ASPG Menu
search

American Scientific Publishing Group

verified Journal

Journal of Cybersecurity and Information Management

ISSN
Online: 2690-6775 Print: 2769-7851
Frequency

Continuous publication

Publication Model

Open access · Articles freely available online · APC applies after acceptance

Journal of Cybersecurity and Information Management
Full Length Article

Volume 15Issue 1PP: 225-232 • 2025

A Hybrid GA-GWO Method for Cyber Attack Detection Using RF Model

Abdulrahman Fatikhan Ataala 1* ,
Khudhair Abed Thamer 1 ,
Ahmed Hikmat Saeed 1 ,
Mohammed Yousif 1 ,
Ahmad Salim 2 ,
Qusay Hatem Alsultan 3 ,
Salim Bader 4
1Department of Computer Engineering Techniques, College of Engineering, University of Al Maarif, Al Anbar, 31001, Iraq
2Middle Technical University, Baghdad, Iraq
3Renewable Energy Research Center, University of Anbar, Ramadi, Iraq
4Al-Huda University College, Ramadi, Iraq
* Corresponding Author.
Received: April 14, 2024 Revised: June 10, 2024 Accepted: August 04, 2024

Abstract

Currently, building a high-performance attack detector for cyber threat should be an essential and challenging task to secure cloud system from malicious activities. Traditional methodologies have become subject to the challenge of overfitting, distributive and intricate system layout, comprehensibility and more extended time particles. Therefore, the proposed contribution can be an efficient solution to design and develop a secure system, which is able to recognize cyber threats from cloud systems. It includes preprocessing and normalization, feature extraction, optimization as well prediction modules. Normalization with the relevant per batch fast Independent Component Analysis (ICA) model. A Genetic Algorithm (GA) - Gray Wolf Optimization (GWO) is then used to select the discriminatory features for training and testing phases. In the end, GAGWO- Random Forest (RF) is employed to classify the flow of data as insider or outsider. The detection system is implemented by taking popular and publicly available datasets like BoT-IoT, KDD Cup’99 etc. The various percentage indicators of feasibility are used as a validation purpose like detection accuracy measuring and comparing with the suggested GAGWO-RF system. Overall Accuracy: The proposed GAGWO-RF system achieved an average accuracy rate at 99.8% on all datasets the used. From the performance study, we have noted that GAGWO-RF security model performs better than other models.

Keywords

Genetic Algorithm Gray Wolf Optimization Random Forest Cyber Attacks Independent Component Analysis

References

[1]       Ahmed, O. (2024). Enhancing Intrusion Detection in Wireless Sensor Networks through Machine Learning Techniques and Context Awareness Integration. International Journal of Mathematics, Statistics, and Computer Science, 2, 244–258. https://doi.org/10.59543/ijmscs.v2i.10377

[2]       V. S. Rajkumar, A. Stefanov, A. Presekal, P. Palensky, and J. L. R. Torres, “Cyber Attacks on Power Grids: Causes and Propagation of Cascading Failures,” IEEE Access, vol. 11, no. September, pp. 103154–103176, 2023, doi: 10.1109/ACCESS.2023.3317695.

[3]       R. Shandler and M. A. Gomez, “The hidden threat of cyber-attacks–undermining public confidence in government,” J. Inf. Technol. Polit., vol. 20, no. 4, pp. 359–374, 2023, doi: 10.1080/19331681.2022.2112796.

[4]       S. Conti, M., Dehghantanha, A., Franke, K., & Watson, “Internet of Things security and forensics: Challenges and opportunities,” Futur. Gener. Comput. Syst., vol. 78, pp. 544–549, 2018.

[5]       N. Zhao, X. Zhao, N. Xu, and L. Zhang, “Resilient Event-Triggered Control of Connected Automated Vehicles Under Cyber Attacks,” IEEE/CAA J. Autom. Sin., vol. 10, no. 12, pp. 2300–2302, 2023, doi: 10.1109/JAS.2023.123483.

[6]       R. R. Chandan et al., “Genetic Algorithm and Machine Learning,” pp. 167–182, 2023, doi: 10.4018/978-1-6684-5656-9.ch009.

[7]       K. C. A. Khatri, K. B. Shah, J. Logeshwaran, and A. Shrestha, “Genetic Algorithm Based Techno-Economic Optimization of an Isolated Hybrid Energy System,” Online) Ictact J. Microelectron., vol. 1680, no. January, p. 4, 2023, doi: 10.21917/ijme.2023.0249.

[8]       G. Shial, S. Sahoo, and S. Panigrahi, An Enhanced GWO Algorithm with Improved Explorative Search Capability for Global Optimization and Data Clustering, vol. 37, no. 1. Taylor & Francis, 2023. doi: 10.1080/08839514.2023.2166232.

[9]       X. Yan, Z. Lin, Z. Lin, and B. Vucetic, “A Novel Exploitative and Explorative GWO-SVM Algorithm for Smart Emotion Recognition,” IEEE Internet Things J., vol. 10, no. 11, pp. 9999–10011, 2023, doi: 10.1109/JIOT.2023.3235356.

[10]     R. Kumar, S., Choudhary, R., & Kumar, “Hybrid Genetic Algorithm and Particle Swarm Optimization for Intrusion Detection System,” Procedia Comput. Sci., vol. 167, pp. 1551–1558, 2019.

[11]     J. Zheng, D. Xin, Q. Cheng, M. Tian, and L. Yang, “The Random Forest Model for analyzing and Forecasting the US Stock Market under the background of smart finance,” pp. 82–90, 2024, doi: 10.2991/978-94-6463-419-8_11.

[12]     H. Liu, Y., & Yu, “Cybersecurity Threat Detection Using Hybrid Models: A Review,” IEEE Access, vol. 10, pp. 5037–5050, 2022.

[13]     K. Zhang, Z., Wang, S., Ji, G., Sun, P., & Li, “A hybrid approach for feature selection based on brain storm optimization and grey wolf optimization,” Appl. Soft Comput., vol. 107, p. 107354, 2021.

[14]     L. Breiman, “Random Forests,” Mach. Learn., vol. 45, no. 1, pp. 5–32, 2001.

[15]     A. Geetha, T.Deepa, “A FKPCA-GWO WDBiLSTM classifier for intrusion detection system in cloud environments,” Knowl. Based Syst, vol. 253, p. 109557, 2022.

[16]     F. Aldallal, A. Alisa, “Effective Intrusion Detection System to Secure Data in Cloud Using Machine Learning,” Symmetry (Basel)., vol. 13, p. 2306, 2021.

[17]     R. Kumar, P. Gupta, G.P. Tripathi, “A distributed ensemble design based intrusion detection system using fog computing to protect the internet of things networks,” J. Ambient. Intell. Humaniz. Comput, vol. 12, pp. 9555–9572, 2021.

[18]     F. S. Kilincer, I.F. Ertam, “A. Machine learning methods for cyber security intrusion detection: Datasets and comparative study,” Comput. Netw, vol. 188, p. 107840, 2021.

[19]     E. C. Detection and U. G. Model, “Enhancing Cloud-Based Security : A Novel Approach for,” 2023.

Cite This Article

Choose your preferred format

format_quote
Ataala, Abdulrahman Fatikhan, Thamer, Khudhair Abed, Saeed, Ahmed Hikmat, Yousif, Mohammed, Salim, Ahmad, Alsultan, Qusay Hatem, Bader, Salim. "A Hybrid GA-GWO Method for Cyber Attack Detection Using RF Model." Journal of Cybersecurity and Information Management, vol. Volume 15, no. Issue 1, 2025, pp. 225-232. DOI: https://doi.org/10.54216/JCIM.150117
Ataala, A., Thamer, K., Saeed, A., Yousif, M., Salim, A., Alsultan, Q., Bader, S. (2025). A Hybrid GA-GWO Method for Cyber Attack Detection Using RF Model. Journal of Cybersecurity and Information Management, Volume 15(Issue 1), 225-232. DOI: https://doi.org/10.54216/JCIM.150117
Ataala, Abdulrahman Fatikhan, Thamer, Khudhair Abed, Saeed, Ahmed Hikmat, Yousif, Mohammed, Salim, Ahmad, Alsultan, Qusay Hatem, Bader, Salim. "A Hybrid GA-GWO Method for Cyber Attack Detection Using RF Model." Journal of Cybersecurity and Information Management Volume 15, no. Issue 1 (2025): 225-232. DOI: https://doi.org/10.54216/JCIM.150117
Ataala, A., Thamer, K., Saeed, A., Yousif, M., Salim, A., Alsultan, Q., Bader, S. (2025) 'A Hybrid GA-GWO Method for Cyber Attack Detection Using RF Model', Journal of Cybersecurity and Information Management, Volume 15(Issue 1), pp. 225-232. DOI: https://doi.org/10.54216/JCIM.150117
Ataala A, Thamer K, Saeed A, Yousif M, Salim A, Alsultan Q, Bader S. A Hybrid GA-GWO Method for Cyber Attack Detection Using RF Model. Journal of Cybersecurity and Information Management. 2025;Volume 15(Issue 1):225-232. DOI: https://doi.org/10.54216/JCIM.150117
A. Ataala, K. Thamer, A. Saeed, M. Yousif, A. Salim, Q. Alsultan, S. Bader, "A Hybrid GA-GWO Method for Cyber Attack Detection Using RF Model," Journal of Cybersecurity and Information Management, vol. Volume 15, no. Issue 1, pp. 225-232, 2025. DOI: https://doi.org/10.54216/JCIM.150117
Digital Archive Ready