• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于自适应WavePCA自动编码器(AWPA)的自适应混合漏洞利用检测网络(AHEDNet)进行零日漏洞利用检测。

Zero-day exploits detection with adaptive WavePCA-Autoencoder (AWPA) adaptive hybrid exploit detection network (AHEDNet).

作者信息

Mohamed Ahmed A, Al-Saleh Abdullah, Sharma Sunil Kumar, Tejani Ghanshyam G

机构信息

Department of Computer Science, College of Computer and Information Sciences, Majmaah University, 11952, Majmaah, Saudi Arabia.

Department of Computer Engineering, College of Computer and Information Sciences, Majmaah University, 11952, Majmaah, Saudi Arabia.

出版信息

Sci Rep. 2025 Feb 3;15(1):4036. doi: 10.1038/s41598-025-87615-2.

DOI:10.1038/s41598-025-87615-2
PMID:39900799
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11791085/
Abstract

This paper introduces a new probabilistic composite model for the detection of zero-day exploits targeting the capabilities of existing anomaly detection systems in terms of accuracy, computational time, and adaptability. To address the issues mentioned above, the proposed framework consisted of three novel elements. The first key innovations are the introduction of "Adaptive WavePCA-Autoencoder (AWPA)" for pre-processing stage which address the denoising and dimensionality reduction, and contributes to the general dependability and accuracy of zero-day exploit detection. Additionally, a novel "Meta-Attention Transformer Autoencoder (MATA)" for enhancing feature extraction which address the subtlety issue, and improves the model's ability and flexibility to detect new security threats, and a novel "Genetic Mongoose-Chameleon Optimization (GMCO)" was introduced for effective feature selection in the case of addressing the efficiency challenges. Furthermore, a novel "Adaptive Hybrid Exploit Detection Network (AHEDNet)" was introduced which address the dynamic ensemble adaptation issue where the accuracy of anomaly detection is very high with low false positives. The experimental results show the proposed model outperforms the other models of dataset 1 in accuracy of 0.988086 and 0.990469, precision of 0.987976 and 0.990628, recall of 0.988298 and 0.990435, with the lowest Hamming Loss of 0.011914 and 0.009531, also, the proposed model outperforms the other models of dataset 2 in accuracy of 0.9819 and 0.9919, precision of 0.9868 and 0.9968, recall of 0.9813 and 0.9923, with the lowest Hamming Loss of 0.0209 and 0.0109, thus the proposed model outperformed the other models in detecting zero-day exploits.

摘要

本文针对现有异常检测系统在检测零日漏洞利用方面的能力,从准确性、计算时间和适应性角度,引入了一种新的概率复合模型。为解决上述问题,所提出的框架包含三个新颖的元素。第一个关键创新是在预处理阶段引入了“自适应小波主成分分析自动编码器(AWPA)”,用于去噪和降维,有助于提高零日漏洞利用检测的总体可靠性和准确性。此外,还引入了一种新颖的“元注意力Transformer自动编码器(MATA)”用于增强特征提取,以解决细微差别问题,并提高模型检测新安全威胁的能力和灵活性,同时在解决效率挑战的情况下引入了一种新颖的“遗传猫鼬 - 变色龙优化算法(GMCO)”用于有效特征选择。此外,还引入了一种新颖的“自适应混合漏洞利用检测网络(AHEDNet)”,用于解决动态集成适应问题,该问题中异常检测的准确性很高且误报率很低。实验结果表明,所提出的模型在数据集1上的准确率分别为0.988086和0.990469,精确率分别为0.987976和0.990628,召回率分别为0.988298和0.990435,汉明损失最低,分别为0.011914和0.009531,优于其他模型;在数据集2上的准确率分别为0.9819和0.9919,精确率分别为0.9868和0.9968,召回率分别为0.9813和0.9923,汉明损失最低,分别为0.0209和0.0109,因此所提出的模型在检测零日漏洞利用方面优于其他模型。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e69f/11791085/a42b08702fb0/41598_2025_87615_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e69f/11791085/fd3b83639c4e/41598_2025_87615_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e69f/11791085/f74a2ddf2a8b/41598_2025_87615_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e69f/11791085/17c485750a78/41598_2025_87615_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e69f/11791085/65b6eb4af13b/41598_2025_87615_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e69f/11791085/477079b91deb/41598_2025_87615_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e69f/11791085/dadbb2209978/41598_2025_87615_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e69f/11791085/acf46695037e/41598_2025_87615_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e69f/11791085/341ff25d1883/41598_2025_87615_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e69f/11791085/aa14c33721c1/41598_2025_87615_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e69f/11791085/3f034697bcf1/41598_2025_87615_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e69f/11791085/3c4773bbf476/41598_2025_87615_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e69f/11791085/5469d1f8671a/41598_2025_87615_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e69f/11791085/a42b08702fb0/41598_2025_87615_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e69f/11791085/fd3b83639c4e/41598_2025_87615_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e69f/11791085/f74a2ddf2a8b/41598_2025_87615_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e69f/11791085/17c485750a78/41598_2025_87615_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e69f/11791085/65b6eb4af13b/41598_2025_87615_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e69f/11791085/477079b91deb/41598_2025_87615_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e69f/11791085/dadbb2209978/41598_2025_87615_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e69f/11791085/acf46695037e/41598_2025_87615_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e69f/11791085/341ff25d1883/41598_2025_87615_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e69f/11791085/aa14c33721c1/41598_2025_87615_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e69f/11791085/3f034697bcf1/41598_2025_87615_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e69f/11791085/3c4773bbf476/41598_2025_87615_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e69f/11791085/5469d1f8671a/41598_2025_87615_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e69f/11791085/a42b08702fb0/41598_2025_87615_Fig13_HTML.jpg

相似文献

1
Zero-day exploits detection with adaptive WavePCA-Autoencoder (AWPA) adaptive hybrid exploit detection network (AHEDNet).基于自适应WavePCA自动编码器(AWPA)的自适应混合漏洞利用检测网络(AHEDNet)进行零日漏洞利用检测。
Sci Rep. 2025 Feb 3;15(1):4036. doi: 10.1038/s41598-025-87615-2.
2
Dual-hybrid intrusion detection system to detect False Data Injection in smart grids.用于检测智能电网中虚假数据注入的双混合入侵检测系统。
PLoS One. 2025 Jan 27;20(1):e0316536. doi: 10.1371/journal.pone.0316536. eCollection 2025.
3
Sparse attention with residual pyramidal depthwise separable convolutional based malware detection with optimization mechanism.基于带有优化机制的残差金字塔深度可分离卷积的稀疏注意力恶意软件检测
Sci Rep. 2024 Oct 18;14(1):24414. doi: 10.1038/s41598-024-76193-4.
4
A novel approach to intrusion detection system using hybrid flower pollination and cheetah optimization algorithm.一种基于混合花粉授粉和猎豹优化算法的入侵检测系统新方法。
Sci Rep. 2025 Apr 16;15(1):13071. doi: 10.1038/s41598-025-98296-2.
5
Harnessing advanced hybrid deep learning model for real-time detection and prevention of man-in-the-middle cyber attacks.利用先进的混合深度学习模型进行中间人网络攻击的实时检测与防范。
Sci Rep. 2025 Jan 11;15(1):1697. doi: 10.1038/s41598-025-85547-5.
6
An AutoEncoder enhanced light gradient boosting machine method for credit card fraud detection.一种用于信用卡欺诈检测的自动编码器增强型轻梯度提升机方法。
PeerJ Comput Sci. 2024 Oct 18;10:e2323. doi: 10.7717/peerj-cs.2323. eCollection 2024.
7
Enhanced Pneumonia Detection in Chest X-Rays Using Hybrid Convolutional and Vision Transformer Networks.使用混合卷积和视觉Transformer网络增强胸部X光片中的肺炎检测
Curr Med Imaging. 2025;21:e15734056326685. doi: 10.2174/0115734056326685250101113959.
8
Spatiotemporal multi-feature fusion vehicle trajectory anomaly detection for intelligent transportation: An improved method combining autoencoders and dynamic Bayesian networks.
Accid Anal Prev. 2025 Mar;211:107911. doi: 10.1016/j.aap.2024.107911. Epub 2025 Jan 3.
9
Protecting digital assets using an ontology based cyber situational awareness system.使用基于本体的网络态势感知系统保护数字资产。
Front Artif Intell. 2025 Jan 9;7:1394363. doi: 10.3389/frai.2024.1394363. eCollection 2024.
10
A hybrid feature weighted attention based deep learning approach for an intrusion detection system using the random forest algorithm.基于混合特征加权注意力的深度学习方法与随机森林算法在入侵检测系统中的应用。
PLoS One. 2024 May 23;19(5):e0302294. doi: 10.1371/journal.pone.0302294. eCollection 2024.

引用本文的文献

1
AI driven automation for enhancing sustainability efforts in CDP report analysis.人工智能驱动的自动化,用于加强CDP报告分析中的可持续发展努力。
Sci Rep. 2025 Jul 7;15(1):24266. doi: 10.1038/s41598-025-07584-4.
2
Research on multi-UAV autonomous obstacle avoidance algorithm integrating improved dynamic window approach and ORCA.基于改进动态窗口法与ORCA的多无人机自主避障算法研究
Sci Rep. 2025 Apr 26;15(1):14646. doi: 10.1038/s41598-025-99111-8.
3
Enhanced anomaly network intrusion detection using an improved snow ablation optimizer with dimensionality reduction and hybrid deep learning model.

本文引用的文献

1
Deep Anomaly Detection Framework Utilizing Federated Learning for Electricity Theft Zero-Day Cyberattacks.利用联邦学习的深度异常检测框架用于电力盗窃零日网络攻击。
Sensors (Basel). 2024 May 20;24(10):3236. doi: 10.3390/s24103236.
2
A Survey of Machine Learning-Based Zero-Day Attack Detection: Challenges and Future Directions.基于机器学习的零日攻击检测综述:挑战与未来方向
Comput Commun. 2023 Jan;198. doi: 10.1016/j.comcom.2022.11.001.
3
Zero-Day Malware Detection and Effective Malware Analysis Using Shapley Ensemble Boosting and Bagging Approach.
使用具有降维和混合深度学习模型的改进型雪消融优化器增强异常网络入侵检测
Sci Rep. 2025 Apr 17;15(1):13270. doi: 10.1038/s41598-025-97398-1.
4
Artificial intelligence-driven cybersecurity system for internet of things using self-attention deep learning and metaheuristic algorithms.基于自注意力深度学习和元启发式算法的物联网人工智能驱动的网络安全系统。
Sci Rep. 2025 Apr 16;15(1):13215. doi: 10.1038/s41598-025-98056-2.
5
Enhancing neurological disease diagnostics: fusion of deep transfer learning with optimization algorithm for acute brain stroke prediction using facial images.增强神经疾病诊断:深度迁移学习与优化算法融合用于基于面部图像的急性脑中风预测
Sci Rep. 2025 Apr 10;15(1):12334. doi: 10.1038/s41598-025-97034-y.
6
Method for reconstructing safety and arming motion process by integrating Kalman filter and KCF.基于卡尔曼滤波器和核相关滤波器集成的安全与解除保险运动过程重构方法
Sci Rep. 2025 Mar 11;15(1):8334. doi: 10.1038/s41598-025-92957-y.
零日恶意软件检测与 Shapley 集成提升和装袋方法在恶意软件分析中的有效应用。
Sensors (Basel). 2022 Apr 6;22(7):2798. doi: 10.3390/s22072798.