Optimized deep learning methodology for intruder behavior detection and classification in cloud

被引:0
作者
Mohan [1 ]
Tamizhazhagan, V. [1 ]
Balaji, S. [2 ]
机构
[1] Annamalai Univ, Dept Informat Technol, Annamalai 608001, Tamil Nadu, India
[2] Panimalar Engn Coll, Dept Comp Sci & Engn, Chennai 600123, Tamil Nadu, India
关键词
Optimized deep learning; Intruder detection; Performance; Security; Cloud computing; KEY DISTRIBUTION PROTOCOL; BLACK-HOLE; MITIGATION; ATTACK; FRAMEWORK; DESIGN; SYSTEM; SDN;
D O I
10.47974/JDMSC-1516
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Apps, networks, frameworks, and services are all made possible by the cloud. In order to get the most out of the improved accessibility and computational capabilities, the Service Providers can offer an optimal use of current services. Application services have been revolutionised as their launch since they are useful and cost-effective for both suppliers and users. Increasingly, cyber defence is a vital research area in today's environment, where networks are essential. The software and hardware of a network are constantly monitored by an intrusion detection framework (IDF), which is an essential part of any cyber defence plan. Many of the current IDSs are still struggling to improve detection performance, reduce false alarm rates and detect new threats. Based on parametric computation analysis, this study provides a deep learning approach to optimize cloud networks and to identify intruders. Results of suggested approach have been displayed from data compared to current methods in the conclusion section.
引用
收藏
页码:1109 / 1119
页数:11
相关论文
共 33 条
  • [1] Hypervisor-based cloud intrusion detection through online multivariate statistical change tracking
    Aldribi, Abdulaziz
    Traore, Issa
    Moa, Belaid
    Nwamuo, Onyekachi
    [J]. COMPUTERS & SECURITY, 2020, 88
  • [2] A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks
    Alkadi, Osama
    Moustafa, Nour
    Turnbull, Benjamin
    Choo, Kim-Kwang Raymond
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (12): : 9463 - 9472
  • [3] A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions
    Alkadi, Osama
    Moustafa, Nour
    Turnbull, Benjamin
    [J]. IEEE ACCESS, 2020, 8 : 104893 - 104917
  • [4] An enhanced 4-way technique using cookies for robust authentication process in wireless network
    Dadheech, Pankaj
    Kumar, Ankit
    Choudhary, Chothmal
    Beniwal, Mahender Kumar
    Dogiwal, Sanwta Ram
    Agarwal, Basant
    [J]. JOURNAL OF STATISTICS & MANAGEMENT SYSTEMS, 2019, 22 (04) : 773 - 782
  • [5] A Survey on Distributed Denial of Service (DDoS) Attacks in SDN and Cloud Computing Environments
    Dong, Shi
    Abbas, Khushnood
    Jain, Raj
    [J]. IEEE ACCESS, 2019, 7 : 80813 - 80828
  • [6] En-ABC: An ensemble artificial bee colony based anomaly detection scheme for cloud environment
    Garg, Sahil
    Kaur, Kuljeet
    Batra, Shalini
    Aujla, Gagangeet Singh
    Morgan, Graham
    Kumar, Neeraj
    Zomaya, Albert Y.
    Ranjan, Rajiv
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 135 : 219 - 233
  • [7] Hajimirzaei B., 2018, ICT EXPRESS
  • [8] A malicious threat detection model for cloud assisted internet of things (CoT) based industrial control system (ICS) networks using deep belief network
    Huda, Shamsul
    Miah, Suruz
    Yearwood, John
    Alyahya, Sultan
    Al-Dossari, Hmood
    Doss, Robin
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 120 : 23 - 31
  • [9] An improved quantum key distribution protocol for verification
    Kumar, Ankit
    Dadheech, Pankaj
    Singh, Vijander
    Poonia, Ramesh C.
    Raja, Linesh
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (04) : 491 - 498
  • [10] Design and analysis of an improved AODV protocol for black hole and flooding attack in vehicular ad-hoc network (VANET)
    Kumar, Ankit
    Sinha, Madhavi
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (04) : 453 - 463