An efficient trustworthy cyberattack defence mechanism system for self guided federated learning framework using attention induced deep convolution neural networks.

Journal: Scientific reports
Published Date:

Abstract

As cyberattacks become more advanced, conventional centralized threat intelligence models often fail to keep up with these threats' growing complexity and frequency, highlighting the requirement for innovative approaches to strengthen cybersecurity resilience. Federated learning (FL), a decentralized machine learning (ML) model, provides a promising solution by permitting spread objects to train techniques on local data collaboratively without distributing sensitive data. The efficiency of FL in enhancing attack intelligence skills emphasizes its probability of driving a novel period of robust and privacy-protecting cybersecurity practices. Furthermore, combining FL into cybersecurity structures can strengthen attack intelligence models by permitting real upgrades and adaptive learning mechanisms. Recently, ML and Deep Learning (DL) approaches have drawn the study community to advance security solutions for cyberattack defence mechanism models. Conventional ML and DL techniques that function with data kept on a federal server increase the main privacy issues for user information. This manuscript presents a Cyberattack Defence Mechanism System for Federated Learning Framework using Attention Induced Deep Convolution Neural Networks (CDMFL-AIDCNN) technique. The CDMFL-AIDCNN model presents an improved structure incorporating self-guided FL with attack intelligence to improve defence mechanisms across varied cybersecurity applications in distributed systems. Initially, the data preprocessing stage utilizes Z-score normalization to transform input data into a beneficial format. The Dung Beetle Optimization (DBO) technique is used in the feature selection process to identify the most relevant and non-redundant features. Furthermore, the fusion of convolutional neural networks, bidirectional long short-term memory, gated recurrent units, and attention (CBLG-A) models are employed to classify cyberattack defence mechanisms. Finally, the parameter tuning of the CBLG-A approach is performed by the growth optimizer (GO) approach. The CDMFL-AIDCNN technique is extensively analyzed using the CIC-IDS-2017 and UNSW-NB15 datasets. The comparison analysis of the CDMFL-AIDCNN technique portrayed a superior accuracy value of 99.07% and 98.64% under the CIC-IDS-2017 and UNSW-NB15 datasets.

Authors

  • Louai A Maghrabi
    Department of Software Engineering, College of Engineering, University of Business and Technology, Jeddah, Saudi Arabia.
  • Alanoud Subahi
    Department of Information Technology, Faculty of Computing and Information Technology, King Abdulaziz University, Rabigh, 25732, Saudi Arabia.
  • Nouf Atiahallah Alghanmi
    Department of Information Technology, Faculty of Computing and Information Technology, King Abdulaziz University, 25732, Rabigh, Saudi Arabia.
  • Turki Althaqafi
    Computer Science Department, School of Engineering, Computing and Design, Dar Al-Hekma University, Jeddah, Saudi Arabia.
  • Nahla J Abid
    Department of Computer Science, College of Computer Science and Engineering, Taibah University, Madinah, Saudi Arabia.
  • Nasser N Albogami
    Information Technology Department, Faculty of Computing and Information Technology, King Abdulaziz University, 21589, Jeddah, Saudi Arabia.
  • Mahmoud Ragab
    Information Technology Department, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, 21589, Saudi Arabia. mragab@kau.edu.sa.

Keywords

No keywords available for this article.