Modelling of intrusion detection using sea horse optimization with machine learning model on cloud environment

被引:0
|
作者
Jansi Sophia Mary C. [1 ]
Mahalakshmi K. [2 ]
机构
[1] Department of Computer Science and Engineering, Idhaya Engineering College for Women, Tamil Nadu, Kallakurichi
[2] Department of Computer Science and Engineering, KIT-Kalaignarkarunanidhi Institute of Technology, Tamil Nadu, Coimbatore
关键词
Cloud computing; Deep learning; Intrusion detection system; Machine learning; Privacy; Security;
D O I
10.1007/s41870-023-01722-9
中图分类号
学科分类号
摘要
The growing reliance on cloud services necessitates a heightened focus on security measures to protect the integrity and privacy of crucial business data. Privacy preservation techniques, incorporating cryptographic and optimization methods, are instrumental in securely storing data in the cloud. The development of Intrusion Detection Systems (IDS) is crucial for pinpointing anomalies in data, playing a pivotal role in fortifying the reliability, confidentiality, and availability of cloud-based systems. The current surge in interest from research communities towards leveraging machine learning (ML) methods for IDS reflects a strategic shift in addressing anomaly detection within network traffic to enhance overall cloud security. Thus, this study introduces a sea horse optimization with deep echo state network-based intrusion detection (SHO-DESNID) method on the cloud environment. The goal of the SHO-DESNID technique is to accomplish security in the cloud environment via an intrusion detection process. To accomplish this, the SHO-DESNID technique undergoes a min–max normalization approach as a pre-processing step. Moreover, the SHO-DESNID approach uses the DESN model for the identification and classification of intrusions into multiple classes. To enhance the intrusion detection rate of the DESN method, the SHO algorithm is utilized for optimal hyperparameter selection. The simulation outcome of the SHO-DESNID system is tested on a benchmark IDS database and the experimental values state the supremacy of the SHO-DESNID technique compared with other approaches. © The Author(s), under exclusive licence to Bharati Vidyapeeth's Institute of Computer Applications and Management 2024.
引用
收藏
页码:1981 / 1988
页数:7
相关论文
共 50 条
  • [1] Horse Herd optimization with deep learning based intrusion detection in cloud computing environment
    Samineni Nagamani
    S. Arivalagan
    M. Senthil
    P. Sudhakar
    International Journal of Information Technology, 2025, 17 (1) : 387 - 393
  • [2] Trojan Horse Infection Detection in Cloud Based Environment Using Machine Learning
    Kanaker, Hasan
    Karim, Nader Abdel
    Awwad, Samer A. B.
    Ismail, Nurul H. A.
    Zraqou, Jamal
    Al ali, Abdulla M. F.
    International Journal of Interactive Mobile Technologies, 2022, 16 (24) : 81 - 106
  • [3] Intrusion detection model using machine learning algorithm on Big Data environment
    Othman, Suad Mohammed
    Ba-Alwi, Fadl Mutaher
    Alsohybe, Nabeel T.
    Al-Hashida, Amal Y.
    JOURNAL OF BIG DATA, 2018, 5 (01)
  • [4] Feature Selection and Intrusion Detection in Cloud Environment based on Machine Learning Algorithms
    Javadpour, Amir
    Abharian, Sanaz Kazemi
    Wang, Guojun
    2017 15TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS AND 2017 16TH IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING AND COMMUNICATIONS (ISPA/IUCC 2017), 2017, : 1417 - 1421
  • [5] Optimization of BPN parameters using PSO for intrusion detection in cloud environment
    Nagarajan, G.
    Sajith, P. J.
    SOFT COMPUTING, 2023,
  • [6] Sensor cloud intrusion detection based on discrete optimization algorithm and machine learning
    Liu Z.-Z.
    Yin W.-X.
    Zhang Q.-Y.
    Peng H.
    Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2020, 50 (02): : 692 - 702
  • [7] Cooperative Machine Learning Techniques for Cloud Intrusion Detection
    Chkirbene, Zina
    Hamila, Ridha
    Erbad, Aiman
    Kiranyaz, Serkan
    Al-Emadi, Nasser
    Hamdi, Mounir
    IWCMC 2021: 2021 17TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2021, : 837 - 842
  • [8] Machine Learning-Based Network Intrusion Detection Optimization for Cloud Computing Environments
    Samriya, Jitendra Kumar
    Kumar, Surendra
    Kumar, Mohit
    Wu, Huaming
    Gill, Sukhpal Singh
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (04) : 7449 - 7460
  • [9] Hierarchical Intrusion Detection Using Machine Learning and Knowledge Model
    Sarnovsky, Martin
    Paralic, Jan
    SYMMETRY-BASEL, 2020, 12 (02):
  • [10] Cloud-Based Intrusion Detection Approach Using Machine Learning Techniques
    Attou, Hanaa
    Guezzaz, Azidine
    Benkirane, Said
    Azrour, Mourade
    Farhaoui, Yousef
    BIG DATA MINING AND ANALYTICS, 2023, 6 (03) : 311 - 320