Accepted author manuscript, 416 KB, PDF document
Available under license: CC BY: Creative Commons Attribution 4.0 International License
Final published version
Research output: Contribution to Journal/Magazine › Journal article › peer-review
Research output: Contribution to Journal/Magazine › Journal article › peer-review
}
TY - JOUR
T1 - AI-Based Learning Model for Sociocybernetic Systems in Web of Things
T2 - An Efficient and Accurate Decision-Making Procedure
AU - Singh, Priti
AU - Rathee, Geetanjali
AU - Kerrache, Chaker Abdelaziz
AU - Bilal, Muhammad
AU - Calafate, Carlos T.
AU - Wang, Huihui
PY - 2024/10/31
Y1 - 2024/10/31
N2 - Cybernetic threats have become a growing concern in recent years, highlighting the need for effective intrusion detection systems (IDSs) to detect and prevent social cyberattacks. Sociocybernetics is a significant platform for providing real-time mapping or to enable information access across heterogeneous networks. However, ontology-based knowledge and web support for social cybernetics demand massive warehouses that provide the required computational power for log applications and data-processing mechanisms, in addition to effective decision-support solutions for business by extracting useful information in a very secure and intelligent way. In this work, we propose an IDS approach that combines a tree-based XGBoost algorithm and a bidirectional long short-term memory (BiLSTM) network to address the limitations of traditional approaches. The proposed approach includes multiple steps, such as data preprocessing, feature selection using an infinite feature selection (IFS) algorithm, and the application of principal component analysis (PCA) for dimensionality reduction. Furthermore, a direct trust-based scheme is used to strengthen the decision-making process by improving the overall accuracy in the network. The performance of the proposed approach is evaluated based on accuracy, precision, recall, and F1 score and is compared with the existing LSTM-based deep learning model (LBDMIDS) method. Experimental results demonstrate that the proposed approach outperforms traditional methods by providing higher accuracy along with a slight improvement in terms of precision, recall, and F1 score. In particular, the proposed mechanism shows a 99% improvement in terms of accuracy compared to existing schemes, while also ensuring secure communication in the network.
AB - Cybernetic threats have become a growing concern in recent years, highlighting the need for effective intrusion detection systems (IDSs) to detect and prevent social cyberattacks. Sociocybernetics is a significant platform for providing real-time mapping or to enable information access across heterogeneous networks. However, ontology-based knowledge and web support for social cybernetics demand massive warehouses that provide the required computational power for log applications and data-processing mechanisms, in addition to effective decision-support solutions for business by extracting useful information in a very secure and intelligent way. In this work, we propose an IDS approach that combines a tree-based XGBoost algorithm and a bidirectional long short-term memory (BiLSTM) network to address the limitations of traditional approaches. The proposed approach includes multiple steps, such as data preprocessing, feature selection using an infinite feature selection (IFS) algorithm, and the application of principal component analysis (PCA) for dimensionality reduction. Furthermore, a direct trust-based scheme is used to strengthen the decision-making process by improving the overall accuracy in the network. The performance of the proposed approach is evaluated based on accuracy, precision, recall, and F1 score and is compared with the existing LSTM-based deep learning model (LBDMIDS) method. Experimental results demonstrate that the proposed approach outperforms traditional methods by providing higher accuracy along with a slight improvement in terms of precision, recall, and F1 score. In particular, the proposed mechanism shows a 99% improvement in terms of accuracy compared to existing schemes, while also ensuring secure communication in the network.
U2 - 10.1109/msmc.2023.3344943
DO - 10.1109/msmc.2023.3344943
M3 - Journal article
VL - 10
SP - 40
EP - 48
JO - IEEE Systems, Man, and Cybernetics Magazine
JF - IEEE Systems, Man, and Cybernetics Magazine
SN - 2380-1298
IS - 4
ER -