Privacy preserving blockchain integrated explainable artificial intelligence with two tier optimization for cyber threat detection and mitigation in the internet of things

Cyber threat hunting early hunts for cyberattacks hidden by conventional defence tools. It inspects extreme to recognize mischievous programs (i.e., malware) that evade recognition. It is significant because complicated cyberattacks can evade the mechanisms of cyber security. The performance of cybe...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Scientific reports Ročník 15; číslo 1; s. 36520 - 22
Hlavní autoři: Alohali, Manal Abdullah, Aljebreen, Mohammed, Ahmad, Nazir, Alahmari, Sultan, Albouq, Sami Saad, Alqazzaz, Ali, Alkhiri, Hassan, Said, Yahia
Médium: Journal Article
Jazyk:angličtina
Vydáno: London Nature Publishing Group UK 21.10.2025
Nature Publishing Group
Nature Portfolio
Témata:
ISSN:2045-2322, 2045-2322
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Popis
Shrnutí:Cyber threat hunting early hunts for cyberattacks hidden by conventional defence tools. It inspects extreme to recognize mischievous programs (i.e., malware) that evade recognition. It is significant because complicated cyberattacks can evade the mechanisms of cyber security. The performance of cyberattack hunting is enhanced over artificial intelligence (AI), particularly explainable AI (XAI), which includes a trust module to the cyberattack hunting procedure. Owing to the addition of XAI, security specialists obtain complete descriptions of perceived attacks as the recognition method in XAI is recognized. Information, like attack, how it was noticed, and why it was identified, is attained very effortlessly owing to XAI in the hunting process of cyberattack. AI, mainly over machine learning (ML) and deep learning (DL) approaches, has exposed promising latent in progressing cybersecurity measures. Recently, the growth of the blockchain (BC) method has indicated a route value in solving the distributed trusted problem in the Internet of Things (IoT) platform. So, this manuscript presents a novel Two-Tier Optimization Algorithms for Cyberthreat Detection and Mitigation Using Explainable Artificial Intelligence with Recurrent Neural Networks (TTOCDM-XAIRNN) methodology. The main intention of the TTOCDM-XAIRNN algorithm framework is to improve the detection and mitigation of cyber threats in dynamic environments. The BC technology is utilized for safe inter-cluster data transmission methods. The presented TTOCDM-XAIRNN model initially employs data preprocessing with a linear scaling normalization (LSN) model to standardize the input features for improved model performance. The pelican optimization algorithm (POA) model is employed for dimensionality reduction to identify the most relevant data attributes. Furthermore, the hybrid attention-based long short-term memory and bidirectional gated recurrent unit (A-LSTM-BiGRU) technique is utilized for cyber threat detection. Finally, the earthworm optimization algorithm (EOA) is implemented to tune the hyperparameters and ensure the model’s parameters are optimized for superior detection and mitigation capabilities. Finally, XAI with SHAP presents transparent insights into model decisions, ensuring high performance and a clear understanding of the threat mitigation process. A wide range of simulation studies of the TTOCDM-XAIRNN approach is examined under the NSLKDD and CICIDS 2017 datasets. The comparison study of the TTOCDM-XAIRNN approach portrayed a superior accuracy value of 98.34% and 98.87% under dual datasets.
Bibliografie:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
ISSN:2045-2322
2045-2322
DOI:10.1038/s41598-025-10601-1