Soft computing in computer network security protection system with machine learning based on level protection in the cloud environment

被引:2
作者
Thomas, Merin [1 ]
Gupta, Mohan Vishal [2 ]
Rajan, V. Gokul [3 ]
Rajalakshmi, R. [4 ]
Dixit, Rinku Sharma [5 ]
Choudhary, Shailee Lohmor [5 ]
机构
[1] Jain Deemed Univ, Fac Engn & Technol, Dept Comp Sci Engn, Bangalore, India
[2] Teerthanker Mahaveer Univ, Coll Comp Sci & IT, Moradabad, Uttar Pradesh, India
[3] Galgotias Univ, Sch Comp Sci & Engn, Greater Noida, Uttar Pradesh, India
[4] Panimalar Engn Coll, Panimalar Engn Coll ECE, Chennai, India
[5] New Delhi Inst Management, Dept Artificial Intelligence & Machine Learning Da, New Delhi, India
关键词
Computing network; Security enhancement; Machine learning; Cloud environment; Encoder architecture; Soft computing environment;
D O I
10.1007/s00500-023-08395-3
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Artificial neural networks (ANN), fuzzy inference systems, approximate reasoning, and derivative-free optimization approaches like evolutionary computation, among others, are all components of Soft Computing (SC), an innovative method for building computationally intelligent methods. Due to its widespread use and benefits, cloud computing is currently a major focus for researchers. The distributed nature of cloud computing and its complete reliance on the internet for service provision present security challenges, the most serious of which is insider Distributed Denial of Service (DDoS) which results in complete deactivation of services. Based on machine learning and the cloud, this study proposes a novel method for improving computing network security. Using a trust-based secure cloud environment and the Kernel principal component encoder architecture, the network monitoring is carried out. The soft computing environment-based detection of a cyberattack on the network is the purpose for the security enhancement. Throughput, QoS, latency, and packet delivery ratio for various monitored cyber security datasets are the focus of the experimental analysis. The proposed technique attained network security analysis of 89%, throughput of 98%, QoS of 66%, latency of 59%, packet delivery ratio of 83%.
引用
收藏
页数:12
相关论文
共 50 条
[31]   Cloud Computing and Machine Learning-based Electrical Fault Detection in the PV System [J].
Ragul, S. ;
Tamilselvi, S. ;
Rengarajan, S. ;
Guna Sundari, S. .
IETE JOURNAL OF RESEARCH, 2023, 69 (12) :8735-8752
[32]   Wide Area Power System Network Protection using Wavelet-Machine Learning Approach [J].
Goli, Ravi Kumar ;
Pappula, Sampath Kumar ;
Sankabathula, Karthik ;
Matta, Hemanjani ;
Agrapu, Durga Prasad ;
Rishi, K. .
10TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTING AND COMMUNICATION TECHNOLOGIES, CONECCT 2024, 2024,
[33]   Machine Learning Based Resource Allocation of Cloud Computing in Auction [J].
Zhang, Jixian ;
Xie, Ning ;
Zhang, Xuejie ;
Yue, Kun ;
Li, Weidong ;
Kumar, Deepesh .
CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 56 (01) :123-135
[34]   A Hybrid Intrusion Detection System Based on Machine Learning under Differential Privacy Protection [J].
Shi, Jibo ;
Lin, Yun ;
Zhang, Zherui ;
Yu, Shui .
2021 IEEE 94TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2021-FALL), 2021,
[35]   Machine Learning (ML)-centric resource security in cloud computing using authenticated key [J].
Saxena, Ravi Shankar ;
Mohapatra, Smaranika ;
Singh, Amit Kumar ;
Bhupati .
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (05) :1427-1436
[36]   Cloud computing security assurance modelling through risk analysis using machine learning [J].
Sharma, Abhishek ;
Singh, Umesh Kumar .
INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2025, 16 (03) :1287-1300
[37]   Machine learning with digital forensics for attack classification in cloud network environment [J].
Shaweta Sachdeva ;
Aleem Ali .
International Journal of System Assurance Engineering and Management, 2022, 13 :156-165
[38]   Machine learning with digital forensics for attack classification in cloud network environment [J].
Sachdeva, Shaweta ;
Ali, Aleem .
INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2022, 13 (SUPPL 1) :156-165
[39]   Apply machine learning techniques to detect malicious network traffic in cloud computing [J].
Alshammari, Amirah ;
Aldribi, Abdulaziz .
JOURNAL OF BIG DATA, 2021, 8 (01)
[40]   Apply machine learning techniques to detect malicious network traffic in cloud computing [J].
Amirah Alshammari ;
Abdulaziz Aldribi .
Journal of Big Data, 8