Feedback deer hunting optimization algorithm for intrusion detection in cloud based deep residual network

被引:1
|
作者
Soniya, Sobin S. [1 ]
Vigila, Maria Celestin S. [1 ]
机构
[1] Noorul Islam Ctr Higher Educ, Kumaracoil 629180, Tamil Nadu, India
关键词
Intrusion detection; cloud computing; support vector machine; Deep Residual network; virtual machine; FRAMEWORK; SYSTEM;
D O I
10.1142/S1793962321500471
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is the distributed computing paradigm continually exposed to different attacks and threats of various origins. The data stored in the cloud framework is easier for external and internal intruders, as access to the cloud framework is done through internet services. Various intrusion detection (ID) methods are developed to detect network intruders in the cloud, but these methods are not primarily effective in generating accurate detection results. Hence, an effective intrusion detection system (IDS) is designed to solve the security issues that unfavorably influence the sustainable development of the cloud and enhance the protection of the cloud from malicious attacks. The IDS is modeled using the proposed Feedback Deer Hunting Optimization (FDHO)-based Deep Residual network to detect network intrusions. However, the proposed FDHO algorithm is designed by integrating Feedback Artificial Tree (FAT) with Deer Hunting Optimization (DHOA), respectively. Moreover, the detection of malicious attacks is carried out using a Deep Residual network that significantly increases the training speed, reduces the computational complexity, and generates effective detection results. The performance of the proposed method is comparatively analyzed with the existing techniques, such as Stacked Contractive Auto-Encoder and Support Vector Machine (SCAE+SVM), Artificial Neural Network with ant bee colony optimization algorithm+fuzzy clustering (ANN+ABC+fuzzy clustering), Improved dynamic immune algorithm (IDIA), and Normalized K-means (NK) clustering algorithm with RNN named, (NK-RNN), FAT-based Deep Residual network, and DHOA-based Deep Residual network using the BoT-IoT dataset and KDD cup-99 dataset. The proposed method achieved outstanding performance by considering the metrics, like specificity, accuracy, and sensitivity, with the values of 0.9526, 0.9498, and 0.9214 using the BoT-IoT dataset.
引用
下载
收藏
页数:23
相关论文
共 50 条
  • [21] Retraction Note: Performance of deer hunting optimization based deep learning algorithm for speech emotion recognition
    Gaurav Agarwal
    Hari Om
    Multimedia Tools and Applications, 2024, 83 (31) : 77135 - 77135
  • [22] Training fuzzy deep neural network with honey badger algorithm for intrusion detection in cloud environment
    Jain, Deepak Kumar
    Ding, Weiping
    Kotecha, Ketan
    INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2023, 14 (06) : 2221 - 2237
  • [23] Training fuzzy deep neural network with honey badger algorithm for intrusion detection in cloud environment
    Deepak Kumar Jain
    Weiping Ding
    Ketan Kotecha
    International Journal of Machine Learning and Cybernetics, 2023, 14 : 2221 - 2237
  • [24] Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection
    Masum, Mohammad
    Shahriar, Hossain
    Haddad, Hisham
    Faruk, Md Jobair Hossain
    Valero, Maria
    Khan, Md Abdullah
    Rahman, Mohammad A.
    Adnan, Muhaiminul, I
    Cuzzocrea, Alfredo
    Wu, Fan
    2021 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2021, : 5413 - 5419
  • [25] Research on Network Security Intrusion Detection Method Based on Optimization Algorithm and Neural Network
    Li, Jie
    Li, Jing
    International Journal of Network Security, 2024, 26 (01) : 68 - 73
  • [26] Enhanced Coyote Optimization with Deep Learning Based Cloud-Intrusion Detection System
    Basahel, Abdullah M.
    Yamin, Mohammad
    Basahel, Sulafah M.
    Lydia, E. Laxmi
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (02): : 4319 - 4336
  • [27] Horse Herd optimization with deep learning based intrusion detection in cloud computing environment
    Samineni Nagamani
    S. Arivalagan
    M. Senthil
    P. Sudhakar
    International Journal of Information Technology, 2025, 17 (1) : 387 - 393
  • [28] Parameter identification of PEMFC based on Convolutional neural network optimized by balanced deer hunting optimization algorithm
    Yuan, Zhi
    Wang, Weiqing
    Wang, Haiyun
    Ashourian, Mohsen
    ENERGY REPORTS, 2020, 6 (06) : 1572 - 1580
  • [29] Intrusion Detection Using Bat Optimization Algorithm and DenseNet for IoT and Cloud Based Systems
    Bella, H. Kanakadurga
    Vasundra, S.
    INTERNATIONAL JOURNAL ON ARTIFICIAL INTELLIGENCE TOOLS, 2024, 33 (02)
  • [30] Intrusion Detection for IoT Based on Improved Genetic Algorithm and Deep Belief Network
    Zhang, Ying
    Li, Peisong
    Wang, Xinheng
    IEEE ACCESS, 2019, 7 : 31711 - 31722