An effective optimization enabled deep learning based Malicious behaviour detection in cloud computing

被引:4
|
作者
Bhingarkar, Sukhada [1 ]
Revathi, S. Thanga [2 ]
Kolli, Chandra Sekhar [3 ]
Mewada, Hiren K. [4 ]
机构
[1] MIT World Peace Univ, Pune, Maharashtra, India
[2] SRM Inst Sci & Technol, Chennai, Tamil Nadu, India
[3] Aditya Coll Engn & Technol, Dept Informat Technol, Surampalem, Andhra Pradesh, India
[4] Prince Mohammad Bin Fahd Univ, Elect Engn Dept, Al Khobar, Saudi Arabia
关键词
Cloud computing; Malicious behavior detection; Deep Q network; Min-max normalization; Hellinger distance; DETECTION SYSTEM; SCHEME;
D O I
10.1007/s41315-022-00239-x
中图分类号
TP24 [机器人技术];
学科分类号
080202 ; 1405 ;
摘要
The quick deployment of cloud with computing platforms has driven novel tendencies which shifted operations of networks. However, the cloud is facing several security issues and is susceptible because of suspicious tasks and attacks. This paper devises a new method to detect malicious activities in cloud. Here, first step is the simulation of cloud patterns, wherein the data outsourced by the users are utilized for detecting malicious behaviors. The data pre-processing is done to eradicate unnecessary data and noise contained in the data and is performed using a min-max normalization process. The selection of imperative features is done using distance measure, namely Hellinger distance for mining the essential features. The augmentation of data is performed to make the data appropriate for improved processing. The malicious behavior detection is performed by exploiting the Deep Q network wherein training is performed with Autoregressive chimp optimization algorithm (AChOA), which is developed by integrating chimp optimization algorithm (ChOA) and Conditional Autoregressive Value at risk (CAViaR). The proposed AChOA-based Deep Q network outperformed with the highest testing accuracy of 94%, sensitivity of 94.1%, and specificity of 91.4%.
引用
下载
收藏
页码:575 / 588
页数:14
相关论文
共 50 条
  • [1] An effective optimization enabled deep learning based Malicious behaviour detection in cloud computing
    Sukhada Bhingarkar
    S. Thanga Revathi
    Chandra Sekhar Kolli
    Hiren K. Mewada
    International Journal of Intelligent Robotics and Applications, 2023, 7 : 575 - 588
  • [2] Optimization Enabled Deep Learning-Based DDoS Attack Detection in Cloud Computing
    Balasubramaniam, S.
    Vijesh Joe, C.
    Sivakumar, T. A.
    Prasanth, A.
    Satheesh Kumar, K.
    Kavitha, V.
    Dhanaraj, Rajesh Kumar
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2023, 2023
  • [3] A hybrid machine learning approach for malicious behaviour detection and recognition in cloud computing
    Rabbani, Mahdi
    Wang, Yong Li
    Khoshkangini, Reza
    Jelodar, Hamed
    Zhao, Ruxin
    Hu, Peng
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 151
  • [4] Malicious mining code detection based on ensemble learning in cloud computing environment
    Li, Shudong
    Li, Yuan
    Han, Weihong
    Du, Xiaojiang
    Guizani, Mohsen
    Tian, Zhihong
    SIMULATION MODELLING PRACTICE AND THEORY, 2021, 113
  • [5] Horse Herd optimization with deep learning based intrusion detection in cloud computing environment
    Samineni Nagamani
    S. Arivalagan
    M. Senthil
    P. Sudhakar
    International Journal of Information Technology, 2025, 17 (1) : 387 - 393
  • [6] Deep learning and optimization enabled multi-objective for task scheduling in cloud computing
    Komarasamy, Dinesh
    Ramaganthan, Siva Malar
    Kandaswamy, Dharani Molapalayam
    Mony, Gokuldhev
    NETWORK-COMPUTATION IN NEURAL SYSTEMS, 2024,
  • [7] Study on Deep Unsupervised Learning Optimization Algorithm Based on Cloud Computing
    Yan, Hui
    Yu, Ping
    Long, Duo
    2019 INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION, BIG DATA & SMART CITY (ICITBS), 2019, : 679 - 681
  • [8] Detection of Malicious Cloud Bandwidth Consumption in Cloud Computing Using Machine Learning Techniques
    Veeraiah, Duggineni
    Mohanty, Rajanikanta
    Kundu, Shakti
    Dhabliya, Dharmesh
    Tiwari, Mohit
    Jamal, Sajjad Shaukat
    Halifa, Awal
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [9] An Effective Swarm Optimization Based Intrusion Detection Classifier System for Cloud Computing
    Kalaivani, S.
    Vikram, A.
    Gopinath, G.
    2019 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2019, : 185 - 188
  • [10] Cloud resource optimization based on poisson linear deep gradient learning for mobile cloud computing
    Saravanan, G.
    Yuvaraj, N.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2021, 40 (01) : 787 - 797