• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种使用注意力诱导深度卷积神经网络的用于自引导联邦学习框架的高效可信网络攻击防御机制系统。

An efficient trustworthy cyberattack defence mechanism system for self guided federated learning framework using attention induced deep convolution neural networks.

作者信息

Maghrabi Louai A, Subahi Alanoud, Alghanmi Nouf Atiahallah, Althaqafi Turki, Abid Nahla J, Albogami Nasser N, Ragab Mahmoud

机构信息

Department of Software Engineering, College of Engineering, University of Business and Technology, Jeddah, Saudi Arabia.

Department of Information Technology, Faculty of Computing and Information Technology, King Abdulaziz University, 25732, Rabigh, Saudi Arabia.

出版信息

Sci Rep. 2025 May 15;15(1):16920. doi: 10.1038/s41598-025-01561-7.

DOI:10.1038/s41598-025-01561-7
PMID:40374691
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC12081891/
Abstract

As cyberattacks become more advanced, conventional centralized threat intelligence models often fail to keep up with these threats' growing complexity and frequency, highlighting the requirement for innovative approaches to strengthen cybersecurity resilience. Federated learning (FL), a decentralized machine learning (ML) model, provides a promising solution by permitting spread objects to train techniques on local data collaboratively without distributing sensitive data. The efficiency of FL in enhancing attack intelligence skills emphasizes its probability of driving a novel period of robust and privacy-protecting cybersecurity practices. Furthermore, combining FL into cybersecurity structures can strengthen attack intelligence models by permitting real upgrades and adaptive learning mechanisms. Recently, ML and Deep Learning (DL) approaches have drawn the study community to advance security solutions for cyberattack defence mechanism models. Conventional ML and DL techniques that function with data kept on a federal server increase the main privacy issues for user information. This manuscript presents a Cyberattack Defence Mechanism System for Federated Learning Framework using Attention Induced Deep Convolution Neural Networks (CDMFL-AIDCNN) technique. The CDMFL-AIDCNN model presents an improved structure incorporating self-guided FL with attack intelligence to improve defence mechanisms across varied cybersecurity applications in distributed systems. Initially, the data preprocessing stage utilizes Z-score normalization to transform input data into a beneficial format. The Dung Beetle Optimization (DBO) technique is used in the feature selection process to identify the most relevant and non-redundant features. Furthermore, the fusion of convolutional neural networks, bidirectional long short-term memory, gated recurrent units, and attention (CBLG-A) models are employed to classify cyberattack defence mechanisms. Finally, the parameter tuning of the CBLG-A approach is performed by the growth optimizer (GO) approach. The CDMFL-AIDCNN technique is extensively analyzed using the CIC-IDS-2017 and UNSW-NB15 datasets. The comparison analysis of the CDMFL-AIDCNN technique portrayed a superior accuracy value of 99.07% and 98.64% under the CIC-IDS-2017 and UNSW-NB15 datasets.

摘要

随着网络攻击变得越来越复杂,传统的集中式威胁情报模型往往难以跟上这些威胁日益增长的复杂性和频率,这凸显了采用创新方法来增强网络安全弹性的必要性。联邦学习(FL)是一种去中心化的机器学习(ML)模型,它通过允许分布式对象在本地数据上协作训练技术而不泄露敏感数据,提供了一个很有前景的解决方案。联邦学习在提升攻击情报技能方面的效率强调了其推动稳健且保护隐私的网络安全实践新时代的可能性。此外,将联邦学习融入网络安全架构可以通过允许实时更新和自适应学习机制来强化攻击情报模型。最近,机器学习和深度学习(DL)方法吸引了研究界为网络攻击防御机制模型推进安全解决方案。在联邦服务器上处理数据的传统机器学习和深度学习技术增加了用户信息的主要隐私问题。本文提出了一种使用注意力诱导深度卷积神经网络(CDMFL-AIDCNN)技术的联邦学习框架的网络攻击防御机制系统。CDMFL-AIDCNN模型提出了一种改进的结构,将自引导联邦学习与攻击情报相结合,以改善分布式系统中各种网络安全应用的防御机制。最初,数据预处理阶段利用Z分数归一化将输入数据转换为有益的格式。在特征选择过程中使用蜣螂优化(DBO)技术来识别最相关且无冗余的特征。此外,卷积神经网络与双向长短期记忆、门控循环单元和注意力(CBLG-A)模型的融合用于对网络攻击防御机制进行分类。最后,通过增长优化器(GO)方法对CBLG-A方法进行参数调整。使用CIC-IDS-2017和UNSW-NB15数据集对CDMFL-AIDCNN技术进行了广泛分析。CDMFL-AIDCNN技术的比较分析在CIC-IDS-2017和UNSW-NB15数据集下分别呈现出99.07%和98.64%的卓越准确率。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/989d/12081891/c8df94a4a9a2/41598_2025_1561_Fig15_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/989d/12081891/3ca4ac1fd927/41598_2025_1561_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/989d/12081891/36654d9cf82b/41598_2025_1561_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/989d/12081891/d58a28ec7b46/41598_2025_1561_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/989d/12081891/fe990df64f21/41598_2025_1561_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/989d/12081891/2b55925ecc6f/41598_2025_1561_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/989d/12081891/cd83d9a0932a/41598_2025_1561_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/989d/12081891/606b9f65dadd/41598_2025_1561_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/989d/12081891/bc949dea16fa/41598_2025_1561_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/989d/12081891/929b7d72c4c8/41598_2025_1561_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/989d/12081891/709646bd5164/41598_2025_1561_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/989d/12081891/8d44b9d94b8b/41598_2025_1561_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/989d/12081891/950fcce87d40/41598_2025_1561_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/989d/12081891/5bc5df06ad65/41598_2025_1561_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/989d/12081891/f26bb437b295/41598_2025_1561_Fig14_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/989d/12081891/c8df94a4a9a2/41598_2025_1561_Fig15_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/989d/12081891/3ca4ac1fd927/41598_2025_1561_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/989d/12081891/36654d9cf82b/41598_2025_1561_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/989d/12081891/d58a28ec7b46/41598_2025_1561_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/989d/12081891/fe990df64f21/41598_2025_1561_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/989d/12081891/2b55925ecc6f/41598_2025_1561_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/989d/12081891/cd83d9a0932a/41598_2025_1561_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/989d/12081891/606b9f65dadd/41598_2025_1561_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/989d/12081891/bc949dea16fa/41598_2025_1561_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/989d/12081891/929b7d72c4c8/41598_2025_1561_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/989d/12081891/709646bd5164/41598_2025_1561_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/989d/12081891/8d44b9d94b8b/41598_2025_1561_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/989d/12081891/950fcce87d40/41598_2025_1561_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/989d/12081891/5bc5df06ad65/41598_2025_1561_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/989d/12081891/f26bb437b295/41598_2025_1561_Fig14_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/989d/12081891/c8df94a4a9a2/41598_2025_1561_Fig15_HTML.jpg

相似文献

1
An efficient trustworthy cyberattack defence mechanism system for self guided federated learning framework using attention induced deep convolution neural networks.一种使用注意力诱导深度卷积神经网络的用于自引导联邦学习框架的高效可信网络攻击防御机制系统。
Sci Rep. 2025 May 15;15(1):16920. doi: 10.1038/s41598-025-01561-7.
2
Advanced artificial intelligence with federated learning framework for privacy-preserving cyberthreat detection in IoT-assisted sustainable smart cities.用于物联网辅助的可持续智慧城市中隐私保护网络威胁检测的具有联邦学习框架的先进人工智能
Sci Rep. 2025 Feb 6;15(1):4470. doi: 10.1038/s41598-025-88843-2.
3
An intelligent federated learning boosted cyberattack detection system for Denial-Of-Wallet attack using advanced heuristic search with multimodal approaches.一种用于防范钱包拒绝服务攻击的智能联邦学习增强型网络攻击检测系统,该系统采用先进的启发式搜索和多模态方法。
Sci Rep. 2025 Apr 24;15(1):14265. doi: 10.1038/s41598-025-96986-5.
4
Metaparameter optimized hybrid deep learning model for next generation cybersecurity in software defined networking environment.用于软件定义网络环境中下一代网络安全的元参数优化混合深度学习模型
Sci Rep. 2025 Apr 23;15(1):14166. doi: 10.1038/s41598-025-96153-w.
5
Attack resilient IoT security framework using multi head attention based representation learning with improved white shark optimization algorithm.使用基于多头注意力的表示学习和改进的白鲨优化算法的抗攻击物联网安全框架。
Sci Rep. 2025 Apr 24;15(1):14255. doi: 10.1038/s41598-025-98180-z.
6
Intelligent deep federated learning model for enhancing security in internet of things enabled edge computing environment.用于增强物联网支持的边缘计算环境安全性的智能深度联邦学习模型。
Sci Rep. 2025 Feb 3;15(1):4041. doi: 10.1038/s41598-025-88163-5.
7
Artificial intelligence-driven cybersecurity system for internet of things using self-attention deep learning and metaheuristic algorithms.基于自注意力深度学习和元启发式算法的物联网人工智能驱动的网络安全系统。
Sci Rep. 2025 Apr 16;15(1):13215. doi: 10.1038/s41598-025-98056-2.
8
A hybrid feature weighted attention based deep learning approach for an intrusion detection system using the random forest algorithm.基于混合特征加权注意力的深度学习方法与随机森林算法在入侵检测系统中的应用。
PLoS One. 2024 May 23;19(5):e0302294. doi: 10.1371/journal.pone.0302294. eCollection 2024.
9
Hybrid quantum enhanced federated learning for cyber attack detection.用于网络攻击检测的混合量子增强联邦学习
Sci Rep. 2024 Dec 30;14(1):32038. doi: 10.1038/s41598-024-83682-z.
10
SecEdge: A novel deep learning framework for real-time cybersecurity in mobile IoT environments.SecEdge:一种用于移动物联网环境中实时网络安全的新型深度学习框架。
Heliyon. 2024 Dec 5;11(1):e40874. doi: 10.1016/j.heliyon.2024.e40874. eCollection 2025 Jan 15.

本文引用的文献

1
Auditable and Verifiable Federated Learning Based on Blockchain-Enabled Decentralization.基于区块链去中心化的可审计和可验证联邦学习
IEEE Trans Neural Netw Learn Syst. 2025 Jan;36(1):102-115. doi: 10.1109/TNNLS.2024.3407670. Epub 2025 Jan 7.
2
Deep Anomaly Detection Framework Utilizing Federated Learning for Electricity Theft Zero-Day Cyberattacks.利用联邦学习的深度异常检测框架用于电力盗窃零日网络攻击。
Sensors (Basel). 2024 May 20;24(10):3236. doi: 10.3390/s24103236.
3
Multi-Classification and Tree-Based Ensemble Network for the Intrusion Detection System in the Internet of Vehicles.
用于车联网入侵检测系统的多分类与基于树的集成网络
Sensors (Basel). 2023 Oct 28;23(21):8788. doi: 10.3390/s23218788.