Feedback deer hunting optimization algorithm for intrusion detection in cloud based deep residual network

被引:1
|
作者
Soniya, Sobin S. [1 ]
Vigila, Maria Celestin S. [1 ]
机构
[1] Noorul Islam Ctr Higher Educ, Kumaracoil 629180, Tamil Nadu, India
关键词
Intrusion detection; cloud computing; support vector machine; Deep Residual network; virtual machine; FRAMEWORK; SYSTEM;
D O I
10.1142/S1793962321500471
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is the distributed computing paradigm continually exposed to different attacks and threats of various origins. The data stored in the cloud framework is easier for external and internal intruders, as access to the cloud framework is done through internet services. Various intrusion detection (ID) methods are developed to detect network intruders in the cloud, but these methods are not primarily effective in generating accurate detection results. Hence, an effective intrusion detection system (IDS) is designed to solve the security issues that unfavorably influence the sustainable development of the cloud and enhance the protection of the cloud from malicious attacks. The IDS is modeled using the proposed Feedback Deer Hunting Optimization (FDHO)-based Deep Residual network to detect network intrusions. However, the proposed FDHO algorithm is designed by integrating Feedback Artificial Tree (FAT) with Deer Hunting Optimization (DHOA), respectively. Moreover, the detection of malicious attacks is carried out using a Deep Residual network that significantly increases the training speed, reduces the computational complexity, and generates effective detection results. The performance of the proposed method is comparatively analyzed with the existing techniques, such as Stacked Contractive Auto-Encoder and Support Vector Machine (SCAE+SVM), Artificial Neural Network with ant bee colony optimization algorithm+fuzzy clustering (ANN+ABC+fuzzy clustering), Improved dynamic immune algorithm (IDIA), and Normalized K-means (NK) clustering algorithm with RNN named, (NK-RNN), FAT-based Deep Residual network, and DHOA-based Deep Residual network using the BoT-IoT dataset and KDD cup-99 dataset. The proposed method achieved outstanding performance by considering the metrics, like specificity, accuracy, and sensitivity, with the values of 0.9526, 0.9498, and 0.9214 using the BoT-IoT dataset.
引用
下载
收藏
页数:23
相关论文
共 50 条
  • [31] An optimization Method for Intrusion Detection Classification Model Based on Deep Belief Network
    Wei, Peng
    Li, Yufeng
    Zhang, Zhen
    Hu, Tao
    Li, Ziyong
    Liu, Diyang
    IEEE ACCESS, 2019, 7 : 87593 - 87605
  • [32] PEMFC IDENTIFICATION USING DEEP LEARNING DEVELOPED BY IMPROVED DEER HUNTING OPTIMIZATION ALGORITHM
    Yin, Zili
    Razmjooy, Navid
    INTERNATIONAL JOURNAL OF POWER AND ENERGY SYSTEMS, 2020, 40 (02): : 86 - 94
  • [33] Intrusion detection for network based cloud computing by custom RC-NN and optimization
    Thilagam, T.
    Aruna, R.
    ICT EXPRESS, 2021, 7 (04): : 512 - 520
  • [34] Machine Learning-Based Network Intrusion Detection Optimization for Cloud Computing Environments
    Kumar Samriya, Jitendra
    Kumar, Surendra
    Kumar, Mohit
    Wu, Huaming
    Singh Gill, Sukhpal
    IEEE Transactions on Consumer Electronics, 2024, 70 (04) : 7449 - 7460
  • [35] Optimization of Intrusion Detection System Based on Improved Convolutional Neural Network Algorithm
    Pu, Xiaochuan
    Zhang, Yuanqiang
    Ruan, Qingqiang
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2022, 2022
  • [36] An Intrusion Detection System Based on a Simplified Residual Network
    Xiao, Yuelei
    Xiao, Xing
    INFORMATION, 2019, 10 (11)
  • [37] Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing
    Fahad, Ahmed Mohammed
    Ahmed, Abdulghani Ali
    Kahar, Mohd Nizam Mohmad
    INTELLIGENT COMPUTING & OPTIMIZATION, 2019, 866 : 56 - 65
  • [38] Golden jackal optimization algorithm with deep learning assisted intrusion detection system for network security
    Aljehane, Nojood O.
    Mengash, Hanan Abdullah
    Eltahir, Majdy M.
    Alotaibi, Faiz Abdullah
    Aljameel, Sumayh S.
    Yafoz, Ayman
    Alsini, Raed
    Assiri, Mohammed
    ALEXANDRIA ENGINEERING JOURNAL, 2024, 86 : 415 - 424
  • [39] Intrusion Detection on AWS Cloud through Hybrid Deep Learning Algorithm
    Balajee, R. M.
    Kannan, M. K. Jayanthi
    ELECTRONICS, 2023, 12 (06)
  • [40] Network intrusion detection based on GMKL Algorithm
    Li, Yuxiang
    Wang, Haiming
    Yu, Hongkui
    Ren, Changquan
    Geng, Qingjia
    Journal of Networks, 2013, 8 (06) : 1315 - 1321