A Deep Learning and Optimization-Aided Intrusion Detection Framework for Adaptive Threat Detection in Dynamic Public Cloud Environments
Keywords:
Intrusion Detection Systems, Cloud Computing, Deep Learning, Deep Belief Networks, Cat Swarm Optimization, Long Short-Term Memory, Network Security, Cyber ThreatsAbstract
The article proposes a novel way to combine cutting-edge Deep Learning (DL) algorithms and optimization strategies to improve the effectiveness of Intrusion Detection Systems (IDS) in cloud environments. The proposed approach aims to address common issues including overfitting, imbalanced data, and the identification of unknown attack types by combining Deep Belief Networks (DBN) with Cat Swarm Optimization assisted Long Short-Term Memory (CSO-LSTM). Utilizing DBN for feature extraction lowers dimensionality, allowing for a more thorough examination of network data, and LSTM takes care of temporal factors that are essential for identifying multi-stage assaults. System performance is improved with LSTM weight optimization using Cat Swarm Optimization. The DBN architecture and the energy dependence model provide a strong basis for identifying latent patterns in the NSL-KDD dataset. This research tries to improve the adaptability and accuracy of intrusion detection systems (IDS) by integrating deep learning (DL) and optimization approaches in a comprehensive manner, in addition to addressing the current limits in IDS for cloud environments. The findings show encouraging gains in precision and flexibility, indicating the possibility for the suggested framework to overcome current intrusion detection for cloud environments constraints.
Downloads
References
Tari, Z. (2014). Cloud Computing: A Primer. Chapman and Hall/CRC.
Patel, M., et al. (2013). Intrusion Detection Systems: A Review. International Journal of Computer Applications, 75(13).
Hashizume, K., et al. (2013). Cloud Computing Security Issues and Solutions: A Survey. International Journal of Information Management, 33(1), 13-25.
Chiba, R., et al. (2016). Positioning, Detection Time, and Data Sources of Intrusion Detection Systems in Cloud Environments. Procedia Computer Science, 82, 165-172.
Wen, Y., et al. (2022). Back Propagation and Neural Network-Based Cloud Computing Intrusion Detection Technology. Journal of Ambient Intelligence and Humanized Computing, 13(2), 1747-1759.
Hizal, A., et al. (2021). NSL-KDD: A New Intrusion Detection Dataset for the Cloud Era. Journal of King Saud University - Computer and Information Sciences.
Kumar, A., et al. (2022). Fuzzy Min-Max Neural Network-Based Intrusion Detection Scheme for Cloud Computing. Neural Computing and Applications, 1-19.
Chiba, R., et al. (2019). Hybrid Framework of Deep Neural Network and Enhanced Genetic Algorithm for Intrusion Detection. IEEE Access, 7, 158336-158346.
Geetha, P., & Deepa, S. (2022). Fisher Kernel-Based Weight Dropped Bi-LSTM Classifier for Intrusion Detection. Computers, Materials & Continua, 70(1), 1065-1083.
Muhuri, P. K., et al. (2020). Genetic Algorithm-Based Feature Selection for LSTM-RNN in Intrusion Detection. In Proceedings of the International Conference on Computational Intelligence and Data Engineering (ICCIDE), 1-6.
Bhardwaj, A., et al. (2020). An Autoencoder-Based Deep Learning Architecture for DDoS Attack Detection in Cloud Computing. Soft Computing, 24(1), 331-341.
Muthukumar, S., & Rajendran, P. (2015). An Intelligent Technique for Building Intrusion Detection System with Enhanced Security. Procedia Computer Science, 46, 866-874.
Latanicki, J., et al. (2010). Intelligent Security Model for Application Layer DoS Attack Detection in Cloud Computing. In Proceedings of the International Conference on Computer Science and Information Technology (ICCSIT), 18-22.
Rajendran, P., et al. (2019). Multi-layered LSTM Network for Detection of Multi-stage Attacks in Cloud Computing. Future Generation Computer Systems, 91, 442-452.
Yu, L., et al. (2013). Cloud-Based Intrusion Detection System. In Proceedings of the International Conference on Cloud Computing and Big Data (CloudCom-Asia), 1-6.
Aldribi, A., et al. (2020). A Novel Intrusion Detection System for Cloud Computing Environments Based on Fuzzy C-Means and SVM. Journal of Ambient Intelligence and Humanized Computing, 11(6), 2451-2464.
Wang, W., et al. (2018). A Centralized HIDS Framework for Resource Efficiency in Cloud Computing. Future Generation Computer Systems, 79, 518-529.
Aljurayban, S., & EmamSaleh, I. (2015). Layered Intrusion Detection Framework (LIDF) for Cloud Computing. Journal of King Saud University - Computer and Information Sciences.
Fischer, A., et al. (2014). Deep Learning with Boltzmann Machines: A Learning Algorithm for the Architecture of the Human Brain. Neural Computation, 26(1), 1- 48.
Hinton, G. E., et al. (2012). A Practical Guide to Training Restricted Boltzmann Machines. In Neural Networks: Tricks of the Trade (pp. 599-619). Springer.
Pankajavalli, P. B., & Karthick, G. S. (2022). Efficient Data Flow Graph Modeling Using Free Poisson Law for Fault-Tolerant Routing in Internet of Things. In Computer Networks and Inventive Communication Technologies: Proceedings of Fifth ICCNCT 2022 (pp. 475-487). Singapore: Springer Nature Singapore.
Al-Emadi, I., et al. (2020). A Comprehensive Review on Long Short-Term Memory Networks: From Data Preprocessing to Model Optimization. IEEE Access, 8, 144516-144543.
Yu, S., et al. (2019). A Novel Intrusion Detection System for Cloud Computing Based on LSTM Networks. IEEE Access, 7, 133379-133389.
Karthick, G. S. "Energy-Aware Reliable Medium Access Control Protocol for Energy-Efficient and Reliable Data Communication in Wireless Sensor Networks." SN Computer Science 4.5 (2023): 449.
Downloads
Published
How to Cite
Issue
Section
License
![Creative Commons License](http://i.creativecommons.org/l/by-sa/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.