Next Article in Journal
The Dynamic Relationship between Carbon Emissions, Financial Development, and Renewable Energy: A Study of the N-5 Asian Countries
Previous Article in Journal
The Food Systems, One Health, and Resilience (FOR) Approach—Led by the FOR-Runners
Previous Article in Special Issue
Machine Learning for APT Detection
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Blockchain-Assisted Machine Learning with Hybrid Metaheuristics-Empowered Cyber Attack Detection and Classification Model

1
Department of Computer Science, College of Computer Science & Information Technology, Jazan University, Jazan 45142, Saudi Arabia
2
Department of Information Systems, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, Riyadh 11671, Saudi Arabia
*
Author to whom correspondence should be addressed.
Sustainability 2023, 15(18), 13887; https://doi.org/10.3390/su151813887
Submission received: 13 July 2023 / Revised: 8 September 2023 / Accepted: 12 September 2023 / Published: 19 September 2023

Abstract

:
Cyber attack detection is the process of detecting and responding to malicious or unauthorized activities in networks, computer systems, and digital environments. The objective is to identify these attacks early, safeguard sensitive data, and minimize the potential damage. An intrusion detection system (IDS) is a cybersecurity tool mainly designed to monitor system activities or network traffic to detect and respond to malicious or suspicious behaviors that may indicate a cyber attack. IDSs that use machine learning (ML) and deep learning (DL) have played a pivotal role in helping organizations identify and respond to security risks in a prompt manner. ML and DL techniques can analyze large amounts of information and detect patterns that may indicate the presence of malicious or cyber attack activities. Therefore, this study focuses on the design of blockchain-assisted hybrid metaheuristics with a machine learning-based cyber attack detection and classification (BHMML-CADC) algorithm. The BHMML-CADC method focuses on the accurate recognition and classification of cyber attacks. Moreover, the BHMML-CADC technique applies Ethereum BC for attack detection. In addition, a hybrid enhanced glowworm swarm optimization (HEGSO) system is utilized for feature selection (FS). Moreover, cyber attacks can be identified with the design of a quasi-recurrent neural network (QRNN) model. Finally, hunter–prey optimization (HPO) algorithm is used for the optimal selection of the QRNN parameters. The experimental outcomes of the BHMML-CADC system were validated on the benchmark BoT-IoT dataset. The wide-ranging simulation analysis illustrates the superior performance of the BHMML-CADC method over other algorithms, with a maximum accuracy of 99.74%.

1. Introduction

The extreme consumption of the Internet in numerous fields is motivating technologists and researchers [1]. Moreover, the usage of intelligent systems can assist users and various applications, ensuring proficient computation, and maintaining the quality of service throughout the networks [2]. The conventional techniques were less efficient, providing average performance and time consumption, and were not suitable for offering solutions in complex, multi-purpose, or real-time difficulties [3]. Consequently, the requirement of a proficient attack identification system can decrease the destructive special effects of cyber threats [4]. Cyber security involves security mechanisms and combinations of different technological developments to protect information, destruction of data and networks, and programs against dissimilar attack activities like modification of information, unauthorized access, and robbery through the network or Internet [5]. Components of cybersecurity consider mostly network security systems and host protection. Presently, it is utilized for protecting various fields, namely the Internet of Things (IoTs), cloud computing (CC), and wireless sensor networks (WSNs) [6]. Several security estimations are obtainable for providing that security to the networks or models, like firewalls, IDS, and anti-virus software. Nevertheless, cyber threats are regularly harmful and interrupt internet services day by day. This encourages numerous researchers to provide their broad offers to pattern security systems [7].
Effective cyber attack detection and prevention contribute to sustainability by minimizing economic losses, reducing electronic waste, maintaining trust, improving energy efficiency, promoting responsible digital transformation, ensuring supply chain resilience, and preventing potential environmental damage [8]. Cyber attack detection and sustainability share common principles of proactive risk management, ethical responsibility, resilience, and the well-being of individuals, organizations, and the planet. By integrating robust cybersecurity practices into the fabric of sustainable initiatives, society can work toward a safer, more secure, and environmentally responsible future [9]. In addition, sustainable businesses prioritize long-term viability, and cyber attack detection plays a vital role in maintaining operational continuity. By preventing and swiftly responding to cyber threats, organizations can avoid costly disruptions, financial losses, and reputational damage [10]. Furthermore, detecting and mitigating attacks promptly can reduce resource consumption, including energy, time, and human effort. By conserving resources, both within organizations and in the broader context, cyber attack detection aligns with principles of environmental sustainability. Moreover, detecting and preventing attacks reduces unnecessary network and system activity, contributing to lower carbon emissions and a smaller environmental footprint [11]. Finally, sustainable practices include ethical considerations, and protecting user data and privacy is a fundamental ethical responsibility. Cyber attack detection helps safeguard personal information, fostering trust between businesses and their customers. This trust is crucial for sustaining healthy relationships and long-term business success.
The widely different techniques applied for detecting attacks extensively are classified into three main kinds, such as misuse-based, hybrid-based, and anomaly-based identification [12]. In the detection technique of misuse-based cyber attacks, they can be examined with pre-recorded attack signatures, and the technique is utilized significantly for detecting the identified attacks. It is helpful to identify the well-known attacks with the fewest false alerts or alarms. The technique needs a few conversions of the rules of attacks and signatures on the datasets [7]. Researchers have been encouraged to use decentralized IDSs that incorporate various machine learning (ML) methods comprising optimization algorithms, deep learning (DL), and artificial neural networks (ANNs), on account of current developments in intelligent machines. Generally, ANNs are limited in their capability to handle the complexities of IDS systems [13]. DL is a subcategory of ML that contains the unsupervised and supervised learning approaches, and it is based on the number of layers of ANNs [14]. Every layer consists of certain neurons with activated functions that are applied to generate non-linear results. The technology is motivated by the biological neuron structures of the brain, but it is broadly relevant to communication models and data processing in the natural nervous system [15]. DL algorithms acquire crucial abstract illustrations from the original information over the usage of the multiple-level learning technique hierarchically.
This study develops blockchain-assisted hybrid metaheuristics with machine learning-based cyber attack detection and a classification (BHMML-CADC) algorithm. The objective of the BHMML-CADC method lies in its accurate detection and classification of cyber attacks. To accomplish this, the BHMML-CADC method employs BC technology using the Ethereum blockchain for attack detection. In addition, a hybrid-enhanced glowworm swarm optimization (HEGSO) system was used for feature selection (FS). Moreover, cyber attacks can be identified by the design of a quasi-recurrent neural network (QRNN) model. Finally, a hunter–prey optimization (HPO) method can be employed for the optimum selection of the QRNN parameters, which has a rapid convergence rate and a considerable optimization capacity. The experimental outcome of the BHMML-CADC method was validated on benchmark datasets.

2. Related Research

This section briefly examines existing studies related to cyber attack detection techniques using ML and DL models. Babu et al. [16] introduced a permission-based BC technology that exploits the arbiter PUF model for protecting the key pair of IoT devices through a lightweight technique. An integrated detection technique is used for identifying the DDoS on IoT via an ML-based ensemble algorithm. Then, a BC technique was integrated that safely shares the alarm signals to every single node of the IoT, with secure authentication. The authors in [17] performed a BC on cluster head (CH) and base station (BS) for registering the node using authorizations, and to address security challenges. Furthermore, ML classifiers called histogram gradient boost (HGB), were applied on the BS to categorize the node as legitimate or malicious. In addition, a wide range of experiments were conducted by the WSN. Dehghani et al. [18] introduced a selective ensemble DL algorithm using gray wolf optimization (GWO) technique for identifying the FDIA in DC-MG. Initially, to collect adequate information within the typical performance needed for model training, load change was considered to identify datasets for load variation schemes and cyber attacks during the data generation process.
Bhayo et al. [19] devised an ML-based algorithm for the recognition of DDoS attacks in SDN-WISE IoT controllers. The study incorporated ML-based detection techniques into the controller, and set up testbed environments for stimulating the traffic generation of DDoS attacks. Saheed and Arowolo [20] introduced a deep RNN (DRNN) and supervised ML techniques (KNN, RF, DT, and ridge classifiers) that are used to design an effective IDS in IoMT environments for the classification and prediction of unexpected cyber threats. Normalization and pre-processing of data were implemented. Later, we enhanced features through the biologically simulated PSO model. Khan et al. [21] improved the accuracy of UAVs with a decentralized ML structure based on BC. The presented method framework is able to considerably increase the storage and reliability of information for intelligent decision-making amongst different UAVs.
The authors in [22] developed a cyber attack detection technique for IoMT-based network, utilizing ensemble learning and a fog-cloud platform for addressing security challenges. The ensemble method exploits an LSTM network as individual learners, and stacks DTs on top of them to categorize normal events and attacks. Reddy and Shyam [23] developed a new architecture for the mitigation of attack nodes using secured SaaS architecture. The important role of this study was to provide an attack detection system that is performed in DBN, where the weight and the activation function are fine-tuned by the Median Fitness-oriented Sea Lion Optimizer technique (MFSLnO). Once the DBN recognizes the attack nodes, then control is transported to the lightweight bait method that consistently alleviates the attack node without disturbing the connection. Ashraf et al. [24] developed an SDN-based IoT anomaly detection technique that identifies attacks and abnormal behaviors. Three ML approaches, SVM, KNN, and MLP, are utilized to develop an IDS, which is employed at the SDN controller to learn and monitor the behaviors of IoT gadgets, and any other deviations from the behaviors can be considered as an attack. After examining the existing research, it was noticed that the current methods do not focus on the hyperparameter selection method, which largely affects the accuracy of the classification algorithm. In particular, the hyperparameters involving learning rate selection, epoch count, and batch size are important to obtain effective outcomes. A metaheuristic algorithm is applied, since the trial-and-error technique for hyperparameter tuning is an erroneous and difficult process. Thus, the HPO technique is used for the parameter selection of the QRNN model in this research.

3. The Proposed Model

In this study, the BHMML-CADC method was introduced for the detection and classification of cyber attacks. The purpose of the BHMML-CADC technique is to exploit BC technology with FS and an optimal DL model for cyber attack recognition. To accomplish this, the BHMML-CADC technique follows several stages of operations, namely BC technology, pre-processing, HPO-based hyperparameter tuning, QRNN-based detection, and HEGSO-based FS. Figure 1 demonstrates the overall work flow of the BHMML-CADC algorithm.

3.1. BC Technology for Cyber Attack Detection

BC is a list of records represented by the Merkle tree related to the cryptographic norm, but all the blocks hold the cryptographic hash of their previous block [25]. BC resists all forms of data modification; meanwhile, modification of data in a single block should modify the subsequent block. Validation of a new block occurs before adding in the chain, and BC is considered more secure than the traditional distributed system, as it displays higher Byzantine fault tolerance despite not being un-modifiable. The distributed ledger records the transaction between both entities in a verifiable and permanent manner, and also aids in increasing trust in social and economic activities.
The development tools such as Oraclize API, truffle suite, and web3.js API were exploited, and smart contract (SC) was introduced in solid language to carry out the necessary transactions among each participant for the implementation of Ethereum BC. The initial activity implemented in the SC is about beginning the attack detection by identifying the financial deals, and the input and output accuracy. InterPlanetory File System (IPFS) is utilized as decentralized storage after learning the local data pattern, which records the parameter related to the attack detection as a hash value that is distributed to decentralized applications (DApp). The assessment of off-chain is implemented, and the result is declared in the DApp. The next action performs the retrieval of assessment in the single node by Web3.js API, within the predetermined threshold by the minimum acceptable fitness rate (MAFR). The analysis, which is superior to MAFR, then interacts with the processing agent through the payable function, which can be performed through BC.

3.2. Pre-Processing

Primarily, the BHMML-CADC technique undergoes preprocessing using min–max normalization [26]. For all the features, the maximum values are changed to 1 , the minimum values are changed to 0 , and each value is converted to a decimal between [0, 1]. The succeeding formula was utilized for normalizing the feature.
X n e w = X X m i n X m a x X m i n
In Equation (1), X represents the group of feature values attained, X m a x and   X m i n show the maximal and minimal values in X , respectively.

3.3. Feature Selection Using HEGSO Algorithm

The HEGSO method is exploited for the optimum selection of features. The classical GSO method is based on the natural behaviors of the glowworm during nighttime [27]. Based on the luciferin, the glowworm displays a type of interaction with other glowworms in the population. If the light discharged through the glowworm is greater, then the luciferin is greater. There exist three dissimilar stages, namely luciferin update, movement, and the update and neighborhood stage. The number of luciferins is equivalent to the fitness of their existing location on the objective function. Next is the movement phase. Using the HEGSO technique, optimization can be carried out. The optimization technique initiates once the path is found between the beginning and ending points of the vehicle nodes. The steps for the HEGSO technique are shown as follows:
Step1: Initialize the Search Agents (SA), viz., the size of population Q , an initial value of radial gamut of SA r o , individual glowworm X ; z shows the step size, iteration counter N i t , luciferin’s initial value I o , and time instance n .
X = x 1 ,   x 2 ,   ,   x Q
Step2: Evaluate the fitness function (FF) based on Equation (3):
F = t = 1 n L E V t V i  
where E V t denotes the average speed of vehicles on the road, V i indicates the vehicle, and L shows the overall length of the road segments.
Step3: This phase is the luciferin phase. Here, the new SA can be evaluated using the subsequent equation:
l j n + 1 = 1 ρ l j n + β J j n + 1
In Equation (4), β shows the luciferin decay constant within [ 0,1 ], l ( n ) implies the luciferin values of the SA at n time,  l j ( n + 1 ) is the luciferin value of the SA at n + 1 time, and J j indicates the FF.
Step4: The objective function of the new SA is evaluated according to similar fitness.
Step5: Based on the brightness, the SA moves towards the adjacent glowworm. The movement of SA can be determined by the EDs among the glowworms. During the movement phase, the SA heads for the computed neighborhood based on probabilistic means. It can be mathematically modelled by Equation (5):
x j n + 1 = x j n + Z x k n x j n x k n x j n
where Z denotes the step size.
Step6: The decision range and neighborhood range of the SA are updated in this step. The decision rules are used based on the following expression:
r d n + 1 = m i n r s , m a x O ,   r d n + B n e N j n
In Equation (6), r d shows the prior value of the neighborhood range, n e represents the SA with a higher luciferin value from the decision range,   r d ( n + 1 ) shows the upgrade values of the neighborhood range, B denotes the constant, and r s indicates the maximum sensing radius of the glowworms.
Step7: If the termination criteria are satisfied, then the fittest solution can be attained. If they are not satisfied, then the mutation and crossover operators can be used. The two-point crossover is exploited.
The FF used in the HEGSO technique is developed to take a balance between the classification accuracy (maximal) and the amount of feature selections (minimal) attained; Equation (10) signifies the FF to evaluate the solution.
F i t n e s s = α γ R D + β R C
In Equation (7), R   refers to the cardinality of the selected subset, γ R ( D ) indicates the classification error rate, | C | symbolizes the overall feature count, and parameters α and β are respective to the importance of classification quality and subset length. ∈ [1,0] and β = 1 α .

3.4. QRNN-Based Cyber Attack Detection

At this stage, the QRNN architecture is used for the detection and classification of cyber attacks. QRNN is a hybrid NN inspired by the LSTM, which brings the benefits of CNN and LSTM together [28]. CNN is fast and extremely parallelizable, while LSTM has the potential to model long-range dependency. However, LSTMs and RNNs have a slower recurrent step. Actually, h t relies on h t 1 , which relies in its turn on h t 2 , etc., thereby generating an execution bottleneck. Figure 2 depicts the infrastructure of QRNN.
The hidden-hidden matrix multiplication of LSTM is eliminated, and the convolution size of n over input x is provided to diminish the computation effort needed for the recurrent step, t. Furthermore, the forget and input gates are connected, which produces output gate o t   and forget gate f t . The QRNN with f o -pooling can be described by the subsequent expression:
f t , o t = σ U f , o x t n + 1 : t ,
c ~ t = t a n h U c x t n + 1 : t .  
c t = c t 1 f t + c ~ t 1 f t .  
h t = c t o t .  
Subsequently, the recurrent step is a weighted or gated sum, thus effectuating faster implementation. This provides a probability for the unbounded activation function, including the ReLu function, considering that the hidden layer cannot exponentially grow anymore.

3.5. Hyperparameter Tuning Using HPO Algorithm

Finally, the HPO algorithm optimally chooses the hyperparameters related to the QRNN models, including the learning rate, number of epochs, and batch size. The HPO algorithm is a new swarm-based optimization technique that mimics the behaviors between the prey and predators. The HPO imitates the predictor behaviors during hunting the prey; in the meantime, the prey moves towards the safer region to escape from the predator. Consequently, based on the modified site of the safer region, the safer region is updated dynamically, and the predator must update its position. In HPO, Iraj et al. [29] explored the safer region corresponding to the better objective values. As HPO is a metaheuristic algorithm, it begins with the collection of random solutions that are calculated using Equation (12):
Z i = l b + r a n d × u b l b   i = 1,2 ,   ,   N ,  
where u b and l b denote the upper and lower boundaries of the searching field ( vector form with dimension = 1,2 , ,   D ) , and r a n d [ 0,1 ] shows the uniformly distributed random value. The D and N   symbols are the numbers of the problem variables and the overall population size, respectively.
The primary group of solutions for detecting the bad and good solutions can calculate the FF. Next, the primary phase of the solution can be updated using the key stages of the HPA method through the set of independent runs. In the HPO, the search process comprises two different stages, the exploitation and exploration phases. During the exploration phase, the agent explores with higher randomness to find the local and global points in the searching space. On the other hand, the exploitation stage repossesses minimal randomization for circulating the potential solution. In this context, Iraj et al. developed the subsequent equation to model the exploration and exploitation stages of the model:
Z i m ( t + 1 ) = Z i m ( t ) + 0.5 [ ( 2 α β P r e y P ( m ) Z i m ( t ) ) + ( 2 ( 1 α ) β μ m Z i m ( t ) ) ]
In Equation (13), Z i m ( t ) ,   Z i m ( t + 1 ) refers to the corresponding present and future locations of the ith hunter. The prey location can be represented as P r e y p ; the β ,   α , and μ symbols are the balancing parameters, adaptive parameters, and mean of each location, respectively. This parameter is calculated with the following expression:
R a n d = R 1 < α ; i n d e x = ( R a n d = = 0 ) ;
β = R 2 i n d e x + R 3 i n d e x .
α = 1 i t 0.98 M A X I t .
where   i n d e x refers to the index number of the vector R 1 that meets the criteria of ( P = = 0 ) and   R a n d ; R 2 ,   R 1 , and R 3 denote the random vector within [ 0,1 ] . M A X I t denotes the maximal number of iterations. The balance parameter α is calculated with Equation (15), whose value drops from 1 to 0.02 through the number of iterations. As previously stated, HPO aims to catch the prey; thus, the prey upgrades the place through the average of each location ( μ ) using Equation (14), and later calculates the distance of all the searching agents from the mean position [30].
μ = 1 n i = 1 n Z i .
Based on the Euclidean distance, the distance can be evaluated as follows:
D e u c ( i ) = m = 1 d ( Z i m μ m ) 2 0.5 .
The searching agent with a maximum distance in the mean of placement is assumed to be the prey ( P r e y P ( m ) ) .
P r e y P ( m ) = Z i | i   i s   s o r t e d   D e u c ( k b e s t ) .
In Equation (18), e s t = r o u n d ( α × N ) , N denotes the number of solutions. Once the prey are attacked, they attempt to escape toward the safer region. Iraj et al. supposed the optimal safer place is the global optimal location, and the hunter may upgrade the current location to choose another prey via the subsequent equation:
Z i m t + 1 = G P ( j ) + α β c o s 2 π R 4 G P ( j ) Z i m t ,
In Equation (19), G P denotes the safe place (global optimal location) and R 4 [ 1,1 ] shows the random integer. Iraj et al. considered the subsequent Equation (8) to differentiate between the hunters and prey.
F l a g = Z i m ( t + 1 ) = Z i m ( t ) + 0.5 [ ( 2 α β P r e y P m Z i m ( t ) ) + ( 2 ( 1 α ) β μ m Z i m ( t ) ) ]   i f   R 5 γ Z i m t + 1 = G P ( j ) + α β cos 2 π R 4 G P ( j ) Z i m t i f   e l s e ,      
In Equation (20), R 5 denotes a random number that lies in [ 0,1 ], and γ shows the regulatory parameter set as 0.1 . The HPO approach develops an FF to obtain a greater classifier solution. It defines a positive integer to indicate the fittest solution for candidate performances. In this case, the decline in the classifier error rate could be regarded to be FF.
f i t n e s s x i = C l a s s i f i e r E r r o r R a t e x i = N o .   o f   m i s c l a s s i f i e d   s a m p l e s T o t a l   N o .   o f   s a m p l e s 100

4. Results and Discussion

The proposed model was simulated using Python 3.6.5 tool on a PC i5-8600k, GeForce 1050Ti 4 GB, 250 GB SSD, 1 TB HDD, with 16 GB RAM. The followingparameter settings were provided: batch size: 5, dropout: 0.5, learning rate: 0.01, epoch count: 50, and activation: ReLU.
In this section, the cyber attack detection performance of the BHMML-CADC algorithm is tested on the BOT-IoT dataset [31,32], comprising 4500 samples and 9 classes, as represented in Table 1.
The cyber attack classification outcomes of the BHMML-CADC technique are demonstrated in Figure 3. The experimental outcome was that the BHMML-CADC method achieved effective outcomes, with the distinct categorization of the class labels.
In Table 2 and Figure 4, the overall cyber attack detection outcome of the BHMML-CADC method is highlighted at 80:20 of the TR set/TS set. The outcomes shows that the BHMML-CADC method categorizes different kinds of attacks proficiently.
Figure 5 presents the training accuracies T R _ a c c u y and V L _ a c c u y of the BHMML-CADC method for the 80:20 TR set/TS set. The T L _ a c c u y can be defined by the approximation of the BHMML-CADC method on the TR database, whereas the V L _ a c c u y is calculated by estimating the performance of the different testing databases. The experimental outcomes demonstrated that T R _ a c c u y and V L _ a c c u y increase with an increase in epochs. Consequently, the performance of the BHMML-CADC method improves to enhance the TR and TS databases with upsurges in many epochs.
In Figure 6, examination of the T R _ l o s s and V R _ l o s s of the BHMML-CADC algorithm for the 80:20 TR set/TS set is presented. The T R _ l o s s defines the error between the predicted performance and original values on the TR database. The V R _ l o s s indicates the measured performance of the BHMML-CADC method on the validation data. The outcomes show that the T R _ l o s s and V R _ l o s s tend to decrease with maximum epochs. This depicts the superior performance of the BHMML-CADC approach, and its capability to produce an accurate classification. The reduced values of the T R _ l o s s and V R _ l o s s show the maximum performance of the BHMML-CADC method in obtaining the patterns and relationships.
A summary precision–recall (PR) curve of the BHMML-CADC approach is shown for the 80:20 TR set/TS set in Figure 7. The analysis shows the BHMML-CADC method outcomes in raising the PR values. Moreover, it was observed that the BHMML-CADC method achieved superior PR values on all of the class labels.
In Figure 8, an ROC investigation of the BHMML-CADC method is shown for the 80:20 TR set/TS set. The figure portrays that the BHMML-CADC method yielded increased ROC values. Moreover, the BHMML-CADC method can be extended for the enhancement of ROC values on all class labels.
In Table 3 and Figure 9, the overall cyber attack identification performance of the BHMML-CADC method is evaluated for the 70:30 TR set/TS set. The outcomes denote that the BHMML-CADC method classifies various types of attacks efficiently. For instance, for the 70% TR set, the BHMML-CADC method provides average a c c u y , p r e c n , r e c a l , MCC, and G m e a s u r e of 99.68%, 98.57%, 98.57%, 98.39%, and 98.57%, respectively. Therefore, for the 30% TS set, the BHMML-CADC approach appropriately provides average a c c u y , p r e c n , r e c a l , MCC, and G m e a s u r e of 99.74%, 98.80%, 98.81%, 98.65%, and 98.80%, respectively.
Figure 10 demonstrates the training accuracies T R _ a c c u y and V L _ a c c u y of the BHMML-CADC approach for the 70:30 TR set/TS set. The T L _ a c c u y is defined by the estimation of the BHMML-CADC method on the TR database, whereas the V L _ a c c u y is calculated by approximating the performance on the individual testing dataset. The outcomes show that T R _ a c c u y and V L _ a c c u y increase with increasing epochs. As an outcome, the performance of the BHMML-CADC method was required to enhance the TR and TS databases with upsurges in many epochs.
In Figure 11, the T R _ l o s s and V R _ l o s s   outcomes of the BHMML-CADC system for the 70:30 TR set/TS set are revealed. The T R _ l o s s defines the error between the predicted performance and original values on the TR data. The V R _ l o s s illustrates the measured performance of the BHMML-CADC method on separate validation data. The outcomes indicate that the T R _ l o s s and V R _ l o s s tend to decrease with growing epochs. These represent the enhanced outcomes of the BHMML-CADC method and its capability to produce an accurate classification. The reduced values of the T R _ l o s s and V R _ l o s s exhibit the greater performance of the BHMML-CADC approach on catching patterns and relationships.
A summary of the analysis of the PR curve of the BHMML-CADC approach is shown for the 70:30 TR set/TS set in Figure 12. The analysis illustrates that the BHMML-CADC methodology raises the PR values. Moreover, it can be seen that the BHMML-CADC method can obtain better PR values on all class labels.
In Figure 13, an ROC investigation of the BHMML-CADC method is demonstrated for the 70:30 TR set/TS set. The figure shows that the BHMML-CADC method enhanced the ROC values. Additionally, the BHMML-CADC method can be extended for the enhancement of ROC values on all class labels.
In Table 4 and Figure 14, detailed classification results of the BHMML-CADC technique are clearly illustrated [33,34,35]. The experimental values highlight that the ensemble learning model achieves worse results. Simultaneously, the SAE, XGBoost, SVM, and CNN models show slightly boosted results. Along with that, the KNN model reported considerable performance with a c c u y , p r e c n , r e c a l , and MCC values of 99.26%, 96.74%, 95.60%, and 97.75%, respectively. Nevertheless, the BHMML-CADC technique accomplished improved performance with maximum a c c u y , p r e c n , r e c a l , and MCC values of 99.74%, 98.80%, 98.81%, and 98.65%, respectively. Therefore, the BHMML-CADC technique is an effective tool for the automated cyber attack detection process.
Table 5 and Figure 15 demonstrate the comparative TRT and TST investigations of the BHMML-CADC method with other current algorithms. The outcomes highlight that the BHMML-CADC system achieves superior performance over the other models.
Based on the TRT outcomes, the BHMML-CADC technique demonstrates a reduced TRT of 6.60 s, while the Ensemble learning, Sparse autoencoder, XGBoost, SVM, CNN, LSTM, and KNN approaches obtained higher TRTs of 18.06 s, 10.14 s, 18.78 s, 18.78 s, 12.73 s, 12.82 s, and 13.05 s, respectively. Afterwards, based on the TST, the BHMML-CADC approach achieved a minimized TST of 3.01 s, whereas the XGBoost, Ensemble learning, Sparse autoencoder, LSTM, KNN, SVM, and CNN techniques achieved greater TST values of 8.86 s, 6.88 s, 7.52 s, 9.44 s, 7.87 s, 5.10 s, and 8.88 s, respectively.
Figure 16 illustrates the security rate of the proposed model with and without BC technology. The security rate of the proposed model with BC was found to be higher than that of the proposed model without BC. The use of BC technology helps to achieve an enhanced security rate of the proposed model. It was also observed that the security rate increases with an increase in the number of transactions (Table 6).
In summary, the proposed model shows improved performance over the other techniques, which is due to the integration of the HEGSO-based FS and HPO-based hyperparameter tuning. The HEGSO technique chooses the related and useful features from the available set of features. With the removal of irrelevant features, the BHMML-CADC technique can focus on crucial factors that contribute to the classification process. This leads to an increase in classification performance. Simultaneously, the HPO optimizer chooses the optimal value for the hyperparameter of the given QRNN model. Hyperparameters are settings that are not learned during training, but must be set before training. They may have a considerable effect on system performance, and selecting the optimum values can result in better accuracy. By combining HPO optimizer-based hyperparameter tuning and the HEGSO algorithm, the BHMML-CADC model achieved the best outcomes by focusing on the most relevant features and selecting the optimum settings for the model. These outcomes ensured superior performance of the BHMML-CADC method over the other current approaches.

5. Conclusions

In this research, we developed the BHMML-CADC algorithm for the identification and classification of cyber attacks. The purpose of the BHMML-CADC technique is to exploit BC technology with FS and an optimal DL model for cyber attack recognition. To accomplish this, the BHMML-CADC technique follows several stages of operations, namely BC technology, pre-processing, HEGSO-based FS, QRNN-based detection, and HPO-based hyperparameter tuning. Furthermore, the BHMML-CADC technique employs BC technology using Ethereum BC for attack detection. The design of HEGSO-based FS and HPO-based parameter optimization processes helps in achieving enhanced detection outcomes. The experimental results of the BHMML-CADC method were validated on the benchmark BOT-IoT dataset. The wide-ranging simulation analysis illustrates the significant performance of the BHMML-CADC method over other approaches with a maximum accuracy of 99.74%, a precision of 98.80%, a recall of 98.81%, and an MCC of 98.65%. Future research can explore the applicability of blockchain-assisted machine learning for cyber attack detection in different domains beyond traditional IT networks, such as critical infrastructure protection, autonomous vehicles, or smart cities. In addition, privacy-preserving methods for cyber attack detection using blockchain can be designed to ensure that sensitive data, such as network traffic logs, can be securely analyzed without exposing sensitive information.

Author Contributions

Conceptualization, A.A.; Methodology, A.A.; Validation, B.A.; Formal analysis, A.A.; Investigation, F.A.; Data curation, F.A.; Writing—review & editing, B.A.; Funding acquisition, B.A. All authors have read and agreed to the published version of the manuscript.

Funding

Princess Nourah Bint Abdulrahman University Researchers Supporting Project number (PNURSP2023R440), Princess Nourah Bint Abdulrahman University, Riyad.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

The authors extend their appreciation to the Princess Nourah Bint Abdulrahman University Researchers Supporting for funding and supporting this work Project number (PNURSP2023R440), Princess Nourah Bint Abdulrahman University, Riyad.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Nguyen, X.H.; Le, K.H. Robust detection of unknown DoS/DDoS attacks in IoT networks using a hybrid learning model. Internet Things 2023, 23, 100851. [Google Scholar] [CrossRef]
  2. Ferrag, M.A.; Shu, L.; Friha, O.; Yang, X. Cyber security intrusion detection for agriculture 4.0: Machine learning-based solutions, datasets, and future directions. IEEE/CAA J. Autom. Sin. 2021, 9, 407–436. [Google Scholar] [CrossRef]
  3. Chakraborty, C.; Nagarajan, S.M.; Devarajan, G.G.; Ramana, T.V.; Mohanty, R. Intelligent AI-based Healthcare Cyber Security System using Multi-Source Transfer Learning Method. ACM Trans. Sens. Netw. 2023. [Google Scholar] [CrossRef]
  4. Shakeel, P.M.; Baskar, S.; Fouad, H.; Manogaran, G.; Saravanan, V.; Montenegro-Marin, C.E. Internet of Things forensic data analysis using machine learning to identify roots of data scavenging. Future Gener. Comput. Syst. 2021, 115, 756–768. [Google Scholar] [CrossRef]
  5. Khan, Z.F.; Alshahrani, S.M.; Alghamdi, A.; Alangari, S.; Altamami, N.I.; Alissa, K.A.; Alazwari, S.; Al Duhayyim, M.; Al-Wesabi, F.N. Machine Learning Based Cybersecurity Threat Detection for Secure IoT Assisted Cloud Environment. Comput. Syst. Sci. Eng. 2023, 47, 855–871. [Google Scholar] [CrossRef]
  6. Alshehri, M. Blockchain-assisted cyber security in medical things using artificial intelligence. Electron. Res. Arch. 2023, 31, 708–728. [Google Scholar] [CrossRef]
  7. Alohali, M.A.; Elsadig, M.; Al-Wesabi, F.N.; Al Duhayyim, M.; Hilal, A.M.; Motwakel, A. Blockchain Assisted Optimal Machine Learning Based Cyberattack Detection and Classification Scheme. Comput. Syst. Sci. Eng. 2023, 46, 3583–3598. [Google Scholar] [CrossRef]
  8. Cui, L.; Su, X.; Ming, Z.; Chen, Z.; Yang, S.; Zhou, Y.; Xiao, W. CREAT: Blockchain-assisted compression algorithm of federated learning for content caching in edge computing. IEEE Internet Things J. 2020, 9, 14151–14161. [Google Scholar] [CrossRef]
  9. Shen, M.; Liu, H.; Zhu, L.; Xu, K.; Yu, H.; Du, X.; Guizani, M. Blockchain-assisted secure device authentication for cross-domain industrial IoT. IEEE J. Sel. Areas Commun. 2020, 38, 942–954. [Google Scholar] [CrossRef]
  10. Feng, Q.; He, D.; Zeadally, S.; Liang, K. BPAS: Blockchain-assisted privacy-preserving authentication system for vehicular ad hoc networks. IEEE Trans. Ind. Inform. 2019, 16, 4146–4155. [Google Scholar] [CrossRef]
  11. Zhang, Y.; Xu, C.; Ni, J.; Li, H.; Shen, X.S. Blockchain-assisted public-key encryption with keyword search against keyword guessing attacks for cloud storage. IEEE Trans. Cloud Comput. 2019, 9, 1335–1348. [Google Scholar] [CrossRef]
  12. Alwasel, B.; Aldribi, A.; Alreshoodi, M.; Alsukayti, I.S.; Alsuhaibani, M. Leveraging Graph-Based Representations to Enhance Machine Learning Performance in IIoT Network Security and Attack Detection. Appl. Sci. 2023, 13, 7774. [Google Scholar] [CrossRef]
  13. Kumar, P.; Kumar, R.; Srivastava, G.; Gupta, G.P.; Tripathi, R.; Gadekallu, T.R.; Xiong, N.N. PPSF: A privacy-preserving and secure framework using blockchain-based machine learning for IoT-driven smart cities. IEEE Trans. Netw. Sci. Eng. 2021, 8, 2326–2341. [Google Scholar] [CrossRef]
  14. Jmal, R.; Ghabri, W.; Guesmi, R.; Alshammari, B.M.; Alshammari, A.S.; Alsaif, H. Distributed Blockchain-SDN Secure IoT System Based on ANN to Mitigate DDoS Attacks. Appl. Sci. 2023, 13, 4953. [Google Scholar] [CrossRef]
  15. AlZubi, A.A.; Al-Maitah, M.; Alarifi, A. Cyber-attack detection in healthcare using cyber-physical systems and machine learning techniques. Soft Comput. 2021, 25, 12319–12332. [Google Scholar] [CrossRef]
  16. Babu, E.S.; SrinivasaRao, B.K.N.; Nayak, S.R.; Verma, A.; Alqahtani, F.; Tolba, A.; Mukherjee, A. Blockchain-based Intrusion Detection System of IoT urban data with device authentication against DDoS attacks. Comput. Electr. Eng. 2022, 103, 108287. [Google Scholar] [CrossRef]
  17. Nouman, M.; Qasim, U.; Nasir, H.; Almasoud, A.; Imran, M.; Javaid, N. Malicious Node Detection Using Machine Learning and Distributed Data Storage Using Blockchain in WSNs. IEEE Access 2023, 11, 6106–6121. [Google Scholar] [CrossRef]
  18. Dehghani, M.; Niknam, T.; Ghiasi, M.; Bayati, N.; Savaghebi, M. Cyber-attack detection in dc microgrids based on deep machine learning and wavelet singular values approach. Electronics 2021, 10, 1914. [Google Scholar] [CrossRef]
  19. Bhayo, J.; Shah, S.A.; Hameed, S.; Ahmed, A.; Nasir, J.; Draheim, D. Towards a machine learning-based framework for DDOS attack detection in software-defined IoT (SD-IoT) networks. Eng. Appl. Artif. Intell. 2023, 123, 106432. [Google Scholar] [CrossRef]
  20. Saheed, Y.K.; Arowolo, M.O. Efficient cyber attack detection on the Internet of medical things-smart environment based on deep recurrent neural network and machine learning algorithms. IEEE Access 2021, 9, 161546–161554. [Google Scholar] [CrossRef]
  21. Khan, A.A.; Khan, M.M.; Khan, K.M.; Arshad, J.; Ahmad, F. A blockchain-based decentralized machine learning framework for collaborative intrusion detection within UAVs. Comput. Netw. 2021, 196, 108217. [Google Scholar] [CrossRef]
  22. Khan, F.; Jan, M.A.; Alturki, R.; Alshehri, M.D.; Shah, S.T.; ur Rehman, A. A Secure Ensemble Learning-Based Fog-Cloud Approach for Cyberattack Detection in IoMT. IEEE Trans. Ind. Inform. 2023, 19, 10125–10132. [Google Scholar] [CrossRef]
  23. Reddy, S.; Shyam, G.K. A machine learning-based attack detection and mitigation using a secure SaaS framework. J. King Saud Univ. Comput. Inf. Sci. 2022, 34, 4047–4061. [Google Scholar] [CrossRef]
  24. Ashraf, J.; Moustafa, N.; Bukhshi, A.D.; Javed, A. Intrusion detection system for SDN-enabled IoT networks using machine learning techniques. In Proceedings of the 2021 IEEE 25th International Enterprise Distributed Object Computing Workshop (EDOCW), Gold Coast, Australia, 25–29 October 2021; pp. 46–52. [Google Scholar]
  25. Guha Roy, D.; Srirama, S.N. A blockchain-based cyber-attack detection scheme for the decentralized Internet of Things using the software-defined network. Softw. Pract. Exp. 2021, 51, 1540–1556. [Google Scholar] [CrossRef]
  26. Kalbhor, M.; Shinde, S.; Popescu, D.E.; Hemanth, D.J. Hybridization of Deep Learning Pre-Trained Models with Machine Learning Classifiers and Fuzzy Min–Max Neural Network for Cervical Cancer Diagnosis. Diagnostics 2023, 13, 1363. [Google Scholar] [CrossRef] [PubMed]
  27. Upadhyay, P.; Marriboina, V.; Kumar, S.; Kumar, S.; Shah, M.A. An Enhanced Hybrid Glowworm Swarm Optimization Algorithm for Traffic-Aware Vehicular Networks. IEEE Access 2022, 10, 110136–110148. [Google Scholar] [CrossRef]
  28. Godin, F.; Degrave, J.; Dambre, J.; De Neve, W. Dual rectified linear units (DReLUs): A replacement for tanh activation functions in quasi-recurrent neural networks. Pattern Recognit. Lett. 2018, 116, 8–14. [Google Scholar] [CrossRef]
  29. Naruei, I.; Keynia, F.; Sabbagh Molahosseini, A. Hunter–prey optimization: Algorithm and applications. Soft Comput. 2022, 26, 1279–1314. [Google Scholar] [CrossRef]
  30. AbdelAty, A.M.; Yousri, D.; Chelloug, S.; Alduailij, M.; Abd Elaziz, M. Fractional order adaptive hunter-prey optimizer for feature selection. Alex. Eng. J. 2023, 75, 531–547. [Google Scholar] [CrossRef]
  31. Koroniotis, N.; Moustafa, N.; Sitnikova, E.; Turnbull, B. Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset. Future Gener. Comput. Syst. 2019, 100, 779–796. [Google Scholar] [CrossRef]
  32. Koroniotis, N.; Moustafa, N.; Sitnikova, E. A new network forensic framework based on deep learning for Internet of Things networks: A particle deep framework. Future Gener. Comput. Syst. 2020, 110, 91–106. [Google Scholar] [CrossRef]
  33. Liu, X.; Du, Y. Towards Effective Feature Selection for IoT Botnet Attack Detection Using a Genetic Algorithm. Electronics 2023, 12, 1260. [Google Scholar] [CrossRef]
  34. Alosaimi, S.; Almutairi, S.M. An Intrusion Detection System Using BoT-IoT. Appl. Sci. 2023, 13, 5427. [Google Scholar] [CrossRef]
  35. Chauhan, S.; Gangopadhyay, S.; Gangopadhyay, A.K. Intrusion Detection System for IoT Using Logical Analysis of Data and Information Gain Ratio. Cryptography 2022, 6, 62. [Google Scholar] [CrossRef]
Figure 1. Overall flow of BHMML-CADC methodology.
Figure 1. Overall flow of BHMML-CADC methodology.
Sustainability 15 13887 g001
Figure 2. Architecture of QRNN.
Figure 2. Architecture of QRNN.
Sustainability 15 13887 g002
Figure 3. Confusion matrices for (a,b) 80:20 TR set/TS set and (c,d) 70:30 TR set/TS set.
Figure 3. Confusion matrices for (a,b) 80:20 TR set/TS set and (c,d) 70:30 TR set/TS set.
Sustainability 15 13887 g003
Figure 4. Average outcomes of BHMML-CADC method for the 80:20 TR set/TS set.
Figure 4. Average outcomes of BHMML-CADC method for the 80:20 TR set/TS set.
Sustainability 15 13887 g004
Figure 5. A c c u y curves of BHMML-CADC method for the 80:20 TR set/TS set.
Figure 5. A c c u y curves of BHMML-CADC method for the 80:20 TR set/TS set.
Sustainability 15 13887 g005
Figure 6. Loss curves of BHMML-CADC method for the 80:20 TR set/TS set.
Figure 6. Loss curves of BHMML-CADC method for the 80:20 TR set/TS set.
Sustainability 15 13887 g006
Figure 7. PR curves of BHMML-CADC method for the 80:20 TR set/TS set.
Figure 7. PR curves of BHMML-CADC method for the 80:20 TR set/TS set.
Sustainability 15 13887 g007
Figure 8. ROC curves of BHMML-CADC methodology for the 80:20 TR set/TS set.
Figure 8. ROC curves of BHMML-CADC methodology for the 80:20 TR set/TS set.
Sustainability 15 13887 g008
Figure 9. Average outcomes of BHMML-CADC methodology for the 70:30 TR set/TS set.
Figure 9. Average outcomes of BHMML-CADC methodology for the 70:30 TR set/TS set.
Sustainability 15 13887 g009
Figure 10. A c c u y curves of BHMML-CADC system for the 70:30 TR set/TS set.
Figure 10. A c c u y curves of BHMML-CADC system for the 70:30 TR set/TS set.
Sustainability 15 13887 g010
Figure 11. Loss curves of BHMML-CADC system for the 70:30 TR set/TS set.
Figure 11. Loss curves of BHMML-CADC system for the 70:30 TR set/TS set.
Sustainability 15 13887 g011
Figure 12. PR curves of BHMML-CADC method for the 70:30 TR set/TS set.
Figure 12. PR curves of BHMML-CADC method for the 70:30 TR set/TS set.
Sustainability 15 13887 g012
Figure 13. ROC curves of BHMML-CADC method for the 70:30 TR set/TS set.
Figure 13. ROC curves of BHMML-CADC method for the 70:30 TR set/TS set.
Sustainability 15 13887 g013
Figure 14. Comparative outcomes of BHMML-CADC algorithm with other systems.
Figure 14. Comparative outcomes of BHMML-CADC algorithm with other systems.
Sustainability 15 13887 g014
Figure 15. TRT and TST outcomes of BHMML-CADC algorithm compared with other systems.
Figure 15. TRT and TST outcomes of BHMML-CADC algorithm compared with other systems.
Sustainability 15 13887 g015
Figure 16. Security rates of the proposed BHMML-CADC algorithm with and without BC.
Figure 16. Security rates of the proposed BHMML-CADC algorithm with and without BC.
Sustainability 15 13887 g016
Table 1. Details of the database.
Table 1. Details of the database.
ClassLabelsNo. of Samples
Service ScanningL1500
OS FingerprintingL2500
DDoS TCPL3500
DDoS UDPL4500
DDoS HTTPL5500
DoS TCPL6500
DoS UDPL7500
DoS HTTPL8500
NormalL9500
Total Number of Samples4500
Table 2. Cyber attack detection outcome of BHMML-CADC approach for the 80:20 TR set/TS set.
Table 2. Cyber attack detection outcome of BHMML-CADC approach for the 80:20 TR set/TS set.
Class Labels A c c u y P r e c n R e c a l MCC G M e a s u r e
Training Phase (80%)
Service Scanning (L1)99.7898.9598.9598.8398.95
OS Fingerprinting (L2)99.2295.6397.5296.1496.57
DDoS TCP (L3)99.5397.9697.7297.5797.84
DdoS UDP (L4)99.6498.7598.0298.1898.39
DdoS HTTP (L5)99.6997.5399.7598.4698.63
DoS TCP (L6)99.6498.2598.5098.1798.37
DoS UDP (L7)99.5898.9997.2897.9098.13
DoS HTTP (L8)99.7899.2498.7598.8799.00
Normal (L9)99.5898.7997.6197.9698.20
Average99.6098.2398.2398.0198.23
Testing Phase (20%)
Service Scanning (L1)99.7898.33100.0099.0499.16
OS Fingerprinting (L2)99.6797.9498.9698.2698.45
DdoS TCP (L3)99.4498.1097.1797.3297.63
DdoS UDP (L4)99.78100.0097.9298.8398.95
DdoS HTTP (L5)99.3395.3799.0496.8197.19
DoS TCP (L6)99.67100.0097.0398.3298.50
DoS UDP (L7)99.5697.9297.9297.6797.92
DoS HTTP (L8)99.6799.0098.0298.3298.51
Normal (L9)99.7898.7898.7898.6698.78
Average99.6398.3898.3198.1498.34
Table 3. Cyber attack detection outcomes of BHMML-CADC approach for the 70:30 TR set/TS set.
Table 3. Cyber attack detection outcomes of BHMML-CADC approach for the 70:30 TR set/TS set.
Class Labels A c c u y P r e c n R e c a l MCC G M e a s u r e
Training Phase (70%)
Service Scanning (L1)99.7198.6098.8798.5798.73
OS Fingerprinting (L2)99.5698.4897.3097.6497.89
DDoS TCP (L3)99.7899.1298.8298.8498.97
DDoS UDP (L4)99.5697.0898.8197.7097.94
DDoS HTTP (L5)99.6298.4198.4198.2098.41
DoS TCP (L6)99.7899.1598.8898.8999.02
DoS UDP (L7)99.6898.3198.8698.4198.58
DoS HTTP (L8)99.7599.1498.5898.7198.86
Normal (L9)99.7198.8598.5698.5498.71
Average99.6898.5798.5798.3998.57
Testing Phase (30%)
Service Scanning (L1)99.6399.3097.2498.0698.26
OS Fingerprinting (L2)99.7098.2299.4098.6498.81
DDoS TCP (L3)99.8599.3899.3899.2999.38
DDoS UDP (L4)99.93100.0099.3999.6599.69
DDoS HTTP (L5)99.7897.60100.0098.6798.79
DoS TCP (L6)99.6399.2997.2298.0598.25
DoS UDP (L7)99.8598.67100.0099.2599.33
DoS HTTP (L8)99.7899.3298.6698.8798.99
Normal (L9)99.4897.3998.0397.4197.71
Average99.7498.8098.8198.6598.80
Table 4. Comparative outcomes of BHMML-CADC algorithm with other techniques.
Table 4. Comparative outcomes of BHMML-CADC algorithm with other techniques.
Classifier A c c u y P r e c n R e c a l MCC
Ensemble learning92.6698.1296.6797.10
Sparse autoencoder 98.1096.9697.4896.25
XGBoost98.9097.1997.6796.44
SVM Algorithm98.3797.0697.6696.92
CNN Model98.3797.6198.0497.96
LSTM Model99.0197.7096.6396.95
KNN Algorithm99.2696.7496.5097.75
BHMML-CADC99.7498.8098.8198.65
Table 5. TRT and TST outcomes of BHMML-CADC algorithm compared with other techniques.
Table 5. TRT and TST outcomes of BHMML-CADC algorithm compared with other techniques.
ClassifierTraining Time (s)Testing Time (s)
Ensemble learning18.068.86
Sparse autoencoder 10.146.88
XGBoost18.787.52
SVM Algorithm18.789.44
CNN Model12.737.87
LSTM Model12.825.10
KNN Algorithm13.058.88
BHMML-CADC06.603.01
Table 6. Security rate analysis of BHMML-CADC algorithm.
Table 6. Security rate analysis of BHMML-CADC algorithm.
Security Rate (%)
No. of TransactionsWith BlockchainWithout Blockchain
2097.5096.06
4097.9196.24
6098.0697.08
8098.6897.72
10099.4598.91
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Albakri, A.; Alabdullah, B.; Alhayan, F. Blockchain-Assisted Machine Learning with Hybrid Metaheuristics-Empowered Cyber Attack Detection and Classification Model. Sustainability 2023, 15, 13887. https://doi.org/10.3390/su151813887

AMA Style

Albakri A, Alabdullah B, Alhayan F. Blockchain-Assisted Machine Learning with Hybrid Metaheuristics-Empowered Cyber Attack Detection and Classification Model. Sustainability. 2023; 15(18):13887. https://doi.org/10.3390/su151813887

Chicago/Turabian Style

Albakri, Ashwag, Bayan Alabdullah, and Fatimah Alhayan. 2023. "Blockchain-Assisted Machine Learning with Hybrid Metaheuristics-Empowered Cyber Attack Detection and Classification Model" Sustainability 15, no. 18: 13887. https://doi.org/10.3390/su151813887

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop