• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

利用可解释人工智能在大规模网络环境中进行网络威胁的早期检测与缓解。

Leveraging explainable artificial intelligence for early detection and mitigation of cyber threat in large-scale network environments.

作者信息

Nalinipriya G, Rama Sree S, Radhika K, Laxmi Lydia E, Karim Faten Khalid, Ishak Mohamad Khairi, Mostafa Samih M

机构信息

Department of Information Technology, Saveetha Engineering College, Chennai, 602 105, India.

Department of CSE, Aditya University, Surampalem, India.

出版信息

Sci Rep. 2025 Jul 9;15(1):24662. doi: 10.1038/s41598-025-08597-9.

DOI:10.1038/s41598-025-08597-9
PMID:40634417
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC12241574/
Abstract

Cybersecurity has often gained much popularity over the years in a fast-evolving discipline, as the number of cybercriminals and threats rises consistently to stay ahead of law enforcement. Recently, cybercriminals have become more complex with their approaches, though the underlying motives for conducting cyber threats remain largely the same. Classical cybersecurity solutions have become poor at identifying and alleviating evolving cyber threats. Machine learning (ML) plays a crucial role in cybersecurity by making malware detection more scalable, efficient, and automated, reducing reliance on conventional human intervention methods. The cybersecurity domain comprises ML challenges that require effective theoretical and methodical handling. Various statistical and ML approaches, like Bayesian classification, deep learning (DL), and support vector machines (SVM), have efficiently alleviated cyber threats. The insights and hidden trends detected from network data and the architecture of a data-driven ML to avoid this attack are essential to establishing an intelligent security system. This study develops a novel Leveraging Explainable Artificial Intelligence for Early Detection and Mitigation of Cyber Threats in Large-Scale Network Environments (LXAIDM-CTLSN) method. The projected LXAIDM-CTLSN method aims to recognize and classify cyber-attacks in achieving cybersecurity. Initially, the normalization is performed using Min-max normalization to standardize the data. The Mayfly Optimization Algorithm (MOA) is then utilized for feature selection, effectively mitigating computational complexity. A Sparse Denoising Autoencoder (SDAE) model recognizes and classifies cyber threats. Additionally, the Hiking Optimization Algorithm (HOA) is employed to fine-tune the hyperparameters of the SDAE model. Finally, the XAI method LIME is integrated to enhance the explainability and understanding of the Blackbox technique, ensuring superior classification of cyberattacks. Extensive experiments were conducted to evaluate the overall robustness of the proposed XAIDM-CTLSN method using the NSLKDD2015 and CICIDS2017 datasets. The experimental validation of the XAIDM-CTLSN method portrayed a superior accuracy value of 99.09% over other techniques.

摘要

多年来,随着网络犯罪分子和威胁数量持续上升以领先于执法部门,网络安全在这个快速发展的领域中越来越受欢迎。最近,网络犯罪分子的作案手法变得更加复杂,尽管实施网络威胁的潜在动机基本相同。传统的网络安全解决方案在识别和缓解不断演变的网络威胁方面已经变得很差。机器学习(ML)通过使恶意软件检测更具可扩展性、高效性和自动化,减少对传统人工干预方法的依赖,在网络安全中发挥着关键作用。网络安全领域包含需要有效理论和方法处理的机器学习挑战。各种统计和机器学习方法,如贝叶斯分类、深度学习(DL)和支持向量机(SVM),已经有效地缓解了网络威胁。从网络数据中检测到的见解和隐藏趋势以及用于避免这种攻击的数据驱动机器学习架构对于建立智能安全系统至关重要。本研究开发了一种新颖的利用可解释人工智能进行大规模网络环境中网络威胁的早期检测和缓解(LXAIDM-CTLSN)方法。预计的LXAIDM-CTLSN方法旨在识别和分类网络攻击以实现网络安全。最初,使用最小-最大归一化进行归一化以标准化数据。然后利用蜉蝣优化算法(MOA)进行特征选择,有效降低计算复杂度。稀疏去噪自动编码器(SDAE)模型识别和分类网络威胁。此外,采用徒步优化算法(HOA)对SDAE模型的超参数进行微调。最后,集成可解释人工智能方法LIME以增强对黑盒技术的可解释性和理解,确保对网络攻击的卓越分类。使用NSLKDD2015和CICIDS2017数据集进行了广泛的实验,以评估所提出的XAIDM-CTLSN方法的整体鲁棒性。XAIDM-CTLSN方法的实验验证显示出比其他技术更高的99.09%的准确率。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91e2/12241574/f500c581ce25/41598_2025_8597_Fig18_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91e2/12241574/2a543f4bf01a/41598_2025_8597_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91e2/12241574/434f1d158e92/41598_2025_8597_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91e2/12241574/00a522329545/41598_2025_8597_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91e2/12241574/860944551e10/41598_2025_8597_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91e2/12241574/3b4be9864f04/41598_2025_8597_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91e2/12241574/b40f4b6ce4c0/41598_2025_8597_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91e2/12241574/6f5e6fe4447f/41598_2025_8597_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91e2/12241574/9f9e4bdbd1ff/41598_2025_8597_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91e2/12241574/a4482b7a7d53/41598_2025_8597_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91e2/12241574/bfc274180050/41598_2025_8597_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91e2/12241574/5e9ee8e2681a/41598_2025_8597_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91e2/12241574/2af280a84ad3/41598_2025_8597_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91e2/12241574/22c81d76a0e1/41598_2025_8597_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91e2/12241574/a16af3fba152/41598_2025_8597_Fig14_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91e2/12241574/fc30c7a62759/41598_2025_8597_Fig15_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91e2/12241574/edaad4f06892/41598_2025_8597_Fig16_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91e2/12241574/8f94d5214281/41598_2025_8597_Fig17_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91e2/12241574/f500c581ce25/41598_2025_8597_Fig18_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91e2/12241574/2a543f4bf01a/41598_2025_8597_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91e2/12241574/434f1d158e92/41598_2025_8597_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91e2/12241574/00a522329545/41598_2025_8597_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91e2/12241574/860944551e10/41598_2025_8597_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91e2/12241574/3b4be9864f04/41598_2025_8597_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91e2/12241574/b40f4b6ce4c0/41598_2025_8597_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91e2/12241574/6f5e6fe4447f/41598_2025_8597_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91e2/12241574/9f9e4bdbd1ff/41598_2025_8597_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91e2/12241574/a4482b7a7d53/41598_2025_8597_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91e2/12241574/bfc274180050/41598_2025_8597_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91e2/12241574/5e9ee8e2681a/41598_2025_8597_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91e2/12241574/2af280a84ad3/41598_2025_8597_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91e2/12241574/22c81d76a0e1/41598_2025_8597_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91e2/12241574/a16af3fba152/41598_2025_8597_Fig14_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91e2/12241574/fc30c7a62759/41598_2025_8597_Fig15_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91e2/12241574/edaad4f06892/41598_2025_8597_Fig16_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91e2/12241574/8f94d5214281/41598_2025_8597_Fig17_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91e2/12241574/f500c581ce25/41598_2025_8597_Fig18_HTML.jpg

相似文献

1
Leveraging explainable artificial intelligence for early detection and mitigation of cyber threat in large-scale network environments.利用可解释人工智能在大规模网络环境中进行网络威胁的早期检测与缓解。
Sci Rep. 2025 Jul 9;15(1):24662. doi: 10.1038/s41598-025-08597-9.
2
Two stage malware detection model in internet of vehicles (IoV) using deep learning-based explainable artificial intelligence with optimization algorithms.基于深度学习的可解释人工智能与优化算法的车联网(IoV)两阶段恶意软件检测模型
Sci Rep. 2025 Jul 1;15(1):20615. doi: 10.1038/s41598-025-00269-y.
3
Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.人为因素对医疗机构网络安全的影响:系统综述。
Sensors (Basel). 2021 Jul 28;21(15):5119. doi: 10.3390/s21155119.
4
Leveraging self attention driven gated recurrent unit with crocodile optimization algorithm for cyberattack detection using federated learning framework.利用自注意力驱动门控循环单元和鳄鱼优化算法,通过联邦学习框架进行网络攻击检测。
Sci Rep. 2025 Jul 3;15(1):23805. doi: 10.1038/s41598-025-99452-4.
5
A deep dive into artificial intelligence with enhanced optimization-based security breach detection in internet of health things enabled smart city environment.在支持智慧城市环境的健康物联网中,通过基于增强优化的安全漏洞检测深入探讨人工智能。
Sci Rep. 2025 Jul 2;15(1):22909. doi: 10.1038/s41598-025-05850-z.
6
Federated Learning and EEL-Levy Optimization in CPS ShieldNet Fusion: A New Paradigm for Cyber-Physical Security.信息物理系统ShieldNet融合中的联邦学习与EEL-Levy优化:一种网络物理安全的新范式
Sensors (Basel). 2025 Jun 9;25(12):3617. doi: 10.3390/s25123617.
7
Artificial intelligence-driven cybersecurity: enhancing malicious domain detection using attention-based deep learning model with optimization algorithms.人工智能驱动的网络安全:使用基于注意力的深度学习模型和优化算法增强恶意域名检测
Sci Rep. 2025 Jul 3;15(1):23806. doi: 10.1038/s41598-025-99420-y.
8
Stabilizing machine learning for reproducible and explainable results: A novel validation approach to subject-specific insights.稳定机器学习以获得可重复和可解释的结果:一种针对特定个体见解的新型验证方法。
Comput Methods Programs Biomed. 2025 Jun 21;269:108899. doi: 10.1016/j.cmpb.2025.108899.
9
Multiclass skin lesion classification and localziation from dermoscopic images using a novel network-level fused deep architecture and explainable artificial intelligence.使用新型网络级融合深度架构和可解释人工智能从皮肤镜图像中进行多类别皮肤病变分类与定位
BMC Med Inform Decis Mak. 2025 Jul 1;25(1):215. doi: 10.1186/s12911-025-03051-2.
10
Enhancing anomaly detection and prevention in Internet of Things (IoT) using deep neural networks and blockchain based cyber security.利用基于深度神经网络和区块链的网络安全增强物联网(IoT)中的异常检测与预防。
Sci Rep. 2025 Jul 1;15(1):22369. doi: 10.1038/s41598-025-04164-4.

本文引用的文献

1
On Evaluating Black-Box Explainable AI Methods for Enhancing Anomaly Detection in Autonomous Driving Systems.关于评估用于增强自动驾驶系统异常检测的黑箱可解释人工智能方法
Sensors (Basel). 2024 May 29;24(11):3515. doi: 10.3390/s24113515.
2
Artificial Intelligence-Based Secured Power Grid Protocol for Smart City.面向智慧城市的基于人工智能的安全电网协议
Sensors (Basel). 2023 Sep 22;23(19):8016. doi: 10.3390/s23198016.
3
A Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning Approach.
一种使用混合学习方法识别恶意 DNS over HTTPS 流量的轻量级两阶段方案。
Sensors (Basel). 2023 Mar 27;23(7):3489. doi: 10.3390/s23073489.
4
Artificial intelligence enabled intrusion detection systems for cognitive cyber-physical systems in industry 4.0 environment.适用于工业4.0环境中认知网络物理系统的人工智能入侵检测系统。
Cogn Neurodyn. 2022 Oct;16(5):1045-1057. doi: 10.1007/s11571-022-09780-8. Epub 2022 Jan 30.