Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : International Journal of Informatics, Information System and Computer Engineering (INJIISCOM)

Revolutionizing Cybersecurity: The GPT-2 Enhanced Attack Detection and Defense (GEADD) Method for Zero-Day Threats Jones, Rebet; Omar, Marwan
International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) Vol 5 No 2 (2024): INJIISCOM: VOLUME 5, ISSUE 2, DECEMBER 2024
Publisher : Universitas Komputer Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34010/injiiscom.v5i2.12741

Abstract

The escalating sophistication of cyber threats, particularly zero-day attacks, necessitates advanced detection methodologies in cybersecurity. This study introduces the GPT-2 Enhanced Attack Detection and Defense (GEADD) method, an innovative approach that integrates the GPT-2 model with metaheuristic optimization techniques for enhanced detection of zero-day threats. The GEADD method encompasses data preprocessing, Equilibrium Optimization (EO)-based feature selection, and Salp Swarm Algorithm-Based Optimization (SABO) for hyperparameter tuning, culminating in a robust framework capable of identifying and classifying zero-day attacks with high accuracy. Through a comprehensive evaluation using standard datasets, the GEADD method demonstrates superior performance in detecting zero-day threats compared to existing models, highlighting its potential as a significant contribution to the field of cybersecurity. This study not only presents a novel application of deep learning for cyber threat detection but also sets a foundation for future research in AI-driven cybersecurity solutions
TextGuard: Identifying and Neutralizing Adversarial Threats in Textual Data Albtsoh, Luay; Omar, Marwan
International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) Vol. 6 No. 2 (2025): INJIISCOM: VOLUME 6, ISSUE 2, DECEMBER 2025 (ONLINE FIRST)
Publisher : Universitas Komputer Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Adversarial attacks inside the text domain pose a serious risk to the integrity of Natural Language Processing (NLP) systems. In this study, we propose "Text-Guard," a unique approach to detect hostile instances in natural language processing, based on the Local Outlier Factor (LOF) algorithm. This paper compares TextGuard's performance against that of more traditional NLP classifiers such as LSTM, CNN, and transformer-based models, while also experimentally verifying its effectiveness on a variety of real-world datasets. TextGuard significantly surpasses earlier state-of-the-art methods like DISP and FGWS, with F1 recognition accuracy scores as high as 94.8%. This sets a new benchmark in the field as the first use of the LOF technique for adversarial example identification in the text domain
Unveiling the Potential of Local Outlier Factor in Credit Card Fraud Detection Jones, Angel; Omar, Marwan
International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) Vol 7 No 1 (2026): INJIISCOM: VOLUME 7, ISSUE 1, JUNE 2026 (ONLINE FIRST)
Publisher : Universitas Komputer Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This study evaluates the Local Outlier Factor (LOF) algorithm for credit card fraud detection, emphasizing its effectiveness with imbalanced datasets. Unlike traditional methods that struggle with the rarity and variability of fraudulent transactions, LOF uses local density deviations to identify anomalies. Through a rigorous methodology involving data preprocessing, parameter tuning, and comparison with other machine learning algorithms, LOF demonstrated a high recall rate and a balanced precision-recall trade-off, excelling at detecting subtle, localized fraud. Challenges like threshold setting and false positives were noted, with future research suggested on real-time system integration, algorithm combination, and advanced feature engineering. The study underscores LOF's strengths and limitations, contributing to enhanced fraud detection strategies