GOSVM: Gannet optimization based support vector machine for malicious attack detection in cloud environment

被引:16
作者
Arunkumar M. [1 ]
Kumar K.A. [1 ]
机构
[1] Department of Computer Science and Engineering, Sathyabama Institute of Science and Technology, Chennai
关键词
Attacks; Cloud; Detection accuracy; Feature selection; GOA; GOA-optimized SVM-ELM technique; Intrusion detection; Intrusion detection system; Security;
D O I
10.1007/s41870-023-01192-z
中图分类号
学科分类号
摘要
Cloud computing is the most useful computing technology for the new service progression. Due to the distributed nature of cloud computing, security threats and cyber attacks are major problems that penetrate the network and cause sudden harm to the financial and business accounts by affecting the servers. Commonly, the vigorous and stable growth of cloud computing is mainly affected due to the security issues in a cloud computing environment. Various malware variants generate cyberattacks. Thus, intrusion detection technology is employed for securing cloud computing from malicious attacks. Cloud Intrusion Detection System (CIDS) identifies malicious attack behavior and guarantees the security and reliability of cloud computing. But, virtual network flow is uncontrollable and unnoticeable among the virtual machines. This paper proposes a novel Gannet Optimization Algorithm-based hybrid Support vector Machine-Extreme Learning Machine (GOA-optimized hybrid SVM-ELM) technique to identify and prevent malicious attacks in a cloud computing atmosphere. Gannet Optimization Algorithm (GOA) optimizer is adopted for selecting optimal features and for minimizing the loss of information. The parameters of the hybrid SVM-ELM model are optimized by the GOA algorithm. The proposed architecture improves the overall security and performance of a cloud-based Intrusion Detection System (IDS). This proposed technique is used for classifying the different attacks like Normal, web attack, Brute Force, Infiltration, Portscan, DoS/DDoS, and Botnet ARES and is executed using Matlab through employing the CICIDS2017 dataset, and the evidence detection in cloud forensics dataset. The results revealed that high precision, F-Measure, and recall rate are obtained in this technique. Then the training time decreased to 389 ms on the evidence detection in the cloud forensics dataset and 399 ms on the CICIDS2017 dataset. © 2023, The Author(s), under exclusive licence to Bharati Vidyapeeth's Institute of Computer Applications and Management.
引用
收藏
页码:1653 / 1660
页数:7
相关论文
共 32 条
[1]  
Ramkumar M.P., Daniya T., Paul P.M., Rajakumar S., Intrusion detection using optimized ensemble classification in fog computing paradigm, Knowl-Based Syst, 252, (2022)
[2]  
Rabbani M., Wang Y.L., Khoshkangini R., Jelodar H., Zhao R., Hu P., A hybrid machine learning approach for malicious behaviour detection and recognition in cloud computing, J Netw Comput Appl, 151, (2020)
[3]  
Lallie H.S., Shepherd L.A., Nurse J.R., Erola A., Epiphaniou G., Maple C., Bellekens X., Cyber security in the age of COVID-19: a timeline and analysis of cyber-crime and cyber-attacks during the pandemic, Comput Secur, 105, (2021)
[4]  
Aslan O., Ozkan-Okay M., Gupta D., Intelligent behavior-based malware detection system on cloud computing environment, IEEE Access, 9, pp. 83252-83271, (2021)
[5]  
Roy S., Li J., Bai Y., A two-layer fog-cloud intrusion detection model for IoT networks, Internet Things, 19, (2022)
[6]  
Al Saleh R., Driss M., Almomani I., CBiLSTM: a hybrid deep learning model for efficient reputation assessment of cloud services, IEEE Access, 10, pp. 35321-35335, (2022)
[7]  
Arunkumar M., Ashok Kumar K., Malicious attack detection approach in cloud computing using machine learning techniques, Soft Comput, (2022)
[8]  
Soumya K., Arunkumar M., SSD Implementation and Spark Integration, Information and Communication Technology for Intelligent Systems (ICTIS, 2017, 1, pp. 249-261, (2017)
[9]  
Shamshirband S., Fathi M., Chronopoulos A.T., Montieri A., Palumbo F., Pescape A., Computational intelligence intrusion detection techniques in mobile cloud computing environments: review, taxonomy, and open research issues, J Inf Secur Appl, 55, (2020)
[10]  
Mishra P., Gupta A., Aggarwal P., Pilli E.S., vServiceInspector: introspection-assisted evolutionary bag-of-ngram approach to detect malware in cloud servers, Ad Hoc Netw, 131, (2022)