Optimization of BPN parameters using PSO for intrusion detection in cloud environment

被引:0
作者
Nagarajan, G. [1 ]
Sajith, P. J. [2 ]
机构
[1] Sathyabama Inst Sci & Technol, Dept Comp Sci & Engn, Chennai 600127, India
[2] Toc H Inst Sci & Technol, Dept Comp Sci & Engn, Ernakulam 682313, India
关键词
Back propagation network; Intrusion detection system; Neural network; Particle swarm optimization; System calls; PARTICLE SWARM OPTIMIZATION; DEEP LEARNING APPROACH; DETECTION SYSTEM; NETWORK; DESIGN;
D O I
10.1007/s00500-023-08737-1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The usage of internet is getting increased in all aspect, like from building various models that are fully connect with internet to the usage of digital media for 24/7. As this is rising in a way, on the other side, the concern about 'data security' is raising, and everybody's information needs to be protected from any other attacks or can say there should not be no data leakage. So, for detecting these attacks, intrusion detection system is placed. But placing this traditional intrusion detection system (IDS) will increase the concerns of security even more, so to amp the process integration of latest technology such deep learning comes in action. Thereby, this paper proposes an IDS using back propagation network where intrusions are identified based on the system calls that we collected in the dataset KDD cup 99. Also, to increase the optimization of neural network, we used particle swarm optimization thereby increase the accurate detection of the system saying if that is normal or abnormal in behavior. We evaluate our proposed model with other methods such as ANFIS, F-GNP and FCM in which the proposed model gives 96.5% accurate detection.
引用
收藏
页数:12
相关论文
共 50 条
[21]   An Optimization Method for Parameters of SVM in Network Intrusion Detection System [J].
Yang, Qiuwei ;
Fu, Hongjuan ;
Zhu, Ting .
PROCEEDINGS 12TH ANNUAL INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS 2016), 2016, :136-142
[22]   Security Establishment in Cybersecurity Environment Using PSO Based Optimization [J].
J. Priyanka ;
M. Ramakrishnan .
Wireless Personal Communications, 2023, 129 :1807-1828
[23]   Security Establishment in Cybersecurity Environment Using PSO Based Optimization [J].
Priyanka, J. ;
Ramakrishnan, M. .
WIRELESS PERSONAL COMMUNICATIONS, 2023, 129 (03) :1807-1828
[24]   Cloud Security: LKM and Optimal Fuzzy System for Intrusion Detection in Cloud Environment [J].
Shyla, S. Immaculate ;
Sujatha, S. S. .
JOURNAL OF INTELLIGENT SYSTEMS, 2020, 29 (01) :1626-1642
[25]   Optimization of PID controller parameters using a hybrid PSO algorithm [J].
Zhang, Xia ;
Yang, Yue .
INTERNATIONAL JOURNAL OF DYNAMICS AND CONTROL, 2024, 12 (10) :3617-3627
[26]   Optimization of Welding Input Parameters Using PSO Technique for Minimizing HAZ Width in GMAW [J].
Mezaache, Mohamed ;
Babes, Badreddine ;
Chaouch, Saad .
PERIODICA POLYTECHNICA-MECHANICAL ENGINEERING, 2022, 66 (02) :99-108
[27]   Parameters optimization of T-S fuzzy classification system using PSO and SVM [J].
Du, Yijun ;
Lu, Xiaobo ;
Hu, Changhui .
2014 SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2014), VOL 2, 2014,
[28]   Modeling network intrusion detection system using feature selection and parameters optimization [J].
Kim, Dong Seong ;
Park, Gong Sou .
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2008, E91D (04) :1050-1057
[29]   Intrusion Detection Using Chaotic Poor and Rich Optimization with Deep Learning Model for Smart City Environment [J].
Alrayes, Fatma S. S. ;
Asiri, Mashael M. M. ;
Maashi, Mashael ;
Salama, Ahmed S. S. ;
Hamza, Manar Ahmed ;
Ibrahim, Sara Saadeldeen ;
Zamani, Abu Sarwar ;
Alsaid, Mohamed Ibrahim .
SUSTAINABILITY, 2023, 15 (08)
[30]   Optimization of cascade stilling basins using GA and PSO approaches [J].
Bakhtyar, R. ;
Barry, D. A. .
JOURNAL OF HYDROINFORMATICS, 2009, 11 (02) :119-132