An effective optimization enabled deep learning based Malicious behaviour detection in cloud computing

被引:5
|
作者
Bhingarkar, Sukhada [1 ]
Revathi, S. Thanga [2 ]
Kolli, Chandra Sekhar [3 ]
Mewada, Hiren K. [4 ]
机构
[1] MIT World Peace Univ, Pune, Maharashtra, India
[2] SRM Inst Sci & Technol, Chennai, Tamil Nadu, India
[3] Aditya Coll Engn & Technol, Dept Informat Technol, Surampalem, Andhra Pradesh, India
[4] Prince Mohammad Bin Fahd Univ, Elect Engn Dept, Al Khobar, Saudi Arabia
关键词
Cloud computing; Malicious behavior detection; Deep Q network; Min-max normalization; Hellinger distance; DETECTION SYSTEM; SCHEME;
D O I
10.1007/s41315-022-00239-x
中图分类号
TP24 [机器人技术];
学科分类号
080202 ; 1405 ;
摘要
The quick deployment of cloud with computing platforms has driven novel tendencies which shifted operations of networks. However, the cloud is facing several security issues and is susceptible because of suspicious tasks and attacks. This paper devises a new method to detect malicious activities in cloud. Here, first step is the simulation of cloud patterns, wherein the data outsourced by the users are utilized for detecting malicious behaviors. The data pre-processing is done to eradicate unnecessary data and noise contained in the data and is performed using a min-max normalization process. The selection of imperative features is done using distance measure, namely Hellinger distance for mining the essential features. The augmentation of data is performed to make the data appropriate for improved processing. The malicious behavior detection is performed by exploiting the Deep Q network wherein training is performed with Autoregressive chimp optimization algorithm (AChOA), which is developed by integrating chimp optimization algorithm (ChOA) and Conditional Autoregressive Value at risk (CAViaR). The proposed AChOA-based Deep Q network outperformed with the highest testing accuracy of 94%, sensitivity of 94.1%, and specificity of 91.4%.
引用
收藏
页码:575 / 588
页数:14
相关论文
共 50 条
  • [1] An effective optimization enabled deep learning based Malicious behaviour detection in cloud computing
    Sukhada Bhingarkar
    S. Thanga Revathi
    Chandra Sekhar Kolli
    Hiren K. Mewada
    International Journal of Intelligent Robotics and Applications, 2023, 7 : 575 - 588
  • [2] Malicious mining code detection based on ensemble learning in cloud computing environment
    Li, Shudong
    Li, Yuan
    Han, Weihong
    Du, Xiaojiang
    Guizani, Mohsen
    Tian, Zhihong
    SIMULATION MODELLING PRACTICE AND THEORY, 2021, 113
  • [3] Horse Herd optimization with deep learning based intrusion detection in cloud computing environment
    Samineni Nagamani
    S. Arivalagan
    M. Senthil
    P. Sudhakar
    International Journal of Information Technology, 2025, 17 (1) : 387 - 393
  • [4] Study on Deep Unsupervised Learning Optimization Algorithm Based on Cloud Computing
    Yan, Hui
    Yu, Ping
    Long, Duo
    2019 INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION, BIG DATA & SMART CITY (ICITBS), 2019, : 679 - 681
  • [5] Machine Learning-Based Network Intrusion Detection Optimization for Cloud Computing Environments
    Samriya, Jitendra Kumar
    Kumar, Surendra
    Kumar, Mohit
    Wu, Huaming
    Gill, Sukhpal Singh
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (04) : 7449 - 7460
  • [6] Malicious attack detection approach in cloud computing using machine learning techniques
    M. Arunkumar
    K. Ashok Kumar
    Soft Computing, 2022, 26 : 13097 - 13107
  • [7] Malicious attack detection approach in cloud computing using machine learning techniques
    Arunkumar, M.
    Kumar, K. Ashok
    SOFT COMPUTING, 2022, 26 (23) : 13097 - 13107
  • [8] Filter-Based Ensemble Feature Selection and Deep Learning Model for Intrusion Detection in Cloud Computing
    Kavitha, C.
    Saravanan, M.
    Gadekallu, Thippa Reddy
    Nimala, K.
    Kavin, Balasubramanian Prabhu
    Lai, Wen-Cheng
    ELECTRONICS, 2023, 12 (03)
  • [9] DDoS Attack Detection in Cloud Computing Based on Ensemble Feature Selection and Deep Learning
    Sanjalawe, Yousef
    Althobaiti, Turke
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 75 (02): : 3571 - 3588
  • [10] Multiverse fractional calculus based hybrid deep learning and fusion approach for detecting malicious behavior in cloud computing environment
    Kolli, Chandra Sekhar
    Ranjan, Nihar M.
    Talapula, Dharani Kumar
    Gawali, Vikram S.
    Biswas, Siddhartha Sankar
    MULTIAGENT AND GRID SYSTEMS, 2022, 18 (3-4) : 193 - 217