A Novel Deep Learning Technique for Big Data Anomaly Threat Severity Prediction in ELearning
Keywords:
Big data, Threat severity, Anomaly features
Abstract
E-learning platforms are susceptible to several anomalies, including abnormal learning behaviours, system abuse, and cyber security (CS) attacks, which interfere with the learning process. Conventional methods for detecting anomalies have limitations with high-dimensional data, skewed distributions, and poor feature selection, resulting in incorrect severity level predictions. To overcome these, a novel Sea Lion Multilayer Perceptron (SLMP) model is introduced for anomaly severity level prediction. At First, an e-learning anomaly dataset is gathered and trained in a Python environment. Hence, the data is preprocessed, and the Sea lion optimization (SLO) is used to select the best features to attain only the most significant attributes. Subsequently, the chosen informative features are employed for further process. Moreover, prediction and classification are performed using the SLMP model. Finally, Performance metrics like F score, Accuracy, recall precision and error rate are used to evaluate the effectiveness of the model. The results confirm the efficacy of the developed SLMP framework over current methods, illustrating its strength in optimizing predictive efficiency for anomaly severity detection in e-learning systems.
Published
2025-12-08
How to Cite
Chinnakka Sudha, & Sreenivasulu Bolla. (2025). A Novel Deep Learning Technique for Big Data Anomaly Threat Severity Prediction in ELearning. Statistics, Optimization & Information Computing. https://doi.org/10.19139/soic-2310-5070-2926
Issue
Section
Research Articles
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).