Modelling of intrusion detection using sea horse optimization with machine learning model on cloud environment

被引:0
|
作者
Jansi Sophia Mary C. [1 ]
Mahalakshmi K. [2 ]
机构
[1] Department of Computer Science and Engineering, Idhaya Engineering College for Women, Tamil Nadu, Kallakurichi
[2] Department of Computer Science and Engineering, KIT-Kalaignarkarunanidhi Institute of Technology, Tamil Nadu, Coimbatore
关键词
Cloud computing; Deep learning; Intrusion detection system; Machine learning; Privacy; Security;
D O I
10.1007/s41870-023-01722-9
中图分类号
学科分类号
摘要
The growing reliance on cloud services necessitates a heightened focus on security measures to protect the integrity and privacy of crucial business data. Privacy preservation techniques, incorporating cryptographic and optimization methods, are instrumental in securely storing data in the cloud. The development of Intrusion Detection Systems (IDS) is crucial for pinpointing anomalies in data, playing a pivotal role in fortifying the reliability, confidentiality, and availability of cloud-based systems. The current surge in interest from research communities towards leveraging machine learning (ML) methods for IDS reflects a strategic shift in addressing anomaly detection within network traffic to enhance overall cloud security. Thus, this study introduces a sea horse optimization with deep echo state network-based intrusion detection (SHO-DESNID) method on the cloud environment. The goal of the SHO-DESNID technique is to accomplish security in the cloud environment via an intrusion detection process. To accomplish this, the SHO-DESNID technique undergoes a min–max normalization approach as a pre-processing step. Moreover, the SHO-DESNID approach uses the DESN model for the identification and classification of intrusions into multiple classes. To enhance the intrusion detection rate of the DESN method, the SHO algorithm is utilized for optimal hyperparameter selection. The simulation outcome of the SHO-DESNID system is tested on a benchmark IDS database and the experimental values state the supremacy of the SHO-DESNID technique compared with other approaches. © The Author(s), under exclusive licence to Bharati Vidyapeeth's Institute of Computer Applications and Management 2024.
引用
收藏
页码:1981 / 1988
页数:7
相关论文
共 50 条
  • [41] Malicious URL and Intrusion Detection using Machine Learning
    Hamza, Amr
    Hammam, Farah
    Abouzeid, Medhat
    Ahmed, Mohammad Arsalan
    Dhou, Salam
    Aloul, Fadi
    38TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, ICOIN 2024, 2024, : 795 - 800
  • [42] Network Intrusion Detection Using Machine Learning Techniques
    Almutairi, Yasmeen
    Alhazmi, Bader
    Munshi, Amr
    ADVANCES IN SCIENCE AND TECHNOLOGY-RESEARCH JOURNAL, 2022, 16 (03) : 193 - 206
  • [43] An Intrusion Detection System for SDN Using Machine Learning
    Logeswari, G.
    Bose, S.
    Anitha, T.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 35 (01): : 867 - 880
  • [44] An Investigation on Intrusion Detection System Using Machine Learning
    Patgiri, Ripon
    Varshney, Udit
    Akutota, Tanya
    Kunde, Rakesh
    2018 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI), 2018, : 1684 - 1691
  • [45] Cascaded intrusion detection system using machine learning
    Ahamed, Md. Khabir Uddin
    Karim, Abdul
    SYSTEMS AND SOFT COMPUTING, 2025, 7
  • [46] Network Intrusion Detection using Machine Learning Approaches
    Hossain, Zakir
    Sourov, Md Mahmudur Rahman
    Khan, Musharrat
    Rahman, Parves
    PROCEEDINGS OF THE 2021 FIFTH INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC 2021), 2021, : 303 - 307
  • [47] The Designation of Bio-Inspired Intrusion Detection System Model in Cloud Computing Based on Machine Learning
    Ge, Yufei
    Liang, Hong
    Chen, Lin
    Zhang, Qian
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTOMATION, MECHANICAL CONTROL AND COMPUTATIONAL ENGINEERING, 2015, 124 : 1932 - 1937
  • [48] Network Intrusion Detection using Hybrid Machine Learning
    Chuang, Po-Jen
    Li, Si-Han
    2019 INTERNATIONAL CONFERENCE ON FUZZY THEORY AND ITS APPLICATIONS (IFUZZY), 2019, : 289 - 293
  • [49] Intrusion Detection Using Data Fusion and Machine Learning
    Hechmi, Jridi Mohamed
    Khlaifi, Hacen
    Bouatay, Amine
    Zrelli, Amira
    Ezzedine, Tahar
    2018 26TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2018, : 235 - 240
  • [50] Network Intrusion Detection using Machine Learning Approaches
    Hossain, Zakir
    Sourov, Md Mahmudur Rahman
    Khan, Musharrat
    Rahman, Parves
    PROCEEDINGS OF THE 2021 FIFTH INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC 2021), 2021, : 438 - 442