2022
DOI: 10.4018/ijaci.293123
|View full text |Cite
|
Sign up to set email alerts
|

Cloud Intrusion Detection Model Based on Deep Belief Network and Grasshopper Optimization

Abstract: Cloud computing is a vast area which uses the resources cost-effectively. The performance aspects and security are the main issues in cloud computing. Besides, the selection of optimal features and high false alarm rate to maintain the highest accuracy of the testing are also the foremost challenges focused. To solve these issues and to increase the accuracy, an effective cloud IDS using Grasshopper optimization Algorithm (GOA) and Deep belief network (DBN) is proposed in this paper. GOA is used to choose the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 39 publications
0
4
0
Order By: Relevance
“…The outcomes of the study imply that extreme learning‐model overtakes the other existing techniques. Similar to this study, the multilevel hybridization intrusion‐detection design for enhancing the detection efficiency of all the unknown threats and the known attacks 35 . This hybrid model utilizes the ELM and SVM‐classifier.…”
Section: Related Workmentioning
confidence: 94%
See 1 more Smart Citation
“…The outcomes of the study imply that extreme learning‐model overtakes the other existing techniques. Similar to this study, the multilevel hybridization intrusion‐detection design for enhancing the detection efficiency of all the unknown threats and the known attacks 35 . This hybrid model utilizes the ELM and SVM‐classifier.…”
Section: Related Workmentioning
confidence: 94%
“…Similar to this study, the multilevel hybridization intrusion-detection design for enhancing the detection efficiency of all the unknown threats and the known attacks. 35 This hybrid model utilizes the ELM and SVM-classifier. The higher training quality data set has been constructed by using the K-means algorithm for the improvisation of the classifier's performance.…”
Section: Intrusion-detection-model Using Svm-classification Techniquementioning
confidence: 99%
“…CNN is the second kind of discriminative deep networks, along with several convolutional and gathering layers stacked in an array to produce a multi-layer neural network [65], [67]. The max pooling layer should come after each convolutional layer.…”
Section: Convolutional Neural Networkmentioning
confidence: 99%
“…The image encryption-then-compression (ETC) technique was recommended. The encrypted and compressed images it produces are strongly secured by this algorithm, which operates in the prediction error domain [10], [11].This work suggests a paradigm shift in which a single plain image is divided into a number of component pictures These are then separately encrypted to form a number of component cypher pictures. The original picture is created by combining the decrypted component cipher-images [12].…”
Section: Introductionmentioning
confidence: 99%