Rana Abdullah Zaeem , Chuan-Yu Chang , Maryam Pervaiz Khan , Muhammad Shoaib , Chi-Min Shu , Muhammad Asif Zahoor Raja
{"title":"基于深度多层外生网络的机器学习解决方案,用于关键基础设施网络资源的分布式拒绝服务攻击模型","authors":"Rana Abdullah Zaeem , Chuan-Yu Chang , Maryam Pervaiz Khan , Muhammad Shoaib , Chi-Min Shu , Muhammad Asif Zahoor Raja","doi":"10.1016/j.engappai.2025.112872","DOIUrl":null,"url":null,"abstract":"<div><div>The increasing dependency on critical infrastructure and the vulnerability to cyber-attacks, particularly Distributed Denial of Service attacks, pose significant challenges and threats in this cold warfare era. This paper explores an epidemic model based distributed denial of service attacks system to analyze the impact of seclusion strategies on protecting critical infrastructure against cyber-attacks by leveraging machine learning knowledge with non-linear exogenous networks supported with Levenberg-Marquardt backpropagation. The proposed information security model presents the critical infrastructure nodes into susceptible, infected, quarantined and recovered differential compartments for the targeted population to portray the attack's dynamics and quarantine measures effectively. To analyze the rates for infection, efficiency in the quarantine and the recovery state, the synthetic data is acquired to carry out processes on various scenarios with Adams numerical solver and the said information is fed to intelligent supervised nonlinear autoregressive exogenous neural networks to decipher the attack patterns. The efficacy of the proposed stochastic computing paradigm is established on mean squared error-based convergence trends, error in time series illustrations, error-histogram, and error distribution in histograms, statistics on correlation and autocorrelation metrics based on an exhaustive simulation study for an information security model. The validation of the performance of the design nonlinear networks is further endorsed from counterpart's backpropagation schemes of Bayesian regularization and scaled conjugate gradient, based on the results of statistics in terms of mean, standard deviation, worst, and best of the convergence arcs, error distribution on heat map, inference on median with box plots, plot-matrix analysis, violin plots dynamics and computational time analysis, on exhaustive autonomous executions for solving cyber-attack model in information security.</div></div>","PeriodicalId":50523,"journal":{"name":"Engineering Applications of Artificial Intelligence","volume":"163 ","pages":"Article 112872"},"PeriodicalIF":8.0000,"publicationDate":"2025-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Machine learning solutions with deep multilayer exogenous networks for distributed denial of service attacks model on networked resources in critical infrastructure\",\"authors\":\"Rana Abdullah Zaeem , Chuan-Yu Chang , Maryam Pervaiz Khan , Muhammad Shoaib , Chi-Min Shu , Muhammad Asif Zahoor Raja\",\"doi\":\"10.1016/j.engappai.2025.112872\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>The increasing dependency on critical infrastructure and the vulnerability to cyber-attacks, particularly Distributed Denial of Service attacks, pose significant challenges and threats in this cold warfare era. This paper explores an epidemic model based distributed denial of service attacks system to analyze the impact of seclusion strategies on protecting critical infrastructure against cyber-attacks by leveraging machine learning knowledge with non-linear exogenous networks supported with Levenberg-Marquardt backpropagation. The proposed information security model presents the critical infrastructure nodes into susceptible, infected, quarantined and recovered differential compartments for the targeted population to portray the attack's dynamics and quarantine measures effectively. To analyze the rates for infection, efficiency in the quarantine and the recovery state, the synthetic data is acquired to carry out processes on various scenarios with Adams numerical solver and the said information is fed to intelligent supervised nonlinear autoregressive exogenous neural networks to decipher the attack patterns. The efficacy of the proposed stochastic computing paradigm is established on mean squared error-based convergence trends, error in time series illustrations, error-histogram, and error distribution in histograms, statistics on correlation and autocorrelation metrics based on an exhaustive simulation study for an information security model. The validation of the performance of the design nonlinear networks is further endorsed from counterpart's backpropagation schemes of Bayesian regularization and scaled conjugate gradient, based on the results of statistics in terms of mean, standard deviation, worst, and best of the convergence arcs, error distribution on heat map, inference on median with box plots, plot-matrix analysis, violin plots dynamics and computational time analysis, on exhaustive autonomous executions for solving cyber-attack model in information security.</div></div>\",\"PeriodicalId\":50523,\"journal\":{\"name\":\"Engineering Applications of Artificial Intelligence\",\"volume\":\"163 \",\"pages\":\"Article 112872\"},\"PeriodicalIF\":8.0000,\"publicationDate\":\"2025-10-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Engineering Applications of Artificial Intelligence\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0952197625029033\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Engineering Applications of Artificial Intelligence","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0952197625029033","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
Machine learning solutions with deep multilayer exogenous networks for distributed denial of service attacks model on networked resources in critical infrastructure
The increasing dependency on critical infrastructure and the vulnerability to cyber-attacks, particularly Distributed Denial of Service attacks, pose significant challenges and threats in this cold warfare era. This paper explores an epidemic model based distributed denial of service attacks system to analyze the impact of seclusion strategies on protecting critical infrastructure against cyber-attacks by leveraging machine learning knowledge with non-linear exogenous networks supported with Levenberg-Marquardt backpropagation. The proposed information security model presents the critical infrastructure nodes into susceptible, infected, quarantined and recovered differential compartments for the targeted population to portray the attack's dynamics and quarantine measures effectively. To analyze the rates for infection, efficiency in the quarantine and the recovery state, the synthetic data is acquired to carry out processes on various scenarios with Adams numerical solver and the said information is fed to intelligent supervised nonlinear autoregressive exogenous neural networks to decipher the attack patterns. The efficacy of the proposed stochastic computing paradigm is established on mean squared error-based convergence trends, error in time series illustrations, error-histogram, and error distribution in histograms, statistics on correlation and autocorrelation metrics based on an exhaustive simulation study for an information security model. The validation of the performance of the design nonlinear networks is further endorsed from counterpart's backpropagation schemes of Bayesian regularization and scaled conjugate gradient, based on the results of statistics in terms of mean, standard deviation, worst, and best of the convergence arcs, error distribution on heat map, inference on median with box plots, plot-matrix analysis, violin plots dynamics and computational time analysis, on exhaustive autonomous executions for solving cyber-attack model in information security.
期刊介绍:
Artificial Intelligence (AI) is pivotal in driving the fourth industrial revolution, witnessing remarkable advancements across various machine learning methodologies. AI techniques have become indispensable tools for practicing engineers, enabling them to tackle previously insurmountable challenges. Engineering Applications of Artificial Intelligence serves as a global platform for the swift dissemination of research elucidating the practical application of AI methods across all engineering disciplines. Submitted papers are expected to present novel aspects of AI utilized in real-world engineering applications, validated using publicly available datasets to ensure the replicability of research outcomes. Join us in exploring the transformative potential of AI in engineering.