Optimization of BPN parameters using PSO for intrusion detection in cloud environment

被引:0
作者
Nagarajan, G. [1 ]
Sajith, P. J. [2 ]
机构
[1] Sathyabama Inst Sci & Technol, Dept Comp Sci & Engn, Chennai 600127, India
[2] Toc H Inst Sci & Technol, Dept Comp Sci & Engn, Ernakulam 682313, India
关键词
Back propagation network; Intrusion detection system; Neural network; Particle swarm optimization; System calls; PARTICLE SWARM OPTIMIZATION; DEEP LEARNING APPROACH; DETECTION SYSTEM; NETWORK; DESIGN;
D O I
10.1007/s00500-023-08737-1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The usage of internet is getting increased in all aspect, like from building various models that are fully connect with internet to the usage of digital media for 24/7. As this is rising in a way, on the other side, the concern about 'data security' is raising, and everybody's information needs to be protected from any other attacks or can say there should not be no data leakage. So, for detecting these attacks, intrusion detection system is placed. But placing this traditional intrusion detection system (IDS) will increase the concerns of security even more, so to amp the process integration of latest technology such deep learning comes in action. Thereby, this paper proposes an IDS using back propagation network where intrusions are identified based on the system calls that we collected in the dataset KDD cup 99. Also, to increase the optimization of neural network, we used particle swarm optimization thereby increase the accurate detection of the system saying if that is normal or abnormal in behavior. We evaluate our proposed model with other methods such as ANFIS, F-GNP and FCM in which the proposed model gives 96.5% accurate detection.
引用
收藏
页数:12
相关论文
共 50 条
[11]   Horse Herd optimization with deep learning based intrusion detection in cloud computing environment [J].
Samineni Nagamani ;
S. Arivalagan ;
M. Senthil ;
P. Sudhakar .
International Journal of Information Technology, 2025, 17 (1) :387-393
[12]   Applying PSO-based BPN for predicting the yield rate of DRAM modules produced using defective ICs [J].
Lee, Zne-Jung ;
Ying, Kuo-Ching ;
Chen, Shih-Chieh ;
Lin, Shih-Wei .
INTERNATIONAL JOURNAL OF ADVANCED MANUFACTURING TECHNOLOGY, 2010, 49 (9-12) :987-999
[13]   Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm [J].
Hajimirzaei, Bahram ;
Navimipour, Nima Jafari .
ICT EXPRESS, 2019, 5 (01) :56-59
[14]   Intrusion Detection in Cloud Computing Implementation of (SAAS & IAAS) Using Grid Environment [J].
Moorthy, S. Manthira ;
Masillamani, M. Roberts .
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON INTERNET COMPUTING AND INFORMATION COMMUNICATIONS (ICICIC GLOBAL 2012), 2014, 216 :53-64
[15]   Distributed Intrusion Detection System using Mobile Agents in Cloud Computing Environment [J].
Mehmood, Yasir ;
Kanwal, Ayesha ;
Shibli, Muhammad Awais ;
Masood, Rahat .
2015 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS), 2015, :1-8
[16]   An Adaptive Network Intrusion Detection Approach for the Cloud Environment [J].
Chou, Hui-Hao ;
Wang, Sheng-De .
49TH ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2015, :7-12
[17]   A Survey of Intrusion Detection Systems for Cloud Computing Environment [J].
Chiba, Zouhair ;
Abghour, Noureddine ;
Moussaid, Khalid ;
El Omri, Amina ;
Rida, Mohamed .
2016 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2016,
[18]   Network Intrusion Detection Based on PSO-Xgboost Model [J].
Jiang, Hui ;
He, Zheng ;
Ye, Gang ;
Zhang, Huyin .
IEEE ACCESS, 2020, 8 :58392-58401
[19]   Intelligent Intrusion Detection System for Private Cloud Environment [J].
Muthukumar, B. ;
Rajendran, Praveen Kumar .
SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 :54-65
[20]   An Optimization Method for Parameters of SVM in Network Intrusion Detection System [J].
Yang, Qiuwei ;
Fu, Hongjuan ;
Zhu, Ting .
PROCEEDINGS 12TH ANNUAL INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS 2016), 2016, :136-142