Feedback deer hunting optimization algorithm for intrusion detection in cloud based deep residual network

被引:1
作者
Soniya, Sobin S. [1 ]
Vigila, Maria Celestin S. [1 ]
机构
[1] Noorul Islam Ctr Higher Educ, Kumaracoil 629180, Tamil Nadu, India
关键词
Intrusion detection; cloud computing; support vector machine; Deep Residual network; virtual machine; FRAMEWORK; SYSTEM;
D O I
10.1142/S1793962321500471
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is the distributed computing paradigm continually exposed to different attacks and threats of various origins. The data stored in the cloud framework is easier for external and internal intruders, as access to the cloud framework is done through internet services. Various intrusion detection (ID) methods are developed to detect network intruders in the cloud, but these methods are not primarily effective in generating accurate detection results. Hence, an effective intrusion detection system (IDS) is designed to solve the security issues that unfavorably influence the sustainable development of the cloud and enhance the protection of the cloud from malicious attacks. The IDS is modeled using the proposed Feedback Deer Hunting Optimization (FDHO)-based Deep Residual network to detect network intrusions. However, the proposed FDHO algorithm is designed by integrating Feedback Artificial Tree (FAT) with Deer Hunting Optimization (DHOA), respectively. Moreover, the detection of malicious attacks is carried out using a Deep Residual network that significantly increases the training speed, reduces the computational complexity, and generates effective detection results. The performance of the proposed method is comparatively analyzed with the existing techniques, such as Stacked Contractive Auto-Encoder and Support Vector Machine (SCAE+SVM), Artificial Neural Network with ant bee colony optimization algorithm+fuzzy clustering (ANN+ABC+fuzzy clustering), Improved dynamic immune algorithm (IDIA), and Normalized K-means (NK) clustering algorithm with RNN named, (NK-RNN), FAT-based Deep Residual network, and DHOA-based Deep Residual network using the BoT-IoT dataset and KDD cup-99 dataset. The proposed method achieved outstanding performance by considering the metrics, like specificity, accuracy, and sensitivity, with the values of 0.9526, 0.9498, and 0.9214 using the BoT-IoT dataset.
引用
收藏
页数:23
相关论文
共 50 条
  • [1] Taylor-feedback deer hunting optimisation algorithm for intrusion detection in cloud using deep maxout network
    Sobin Soniya S.
    Maria Celestin Vigila S.
    International Journal of Intelligent Information and Database Systems, 2022, 15 (02): : 199 - 222
  • [2] Cloud Intrusion Detection Model Based on Deep Belief Network and Grasshopper Optimization
    Parganiha V.
    Shukla S.P.
    Sharma L.K.
    International Journal of Ambient Computing and Intelligence, 2022, 13 (01):
  • [3] An Improved Algorithm for Network Intrusion Detection Based on Deep Residual Networks
    Hu, Xuntao
    Meng, Xiancai
    Liu, Shaoqing
    Liang, Lizhen
    IEEE ACCESS, 2024, 12 : 66432 - 66441
  • [4] Chronological salp swarm algorithm based deep belief network for intrusion detection in cloud using fuzzy entropy
    Karuppusamy, Loheswaran
    Ravi, Jayavadivel
    Dabbu, Murali
    Lakshmanan, Srinivasan
    INTERNATIONAL JOURNAL OF NUMERICAL MODELLING-ELECTRONIC NETWORKS DEVICES AND FIELDS, 2022, 35 (01)
  • [5] Pelican: A Deep Residual Network for Network Intrusion Detection
    Wu, Peilun
    Guo, Hui
    Moustafa, Nour
    50TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W 2020), 2020, : 55 - 62
  • [6] Research on the Detection of Network Intrusion Prevention with SVM Based Optimization Algorithm
    Wang, Debing
    Xu, Guangyu
    INFORMATICA-AN INTERNATIONAL JOURNAL OF COMPUTING AND INFORMATICS, 2020, 44 (02): : 269 - 273
  • [7] Performance of deer hunting optimization based deep learning algorithm for speech emotion recognition
    Agarwal, Gaurav
    Om, Hari
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (07) : 9961 - 9992
  • [8] Training fuzzy deep neural network with honey badger algorithm for intrusion detection in cloud environment
    Jain, Deepak Kumar
    Ding, Weiping
    Kotecha, Ketan
    INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2023, 14 (06) : 2221 - 2237
  • [9] Training fuzzy deep neural network with honey badger algorithm for intrusion detection in cloud environment
    Deepak Kumar Jain
    Weiping Ding
    Ketan Kotecha
    International Journal of Machine Learning and Cybernetics, 2023, 14 : 2221 - 2237
  • [10] Border-hunting optimization for mobile agent-based intrusion detection with deep convolutional neural network
    Kaur, Prabhjot
    Batra, Shalini
    Rana, Prashant Singh
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (01)