Hybrid Deep Learning Technique for Cybersecurity Detection and Classification
Keywords:
Cyber threat, cyber security, Crayfish optimization, Elman neural network
Abstract
Nowadays, cyber threats (CT) evolve rapidly, and this necessitates developing strong and intelligent prediction models that are effective for the detection and classification of cyber security (CS). Hence, a new Elman Crayfish network (ECFN) is proposed to predict and classify CT. In this study, a Kaggle CS threat dataset is trained with Python to develop a more effective classification model. The dataset undergoes a data refinement stage, where noisy data is preprocessed to improve precision. In order to effectively choose the features, a Crayfish Optimization Algorithm is applied in a spatiotemporal feature analysis to select the relevant attributes that contribute to classification. The ECFN utilizes these chosen features to predict CT more effectively. Finally, the detected attacks are classified, and the performance is measured to obtain high accuracy and reliability in detecting CT. The developed method improves CS protection by optimizing the selection process and improving the accuracy of classification. The model's performance is evaluated with metrics like F score, accuracy, recall, precision, and error rate, and the comparison of the results with existing approaches proves its efficiency.
Published
2025-08-28
How to Cite
Akhila Reddy Yadulla, Bhargavi Konda, Mounica Yenugula, Vinay Kumar Kasula, & Chaitanya Tumma. (2025). Hybrid Deep Learning Technique for Cybersecurity Detection and Classification. Statistics, Optimization & Information Computing. https://doi.org/10.19139/soic-2310-5070-2491
Issue
Section
Research Articles
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).