Feedback deer hunting optimization algorithm for intrusion detection in cloud based deep residual network

被引:1
|
作者
Soniya, Sobin S. [1 ]
Vigila, Maria Celestin S. [1 ]
机构
[1] Noorul Islam Ctr Higher Educ, Kumaracoil 629180, Tamil Nadu, India
关键词
Intrusion detection; cloud computing; support vector machine; Deep Residual network; virtual machine; FRAMEWORK; SYSTEM;
D O I
10.1142/S1793962321500471
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is the distributed computing paradigm continually exposed to different attacks and threats of various origins. The data stored in the cloud framework is easier for external and internal intruders, as access to the cloud framework is done through internet services. Various intrusion detection (ID) methods are developed to detect network intruders in the cloud, but these methods are not primarily effective in generating accurate detection results. Hence, an effective intrusion detection system (IDS) is designed to solve the security issues that unfavorably influence the sustainable development of the cloud and enhance the protection of the cloud from malicious attacks. The IDS is modeled using the proposed Feedback Deer Hunting Optimization (FDHO)-based Deep Residual network to detect network intrusions. However, the proposed FDHO algorithm is designed by integrating Feedback Artificial Tree (FAT) with Deer Hunting Optimization (DHOA), respectively. Moreover, the detection of malicious attacks is carried out using a Deep Residual network that significantly increases the training speed, reduces the computational complexity, and generates effective detection results. The performance of the proposed method is comparatively analyzed with the existing techniques, such as Stacked Contractive Auto-Encoder and Support Vector Machine (SCAE+SVM), Artificial Neural Network with ant bee colony optimization algorithm+fuzzy clustering (ANN+ABC+fuzzy clustering), Improved dynamic immune algorithm (IDIA), and Normalized K-means (NK) clustering algorithm with RNN named, (NK-RNN), FAT-based Deep Residual network, and DHOA-based Deep Residual network using the BoT-IoT dataset and KDD cup-99 dataset. The proposed method achieved outstanding performance by considering the metrics, like specificity, accuracy, and sensitivity, with the values of 0.9526, 0.9498, and 0.9214 using the BoT-IoT dataset.
引用
下载
收藏
页数:23
相关论文
共 50 条
  • [1] Taylor-feedback deer hunting optimisation algorithm for intrusion detection in cloud using deep maxout network
    Sobin Soniya S.
    Maria Celestin Vigila S.
    International Journal of Intelligent Information and Database Systems, 2022, 15 (02): : 199 - 222
  • [2] An Improved Algorithm for Network Intrusion Detection Based on Deep Residual Networks
    Hu, Xuntao
    Meng, Xiancai
    Liu, Shaoqing
    Liang, Lizhen
    IEEE ACCESS, 2024, 12 : 66432 - 66441
  • [3] Cloud Intrusion Detection Model Based on Deep Belief Network and Grasshopper Optimization
    Parganiha V.
    Shukla S.P.
    Sharma L.K.
    International Journal of Ambient Computing and Intelligence, 2022, 13 (01):
  • [4] Intrusion Detection Algorithm Based on Residual Neural Network
    Cai, Zengyu
    Wang, Jingchao
    Zhang, Jianwei
    Si, Yajie
    International Journal of Network Security, 2022, 24 (06) : 1135 - 1141
  • [5] Efficient anomaly detection using deer hunting optimization algorithm via adaptive deep belief neural network in mobile network
    Prabhakar T.S.
    Veena M.N.
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (12) : 16409 - 16425
  • [6] Network intrusion detection algorithm based on deep neural network
    Jia, Yang
    Wang, Meng
    Wang, Yagang
    IET INFORMATION SECURITY, 2019, 13 (01) : 48 - 53
  • [7] Pelican: A Deep Residual Network for Network Intrusion Detection
    Wu, Peilun
    Guo, Hui
    Moustafa, Nour
    50TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W 2020), 2020, : 55 - 62
  • [8] Performance of deer hunting optimization based deep learning algorithm for speech emotion recognition
    Agarwal, Gaurav
    Om, Hari
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (07) : 9961 - 9992
  • [9] Border-hunting optimization for mobile agent-based intrusion detection with deep convolutional neural network
    Kaur, Prabhjot
    Batra, Shalini
    Rana, Prashant Singh
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (01):
  • [10] DoS attack detection using Aquila deer hunting optimization enabled deep belief network
    Thomas, Merly
    Meshram, B. B.
    INTERNATIONAL JOURNAL OF WEB INFORMATION SYSTEMS, 2024, 20 (01) : 66 - 87