An Improved Harris Hawks Optimization Algorithm for Malware Intrusion Detection in Cloud Storage


  • Manjushree C. V. Vemana Institute of Technology (VTU), Bangalore, India
  • Nandakumar A. N. VTU/City Engineering College, Bangalore, India


Cloud Data Security, Malware Intrusion Detection, Multilayer Perceptron Model, Harris Hawks Optimization, Unknown Malware Attacks


Defending against malware threats has become a crucial concern in the continually evolving realm of cloud computing. Creative malware has become a rising challenge to cloud data security. Hence, we have proposed a methodology for Cloud Malware Intrusion Detection to strengthen cloud infrastructures against the constant threat of unknown malware attacks. Harris Hawks Optimization (HHO) and the Multilayer Perceptron (MLP) are proposed as a hybrid approach to tackling malware attacks in the cloud using deep learning to detect subtle abnormalities as an indicative solution to identify hidden malware threats. Hence, the MLP model provides part of a vigilant data monitoring system inside the cloud architecture. By modifying the MLP's hyperparameters, HHO serves as an optimization engine, enhancing the MLP's accuracy and efficiency. This hybrid approach has the capacity to safeguard cloud resources against the constantly changing and threatening landscape of malware, which provides an efficient and adaptive defense system, as proved by the implementation process. Accuracy of 98.45%, precision of 98.55%, recall of 99.88%, and F1 Score of 99.21% have been achieved during the experimentation.


Download data is not yet available.


Al-Hawawreh, M., & Moustafa, N., “Explainable deep learning for attack intelligence and combating cyber-physical attacks,” Ad Hoc Networks, pp. 103329, 2023.

Fascí, L. S., Fisichella, M., Lax, G., & Qian, C., “Disarming visualization-based approaches in malware detection systems,” Computers & Security, vol. 126, pp. 103062, 2023.

Liu, C., Lu, J., Feng, W., Du, E., Di, L., & Song, Z., “MOBIPCR: Efficient, accurate, and strict ML-based mobile malware detection,” Future Generation Computer Systems, vol. 144, pp. 140-150, 2023.

Wen, Q., & Chow, K. P., “CNN based zero-day malware detection using small binary segments,” Forensic Science International: Digital Investigation, vol. 38, pp. 301128, 2021.

Tian, D., Ying, Q., Jia, X., Ma, R., Hu, C., & Liu, W., “MDCHD: A novel malware detection method in cloud using hardware trace and deep learning,” Computer Networks, vol. 198, pp. 108394, 2021.

Mohammed, M.A., Lakhan, A., Zebari, D.A., Abdulkareem, K.H., Nedoma, J., Martinek, R., Tariq, U., Alhaisoni, M. and Tiwari, P., “Adaptive secure malware efficient machine learning algorithm for healthcare data,” CAAI Transactions on Intelligence Technology, 2023.

Liu, X., Liu, X., Xiong, N., Luo, D., Xu, G., & Chen, X., “AAJS: An Anti-Malicious Attack Graphic Similarity Judgment System in Cloud Computing Environments,” Electronics, vol. 12, no. 9, pp. 1983, 2023.

Ping, Y., Zhan, Y., Lu, K., & Wang, B., “Public data integrity verification scheme for secure cloud storage,” Information, vol. 11, no. 9, pp. 409, 2023.

Susilo, W., Jiang, P., Lai, J., Guo, F., Yang, G., & Deng, R. H., “Sanitizable access control system for secure cloud storage against malicious data publishers,” IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 3, pp. 2138-2148, 2021.

Aslan, Ö., Ozkan-Okay, M., & Gupta, D., “A review of cloud-based malware detection system: Opportunities, advances and challenges,” European Journal of Engineering and Technology Research, vol. 6, no. 3, pp.1-8, 2021.

Aljumah, A., & Ahanger, T. A., “Cyber security threats, challenges and defence mechanisms in cloud computing,” IET communications, vol. 14, no. 7, pp. 1185-1191, 2020.

Vellela, S. S., Balamanigandan, R., & Praveen, S. P., “Strategic Survey on Security and Privacy Methods of Cloud Computing Environment,” Journal of Next Generation Technology, vol. 2, no. 1, 2022.

George, A. S., & Sagayarajan, S., “Securing Cloud Application Infrastructure: Understanding the Penetration Testing Challenges of IaaS, PaaS, and SaaS Environments,” Partners Universal International Research Journal, vol. 2, no. 1, pp. 24-34, 2023.

Jadhav, A., & Chawan, P. M., “A System for Detection and Prevention of Data Leak,” International Research Journal of engineering and Technology, pp: 471-474, 2021.

Pronika, S.S.Tyagi, “Enhancing Security of Cloud Data through Encryption with AES and Fernet Algorithm through Convolutional-Neural-Networks (CNN)”, International Journal of Computer Networks and Applications (IJCNA), vol. 8, no. 4, pp. 288-299, 2021.

Roychowdhury, S., & Singh, B. K, “A Hybrid and Multi-objective Approach for Data Leak and Tamper Detection in Healthcare Cloud Data”, In Machine Vision and Augmented Intelligence: Select Proceedings of MAI, Singapore: Springer Nature Singapore, pp: 275-285, 2023.

Mottupalli, R. K., “Augmenting the Cloud Environment Security Through Blockchain Based Hash Algorithms”, Journal of Computer Sciences Institute, vol. 26, pp. 1-6, 2023.

Rubio-Medrano, C. E., Soundrapandian, P. K. D., Hill, M., Claramunt, L., Baek, J., & Ahn, G. J., “DyPolDroid: Protecting against permission-abuse attacks in android,” Information Systems Frontiers, vol. 25, no. 2, pp. 529-548, 2023.

Song, H., Li, J., & Li, H., “A cloud secure storage mechanism based on data dispersion and encryption,” IEEE Access, vol. 9, pp. 63745-63751, 2021.

Deyannis, D., Papadogiannaki, E., Kalivianakis, G., Vasiliadis, G., & Ioannidis, S., “Trustav: Practical and privacy preserving malware analysis in the cloud”, In Proceedings of the tenth ACM conference on data and application security and privacy, pp. 39-48, 2020.

Gao, X., Hu, C., Shan, C., Liu, B., Niu, Z., & Xie, H., “Malware classification for the cloud via semi-supervised transfer learning,” Journal of Information Security and Applications, vol. 55, pp. 102661, 2020.

Qaisar, Z. H., Almotiri, S. H., Al Ghamdi, M. A., Nagra, A. A., & Ali, G., “A scalable and efficient multi-agent architecture for malware protection in data sharing over mobile cloud,” IEEE Access, vol. 9, pp. 76248-76259, 2021.

Aslan, Ö., Ozkan-Okay, M., & Gupta, D., “Intelligent behavior-based malware detection system on cloud computing environment,” IEEE Access, vol. 9, pp. 83252-83271, 2021.

Mishra, P., Aggarwal, P., Vidyarthi, A., Singh, P., Khan, B., Alhelou, H. H., & Siano, P., “VMShield: Memory introspection-based malware detection to secure cloud-based services against stealthy attacks,” IEEE Transactions on Industrial Informatics, vol. 17, no. 10, pp. 6754-6764, 2021.

Vinay J., Zuhair Bilal, Rohit K., Syed Ali Zuhaib, Dr. Mouleeswaran S. K., “Cloud based Malware Detection System,” International Journal of Engineering Research & Technology (IJERT), vol. 11, no. 5, 2022.

Ben Abdel Ouahab, I., Elaachak, L., & Bouhorma, M, “Image-based malware classification using multi-layer perceptron”, In Networking, Intelligent Systems and Security: Proceedings of NISS, Springer Singapore, pp: 453-464, 2021.

Long, Do., “Detecting malware using the MLP algorithm,” International Journal of Advanced Trends in Computer Science and Engineering, vol. 9, pp. 5640-5644, 2020.

Mohammed, A. J., Arif, M. H., & Ali, A. A., “A multilayer perceptron artificial neural network approach for improving the accuracy of intrusion detection systems,” IAES International Journal of Artificial Intelligence, vol. 9, no. 4, pp. 609-615, 2020.

Abbas, S., Sampedro, G. A., Abisado, M., Almadhor, A., Yousaf, I., & Hong, S. P., “Harris-Hawk-Optimization-Based Deep Recurrent Neural Network for Securing the Internet of Medical Thing,” Electronics, vol. 12, no. 12, pp. 2612, 2023.

Alsubai, S., Dutta, A. K., Alnajim, A. M., Ayub, R., AlShehri, A. M., & Ahmad, N., “Artificial intelligence-driven malware detection framework for internet of things environment,” PeerJ Computer Science, vol. 9, pp. 1366, 2023.




How to Cite

C. V., M. ., & A. N., N. . (2024). An Improved Harris Hawks Optimization Algorithm for Malware Intrusion Detection in Cloud Storage. International Journal of Intelligent Systems and Applications in Engineering, 12(14s), 616–622. Retrieved from



Research Article