Modelling of intrusion detection using sea horse optimization with machine learning model on cloud environment

被引:0
|
作者
Jansi Sophia Mary C. [1 ]
Mahalakshmi K. [2 ]
机构
[1] Department of Computer Science and Engineering, Idhaya Engineering College for Women, Tamil Nadu, Kallakurichi
[2] Department of Computer Science and Engineering, KIT-Kalaignarkarunanidhi Institute of Technology, Tamil Nadu, Coimbatore
关键词
Cloud computing; Deep learning; Intrusion detection system; Machine learning; Privacy; Security;
D O I
10.1007/s41870-023-01722-9
中图分类号
学科分类号
摘要
The growing reliance on cloud services necessitates a heightened focus on security measures to protect the integrity and privacy of crucial business data. Privacy preservation techniques, incorporating cryptographic and optimization methods, are instrumental in securely storing data in the cloud. The development of Intrusion Detection Systems (IDS) is crucial for pinpointing anomalies in data, playing a pivotal role in fortifying the reliability, confidentiality, and availability of cloud-based systems. The current surge in interest from research communities towards leveraging machine learning (ML) methods for IDS reflects a strategic shift in addressing anomaly detection within network traffic to enhance overall cloud security. Thus, this study introduces a sea horse optimization with deep echo state network-based intrusion detection (SHO-DESNID) method on the cloud environment. The goal of the SHO-DESNID technique is to accomplish security in the cloud environment via an intrusion detection process. To accomplish this, the SHO-DESNID technique undergoes a min–max normalization approach as a pre-processing step. Moreover, the SHO-DESNID approach uses the DESN model for the identification and classification of intrusions into multiple classes. To enhance the intrusion detection rate of the DESN method, the SHO algorithm is utilized for optimal hyperparameter selection. The simulation outcome of the SHO-DESNID system is tested on a benchmark IDS database and the experimental values state the supremacy of the SHO-DESNID technique compared with other approaches. © The Author(s), under exclusive licence to Bharati Vidyapeeth's Institute of Computer Applications and Management 2024.
引用
收藏
页码:1981 / 1988
页数:7
相关论文
共 50 条
  • [31] Model Evasion Attack on Intrusion Detection Systems using Adversarial Machine Learning
    Ayub, Md Ahsan
    Johnson, William A.
    Talbert, Douglas A.
    Siraj, Ambareen
    2020 54TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2020, : 324 - 329
  • [32] Network Intrusion Detection Using Knapsack Optimization, Mutual Information Gain, and Machine Learning
    Afolabi, Akindele S.
    Akinola, Olubunmi A.
    JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2024, 2024
  • [33] A hybrid machine learning model for intrusion detection in VANET
    Hind Bangui
    Mouzhi Ge
    Barbora Buhnova
    Computing, 2022, 104 : 503 - 531
  • [34] MapReduce based intelligent model for intrusion detection using machine learning technique
    Asif, Muhammad
    Abbas, Sagheer
    Khan, M. A.
    Fatima, Areej
    Khan, Muhammad Adnan
    Lee, Sang-Woong
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (10) : 9723 - 9731
  • [35] Intrusion Detection Using Krill Herd Optimization Based Weighted Extreme Learning Machine
    Kaliraj, P.
    Subramani, B.
    JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, 2024, 15 (01) : 147 - 154
  • [36] Industrial Internet of Things Intrusion Detection Method Using Machine Learning and Optimization Techniques
    Gaber T.
    Awotunde J.B.
    Folorunso S.O.
    Ajagbe S.A.
    Eldesouky E.
    Wireless Communications and Mobile Computing, 2023, 2023
  • [37] Optimizing intrusion detection using intelligent feature selection with machine learning model
    Aljehane, Nojood O.
    Mengash, Hanan A.
    Hassine, Siwar B. H.
    Alotaibi, Faiz A.
    Salama, Ahmed S.
    Abdelbagi, Sitelbanat
    ALEXANDRIA ENGINEERING JOURNAL, 2024, 91 : 39 - 49
  • [38] Intrusion Detection Using Machine Learning and Deep Learning Techniques
    Calisir, Sinan
    Atay, Remzi
    Pehlivanoglu, Meltem Kurt
    Duru, Nevcihan
    2019 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2019, : 656 - 660
  • [39] IoBT Intrusion Detection System using Machine Learning
    Alkanjr, Basmh
    Alshammari, Thamer
    2023 IEEE 13TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE, CCWC, 2023, : 886 - 892
  • [40] Intrusion Detection Study and Enhancement Using Machine Learning
    Mliki, Hela
    Kaceam, Abir Hadj
    Chaari, Lamia
    RISKS AND SECURITY OF INTERNET AND SYSTEMS (CRISIS 2019), 2020, 12026 : 263 - 278