Claim Missing Document
Check
Articles

Found 11 Documents
Search

A significant features vector for internet traffic classification based on multi-features selection techniques and ranker, voting filters Munther, Alhamza; Abualhaj, Mosleh M.; Alalousi, Alabass; Fadhil, Hilal A.
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 6: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v14i6.pp6958-6968

Abstract

The pursuit of effective models with high detection accuracy has sparked great interest in anomaly detection of internet traffic. The issue still lies in creating a trustworthy and effective anomaly detection system that can handle massive data volumes and patterns that change in real-time. The detection techniques used, especially the feature selection methods and machine learning algorithms, are crucial to the design of such a system. The fundamental difficulty in feature selection is selecting a smaller subset of features that are more related to the class but are less numerous. To reduce the dimensionality of the dataset, this research offered a multi-feature selection technique (MFST) using four filter techniques: fast correlation-based filter, significance feature evaluator, chi-square, and gain ratio. Each technique's output vector is put via ranker and Borda voting filters. The feature with the highest number of votes and rank values will be selected from the dataset. The performance of the given MFST framework was the best when compared to the four strategies listed above functioning alone; three different classifiers were employed to test the accuracy. C4.5, nave Bayes, and support vector machine. The experiment outcomes employed ten datasets of different sizes with 10,000-300,000 instances. Only 8 out of 248 characteristics were chosen, with classifiers percentages averaging 65%, 93.8%, and 95.5%.
A novel approach for e-health recommender systems Alsaaidah, Adeeb M.; Shambour, Qusai Y.; Abualhaj, Mosleh M.; Abu-Shareha, Ahmad Adel
Bulletin of Electrical Engineering and Informatics Vol 13, No 4: August 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v13i4.7749

Abstract

The increasing use of the internet for health information brings challenges due to the complexity and abundance of data, leading to information overload. This highlights the necessity of implementing recommender systems (RSs) within the healthcare domain, with the aim of facilitating more effective and precise healthcare-related decisions for both healthcare providers and users. Health recommendation systems can suggest suitable healthcare items or services based on users' health conditions and needs, including medications, diagnoses, hospitals, doctors, and healthcare services. Despite their potential benefits, RSs encounter significant limitations, including data sparsity, which can lead to recommendations that are unreliable and misleading. Considering the increasing significance of health recommendation systems and the challenge of sparse data, we propose an effective approach to improve precision and coverage in recommending healthcare items or services. This aims to assist users and healthcare practitioners in making informed decisions tailored to their unique needs and health conditions. Empirical testing on two healthcare rating datasets, including sparse datasets, illustrate that our proposed approach outperforms baseline recommendation methods. It excels in improving both the precision and coverage of health-related recommendations, demonstrating effective handling of extremely sparse datasets.
Enhancing spyware detection by utilizing decision trees with hyperparameter optimization Abualhaj, Mosleh M.; Al-Shamayleh, Ahmad Sami; Munther, Alhamza; Alkhatib, Sumaya Nabil; Hiari, Mohammad O.; Anbar, Mohammed
Bulletin of Electrical Engineering and Informatics Vol 13, No 5: October 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v13i5.7939

Abstract

In the realm of cybersecurity, spyware has emerged as a formidable adversary due to its persistent and stealthy nature. This study delves deeply into the multifaceted impact of spyware, meticulously examining its implications for individuals and organizations. This work introduces a systematic approach to spyware detection, leveraging decision trees (DT), a machine-learning classifier renowned for its analytical prowess. A pivotal aspect of this research involves the meticulous optimization of DT's hyperparameters, a critical operation for enhancing the precision of spyware threat identification. To evaluate the efficacy of the proposed methodology, the study employs the Obfuscated-MalMem2022 dataset, well-regarded for its comprehensive and detailed spyware-related data. The model is implemented using the Python programming language. Significantly, the findings of this study consistently demonstrate the superiority of the DT classifier over other methods. With an accuracy rate of 99.97%, the DT proves its exceptional effectiveness in detecting spyware, particularly in the face of more intricate threats. By advancing our understanding of spyware and providing a potent detection mechanism, this research equips cybersecurity professionals with a valuable tool to combat this persistent online menace.
Enhancing Spam Detection Using Hybrid of Harris Hawks and Firefly Optimization Algorithms Abualhaj, Mosleh M.; Shambour, Qusai Y.; Alsaaidah, Adeeb; Abu-Shareha, Ahmad; Al-Khatib, Sumaya; Hiari, Mohammad O.
Journal of Applied Data Sciences Vol 5, No 3: SEPTEMBER 2024
Publisher : Bright Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/jads.v5i3.279

Abstract

The emergence of the modern Internet has presented numerous opportunities for attackers to profit illegally by distributing spam mail. Spam refers to irrelevant or inappropriate messages that are sent on the Internet to numerous recipients. Many researchers use many classification methods in machine learning to filter spam messages. However, more research is still needed to assess using metaheuristic optimization algorithms to classify spam emails in feature selection. In this paper, we endorse fighting spam emails by employing a union of Firefly Optimization Algorithm (FOA) and Harris Hawks Optimization (HHO) algorithms to classify spam emails, along with one of the most well-known and efficient methods in this area, the Random Forest (RF) classifier. In this process, the experimental studies on the ISCX-URL2016 spam dataset yield promising results. For instance, the union of HHO and FOA, along with using an RF classifier, achieved an accuracy of 99.83% in detecting spam emails.
A multi-criteria trust-enhanced collaborative filtering algorithm for personalized tourism recommendations Shambour, Qusai Y.; Al-Zyoud, Mahran M.; Alsaaidah, Adeeb M.; Abualhaj, Mosleh M.; Abu-Shareha, Ahmad A.
Indonesian Journal of Electrical Engineering and Computer Science Vol 36, No 3: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v36.i3.pp1919-1928

Abstract

The exponential growth of online information has LED to significant challenges in navigating data overload, particularly in the tourism industry. Travelers are overwhelmed with choices regarding destinations, accommodations, dining, and attractions, making it difficult to select options that best meet their needs. Recommender systems have emerged as a promising solution to this problem, aiding users in decision-making by providing personalized suggestions based on their preferences. Traditional collaborative filtering (CF) methods, however, face limitations, such as data sparsity and reliance on single rating scores, which do not fully capture the complexity of user preferences. This study proposes a hybrid multi-criteria trust-enhanced CF (HMCTeCF) algorithm to improve the accuracy and robustness of tourism recommendations. HMCTeCF improves the quality of recommendations by integrating multi-criteria user preferences with trust relationships among users and between items. Experimental results using real-world datasets, including Restaurants-TripAdvisor and Hotels-TripAdvisor, demonstrate that HMCTeCF outperforms benchmark CF-based recommendation methods. It achieves higher prediction accuracy and coverage rate, effectively addressing the data sparsity problem. This innovative algorithm facilitates a more personalized and enriching travel experience, particularly in scenarios with limited user data. The findings highlight the importance of considering multiple criteria and trust relationships in developing robust recommendation systems for the tourism industry.
Comparative analysis of whale and Harris Hawks optimization for feature selection in intrusion detection Abualhaj, Mosleh M.; Hiari, Mohammad O.; Alsaaidah, Adeeb; Al-Zyoud, Mahran M.
Indonesian Journal of Electrical Engineering and Computer Science Vol 37, No 1: January 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v37.i1.pp179-185

Abstract

This research paper explores the efficacy of two nature-inspired optimization algorithms, the whale optimization algorithm (WOA) and Harris Hawks optimization (HHO), for feature selection in the context of intrusion detection and prevention systems (IDPS). Leveraging the NSL-KDD dataset as a benchmark, our study employs Python for implementation and uses decision tree (DT) as the classification model. The objective is to assess the impact of the HHO and WOA optimization techniques on the performance of IDPS through feature selection. The WOA and HHO techniques were able to lessen the features from 40 to 16 and 13, respectively. Results indicate that DT integrated with HHO achieves an impressive accuracy of 97.59%, outperforming the WOA-enhanced model, which attains an accuracy of 97.5%. This study contributes valuable insights into the comparative effectiveness of WOA and HHO optimization algorithms in enhancing the accuracy of IDPSs, shedding light on their potential applications in the realm of cybersecurity.
Enhancing malware detection through self-union feature selection using gray wolf optimizer Abualhaj, Mosleh M.; Shambour, Qusai Y.; Abu-Shareha, Ahmad Adel; Al-Khatib, Sumaya N.; Amer, Amal
Indonesian Journal of Electrical Engineering and Computer Science Vol 37, No 1: January 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v37.i1.pp197-205

Abstract

This research explores the impact of malware on the digital world and presents an innovative system to detect and classify malware instances. The suggested system combines a random forest (RF) classifier and gray wolf optimizer (GWO) to identify and detect malware effectively. Therefore, the suggested system is called RFGWO-Mal. The RFGWO-Mal system employs the GWO for feature selection in binary and multiclass classification scenarios. Then, the RFGWO-Mal system uses a novel self-union feature selection approach, combining features from different subsets of binary and multiclass classification extracted using the GWO optimizer. The RF classifier is then applied for classifying malware and benign data. The comprehensive Obfuscated-MalMem2022 dataset was utilized to evaluate the suggested RFGWO-Mal system, which has been implanted using Python. The suggested RFGWO-Mal system achieves significantly improved results using the novel self-union feature selection approach. Specifically, the RFGWO-Mal system achieves an outstanding accuracy of 99.95% in binary classification and maintains a high accuracy of 86.57% with multiclass classification. The findings underscore the achievement of a self-union feature selection approach in enhancing the performance of malware detection systems, providing a valuable contribution to cybersecurity.
Performance Comparison of Whale and Harris Hawks Optimizers with Network Intrusion Prevention Systems Abualhaj, Mosleh M.; Al-Khatib, Sumaya N; Alsharaiah, Mohammad A; Hiari, Mohammad O
Journal of Applied Data Sciences Vol 5, No 4: DECEMBER 2024
Publisher : Bright Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/jads.v5i4.323

Abstract

Digital technology has permeated every aspect of our daily lives. Processing and evaluating information are highly demanding in all fields, including cybersecurity. Cybersecurity engineers widely use the Network Intrusion Prevention System (NIPS) to safeguard against cyberattacks. To avoid cyberattacks, the NIPS must deal with a large amount of data, which degrades its performance. This paper uses the whale optimization algorithm (WOA) and the Harris Hawks optimization method (HHO) to diminish the large amount of data that the NIPS needs to deal with. Subsequently, the Gradient Boosting Machine (GBM) is employed to determine the accuracy achieved when employing WOA and HHO. The GBM classifier is widely regarded as a sophisticated and straightforward classifier in data mining. Regardless of the premise of feature independence, it outperforms all other classification algorithms by delivering excellent performance. When using GBM, the findings indicate that the accuracy achieved with HHO is 89.81%, but the accuracy attained with WOA is 94.3%.
Enhancing intrusion detection systems with hybrid HHO-WOA optimization and gradient boosting machine classifier Abualhaj, Mosleh M.; Abu-Shareha, Ahmad Adel; Rateb, Roqia
International Journal of Reconfigurable and Embedded Systems (IJRES) Vol 14, No 2: July 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijres.v14.i2.pp518-526

Abstract

In this paper, we propose a hybrid intrusion detection system (IDS) that leverages Harris Hawks optimization (HHO) and whale optimization algorithm (WOA) for feature selection to enhance the detection of cyberattacks. The hybrid approach reduces the dimensionality of the NSL KDD dataset, allowing the IDS to operate more efficiently. The reduced feature set is then classified using logistic regression (LR) and gradient boosting machine (GBM) classifiers. Performance evaluation demonstrates that the GBM-HHO/WOA combination outperforms the LR-HHO/WOA approach, achieving an accuracy of 97.68%. These results indicate that integrating HHO and WOA significantly improves the IDS's ability to identify intrusions while maintaining high computational efficiency. This research highlights the potential of advanced optimization techniques to strengthen network security against evolving threats.
Detecting spam using Harris Hawks optimizer as a feature selection algorithm Abualhaj, Mosleh M.; Abu-Shareha, Ahmad Adel; Nabil Alkhatib, Sumaya; Shambour, Qusai Y.; Alsaaidah, Adeeb M.
Bulletin of Electrical Engineering and Informatics Vol 14, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v14i3.9198

Abstract

The Harris Hawks optimization (HHO) was used in this study to enhance spam identification. Only the features with a high influence on spam detection have been selected using the HHO metaheuristic technique. The HHO technique's assessment of the selected features was conducted using the ISCX-URL2016 dataset. The ISCX-URL2016 dataset has 72 features, but the HHO technique reduces that to just 10 features. Extra tree (ET), extreme gradient boosting (XGBoost), and support vector machine (SVM) techniques are used to complete the classification assignment. 99.81% accuracy is attained by the ET, 99.60% by XGBoost, and 98.74% by SVM. As we can see, with the ET, XGBoost, and k-nearest neighbor (KNN) techniques, the HHO technique achieves accuracy above 98%. Nonetheless, the ET technique outperforms the XGBoost and KNN techniques. ET outperforms other methods due to its robust ensemble approach, which benefits from the diverse and relevant feature subset selected by HHO. HHO's effective reduction of noisy or redundant features enhances ET's ability to generalize and avoid overfitting, making it a highly efficient combination for spam detection. Thus, it looks promising to combat spam emails by combining the ET technique for classification with the HHO technique for feature selection.