基于深度多层外生网络的机器学习解决方案,用于关键基础设施网络资源的分布式拒绝服务攻击模型

IF 8 2区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS
Rana Abdullah Zaeem , Chuan-Yu Chang , Maryam Pervaiz Khan , Muhammad Shoaib , Chi-Min Shu , Muhammad Asif Zahoor Raja
{"title":"基于深度多层外生网络的机器学习解决方案,用于关键基础设施网络资源的分布式拒绝服务攻击模型","authors":"Rana Abdullah Zaeem ,&nbsp;Chuan-Yu Chang ,&nbsp;Maryam Pervaiz Khan ,&nbsp;Muhammad Shoaib ,&nbsp;Chi-Min Shu ,&nbsp;Muhammad Asif Zahoor Raja","doi":"10.1016/j.engappai.2025.112872","DOIUrl":null,"url":null,"abstract":"<div><div>The increasing dependency on critical infrastructure and the vulnerability to cyber-attacks, particularly Distributed Denial of Service attacks, pose significant challenges and threats in this cold warfare era. This paper explores an epidemic model based distributed denial of service attacks system to analyze the impact of seclusion strategies on protecting critical infrastructure against cyber-attacks by leveraging machine learning knowledge with non-linear exogenous networks supported with Levenberg-Marquardt backpropagation. The proposed information security model presents the critical infrastructure nodes into susceptible, infected, quarantined and recovered differential compartments for the targeted population to portray the attack's dynamics and quarantine measures effectively. To analyze the rates for infection, efficiency in the quarantine and the recovery state, the synthetic data is acquired to carry out processes on various scenarios with Adams numerical solver and the said information is fed to intelligent supervised nonlinear autoregressive exogenous neural networks to decipher the attack patterns. The efficacy of the proposed stochastic computing paradigm is established on mean squared error-based convergence trends, error in time series illustrations, error-histogram, and error distribution in histograms, statistics on correlation and autocorrelation metrics based on an exhaustive simulation study for an information security model. The validation of the performance of the design nonlinear networks is further endorsed from counterpart's backpropagation schemes of Bayesian regularization and scaled conjugate gradient, based on the results of statistics in terms of mean, standard deviation, worst, and best of the convergence arcs, error distribution on heat map, inference on median with box plots, plot-matrix analysis, violin plots dynamics and computational time analysis, on exhaustive autonomous executions for solving cyber-attack model in information security.</div></div>","PeriodicalId":50523,"journal":{"name":"Engineering Applications of Artificial Intelligence","volume":"163 ","pages":"Article 112872"},"PeriodicalIF":8.0000,"publicationDate":"2025-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Machine learning solutions with deep multilayer exogenous networks for distributed denial of service attacks model on networked resources in critical infrastructure\",\"authors\":\"Rana Abdullah Zaeem ,&nbsp;Chuan-Yu Chang ,&nbsp;Maryam Pervaiz Khan ,&nbsp;Muhammad Shoaib ,&nbsp;Chi-Min Shu ,&nbsp;Muhammad Asif Zahoor Raja\",\"doi\":\"10.1016/j.engappai.2025.112872\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>The increasing dependency on critical infrastructure and the vulnerability to cyber-attacks, particularly Distributed Denial of Service attacks, pose significant challenges and threats in this cold warfare era. This paper explores an epidemic model based distributed denial of service attacks system to analyze the impact of seclusion strategies on protecting critical infrastructure against cyber-attacks by leveraging machine learning knowledge with non-linear exogenous networks supported with Levenberg-Marquardt backpropagation. The proposed information security model presents the critical infrastructure nodes into susceptible, infected, quarantined and recovered differential compartments for the targeted population to portray the attack's dynamics and quarantine measures effectively. To analyze the rates for infection, efficiency in the quarantine and the recovery state, the synthetic data is acquired to carry out processes on various scenarios with Adams numerical solver and the said information is fed to intelligent supervised nonlinear autoregressive exogenous neural networks to decipher the attack patterns. The efficacy of the proposed stochastic computing paradigm is established on mean squared error-based convergence trends, error in time series illustrations, error-histogram, and error distribution in histograms, statistics on correlation and autocorrelation metrics based on an exhaustive simulation study for an information security model. The validation of the performance of the design nonlinear networks is further endorsed from counterpart's backpropagation schemes of Bayesian regularization and scaled conjugate gradient, based on the results of statistics in terms of mean, standard deviation, worst, and best of the convergence arcs, error distribution on heat map, inference on median with box plots, plot-matrix analysis, violin plots dynamics and computational time analysis, on exhaustive autonomous executions for solving cyber-attack model in information security.</div></div>\",\"PeriodicalId\":50523,\"journal\":{\"name\":\"Engineering Applications of Artificial Intelligence\",\"volume\":\"163 \",\"pages\":\"Article 112872\"},\"PeriodicalIF\":8.0000,\"publicationDate\":\"2025-10-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Engineering Applications of Artificial Intelligence\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0952197625029033\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Engineering Applications of Artificial Intelligence","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0952197625029033","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

在这个冷战时代,对关键基础设施的日益依赖和对网络攻击(特别是分布式拒绝服务攻击)的脆弱性构成了重大挑战和威胁。本文探索了一种基于流行病模型的分布式拒绝服务攻击系统,通过利用机器学习知识和Levenberg-Marquardt反向传播支持的非线性外生网络,分析隔离策略对保护关键基础设施免受网络攻击的影响。所提出的信息安全模型将关键基础设施节点划分为易感、感染、隔离和恢复的目标人群差异隔间,有效地描述了攻击的动态和隔离措施。为了分析感染率、隔离效率和恢复状态,获取合成数据,利用Adams数值求解器对各种场景进行处理,并将所得信息输入智能监督非线性自回归外生神经网络,解码攻击模式。本文提出的随机计算范式的有效性建立在基于均方误差的收敛趋势、时间序列插图中的误差、误差直方图和直方图中的误差分布、基于信息安全模型详尽模拟研究的相关统计和自相关度量上。基于收敛弧的均值、标准差、最坏和最佳统计结果、热图上的误差分布、箱形图中值推断、图-矩阵分析、小提琴图动力学和计算时间分析,贝叶斯正则化和缩放共轭梯度的反向传播方案进一步验证了设计的非线性网络的性能。信息安全中网络攻击模型的穷举自治求解。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Machine learning solutions with deep multilayer exogenous networks for distributed denial of service attacks model on networked resources in critical infrastructure
The increasing dependency on critical infrastructure and the vulnerability to cyber-attacks, particularly Distributed Denial of Service attacks, pose significant challenges and threats in this cold warfare era. This paper explores an epidemic model based distributed denial of service attacks system to analyze the impact of seclusion strategies on protecting critical infrastructure against cyber-attacks by leveraging machine learning knowledge with non-linear exogenous networks supported with Levenberg-Marquardt backpropagation. The proposed information security model presents the critical infrastructure nodes into susceptible, infected, quarantined and recovered differential compartments for the targeted population to portray the attack's dynamics and quarantine measures effectively. To analyze the rates for infection, efficiency in the quarantine and the recovery state, the synthetic data is acquired to carry out processes on various scenarios with Adams numerical solver and the said information is fed to intelligent supervised nonlinear autoregressive exogenous neural networks to decipher the attack patterns. The efficacy of the proposed stochastic computing paradigm is established on mean squared error-based convergence trends, error in time series illustrations, error-histogram, and error distribution in histograms, statistics on correlation and autocorrelation metrics based on an exhaustive simulation study for an information security model. The validation of the performance of the design nonlinear networks is further endorsed from counterpart's backpropagation schemes of Bayesian regularization and scaled conjugate gradient, based on the results of statistics in terms of mean, standard deviation, worst, and best of the convergence arcs, error distribution on heat map, inference on median with box plots, plot-matrix analysis, violin plots dynamics and computational time analysis, on exhaustive autonomous executions for solving cyber-attack model in information security.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Engineering Applications of Artificial Intelligence
Engineering Applications of Artificial Intelligence 工程技术-工程:电子与电气
CiteScore
9.60
自引率
10.00%
发文量
505
审稿时长
68 days
期刊介绍: Artificial Intelligence (AI) is pivotal in driving the fourth industrial revolution, witnessing remarkable advancements across various machine learning methodologies. AI techniques have become indispensable tools for practicing engineers, enabling them to tackle previously insurmountable challenges. Engineering Applications of Artificial Intelligence serves as a global platform for the swift dissemination of research elucidating the practical application of AI methods across all engineering disciplines. Submitted papers are expected to present novel aspects of AI utilized in real-world engineering applications, validated using publicly available datasets to ensure the replicability of research outcomes. Join us in exploring the transformative potential of AI in engineering.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信