Feedback deer hunting optimization algorithm for intrusion detection in cloud based deep residual network

被引:1
作者
Soniya, Sobin S. [1 ]
Vigila, Maria Celestin S. [1 ]
机构
[1] Noorul Islam Ctr Higher Educ, Kumaracoil 629180, Tamil Nadu, India
关键词
Intrusion detection; cloud computing; support vector machine; Deep Residual network; virtual machine; FRAMEWORK; SYSTEM;
D O I
10.1142/S1793962321500471
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is the distributed computing paradigm continually exposed to different attacks and threats of various origins. The data stored in the cloud framework is easier for external and internal intruders, as access to the cloud framework is done through internet services. Various intrusion detection (ID) methods are developed to detect network intruders in the cloud, but these methods are not primarily effective in generating accurate detection results. Hence, an effective intrusion detection system (IDS) is designed to solve the security issues that unfavorably influence the sustainable development of the cloud and enhance the protection of the cloud from malicious attacks. The IDS is modeled using the proposed Feedback Deer Hunting Optimization (FDHO)-based Deep Residual network to detect network intrusions. However, the proposed FDHO algorithm is designed by integrating Feedback Artificial Tree (FAT) with Deer Hunting Optimization (DHOA), respectively. Moreover, the detection of malicious attacks is carried out using a Deep Residual network that significantly increases the training speed, reduces the computational complexity, and generates effective detection results. The performance of the proposed method is comparatively analyzed with the existing techniques, such as Stacked Contractive Auto-Encoder and Support Vector Machine (SCAE+SVM), Artificial Neural Network with ant bee colony optimization algorithm+fuzzy clustering (ANN+ABC+fuzzy clustering), Improved dynamic immune algorithm (IDIA), and Normalized K-means (NK) clustering algorithm with RNN named, (NK-RNN), FAT-based Deep Residual network, and DHOA-based Deep Residual network using the BoT-IoT dataset and KDD cup-99 dataset. The proposed method achieved outstanding performance by considering the metrics, like specificity, accuracy, and sensitivity, with the values of 0.9526, 0.9498, and 0.9214 using the BoT-IoT dataset.
引用
收藏
页数:23
相关论文
共 50 条
  • [21] Chaotic Metaheuristics with Multi-Spiking Neural Network Based Cloud Intrusion Detection
    Yamin, Mohammad
    Bajaba, Saleh
    AlKubaisy, Zenah Mahmoud
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (03): : 6101 - 6118
  • [22] Intrusion Detection for IoT Based on Improved Genetic Algorithm and Deep Belief Network
    Zhang, Ying
    Li, Peisong
    Wang, Xinheng
    IEEE ACCESS, 2019, 7 : 31711 - 31722
  • [23] Intrusion Detection Using Bat Optimization Algorithm and DenseNet for IoT and Cloud Based Systems
    Bella, H. Kanakadurga
    Vasundra, S.
    INTERNATIONAL JOURNAL ON ARTIFICIAL INTELLIGENCE TOOLS, 2024, 33 (02)
  • [24] Research on Intrusion Detection Algorithm of User Data based on Cloud Computing
    Zhang Hongdong
    Song Yuli
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 275 - 283
  • [25] An optimization Method for Intrusion Detection Classification Model Based on Deep Belief Network
    Wei, Peng
    Li, Yufeng
    Zhang, Zhen
    Hu, Tao
    Li, Ziyong
    Liu, Diyang
    IEEE ACCESS, 2019, 7 : 87593 - 87605
  • [26] Machine Learning-Based Network Intrusion Detection Optimization for Cloud Computing Environments
    Samriya, Jitendra Kumar
    Kumar, Surendra
    Kumar, Mohit
    Wu, Huaming
    Gill, Sukhpal Singh
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (04) : 7449 - 7460
  • [27] Enhanced Quantum-Secure Ensemble Intrusion Detection Techniques for Cloud Based on Deep Learning
    Salvakkam, Dilli Babu
    Saravanan, Vijayalakshmi
    Jain, Praphula Kumar
    Pamula, Rajendra
    COGNITIVE COMPUTATION, 2023, 15 (05) : 1593 - 1612
  • [28] An Intrusion Detection System Based on a Simplified Residual Network
    Xiao, Yuelei
    Xiao, Xing
    INFORMATION, 2019, 10 (11)
  • [29] Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing
    Fahad, Ahmed Mohammed
    Ahmed, Abdulghani Ali
    Kahar, Mohd Nizam Mohmad
    INTELLIGENT COMPUTING & OPTIMIZATION, 2019, 866 : 56 - 65
  • [30] Performance Study of a Network Intrusion Detection Algorithm Improved by an Optimization Algorithm
    Feng, Wei
    Gao, Hanjun
    Cao, Duan
    International Journal of Network Security, 2022, 24 (05) : 953 - 958