{"title":"基于关联感知莲花效应的分层对偶图神经网络攻击检测与网络恢复","authors":"Leena R , Sneha Karamadi , Manjesh R","doi":"10.1016/j.compeleceng.2025.110315","DOIUrl":null,"url":null,"abstract":"<div><div>The recent advancements in Software Defined-Wireless Sensor Networks (SD-WSNs) have revealed the susceptibility of the systems to future enhancement in cyber–physical attacks. However, intrusion detection creates an anomalous behavior that bypasses traditional detection systems. To address these problems, the Correlation Lotus Effect Hierarchical Dual Graph Neural Networks (CLEHDGNN) is a new proposed method to guarantee the correct classification of various types of attacks. This approach utilizes a correlation-sensitive framework is used to efficiently discern the relationships between features for attack detection. Density-Based Spatial Clustering (DBSC) is employed for clustering time-oriented data, whereas the selection of cluster heads is achieved through a Particle-Guided Metaheuristic Algorithm (PGMA) to ensure effective cluster management. This method serves to facilitate and enhance the rapid identification of emerging attack patterns for improved detection accuracy performance. This approach is based on the integration of the Lotus Effect Optimization Algorithm, which improves the identification and classification of attacks. The proposed method has shown astonishing results, reaching a maximum accuracy of 98.5%, F1-score of 97.9%, precision of 98.6%, recall of 98.95%, and specificity of 99.6 as compared to existing techniques. Overall, the proposed model holds significant potential for bolstering the reliability of security in cyber–physical systems.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"124 ","pages":"Article 110315"},"PeriodicalIF":4.0000,"publicationDate":"2025-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Attack detection and network recovery using Correlation Aware Lotus Effect Hierarchical Dual Graph Neural Networks\",\"authors\":\"Leena R , Sneha Karamadi , Manjesh R\",\"doi\":\"10.1016/j.compeleceng.2025.110315\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>The recent advancements in Software Defined-Wireless Sensor Networks (SD-WSNs) have revealed the susceptibility of the systems to future enhancement in cyber–physical attacks. However, intrusion detection creates an anomalous behavior that bypasses traditional detection systems. To address these problems, the Correlation Lotus Effect Hierarchical Dual Graph Neural Networks (CLEHDGNN) is a new proposed method to guarantee the correct classification of various types of attacks. This approach utilizes a correlation-sensitive framework is used to efficiently discern the relationships between features for attack detection. Density-Based Spatial Clustering (DBSC) is employed for clustering time-oriented data, whereas the selection of cluster heads is achieved through a Particle-Guided Metaheuristic Algorithm (PGMA) to ensure effective cluster management. This method serves to facilitate and enhance the rapid identification of emerging attack patterns for improved detection accuracy performance. This approach is based on the integration of the Lotus Effect Optimization Algorithm, which improves the identification and classification of attacks. The proposed method has shown astonishing results, reaching a maximum accuracy of 98.5%, F1-score of 97.9%, precision of 98.6%, recall of 98.95%, and specificity of 99.6 as compared to existing techniques. Overall, the proposed model holds significant potential for bolstering the reliability of security in cyber–physical systems.</div></div>\",\"PeriodicalId\":50630,\"journal\":{\"name\":\"Computers & Electrical Engineering\",\"volume\":\"124 \",\"pages\":\"Article 110315\"},\"PeriodicalIF\":4.0000,\"publicationDate\":\"2025-04-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computers & Electrical Engineering\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0045790625002587\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Electrical Engineering","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0045790625002587","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
Attack detection and network recovery using Correlation Aware Lotus Effect Hierarchical Dual Graph Neural Networks
The recent advancements in Software Defined-Wireless Sensor Networks (SD-WSNs) have revealed the susceptibility of the systems to future enhancement in cyber–physical attacks. However, intrusion detection creates an anomalous behavior that bypasses traditional detection systems. To address these problems, the Correlation Lotus Effect Hierarchical Dual Graph Neural Networks (CLEHDGNN) is a new proposed method to guarantee the correct classification of various types of attacks. This approach utilizes a correlation-sensitive framework is used to efficiently discern the relationships between features for attack detection. Density-Based Spatial Clustering (DBSC) is employed for clustering time-oriented data, whereas the selection of cluster heads is achieved through a Particle-Guided Metaheuristic Algorithm (PGMA) to ensure effective cluster management. This method serves to facilitate and enhance the rapid identification of emerging attack patterns for improved detection accuracy performance. This approach is based on the integration of the Lotus Effect Optimization Algorithm, which improves the identification and classification of attacks. The proposed method has shown astonishing results, reaching a maximum accuracy of 98.5%, F1-score of 97.9%, precision of 98.6%, recall of 98.95%, and specificity of 99.6 as compared to existing techniques. Overall, the proposed model holds significant potential for bolstering the reliability of security in cyber–physical systems.
期刊介绍:
The impact of computers has nowhere been more revolutionary than in electrical engineering. The design, analysis, and operation of electrical and electronic systems are now dominated by computers, a transformation that has been motivated by the natural ease of interface between computers and electrical systems, and the promise of spectacular improvements in speed and efficiency.
Published since 1973, Computers & Electrical Engineering provides rapid publication of topical research into the integration of computer technology and computational techniques with electrical and electronic systems. The journal publishes papers featuring novel implementations of computers and computational techniques in areas like signal and image processing, high-performance computing, parallel processing, and communications. Special attention will be paid to papers describing innovative architectures, algorithms, and software tools.