An efficient metaheuristic algorithm based feature selection and recurrent neural network for DoS attack detection in cloud computing environment

被引:82
作者
SaiSindhuTheja, Reddy [1 ,2 ]
Shyam, Gopal K. [1 ]
机构
[1] REVA Univ, Sch Comp & Informat Technol, Bengaluru 560064, Karnataka, India
[2] Sreenidhi Inst Sci & Technol, Dept CSE, Hyderabad 501301, Telangana, India
关键词
Cloud computing; DoS attack; Crow Search Algorithm; Opposition based learning; Recurrent neural network; SECURITY ISSUES; DDOS ATTACKS; OPPOSITION;
D O I
10.1016/j.asoc.2020.106997
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Detection of Denial of Service (DoS) attack is one of the most critical issues in cloud computing. The attack detection framework is very complex due to the nonlinear thought of interruption activities, unusual conduct of systems traffic, and many attributes in the issue space. This paper proposes an efficient DoS attack detection system that uses the Oppositional Crow Search Algorithm (OCSA), which integrates the Crow Search Algorithm (CSA) and Opposition Based Learning (OBL) method to address such type of issues. The proposed system consists of two stages viz. selection of features using OCSA and classification using Recurrent Neural Network (RNN) classifier. The essential features are selected using the OCSA algorithm and then given to RNN classifier. In the subsequent testing process, incoming data is classified using the RNN classifier. It ensures the separation of standard data (saved in cloud) and the removal of compromised data Using the benchmark data set, the results of experimental evaluation demonstrate that the proposed technique outperforms the other conventional methods by 98.18%, 95.13%, 93.56%, and 94.12% in terms of Precision, Recall, F-Measure, and Accuracy respectively. Further, the proposed work outperforms existing works by 3% on an average for all the metrics used. (c) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页数:11
相关论文
共 65 条
  • [1] A novel approach based on crow search algorithm for optimal selection of conductor size in radial distribution networks
    Abdelaziz, Almoataz Y.
    Fathy, Ahmed
    [J]. ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH, 2017, 20 (02): : 391 - 402
  • [2] Aharkhizan M., P HDB BIG DATA PRIVA
  • [3] Aljamal I, 2019, 2019 IEEE/ACIS 17TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT AND APPLICATIONS (SERA), P84, DOI [10.1109/sera.2019.8886794, 10.1109/SERA.2019.8886794]
  • [4] Anitha E, 2013, 2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), P367, DOI 10.1109/ICICES.2013.6508330
  • [5] Fuzziness based semi-supervised learning approach for intrusion detection system
    Ashfaq, Rana Aamir Raza
    Wang, Xi-Zhao
    Huang, Joshua Zhexue
    Abbas, Haider
    He, Yu-Lin
    [J]. INFORMATION SCIENCES, 2017, 378 : 484 - 497
  • [6] LR-HIDS: logistic regression host-based intrusion detection system for cloud environments
    Besharati, Elham
    Naderan, Marjan
    Namjoo, Ehsan
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (09) : 3669 - 3692
  • [7] Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment
    Bhushan, Kriti
    Gupta, B. B.
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (05) : 1985 - 1997
  • [8] Hybridization of computational intelligence methods for attack detection in computer networks
    Branitskiy, A.
    Kotenko, I.
    [J]. JOURNAL OF COMPUTATIONAL SCIENCE, 2017, 23 : 145 - 156
  • [9] Cavusoglu U., 2019, P APPL INTELLIGENCE, V49
  • [10] Chellappan C., 2017, P INT J BUS INTELL D, V1, P1