2023
DOI: 10.3390/electronics12030556
|View full text |Cite
|
Sign up to set email alerts
|

Filter-Based Ensemble Feature Selection and Deep Learning Model for Intrusion Detection in Cloud Computing

Abstract: In recent years, the high improvement in communication, Internet of Things (IoT) and cloud computing have begun complex questioning in security. Based on the development, cyberattacks can be increased since the present security techniques do not give optimal solutions. As a result, the authors of this paper created filter-based ensemble feature selection (FEFS) and employed a deep learning model (DLM) for cloud computing intrusion detection. Initially, the intrusion data were collected from the global datasets… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 30 publications
0
10
0
Order By: Relevance
“…Kavitha et al [11] examined filter-based ensemble-FS (FEFS) and used the DL method to overcome the problems faced in CC. FEFS is an integration of three feature extraction approaches, namely, embedded, filter, and wrapper methods.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Kavitha et al [11] examined filter-based ensemble-FS (FEFS) and used the DL method to overcome the problems faced in CC. FEFS is an integration of three feature extraction approaches, namely, embedded, filter, and wrapper methods.…”
Section: Related Workmentioning
confidence: 99%
“…In Equation (11), θ represents the angle of attack in the range of [0, 2], R denotes the spiral radius, and u and v show the spiral constant and are fixed as 1. The equation to update the location of the sooty tern is as follows.…”
Section: Hyperparameter Tuning Using the Stoamentioning
confidence: 99%
“…This can be achieved through various methods such as filter, wrapper, and embedded approaches. 49 Filter methods independently evaluate the importance of each feature based on a criterion, while wrapper methods use the classifier to assess the subset of features. Embedded methods are integrated with learning algorithms.…”
Section: Feature Selectionmentioning
confidence: 99%
“…Feature selection involves identifying the most significant features to detect DDoS attacks. This can be achieved through various methods such as filter, wrapper, and embedded approaches 49 . Filter methods independently evaluate the importance of each feature based on a criterion, while wrapper methods use the classifier to assess the subset of features.…”
Section: Introductionmentioning
confidence: 99%
“…The client computing paradigm has inherent issues with security, privacy, service availability, and other problems [5]. The cloud's resources and data connections are becoming increasingly challenging to manage, as the number of intrusions increase [6]. One of the techniques for preventing malicious attacks on cloud computing is intrusion detection.…”
Section: Introductionmentioning
confidence: 99%