期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Feedback deer hunting optimization algorithm for intrusion detection in cloud based deep residual network
1
作者 sobin soniya.s Maria Celestin Vigila.S 《International Journal of Modeling, Simulation, and Scientific Computing》 EI 2021年第6期33-55,共23页
Cloud computing is the distributed computing paradigm continually exposed to different attacks and threats of various origins.The data stored in the cloud framework is easier for external and internal intruders,as ac... Cloud computing is the distributed computing paradigm continually exposed to different attacks and threats of various origins.The data stored in the cloud framework is easier for external and internal intruders,as access to the cloud framework is done through internet services.Various intrusion detection(ID)methods are developed to detect network intruders in the cloud,but these methods are not primarily effective in generating accurate detection results.Hence,an effective intrusion detection system(IDS)is designed to solve the security issues that unfavorably influence the sustainable development of the cloud and enhance the protection of the cloud from malicious attacks.The IDS is modeled using the proposed Feedback Deer Hunting Optimization(FDHO)-based Deep Residual network to detect network intrusions.However,the proposed FDHO algorithm is designed by integrating Feedback Artificial Tree(FAT)with Deer Hunting Optimization(DHOA),respectively.Moreover,the detection of malicious attacks is carried out using a Deep Residual network that significantly increases the training speed,reduces the computational complexity,and generates effective detection results.The performance of the proposed method is comparatively analyzed with the existing techniques,such as Stacked Contractive Auto-Encoder and Support Vector Machine(SCAE+SVM),Artificial Neural Network with ant bee colony optimization algorithm+fuzzy clustering(ANN+ABC+fuzzy clustering),Improved dynamic immune algorithm(IDIA),and Normalized K-means(NK)clustering algorithm with RNN named,(NK-RNN),FAT-based Deep Residual network,and DHOA-based Deep Residual network using the BoT-IoT dataset and KDD cup-99 dataset.The proposed method achieved outstanding performance by considering the metrics,like specificity,accuracy,and sensitivity,with the values of 0.9526,0.9498,and 0.9214 using the BoT-IoT dataset. 展开更多
关键词 Intrusion detection cloud computing support vector machine Deep Residual network virtual machine
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部