Socio Cyber-Physical System for Cyber-Attack Detection in Brand Marketing Communication Network

SiFan Yang,Haiming Long
DOI: https://doi.org/10.1007/s11277-024-11261-6
IF: 2.017
2024-06-19
Wireless Personal Communications
Abstract:Brand truthfulness, consumer trust, and economic security are all seriously dangerous from sophisticated cyberattacks targeting brand communication networks in today's digitally driven marketplace. This study aims to improve the identification and mitigation of cyber risks in these systems by introducing the Socio-Cyber-Physical System (SCPS) architecture. The suggested SCPS framework combines social behaviour analytics, physical network monitoring, and powerful artificial intelligence to establish a comprehensive and flexible security system. The proposed method processes the brand marketing area, such as Alluring ads, and the SCPS helps to identify the cyber-attacks in ads. Initially, it collects the URL structure dataset and pre-processes the data. Then, the SCPS is integrated with the system to identify any attacks in the URL dataset. Next, the dataset will be trained using deep learning methods such as Deep Maxout Network (DMN). An experimental setup in a fictitious brand communication network shows how well the system recognises and reacts to different types of cyberattacks. The SCPS framework is a new strategy that contributes to digital marketing administration and cyber security by bringing together the social, technological, and physical domains to protect digital marketing assets. The evaluation of the trial showed effective and precise detection of phishing attacks. According to the performance evaluation, the DMN algorithm beat other applied models with a maximum accuracy and precision of 96% during the training and 93% during the testing phases. Based on URL, text, and image attributes, the algorithms distinguished between phishing and authentic websites with these precision values. This study improves internet user security by assisting in the early detection of sophisticated phishing assaults.
telecommunications
What problem does this paper attempt to address?