X-AI Enabled Hybrid Approach for Detection of Cyber Terrorism

Abstract

In an time checked by the fast advancement of innovation, cyber fear mongering postures a noteworthy danger to worldwide security and societal solidness. This paper proposes an X-AI empowered crossover approach to improve the location and avoidance of cyber fear mongering exercises. By coordination progressed counterfeit insights methods with conventional cybersecurity measures, this approach points to make a strong framework able of recognizing and relieving cyber dangers in real-time. The proposed show leverages machine learning calculations, counting profound learning and gathering strategies, to analyze tremendous datasets for designs characteristic of cyber fear monger behavior. Furthermore, the cross breed approach joins inconsistency location techniques to recognize bizarre exercises that will flag a looming cyber attack. Our framework is outlined to adjust persistently, learning from modern information and advancing danger scenes, hence guaranteeing proactive defense instruments against developing cyber dangers. We approve our approach through broad experimentation on benchmark datasets, illustrating made strides precision and diminished false-positive rates compared to existing location frameworks. The discoveries emphasize the potential of X-AI innovations in invigorating cybersecurity frameworks against cyber fear based oppression. This inquire about not as it were contributes to the scholastic talk on cybersecurity but moreover gives commonsense suggestions for organizations looking for to improve their danger location capabilities.

Country : India

1 T.Niranjan Babu2 Dumpala Sravani3 R.Siva Sundar Reddy

  1. Assistant Professor, Dept. of C.S.E (Cyber Security), Madanapalle Institute of Technology & Science, Madanapalle, India
  2. UG Scholar, Dept. of C.S.E (Cyber Security), Madanapalle Institute of Technology & Science, Madanapalle, India
  3. UG Scholar, Dept. of C.S.E (Cyber Security), Madanapalle Institute of Technology & Science, Madanapalle, India

IRJIET, Volume 9, Special Issue of INSPIRE’25 April 2025 pp. 315-322

doi.org/10.47001/IRJIET/2025.INSPIRE51

References

  1. M. A. Al-Garadi, A. Mohamed, A. K. Al-Ali, X. Du, I. Ali and M. Guizani, "A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security," in IEEE Communications Surveys & Tutorials, vol. 22, no. 3, pp. 1646-1685, thirdquarter 2020, doi: 10.1109/COMST.2020.2988293.
  2. M. Zolanvari, M. A. Teixeira, L. Gupta, K. M. Khan and R. Jain, "Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things," in IEEE Internet of Things Journal, vol. 6, no. 4, pp. 6822-6834, Aug. 2019, doi: 10.1109/JIOT.2019.2912022.
  3. T. M. Chen and S. Abu-Nimeh, "Lessons from Stuxnet," in Computer, vol. 44, no. 4, pp. 91-93, April 2011, doi: 10.1109/MC.2011.115.
  4. S. Latif, Z. Idrees, Z. Zou and J. Ahmad, "DRaNN: A Deep Random Neural Network Model for Intrusion Detection in Industrial IoT," 2020 International Conference on UK-China Emerging Technologies (UCET), Glasgow, UK, 2020, pp. 1-4, doi: 10.1109/UCET51115.2020.9205361.
  5. S. Aftab, Z. S. Shah, S. A. Memon and Q. Shaikh, "A machine-learning-based Intrusion detection for IIoT infrastructure," 2023 7th International Multi-Topic ICT Conference (IMTIC), Jamshoro, Pakistan, 2023, pp. 1-6, doi: 10.1109/IMTIC58887.2023.10178529.
  6. S. Li et al., "CRSF: An Intrusion Detection Framework for Industrial Internet of Things Based on Pretrained CNN2D-RNN and SVM," in IEEE Access, vol. 11, pp. 92041-92054, 2023, doi: 10.1109/ACCESS.2023.3307429.
  7. S. V. B. Rakas, M. D. Stojanović and J. D. Marković-Petrović, "A Review of Research Work on Network-Based SCADA Intrusion Detection Systems," in IEEE Access, vol. 8, pp. 93083-93108, 2020, doi: 10.1109/ACCESS.2020.2994961.
  8. T. -T. -H. Le, J. Kim and H. Kim, "An Effective Intrusion Detection Classifier Using Long Short-Term Memory with Gradient Descent Optimization," 2017 International Conference on Platform Technology and Service (PlatCon), Busan, Korea (South), 2017, pp. 1-6, doi: 10.1109/PlatCon.2017.7883684.
  9. R. Vinayakumar, K. P. Soman and P. Poornachandran, "Applying convolutional neural network for network intrusion detection," 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Udupi, India, 2017, pp. 1222-1228, doi: 10.1109/ICACCI.2017.8126009.
  10. S. A. Althubiti, E. M. Jones and K. Roy, "LSTM for Anomaly-Based Network Intrusion Detection," 2018 28th International Telecommunication Networks and Applications Conference (ITNAC), Sydney, NSW, Australia, 2018, pp. 1-3, doi: 10.1109/ATNAC.2018.8615300.
  11. Z. Wu, H. Zhang, P. Wang and Z. Sun, "RTIDS: A Robust Transformer-Based Approach for Intrusion Detection System," in IEEE Access, vol. 10, pp. 64375-64387, 2022, doi: 10.1109/ACCESS.2022.3182333.
  12. J. Casajús-Setién, C. Bielza and P. Larrañaga, "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models," 2023 IEEE International Conference on Cyber Security and Resilience (CSR), Venice, Italy, 2023, pp. 72-77, doi: 10.1109/CSR57506.2023.10224965.
  13. O. Belarbi, T. Spyridopoulos, E. Anthi, I. Mavromatis, P. Carnelli and A. Khan, "Federated Deep Learning for Intrusion Detection in IoT Networks," GLOBECOM 2023 - 2023 IEEE Global Communications Conference, Kuala Lumpur, Malaysia, 2023, pp. 237-242, doi: 10.1109/GLOBECOM54140.2023.10437860.
  14. M. Al-Hawawreh, E. Sitnikova and N. Aboutorab, "X-IIoTID: A Connectivity-Agnostic and Device-Agnostic Intrusion Data Set for Industrial Internet of Things," in IEEE Internet of Things Journal, vol. 9, no. 5, pp. 3962-3977, 1 March1, 2022, doi: 10.1109/JIOT.2021.3102056.
  15. A.Alsaedi, N. Moustafa, Z. Tari, A. Mahmood and A. Anwar, "TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems," in IEEE Access, vol. 8, pp. 165130-165150, 2020, doi: 10.1109/ACCESS.2020.3022862.