Feedback deer hunting optimization algorithm for intrusion detection in cloud based deep residual network

被引:1
|
作者
Soniya, Sobin S. [1 ]
Vigila, Maria Celestin S. [1 ]
机构
[1] Noorul Islam Ctr Higher Educ, Kumaracoil 629180, Tamil Nadu, India
关键词
Intrusion detection; cloud computing; support vector machine; Deep Residual network; virtual machine; FRAMEWORK; SYSTEM;
D O I
10.1142/S1793962321500471
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is the distributed computing paradigm continually exposed to different attacks and threats of various origins. The data stored in the cloud framework is easier for external and internal intruders, as access to the cloud framework is done through internet services. Various intrusion detection (ID) methods are developed to detect network intruders in the cloud, but these methods are not primarily effective in generating accurate detection results. Hence, an effective intrusion detection system (IDS) is designed to solve the security issues that unfavorably influence the sustainable development of the cloud and enhance the protection of the cloud from malicious attacks. The IDS is modeled using the proposed Feedback Deer Hunting Optimization (FDHO)-based Deep Residual network to detect network intrusions. However, the proposed FDHO algorithm is designed by integrating Feedback Artificial Tree (FAT) with Deer Hunting Optimization (DHOA), respectively. Moreover, the detection of malicious attacks is carried out using a Deep Residual network that significantly increases the training speed, reduces the computational complexity, and generates effective detection results. The performance of the proposed method is comparatively analyzed with the existing techniques, such as Stacked Contractive Auto-Encoder and Support Vector Machine (SCAE+SVM), Artificial Neural Network with ant bee colony optimization algorithm+fuzzy clustering (ANN+ABC+fuzzy clustering), Improved dynamic immune algorithm (IDIA), and Normalized K-means (NK) clustering algorithm with RNN named, (NK-RNN), FAT-based Deep Residual network, and DHOA-based Deep Residual network using the BoT-IoT dataset and KDD cup-99 dataset. The proposed method achieved outstanding performance by considering the metrics, like specificity, accuracy, and sensitivity, with the values of 0.9526, 0.9498, and 0.9214 using the BoT-IoT dataset.
引用
收藏
页数:23
相关论文
共 50 条
  • [41] Movie trailer classification using deer hunting optimization based deep convolutional neural network in video sequences
    Prashant Giridhar Shambharkar
    M. N. Doja
    Multimedia Tools and Applications, 2020, 79 : 21197 - 21222
  • [42] Performance Study of a Network Intrusion Detection Algorithm Improved by an Optimization Algorithm
    Feng, Wei
    Gao, Hanjun
    Cao, Duan
    International Journal of Network Security, 2022, 24 (05) : 953 - 958
  • [43] Movie trailer classification using deer hunting optimization based deep convolutional neural network in video sequences
    Shambharkar, Prashant Giridhar
    Doja, M. N.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (29-30) : 21197 - 21222
  • [44] A Clustering based Algorithm for Network Intrusion Detection
    Arya, K. V.
    Kumar, Hemant
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2012, : 193 - 196
  • [45] Jaya-Mutated Leader Algorithm Based Deep Feed Forward Neural Network for Intrusion Detection Using Cloud Computing
    Mahajan, Kirti
    Alhasen, Saeed
    Chaudhari, Deepti
    Sharanyaa, S.
    Agrawal, Deepti
    CYBERNETICS AND SYSTEMS, 2022,
  • [46] Jaya-Mutated Leader Algorithm Based Deep Feed Forward Neural Network for Intrusion Detection Using Cloud Computing
    Mahajan, Kirti
    Alhasen, Saeed
    Chaudhari, Deepti
    Sharanyaa, S.
    Agrawal, Deepti
    Cybernetics and Systems, 2022,
  • [47] Leveraging feature subset selection with deer hunting optimizer based deep learning for anomaly detection in secure cloud environment
    Bai, V. Sujatha
    Punithavalli, M.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (25) : 65949 - 65966
  • [48] ExpSFROA-Based DRN: Exponential Sunflower Rider Optimization Algorithm-Driven Deep Residual Network for the Intrusion Detection in IOT-Based Plant Disease Monitoring
    Deelip, Mali Shrikant
    Govinda, K.
    INTERNATIONAL JOURNAL OF SEMANTIC COMPUTING, 2023, 17 (01) : 5 - 31
  • [49] Implementation of African vulture optimization algorithm based on deep learning for cybersecurity intrusion detection
    Alsirhani, Amjad
    Alshahrani, Mohammed Mujib
    Hassan, Ahmed M.
    Taloba, Ahmed I.
    El-Aziz, Rasha M. Abd
    Samak, Ahmed H.
    ALEXANDRIA ENGINEERING JOURNAL, 2023, 79 : 105 - 115
  • [50] Cloud-based Real-time Network Intrusion Detection Using Deep Learning
    Parampottupadam, Santhosh
    Moldovann, Arghir-Nicolae
    2018 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), 2018,