{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T04:33:13Z","timestamp":1741667593799,"version":"3.38.0"},"reference-count":26,"publisher":"SAGE Publications","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IDT"],"published-print":{"date-parts":[[2024,9,16]]},"abstract":"<jats:p>Cyber security evolving as a severe problem almost in all sectors of cyberspace, due to the time-to-time increase in the number of security breaches. Numerous Zero-days attacks occur continuously, due to the increase in multiple protocols. Almost all of these attacks are small variants of previously known cyber attacks. Moreover, even the advanced approach like Machine Learning (ML), faces the difficulty in identifying those attack\u2019s small mutants over time. Recently, Deep Learning (DL) has been utilized for multiple applications related to cybersecurity fields. Making use of this DL to identify the cyber attack might be a resilient mechanism for novel attacks or tiny mutations. Thereby, a novel cyber attack classification model named DCNN-Bi-LSTM-ICS is proposed in this work. This proposed DCNN-Bi-LSTM-ICS has five working stages. Firstly, in the data acquisition stage, the input data (considering the datasets) for attack classification has been collected. These raw data are pre-processed in the second stage, where an improved class imbalance balancing processing is conducted which makes use of the Improved Synthetic Minority Oversampling Technique (ISMOTE). In the third stage, along with the conventional mutual information and statistical features, Improved holo-entropy-based features are extracted. To choose the appropriate feature from those retrieved features, an Improved Chi-Square (ICS) processing is developed in the fourth stage. In the final classification stage, a hybrid classification model that combines both the Deep Convolutional Neural Network (DCNN) and Bi-directional Long Short Term Memory (Bi-LSTM) has been developed. The outcomes show that the proposed DCNN-Bi-LSTM-ICS can offer outstanding performance in the cyber attack classification task.<\/jats:p>","DOI":"10.3233\/idt-240362","type":"journal-article","created":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T14:33:54Z","timestamp":1726842834000},"page":"2191-2212","source":"Crossref","is-referenced-by-count":0,"title":["An intelligent hybrid model for cyber attack classification with selected feature set"],"prefix":"10.1177","volume":"18","author":[{"given":"G.","family":"Geetha","sequence":"first","affiliation":[{"name":"Department of Computing Technologies, SRM Institute of Science and Technology, Kattankulathur, Tamilnadu, India"}]},{"given":"Manjula","family":"Rajagopal","sequence":"additional","affiliation":[{"name":"Department of Computing Technologies, SRM Institute of Science and Technology, Kattankulathur, Tamilnadu, India"}]},{"given":"K.","family":"Purnachand","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering (Data Science), B V Raju Institute of Technology, Narsapur, Medak, Telengana, India"}]}],"member":"179","reference":[{"issue":"5","key":"10.3233\/IDT-240362_ref1","doi-asserted-by":"crossref","first-page":"2211","DOI":"10.1007\/s40747-021-00396-9","article-title":"A robust intelligent zero-day cyber-attack detection technique","volume":"7","author":"Kumar","year":"2021","journal-title":"Complex & Intelligent Systems."},{"issue":"16","key":"10.3233\/IDT-240362_ref2","doi-asserted-by":"crossref","first-page":"10211","DOI":"10.1007\/s00521-021-05785-2","article-title":"Hybrid DeepGCL model for cyber-attacks detection on cyber-physical systems","volume":"33","author":"Alguliyev","year":"2021","journal-title":"Neural Computing and Applications."},{"issue":"4","key":"10.3233\/IDT-240362_ref3","doi-asserted-by":"crossref","first-page":"2565","DOI":"10.1007\/s12083-020-00999-y","article-title":"Analysis of intrusion detection in cyber attacks using DEEP learning neural networks","volume":"14","author":"Kumar","year":"2021","journal-title":"Peer-to-Peer Networking and Applications."},{"issue":"13","key":"10.3233\/IDT-240362_ref4","doi-asserted-by":"crossref","first-page":"9427","DOI":"10.1007\/s00521-019-04453-w","article-title":"A whale optimization algorithm-trained artificial neural network for smart grid cyber intrusion detection","volume":"32","author":"Haghnegahdar","year":"2020","journal-title":"Neural Computing and Applications."},{"key":"10.3233\/IDT-240362_ref5","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1007\/s42154-021-00153-1","article-title":"Cyber-attack detection for autonomous driving using vehicle dynamic state estimation","volume":"4","author":"Zhang","year":"2021","journal-title":"Automotive Innovation."},{"key":"10.3233\/IDT-240362_ref6","doi-asserted-by":"crossref","first-page":"126593","DOI":"10.1016\/j.amc.2021.126593","article-title":"Fault detection filter design for networked systems with cyber attacks","volume":"412","author":"Dai","year":"2022","journal-title":"Applied Mathematics and Computation."},{"issue":"18","key":"10.3233\/IDT-240362_ref7","doi-asserted-by":"crossref","first-page":"12319","DOI":"10.1007\/s00500-021-05926-8","article-title":"Cyber-attack detection in healthcare using cyber-physical system and machine learning techniques","volume":"25","author":"AlZubi","year":"2021","journal-title":"Soft Computing."},{"key":"10.3233\/IDT-240362_ref8","doi-asserted-by":"crossref","first-page":"1435","DOI":"10.1007\/s10586-020-03203-1","article-title":"Detecting network cyber-attacks using an integrated statistical approach","volume":"24","author":"Bouyeddou","year":"2021","journal-title":"Cluster Computing."},{"key":"10.3233\/IDT-240362_ref9","first-page":"1","article-title":"Deep learning based cyber bullying early detection using distributed denial of service flow","volume":"1","author":"Zaib","year":"2022","journal-title":"Multimedia Systems."},{"key":"10.3233\/IDT-240362_ref10","first-page":"1","article-title":"Coordinated cyber-physical attacks based on different attack strategies for cascading failure analysis in smart grids","volume":"18","author":"Kang","year":"2021","journal-title":"Wireless Networks."},{"key":"10.3233\/IDT-240362_ref11","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/s11416-019-00342-x","article-title":"PenQuest: A gamified attacker\/defender meta model for cyber security assessment and education","volume":"16","author":"Luh","year":"2020","journal-title":"Journal of Computer Virology and Hacking Techniques."},{"key":"10.3233\/IDT-240362_ref12","doi-asserted-by":"crossref","first-page":"4043","DOI":"10.1007\/s10489-020-02007-5","article-title":"Cyber intrusion detection through association rule mining on multi-source logs","volume":"51","author":"Lou","year":"2021","journal-title":"Applied Intelligence."},{"issue":"6","key":"10.3233\/IDT-240362_ref13","doi-asserted-by":"crossref","first-page":"1450","DOI":"10.1007\/s40565-019-0500-2","article-title":"Deducing cascading failures caused by cyberattacks based on attack gains and cost principle in cyber-physical power systems","volume":"7","author":"Wang","year":"2019","journal-title":"Journal of Modern Power Systems and Clean Energy."},{"key":"10.3233\/IDT-240362_ref14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s42400-021-00071-z","article-title":"Cascading effects of cyber-attacks on interconnected critical infrastructure","volume":"4","author":"Palleti","year":"2021","journal-title":"Cybersecurity."},{"issue":"1","key":"10.3233\/IDT-240362_ref15","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/s11036-021-01789-3","article-title":"Methodology for detecting cyber intrusions in e-learning systems during COVID-19 pandemic","volume":"28","author":"Cviti\u00e9","year":"2023","journal-title":"Mobile Networks and Applications."},{"key":"10.3233\/IDT-240362_ref16","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1016\/j.cose.2019.05.021","article-title":"A cyber network attack detection based on GM Median Nearest Neighbors LDA","volume":"86","author":"Elkhadir","year":"2019","journal-title":"Computers & Security."},{"key":"10.3233\/IDT-240362_ref17","doi-asserted-by":"crossref","first-page":"107211","DOI":"10.1016\/j.compeleceng.2021.107211","article-title":"Detection of false data cyber-attacks for the assessment of security in smart grid using deep learning","volume":"93","author":"Sengan","year":"2021","journal-title":"Computers & Electrical Engineering."},{"issue":"4","key":"10.3233\/IDT-240362_ref18","doi-asserted-by":"crossref","first-page":"3749","DOI":"10.1007\/s13369-020-05181-3","article-title":"Toward design of an intelligent cyber attack detection system using hybrid feature reduced approach for iot networks","volume":"46","author":"Kumar","year":"2021","journal-title":"Arabian Journal for Science and Engineering."},{"issue":"2","key":"10.3233\/IDT-240362_ref19","doi-asserted-by":"crossref","first-page":"1705","DOI":"10.1007\/s11277-021-08716-5","article-title":"A novel decentralized analytical methodology for cyber physical networks attack detection","volume":"127","author":"Alqahtani","year":"2022","journal-title":"Wireless Personal Communications."},{"issue":"39","key":"10.3233\/IDT-240362_ref20","doi-asserted-by":"crossref","first-page":"29923","DOI":"10.1007\/s11042-020-09444-x","article-title":"MCKC: A modified cyber kill chain model for cognitive APTs analysis within Enterprise multimedia network","volume":"79","author":"Ju","year":"2020","journal-title":"Multimedia Tools and Applications."},{"issue":"2","key":"10.3233\/IDT-240362_ref21","doi-asserted-by":"crossref","first-page":"1412","DOI":"10.2991\/ijcis.d.191114.002","article-title":"A-SMOTE: A new preprocessing approach for highly imbalanced datasets by improving SMOTE","volume":"12","author":"Hussein","year":"2019","journal-title":"International Journal of Computational Intelligence Systems."},{"issue":"8","key":"10.3233\/IDT-240362_ref22","doi-asserted-by":"crossref","first-page":"2173","DOI":"10.1007\/s00371-020-01978-3","article-title":"Enhanced holoentropy-based encoding via whale optimization for highly efficient video coding","volume":"37","author":"Munagala","year":"2021","journal-title":"The Visual Computer."},{"issue":"2","key":"10.3233\/IDT-240362_ref23","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1016\/j.jksuci.2018.05.010","article-title":"Feature selection using an improved Chi-square for Arabic text classification","volume":"32","author":"Bahassine","year":"2020","journal-title":"Journal of King Saud University-Computer and Information Sciences."},{"issue":"7","key":"10.3233\/IDT-240362_ref28","doi-asserted-by":"crossref","first-page":"1022","DOI":"10.3390\/math10071022","article-title":"A RUL prediction method of small sample equipment based on DCNN-BiLSTM and domain adaptation","volume":"10","author":"Chen","year":"2022","journal-title":"Mathematics."},{"issue":"4","key":"10.3233\/IDT-240362_ref31","doi-asserted-by":"crossref","first-page":"1674","DOI":"10.3390\/app11041674","article-title":"Intelligent cyber attack detection and classification for network-based intrusion detection systems","volume":"11","author":"Oliveira","year":"2021","journal-title":"Applied Sciences."},{"issue":"1","key":"10.3233\/IDT-240362_ref32","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/BF01573178","article-title":"Behaviour classification of cyber attacks using convolutional neural networks","volume":"32","author":"Lin","year":"2021","journal-title":"J. Comput. Sci."}],"container-title":["Intelligent Decision Technologies"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/IDT-240362","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T20:31:21Z","timestamp":1741638681000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/IDT-240362"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,16]]},"references-count":26,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.3233\/idt-240362","relation":{},"ISSN":["1872-4981","1875-8843"],"issn-type":[{"type":"print","value":"1872-4981"},{"type":"electronic","value":"1875-8843"}],"subject":[],"published":{"date-parts":[[2024,9,16]]}}}