2021
DOI: 10.1002/jnm.2948
|View full text |Cite
|
Sign up to set email alerts
|

Chronological salp swarm algorithm based deep belief network for intrusion detection in cloud using fuzzy entropy

Abstract: Cloud computing is susceptible to the existing information technology attacks, as it extends and uses the traditional operating system, information technology infrastructure, and applications. However, in addition to the existing threats, the cloud computing environment faces various security issues in detecting anomalous network behaviors. In order to resolve the security issues, an effective intrusion detection system named Chronological Salp Swarm Algorithm‐based Deep Belief Network is proposed for detectin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
22
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 80 publications
(22 citation statements)
references
References 29 publications
0
22
0
Order By: Relevance
“…accuracy, specificity, sensitivity, F‐score, precision, false positive rate, AUC is analyzed. Then the proposed IDS‐CC‐CCGAN‐WSOA method is examined and likened with the existing methods, such as intrusion detection framework on cloud computing with deep belief network with salp swarm algorithm (IDS‐CC‐DBN‐CSSA), 31 intrusion detection framework on cloud computing using deep neural network with improved genetic algorithm and simulated annealing algorithm (IDS‐CC‐DNN‐IGASAA), 32 intrusion detection for cloud computing with multilayer perceptron neural network and artificial bee colony optimization algorithm (IDS‐CC‐MLPNN‐ABC), 33 intrusion detection for cloud computing using recurrent convolutional neural network with ant lion optimization algorithm (IDS‐CC‐RCNN‐ALO), 34 hybrid intrusion detection using map reduce based black widow optimized convolutional long short‐term memory neural networks (IDS‐CC‐BWO‐CONV‐LSTM), 35 and unified deep learning approach for efficient intrusion detection system using integrated spatial‐temporal features (IDS‐CC‐OCNN‐HMLSTM), 36 respectively. The simulation parameter of IDS‐CC‐DCCGAN‐RFOA is given in Table 3.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…accuracy, specificity, sensitivity, F‐score, precision, false positive rate, AUC is analyzed. Then the proposed IDS‐CC‐CCGAN‐WSOA method is examined and likened with the existing methods, such as intrusion detection framework on cloud computing with deep belief network with salp swarm algorithm (IDS‐CC‐DBN‐CSSA), 31 intrusion detection framework on cloud computing using deep neural network with improved genetic algorithm and simulated annealing algorithm (IDS‐CC‐DNN‐IGASAA), 32 intrusion detection for cloud computing with multilayer perceptron neural network and artificial bee colony optimization algorithm (IDS‐CC‐MLPNN‐ABC), 33 intrusion detection for cloud computing using recurrent convolutional neural network with ant lion optimization algorithm (IDS‐CC‐RCNN‐ALO), 34 hybrid intrusion detection using map reduce based black widow optimized convolutional long short‐term memory neural networks (IDS‐CC‐BWO‐CONV‐LSTM), 35 and unified deep learning approach for efficient intrusion detection system using integrated spatial‐temporal features (IDS‐CC‐OCNN‐HMLSTM), 36 respectively. The simulation parameter of IDS‐CC‐DCCGAN‐RFOA is given in Table 3.…”
Section: Resultsmentioning
confidence: 99%
“…Some of the recent works are reviewed here. Karuppusamy et al 31 have presented an IDS-CC-DBN-CSSA. The aim was determine the security issues and identify the distrustful intrusions in cloud environment.…”
Section: Literature Surveymentioning
confidence: 99%
See 2 more Smart Citations
“…The preprocessing output is fed to feature selection. Here, extracted the optimum features depends on correlation feature selection 29 approach. The optimum features based, the data is categorized as normal and anomalous data with the help of cycle‐consistent generative adversarial network. Mainly, cycle‐consistent generative adversarial network classifier not express the adaptation of optimization strategies to scale the optimal variables and assure exact intruder detection in cloud computing. So, the water strider optimization approach is proposed to optimize the cycle‐consistent generative adversarial network classifier. The proposed approach is simulated in MATLAB using the benchmark dataset of NSL‐KDD. The performance metrics, such as accuracy, F‐score, specificity, precision, sensitivity, false positive rate, and AUC are evaluated. Then, the obtained results are compared with existing approaches, like chronological salp swarm algorithm‐base deep belief network for IDS in cloud computing (IDS‐CC‐DBN‐CSSA), 30 deep neural network based IDS utilizing hybrid optimization of improved genetic and simulated annealing algorithms for intrusion detection in CC (IDS‐CC‐DNN‐IGASAA) 31 and multiple layer perceptron neural network with artificial bee colony (IDS‐CC‐MLPNN‐ABC) 32 methods, respectively.…”
Section: Introductionmentioning
confidence: 99%