Feedback deer hunting optimization algorithm for intrusion detection in cloud based deep residual network

被引:1
作者
Soniya, Sobin S. [1 ]
Vigila, Maria Celestin S. [1 ]
机构
[1] Noorul Islam Ctr Higher Educ, Kumaracoil 629180, Tamil Nadu, India
关键词
Intrusion detection; cloud computing; support vector machine; Deep Residual network; virtual machine; FRAMEWORK; SYSTEM;
D O I
10.1142/S1793962321500471
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is the distributed computing paradigm continually exposed to different attacks and threats of various origins. The data stored in the cloud framework is easier for external and internal intruders, as access to the cloud framework is done through internet services. Various intrusion detection (ID) methods are developed to detect network intruders in the cloud, but these methods are not primarily effective in generating accurate detection results. Hence, an effective intrusion detection system (IDS) is designed to solve the security issues that unfavorably influence the sustainable development of the cloud and enhance the protection of the cloud from malicious attacks. The IDS is modeled using the proposed Feedback Deer Hunting Optimization (FDHO)-based Deep Residual network to detect network intrusions. However, the proposed FDHO algorithm is designed by integrating Feedback Artificial Tree (FAT) with Deer Hunting Optimization (DHOA), respectively. Moreover, the detection of malicious attacks is carried out using a Deep Residual network that significantly increases the training speed, reduces the computational complexity, and generates effective detection results. The performance of the proposed method is comparatively analyzed with the existing techniques, such as Stacked Contractive Auto-Encoder and Support Vector Machine (SCAE+SVM), Artificial Neural Network with ant bee colony optimization algorithm+fuzzy clustering (ANN+ABC+fuzzy clustering), Improved dynamic immune algorithm (IDIA), and Normalized K-means (NK) clustering algorithm with RNN named, (NK-RNN), FAT-based Deep Residual network, and DHOA-based Deep Residual network using the BoT-IoT dataset and KDD cup-99 dataset. The proposed method achieved outstanding performance by considering the metrics, like specificity, accuracy, and sensitivity, with the values of 0.9526, 0.9498, and 0.9214 using the BoT-IoT dataset.
引用
收藏
页数:23
相关论文
共 50 条
  • [31] Leveraging feature subset selection with deer hunting optimizer based deep learning for anomaly detection in secure cloud environment
    Bai, V. Sujatha
    Punithavalli, M.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (25) : 65949 - 65966
  • [32] Intrusion Detection Based on BP Neural Network and Genetic Algorithm
    Zhao Jian-hua
    Li Wei-hua
    INFORMATION COMPUTING AND APPLICATIONS, PT 2, 2012, 308 : 438 - 444
  • [33] Network intrusion detection based on GMKL Algorithm
    Li, Yuxiang
    Wang, Haiming
    Yu, Hongkui
    Ren, Changquan
    Geng, Qingjia
    Journal of Networks, 2013, 8 (06) : 1315 - 1321
  • [34] Implementation of African vulture optimization algorithm based on deep learning for cybersecurity intrusion detection
    Alsirhani, Amjad
    Alshahrani, Mohammed Mujib
    Hassan, Ahmed M.
    Taloba, Ahmed I.
    El-Aziz, Rasha M. Abd
    Samak, Ahmed H.
    ALEXANDRIA ENGINEERING JOURNAL, 2023, 79 : 105 - 115
  • [35] A feasible approach to intrusion detection in virtual network layer of Cloud computing
    Modi, Chirag
    Patel, Dhiren
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2018, 43 (07):
  • [36] Deep Learning Network Intrusion Detection Based on Network Traffic
    Wang, Hanyang
    Zhou, Sirui
    Li, Honglei
    Hu, Juan
    Du, Xinran
    Zhou, Jinghui
    He, Yunlong
    Fu, Fa
    Yang, Houqun
    ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT III, 2022, 13340 : 194 - 207
  • [37] Virtual Machine Migration-Based Intrusion Detection System in Cloud Environment Using Deep Recurrent Neural Network
    Srinivas, B., V
    Mandal, Indrajit
    Keshavarao, Seetharam
    CYBERNETICS AND SYSTEMS, 2024, 55 (02) : 450 - 470
  • [38] An Industrial Network Intrusion Detection Algorithm Based on Multifeature Data Clustering Optimization Model
    Liang, Wei
    Li, Kuan-Ching
    Long, Jing
    Kui, Xiaoyan
    Zomaya, Albert Y.
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (03) : 2063 - 2071
  • [39] Research on the Network Intrusion Detection System based on Modified Particle Swarm Optimization Algorithm
    Wang, Xuesong
    Feng, Guangzhan
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE AND TECHNOLOGY EDUCATION (ICSSTE 2016), 2016, 55 : 634 - 639
  • [40] Combined Wireless Network Intrusion Detection Model Based on Deep Learning
    Yang, Hongyu
    Qin, Geng
    Ye, Li
    IEEE ACCESS, 2019, 7 : 82624 - 82632