Horse Herd optimization with deep learning based intrusion detection in cloud computing environment

被引:0
|
作者
Samineni Nagamani [1 ]
S. Arivalagan [1 ]
M. Senthil [2 ]
P. Sudhakar [1 ]
机构
[1] Annamalai University,Department of CSE
[2] QIS College of Engineering and Technology,Department of AIML
关键词
Intrusion detection system; Cloud computing; Deep learning; Horse herd optimization; Data normalization;
D O I
10.1007/s41870-024-02199-w
中图分类号
学科分类号
摘要
The cloud offers applications, infrastructure, and storage services to consumers that must be secure by some strategies. Hence, security in the cloud is to protect consumer data and structure from malicious users by delivering integrity, availability, confidentiality, and in-time intrusion recognition. Utilizing deep learning (DL), intrusion detection systems (IDS) employ advanced neural networks to automatically recognize and respond to fraudulent activities,. By analyzing large-scale datasets of network traffic, DL techniques like Recurrent Neural Network (RNN) and Long Short-Term Memory network (LSTM), can distinguish patterns linked with several cyber-attacks. This study presents a novel Horse Herd Optimization with a Deep Learning based Intrusion Detection Approach (HHODL-IDA) methodology in Cloud Computing. The goal of the HHODL-IDA methodology is to achieve security in the cloud platform by employing intrusion detection. In the HHODL-IDA technique, min-max scalar is primarily utilized to scale the input data. To select the features, the HHODL-IDA technique involves the invasive weed optimization (IWO) technique. Next, the detection of intrusions takes place using attention-based bidirectional LSTM (A-BiLSTM) technique. Eventually, the HHO approach has been executed for the enhanced hyperparameter selection of the A-BiLSTM approach. The experimental value of the HHODL-IDA approach has been executed using a benchmark IDS database. The extensive comparison study stated that the HHODL-IDA approach outcomes in greater detection results in the CC platform.
引用
收藏
页码:387 / 393
页数:6
相关论文
共 50 条
  • [1] Modelling of intrusion detection using sea horse optimization with machine learning model on cloud environment
    Jansi Sophia Mary C.
    Mahalakshmi K.
    International Journal of Information Technology, 2024, 16 (3) : 1981 - 1988
  • [2] Power Intelligent Terminal Intrusion Detection Based on Deep Learning and Cloud Computing
    Li, Tong
    Zhao, Hai
    Tao, Yaodong
    Huang, Donghua
    Yang, Chao
    Xu, Shuheng
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [3] Track Signal Intrusion Detection Method Based on Deep Learning in Cloud-Edge Collaborative Computing Environment
    Zhong, Yaojun
    Zhong, Shuhai
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2023, 32 (15)
  • [4] Machine Learning-Based Network Intrusion Detection Optimization for Cloud Computing Environments
    Samriya, Jitendra Kumar
    Kumar, Surendra
    Kumar, Mohit
    Wu, Huaming
    Gill, Sukhpal Singh
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (04) : 7449 - 7460
  • [5] A Deep Learning Approach for Intrusion Detection Systems in Cloud Computing Environments
    Aljuaid, Wa'ad H.
    Alshamrani, Sultan S.
    APPLIED SCIENCES-BASEL, 2024, 14 (13):
  • [6] Enhanced Coyote Optimization with Deep Learning Based Cloud-Intrusion Detection System
    Basahel, Abdullah M.
    Yamin, Mohammad
    Basahel, Sulafah M.
    Lydia, E. Laxmi
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (02): : 4319 - 4336
  • [7] A Hybrid Deep Learning Intrusion Detection Model for Fog Computing Environment
    Kalaivani, K.
    Chinnadurai, M.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2021, 30 (01): : 1 - 15
  • [8] HIDS: A host based intrusion detection system for cloud computing environment
    Deshpande P.
    Sharma S.C.
    Peddoju S.K.
    Junaid S.
    Deshpande, Prachi (deprachi3@gmail.com), 2018, Springer (09) : 567 - 576
  • [9] FCM–SVM based intrusion detection system for cloud computing environment
    Aws Naser Jaber
    Shafiq Ul Rehman
    Cluster Computing, 2020, 23 : 3221 - 3231
  • [10] An efficient optimal security system for intrusion detection in cloud computing environment using hybrid deep learning technique
    Mayuranathan, M.
    Saravanan, S. K.
    Muthusenthil, B.
    Samydurai, A.
    ADVANCES IN ENGINEERING SOFTWARE, 2022, 173