Claim Missing Document
Check
Articles

Found 3 Documents
Search

Artificial intelligence-driven method for the discovery and prevention of distributed denial of service attacks ALDabbas, Ashraf; Baniata, Laith H.; AlSaaidah, Bayan A.; Mustafa, Zaid; Alali, Muath; Rateb, Roqia
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 14, No 1: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v14.i1.pp614-628

Abstract

Distributed denial of service (DDoS) attacks has emerged as a prominent cyber threat in contemporary times. By impeding the machine's capacity to give services to legitimate clients, the impacted system performance and buffer size are reduced. Researchers are working to build sophisticated algorithms that can identify and thwart DDoS violations. An effective approach for DDoS attacks has been proposed in this work. This research presents a model as a potential explanation for DDoS assaults. In order to successfully identify this kind of attacks, which may stop or block the urgent and vital transmission of data, we present a distinctive method that integrates a pair of fully connected layers within an amalgamated deep learning (DL) framework with long short-term memory (LSTM) and a max pooling layer. The acquired accuracy reached 99.58%.
Exploring the dynamics of providing cognition using a computational model of cognitive insomnia Rateb, Roqia; M. Abualhaj, Mosleh; Alsaaidah, Adeeb; A. Alsharaiah, Mohammad; Shorman, Amaal; Jaber Thalji, Nisrean
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 14, No 1: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v14.i1.pp92-101

Abstract

Insomnia is a common sleep-related neuropsychological disorder that can lead to a range of problems, including cognitive deficits, emotional distress, negative thoughts, and a sense of insufficient sleep. This study proposes a providing computational dynamic cognitive model (PCDCM) insight into providing cognitive mechanisms of insomnia and consequent cognitive deficits. Since the support providing is significantly dynamic and it includes substantial changes as demanding condition happen. From this perspective the underlying model covers integrating of both coping strategies, provision preferences and adaptation concepts. The model was found to produce realistic behavior that could clarify conditions for providing support to handle insomnia individuals, which was done by employing simulation experiments under various negative events, personality resources, altruistic attitude and personality attributes. Simulation results show that, a person with bonadaptation and either problem focused or emotion focused coping can provide different social support based on his personality resources, personality attributes, and knowledge level, whereas a person with maladaptation regardless the coping strategies cannot provide any type of social support. Moreover, person with close tie tends to provide instrumental, emotional, and companionship support than from weak tie. Finally, a mathematical analysis was used to examine the possible equilibria of the model. 
Enhancing intrusion detection systems with hybrid HHO-WOA optimization and gradient boosting machine classifier Abualhaj, Mosleh M.; Abu-Shareha, Ahmad Adel; Rateb, Roqia
International Journal of Reconfigurable and Embedded Systems (IJRES) Vol 14, No 2: July 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijres.v14.i2.pp518-526

Abstract

In this paper, we propose a hybrid intrusion detection system (IDS) that leverages Harris Hawks optimization (HHO) and whale optimization algorithm (WOA) for feature selection to enhance the detection of cyberattacks. The hybrid approach reduces the dimensionality of the NSL KDD dataset, allowing the IDS to operate more efficiently. The reduced feature set is then classified using logistic regression (LR) and gradient boosting machine (GBM) classifiers. Performance evaluation demonstrates that the GBM-HHO/WOA combination outperforms the LR-HHO/WOA approach, achieving an accuracy of 97.68%. These results indicate that integrating HHO and WOA significantly improves the IDS's ability to identify intrusions while maintaining high computational efficiency. This research highlights the potential of advanced optimization techniques to strengthen network security against evolving threats.