Research Article Adaptive Anomaly Detection Framework Model Objects in Cyberspace Hasan Alkahtani, 1 Theyazn H. H. Aldhyani , 2 and Mohammed Al-Yaari 3 1 College of Computer Science and Information Technology, King Faisal University, P.O. Box 4000, Al-Ahsa 31982, Saudi Arabia 2 Community College of Abqaiq, King Faisal University, P.O. Box 4000, Al-Ahsa 31982, Saudi Arabia 3 Chemical Engineering Department, King Faisal University, P.O. Box 380, Al-Ahsa 31982, Saudi Arabia Correspondence should be addressed to Theyazn H. H. Aldhyani; taldhyani@kfu.edu.sa Received 27 October 2020; Revised 23 November 2020; Accepted 28 November 2020; Published 10 December 2020 Academic Editor: Mohammed Yahya Alzahrani Copyright © 2020 Hasan Alkahtani et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Telecommunication has registered strong and rapid growth in the past decade. Accordingly, the monitoring of computers and networks is too complicated for network administrators. Hence, network security represents one of the biggest serious challenges that can be faced by network security communities. Taking into consideration the fact that e-banking, e-commerce, and business data will be shared on the computer network, these data may face a threat from intrusion. The purpose of this research is to propose a methodology that will lead to a high level and sustainable protection against cyberattacks. In particular, an adaptive anomaly detection framework model was developed using deep and machine learning algorithms to manage automatically-congured application-level rewalls. The standard network datasets were used to evaluate the proposed model which is designed for improving the cybersecurity system. The deep learning based on Long-Short Term Memory Recurrent Neural Network (LSTM-RNN) and machine learning algorithms namely Support Vector Machine (SVM), K-Nearest Neighbor (K-NN) algorithms were implemented to classify the Denial-of-Service attack (DoS) and Distributed Denial-of-Service (DDoS) attacks. The information gain method was applied to select the relevant features from the network dataset. These network features were signicant to improve the classication algorithm. The system was used to classify DoS and DDoS attacks in four stand datasets namely KDD cup 199, NSL-KDD, ISCX, and ICI-ID2017. The empirical results indicate that the deep learning based on the LSTM-RNN algorithm has obtained the highest accuracy. The proposed system based on the LSTM-RNN algorithm produced the highest testing accuracy rate of 99.51% and 99.91% with respect to KDD Cup99, NSL-KDD, ISCX, and ICI-Id2017 datasets, respectively. A comparative result analysis between the machine learning algorithms, namely SVM and KNN, and the deep learning algorithms based on the LSTM-RNN model is presented. Finally, it is concluded that the LSTM-RNN model is ecient and eective to improve the cybersecurity system for detecting anomaly-based cybersecurity. 1. Introduction The end of the Cold War has led to many challenges and threats that the international community has never seen before, known as asymmetric or asymmetric cross-border threats that recognize neither borders and national sover- eignty nor the idea of a nation-state. These threats led to shifts in the eld of security and strategic studies as well as at the level of political practice. The explosion of the informa- tion revolution and the entry of the digital age, especially in the 21st century resulted in many repercussions manifested in the emergence of cyber threats and crimes. Such threats are regarded to be a major challenge to the national as well as international security making cyberspace as the fth area of war after land, sea, air, and space. These repercussions entailed the need for security guarantees within this digital environment which led to the emergence of cybersecurity as a new dimension within the eld of security studies that has acquired the interests of many researchers in this area. Having said that, we need to understand what cybersecurity is as a new variable in international relations. The task of adjusting concepts and terminology is a challenge facing Hindawi Applied Bionics and Biomechanics Volume 2020, Article ID 6660489, 14 pages https://doi.org/10.1155/2020/6660489