analysis using measurement/testing, modelling and simulation -Performance evaluation issues and methods.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信