Int J Performability Eng ›› 2024, Vol. 20 ›› Issue (12): 764-774.doi: 10.23940/ijpe.24.12.p6.764774
• Original article • Previous Articles
Deepika Singh(), Shajee Mohan, and Preeti Dubey
Submitted on
;
Revised on
;
Accepted on
Contact:
Deepika Singh
E-mail:2023563074.deepika@pg.sharda.ac.in
Deepika Singh, Shajee Mohan, and Preeti Dubey. Identifying Cyber Threats in Metaverse Learning Environment using Explainable Deep Neural Networks [J]. Int J Performability Eng, 2024, 20(12): 764-774.
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
[1] | Mohammed Z.K., Mohammed M.A., Abdulkareem K.H., Zebari D.A., Lakhan A., Marhoon H.A., Nedoma J., and Martinek R., 2024. A metaverse framework for IoT-based remote patient monitoring and virtual consultations using AES-256 encryption. Applied Soft Computing, 158, 111588. |
[2] | Gaber T., Awotunde J.B., Torky M., Ajagbe S.A., Hammoudeh M., and Li W., 2023. Metaverse-IDS: deep learning-based intrusion detection system for metaverse-IoT networks. Internet of Things, 24, 100977. |
[3] | Nkoro E.C., Nwakanma C.I., Lee J.M., and Kim D.S., 2024. Detecting cyberthreats in metaverse learning platforms using an explainable DNN. Internet of Things, 25, 101046. |
[4] | Brahma M., Rejula M.A., Srinivasan B., Kumar S.N., Banu W.A., Malarvizhi K., Priya S.S., and Kumar A., 2023. Learning impact of recent ICT advances based on virtual reality IoT sensors in a metaverse environment. Measurement: Sensors, 27, 100754. |
[5] | Nawshin F., Unal D., Hammoudeh M., and Suganthan P.N., 2024. AI-powered malware detection with differential privacy for zero trust security in internet of things networks. Ad Hoc Networks, 161, 103523. |
[6] | Alkaeed M., Qayyum A., and Qadir J., 2024. Privacy preservation in artificial intelligence and extended reality (AI-XR) metaverses: A survey. Journal of Network and Computer Applications, 103989. |
[7] | Baidya T., and Moh S., 2024. Comprehensive survey on resource allocation for edge-computing-enabled metaverse. Computer Science Review, 54, 100680. |
[8] | Adnan M., Ahmed I., Iqbal S., Fazal M.R., Siddiqi S.J., and Tariq M., 2024. Exploring the convergence of metaverse, blockchain, artificial intelligence, and digital twin for pioneering the digitization in the envision smart grid 3.0. Computers and Electrical Engineering, 120, 109709. |
[9] | Adil M., Song H., Khan M.K., Farouk A., and Jin Z., 2024. 5G/6G-enabled metaverse technologies: taxonomy, applications, and open security challenges with future research directions. Journal of Network and Computer Applications, 103828. |
[10] | Hajian A., Daneshgar S., Sadeghi K., Ojha D., and Katiyar G., 2024. From theory to practice: empirical perspectives on the metaverse's potential. Technological Forecasting and Social Change, 201, 123224. |
[11] | Xua B., and Yang G., 2024. Interpretability research of deep learning: A literature survey. Information Fusion, 102721. |
[12] | Cheng R., Chen S., and Han B., 2023. Toward zero-trust security for the metaverse. IEEE Communications Magazine, 62(2), pp. 156-162. |
[13] | Yang A.H.X., Kasabov N., and Cakmak Y.O., 2022. Machine learning methods for the study of cybersickness: a systematic review. Brain Informatics, 9(1), 24. |
[14] | Ding S., Kou L., and Wu T., 2022. A GAN-based intrusion detection model for 5G enabled future metaverse. Mobile Networks and Applications, 27(6), pp. 2596-2610. |
[15] | He Y., Kong M., Du C., Yao D., and Yu M., 2022. Communication security analysis of intelligent transportation system using 5G internet of things from the perspective of big data. IEEE Transactions on Intelligent Transportation Systems, 24(2), pp. 2199-2207. |
[16] | Lee J., and Park K., 2019. AE-CGAN model based high performance network intrusion detection system. Applied Sciences, 9(20), 4221. |
[17] | Mavaluru D., 2021. Using machine learning, an intrusion detection and prevention system for malicious crawler detection in e-learning systems. Multicultural Education, 7(11). |
[18] | Maseer Z.K., Yusof R., Bahaman N., Mostafa S.A., and Foozy C.F.M., 2021. Benchmarking of machine learning for anomaly based intrusion detection systems in the CICIDS2017 dataset. IEEE Access, 9, pp. 22351-22370. |
[19] | Kim J., Shim M., Hong S., Shin Y., and Choi E., 2020. Intelligent detection of IoT botnets using machine learning and deep learning. Applied Sciences, 10(19), 7009. |
[20] | Butun I., Morgera S.D., and Sankar R., 2013. A survey of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys & Tutorials, 16(1), pp. 266-282. |
[21] | Patil S., Varadarajan V., Mazhar S.M., Sahibzada A., Ahmed N., Sinha O., Kumar S., Shaw K., and Kotecha K., 2022. Explainable artificial intelligence for intrusion detection system. Electronics, 11(19), 3079. |
[22] | Sivamohan S., Sridhar S.S., and Krishnaveni S., 2023. TEA-EKHO-IDS: an intrusion detection system for industrial CPS with trustworthy explainable AI and enhanced krill herd optimization. Peer-To-Peer Networking and Applications, 16(4), pp. 1993-2021. |
[23] | Alani M.M., 2022. BotStop: packet-based efficient and explainable IoT botnet detection using machine learning. Computer Communications, 193, pp. 53-62. |
[24] | Abou El Houda Z., Brik B., and Khoukhi L., 2022. “why should I trust your ids?”: an explainable deep learning framework for intrusion detection systems in internet of things networks. IEEE Open Journal of the Communications Society, 3, pp. 1164-1176. |
[25] | Alani M.M., Awad A.I., and Barka E., 2023. ARP-PROBE: an ARP spoofing detector for internet of things networks using explainable deep learning. Internet of Things, 23, 100861. |
[26] | He S., Du C., and Hossain M.S., 2023. 6g-enabled consumer electronics device intrusion detection with federated meta-learning and digital twins in a meta-verse environment. IEEE Transactions on Consumer Electronics. |
[27] | Li K., Cui Y., Li W., Lv T., Yuan X., Li S., Ni W., Simsek M., and Dressler F., 2022. When internet of things meets metaverse: convergence of physical and cyber worlds. IEEE Internet of Things Journal, 10(5), pp. 4148-4173. |
[28] | Ahmad B., Wu Z., Huang Y., and Rehman S.U., 2024. Enhancing the security in IoT and IIoT networks: an intrusion detection scheme leveraging deep transfer learning. Knowledge-Based Systems, 305, 112614. |
[29] | Ferrag M.A., Friha O., Hamouda D., Maglaras L., and Janicke H., 2022. Edge-IIoTset: A new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning. IEEE Access, 10, pp. 40281-40306. |
[30] | Lin Z.Q., Shafiee M.J., Bochkarev S., Jules M.S., Wang X.Y., and Wong A., 2019. Do explanations reflect decisions? A machine-centric strategy to quantify the performance of explainability algorithms. Arxiv Preprint Arxiv:1910.07387. |
[31] | Zhang Z., Al Hamadi H., Damiani E., Yeun C.Y., and Taher F., 2022. Explainable artificial intelligence applications in cyber security: state-of-the-art in research. IEEE Access, 10, pp. 93104-93139. |
[32] | Lundberg S., 2017. A unified approach to interpreting model predictions. arXiv preprint arXiv:1705.07874. |
[1] | Ashu Mehta, Navdeep Kaur, and Amandeep Kaur. A Review of Software Fault Prediction Techniques in Class Imbalance Scenarios [J]. Int J Performability Eng, 2025, 21(3): 123-130. |
[2] | Parveen Sihmar and Vikas Modgil. Petri Net-Based Decision Support System for Maintenance Prioritization in Butter Oil Production Systems [J]. Int J Performability Eng, 2025, 21(3): 141-148. |
[3] | Seema Kalonia and Amrita Upadhyay. Data Driven Software Quality Assessment: Correlation Analysis of Code Metrics and Fault-Proneness [J]. Int J Performability Eng, 2025, 21(3): 149-156. |
[4] | Vikas, Charu Wahi, Bharat Bhushan Sagar, and Manisha Manjul. Trust Management in WSN using ML for Detection of DDoS Attacks [J]. Int J Performability Eng, 2025, 21(3): 157-167. |
[5] | Sidali Bacha. Evaluation of the Dynamic Behavior of Critical Systems using the Mixture Weibull Proportional Hazard Model: A Case Study of a Gas Turbine [J]. Int J Performability Eng, 2025, 21(2): 74-83. |
[6] | Ashu Mehta, Navdeep Kaur, and Amandeep Kaur. Addressing Class Imbalance in Software Fault Prediction using BVPC-SENN: A Hybrid Ensemble Approach [J]. Int J Performability Eng, 2025, 21(2): 94-103. |
[7] | Pancham Singh, Updesh Kumar Jaiswal, Eshank Jain, Nikhil Kumar, and Vimlesh Mishra. A Novel Methodology Utilizing Modern CCTV Cameras and Software as a Service Model for Crime Detection and Prediction [J]. Int J Performability Eng, 2025, 21(2): 112-121. |
[8] | Updesh Kumar Jaiswal and Amarjeet Prajapati. An Effective PSO-Driven Method for Test Data Generation in Branch Coverage Software Testing [J]. Int J Performability Eng, 2025, 21(1): 1-9. |
[9] | Archana Sharma and Dharmveer Singh Rajpoot. A DNN Anti-Predatory Algorithm-Based Model to Enhance the Efficiency of Software Effort Estimation [J]. Int J Performability Eng, 2025, 21(1): 10-23. |
[10] | Anita Rani and Vinay Bhardwaj. Optimized 3D Rectangular Filtration for Routing in FANETs [J]. Int J Performability Eng, 2025, 21(1): 24-35. |
[11] | Arpna Saxena and Sangeeta Mittal. CluSHAPify: Synergizing Clustering and SHAP Value Interpretations for Improved Reconnaissance Attack Detection in IIoT Networks [J]. Int J Performability Eng, 2025, 21(1): 36-47. |
[12] | Seema Kalonia and Amrita Upadhyay. Comparative Analysis of Machine Learning Model and PSO Optimized CNN-RNN for Software Fault Prediction [J]. Int J Performability Eng, 2025, 21(1): 48-55. |
[13] | Megha Jain and Dhiraj Pandey. HRCM: An Approach using Blockchain Technology in Healthcare-Record Chain Management [J]. Int J Performability Eng, 2025, 21(1): 56-64. |
[14] | Manu Banga. Enhancing Software Fault Prediction using Machine Learning [J]. Int J Performability Eng, 2024, 20(9): 529-540. |
[15] | Vikas Kumar, Charu Wahi, Bharat Bhushan Sagar, and Manisha Manjul. Ensemble Learning Based Intrusion Detection for Wireless Sensor Network Environment [J]. Int J Performability Eng, 2024, 20(9): 541-551. |
|