An effective optimization enabled deep learning based Malicious behaviour detection in cloud computing

被引:7
作者
Bhingarkar, Sukhada [1 ]
Revathi, S. Thanga [2 ]
Kolli, Chandra Sekhar [3 ]
Mewada, Hiren K. [4 ]
机构
[1] MIT World Peace Univ, Pune, Maharashtra, India
[2] SRM Inst Sci & Technol, Chennai, Tamil Nadu, India
[3] Aditya Coll Engn & Technol, Dept Informat Technol, Surampalem, Andhra Pradesh, India
[4] Prince Mohammad Bin Fahd Univ, Elect Engn Dept, Al Khobar, Saudi Arabia
关键词
Cloud computing; Malicious behavior detection; Deep Q network; Min-max normalization; Hellinger distance; DETECTION SYSTEM; SCHEME;
D O I
10.1007/s41315-022-00239-x
中图分类号
TP24 [机器人技术];
学科分类号
080202 ; 1405 ;
摘要
The quick deployment of cloud with computing platforms has driven novel tendencies which shifted operations of networks. However, the cloud is facing several security issues and is susceptible because of suspicious tasks and attacks. This paper devises a new method to detect malicious activities in cloud. Here, first step is the simulation of cloud patterns, wherein the data outsourced by the users are utilized for detecting malicious behaviors. The data pre-processing is done to eradicate unnecessary data and noise contained in the data and is performed using a min-max normalization process. The selection of imperative features is done using distance measure, namely Hellinger distance for mining the essential features. The augmentation of data is performed to make the data appropriate for improved processing. The malicious behavior detection is performed by exploiting the Deep Q network wherein training is performed with Autoregressive chimp optimization algorithm (AChOA), which is developed by integrating chimp optimization algorithm (ChOA) and Conditional Autoregressive Value at risk (CAViaR). The proposed AChOA-based Deep Q network outperformed with the highest testing accuracy of 94%, sensitivity of 94.1%, and specificity of 91.4%.
引用
收藏
页码:575 / 588
页数:14
相关论文
共 26 条
[1]  
Aljamal I, 2019, 2019 IEEE/ACIS 17TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT AND APPLICATIONS (SERA), P84, DOI [10.1109/SERA.2019.8886794, 10.1109/sera.2019.8886794]
[2]  
[Anonymous], 2016, ACM Comput. Surv
[3]   Intelligent Behavior-Based Malware Detection System on Cloud Computing Environment [J].
Aslan, Omer ;
Ozkan-Okay, Merve ;
Gupta, Deepti .
IEEE ACCESS, 2021, 9 :83252-83271
[4]  
Dasgupta A, 2007, KDD-2007 PROCEEDINGS OF THE THIRTEENTH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, P230
[5]   CAViaR: Conditional autoregressive value at risk by regression quantiles [J].
Engle, RF ;
Manganelli, S .
JOURNAL OF BUSINESS & ECONOMIC STATISTICS, 2004, 22 (04) :367-381
[6]   En-ABC: An ensemble artificial bee colony based anomaly detection scheme for cloud environment [J].
Garg, Sahil ;
Kaur, Kuljeet ;
Batra, Shalini ;
Aujla, Gagangeet Singh ;
Morgan, Graham ;
Kumar, Neeraj ;
Zomaya, Albert Y. ;
Ranjan, Rajiv .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 135 :219-233
[7]   An Immediate System Call Sequence Based Approach for Detecting Malicious Program Executions in Cloud Environment [J].
Gupta, Sanchika ;
Kumar, Padam .
WIRELESS PERSONAL COMMUNICATIONS, 2015, 81 (01) :405-425
[8]  
ieee, BOT IOT DAT
[9]  
Jayalakshmi T, 2011, INT J COMPUT THEORY, V3, P89, DOI DOI 10.7763/IJCTE.2011.V3.288
[10]   Chimp optimization algorithm [J].
Khishe, M. ;
Mosavi, M. R. .
EXPERT SYSTEMS WITH APPLICATIONS, 2020, 149