  <?xml version="1.0"?>
<journal>
 <journal_metadata>
  <full_title>Journal of Cybersecurity and Information Management</full_title>
  <abbrev_title>JCIM</abbrev_title>
  <issn media_type="print">2690-6775</issn>
  <issn media_type="electronic">2769-7851</issn>
  <doi_data>
   <doi>10.54216/JCIM</doi>
   <resource>https://www.americaspg.com/journals/show/3135</resource>
  </doi_data>
 </journal_metadata>
 <journal_issue>
  <publication_date media_type="print">
   <year>2019</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2019</year>
  </publication_date>
 </journal_issue>
 <journal_article publication_type="full_text">
  <titles>
   <title>A Hybrid GA-GWO Method for Cyber Attack Detection Using RF Model</title>
  </titles>
  <contributors>
   <organization sequence="first" contributor_role="author">Department of Computer Engineering Techniques, College of Engineering, University of Al Maarif, Al Anbar, 31001, Iraq</organization>
   <person_name sequence="first" contributor_role="author">
    <given_name>Mohammed</given_name>
    <surname>Mohammed</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of Computer Engineering Techniques, College of Engineering, University of Al Maarif, Al Anbar, 31001, Iraq</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Khudhair Abed</given_name>
    <surname>Thamer</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of Computer Engineering Techniques, College of Engineering, University of Al Maarif, Al Anbar, 31001, Iraq</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Ahmed Hikmat</given_name>
    <surname>Saeed</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of Computer Engineering Techniques, College of Engineering, University of Al Maarif, Al Anbar, 31001, Iraq</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Mohammed</given_name>
    <surname>Yousif</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Middle Technical University, Baghdad, Iraq</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Ahmad</given_name>
    <surname>Salim</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Renewable Energy Research Center, University of Anbar, Ramadi, Iraq</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Qusay Hatem</given_name>
    <surname>Alsultan</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Al-Huda University College, Ramadi, Iraq</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Salim</given_name>
    <surname>Bader</surname>
   </person_name>
  </contributors>
  <jats:abstract xml:lang="en">
   <jats:p>Currently, building a high-performance attack detector for cyber threat should be an essential and challenging task to secure cloud system from malicious activities. Traditional methodologies have become subject to the challenge of overfitting, distributive and intricate system layout, comprehensibility and more extended time particles. Therefore, the proposed contribution can be an efficient solution to design and develop a secure system, which is able to recognize cyber threats from cloud systems. It includes preprocessing and normalization, feature extraction, optimization as well prediction modules. Normalization with the relevant per batch fast Independent Component Analysis (ICA) model. A Genetic Algorithm (GA) - Gray Wolf Optimization (GWO) is then used to select the discriminatory features for training and testing phases. In the end, GAGWO- Random Forest (RF) is employed to classify the flow of data as insider or outsider. The detection system is implemented by taking popular and publicly available datasets like BoT-IoT, KDD Cup’99 etc. The various percentage indicators of feasibility are used as a validation purpose like detection accuracy measuring and comparing with the suggested GAGWO-RF system. Overall Accuracy: The proposed GAGWO-RF system achieved an average accuracy rate at 99.8% on all datasets the used. From the performance study, we have noted that GAGWO-RF security model performs better than other models.</jats:p>
  </jats:abstract>
  <publication_date media_type="print">
   <year>2025</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2025</year>
  </publication_date>
  <pages>
   <first_page>225</first_page>
   <last_page>232</last_page>
  </pages>
  <doi_data>
   <doi>10.54216/JCIM.150117</doi>
   <resource>https://www.americaspg.com/articleinfo/2/show/3135</resource>
  </doi_data>
 </journal_article>
</journal>
