Feedback deer hunting optimization algorithm for intrusion detection in cloud based deep residual network

被引:1
作者
Soniya, Sobin S. [1 ]
Vigila, Maria Celestin S. [1 ]
机构
[1] Noorul Islam Ctr Higher Educ, Kumaracoil 629180, Tamil Nadu, India
关键词
Intrusion detection; cloud computing; support vector machine; Deep Residual network; virtual machine; FRAMEWORK; SYSTEM;
D O I
10.1142/S1793962321500471
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is the distributed computing paradigm continually exposed to different attacks and threats of various origins. The data stored in the cloud framework is easier for external and internal intruders, as access to the cloud framework is done through internet services. Various intrusion detection (ID) methods are developed to detect network intruders in the cloud, but these methods are not primarily effective in generating accurate detection results. Hence, an effective intrusion detection system (IDS) is designed to solve the security issues that unfavorably influence the sustainable development of the cloud and enhance the protection of the cloud from malicious attacks. The IDS is modeled using the proposed Feedback Deer Hunting Optimization (FDHO)-based Deep Residual network to detect network intrusions. However, the proposed FDHO algorithm is designed by integrating Feedback Artificial Tree (FAT) with Deer Hunting Optimization (DHOA), respectively. Moreover, the detection of malicious attacks is carried out using a Deep Residual network that significantly increases the training speed, reduces the computational complexity, and generates effective detection results. The performance of the proposed method is comparatively analyzed with the existing techniques, such as Stacked Contractive Auto-Encoder and Support Vector Machine (SCAE+SVM), Artificial Neural Network with ant bee colony optimization algorithm+fuzzy clustering (ANN+ABC+fuzzy clustering), Improved dynamic immune algorithm (IDIA), and Normalized K-means (NK) clustering algorithm with RNN named, (NK-RNN), FAT-based Deep Residual network, and DHOA-based Deep Residual network using the BoT-IoT dataset and KDD cup-99 dataset. The proposed method achieved outstanding performance by considering the metrics, like specificity, accuracy, and sensitivity, with the values of 0.9526, 0.9498, and 0.9214 using the BoT-IoT dataset.
引用
收藏
页数:23
相关论文
共 50 条
  • [41] Improving intrusion detection in cloud-based healthcare using neural network
    Patel, Sagarkumar K.
    BIOMEDICAL SIGNAL PROCESSING AND CONTROL, 2023, 83
  • [42] Enhanced Lion Optimization Algorithm and deep belief network for intrusion detection with SDN enabled IoT networks
    Babu, D. Suresh
    Ramakrishnan, M.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2023, 45 (04) : 6605 - 6615
  • [43] A framework for Network Intrusion Detection in Cloud
    Prwez, Md Tarique
    Chatterjee, Kakali
    2016 IEEE 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (IACC), 2016, : 512 - 516
  • [44] Proxy Network Intrusion Detection System for Cloud Computing
    Oktay, Ueman
    Sahingoz, Ozgur Koray
    2013 INTERNATIONAL CONFERENCE ON TECHNOLOGICAL ADVANCES IN ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING (TAEECE), 2013, : 98 - 104
  • [45] HYBRID METAHEURISTIC ALGORITHM TUNED BACK PROPAGATION NEURAL NETWORK FOR INTRUSION DETECTION IN CLOUD ENVIRONMENT
    Thirumalairaj, Ayyappan
    Jeyakarthic, Mohan
    IIOAB JOURNAL, 2020, 11 (02) : 47 - 54
  • [46] An Intrusion Detection Model Based on Deep Belief Network
    Qu, Feng
    Zhang, Jitao
    Shao, Zetian
    Qi, Shuzhuang
    PROCEEDINGS OF 2017 VI INTERNATIONAL CONFERENCE ON NETWORK, COMMUNICATION AND COMPUTING (ICNCC 2017), 2017, : 97 - 101
  • [47] An Adaptive Network Intrusion Detection Approach for the Cloud Environment
    Chou, Hui-Hao
    Wang, Sheng-De
    49TH ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2015, : 7 - 12
  • [48] Research on Network Intrusion Detection Based on Support Vector Machine Optimized with Pigeon-inspired Optimization Algorithm
    Sun, Yiheng
    Ye, Zhiwei
    Wang, Chunzhi
    Yan, Lingyu
    Wang, Ruoxi
    PROCEEDINGS OF THE 2018 IEEE 4TH INTERNATIONAL SYMPOSIUM ON WIRELESS SYSTEMS WITHIN THE INTERNATIONAL CONFERENCES ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS (IDAACS-SWS), 2018, : 62 - 67
  • [49] A Network Intrusion Detection Algorithm Based on Outlier Mining
    Ding, Tianyi
    Zhang, Min
    He, Dongjie
    COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, 2019, 463 : 1229 - 1236
  • [50] Quantum Evolutionary Algorithm Based Network Intrusion Detection
    Yin, Xiangdong
    ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2010, : 683 - 685