JNACSISSN:2582-3817

Cloud Intrusion Detection using Modified Crow Search Optimized based Neural Network

Abstract

For computing services, cloud computing is represented as the internet-based method whereas cloud users use the resources. In the cloud service, intrusion or attacks is considered as one of the main problems in the cloud environment because it corrupts the performance. The service is affected because of the various attacks, and it provides deceptive information also maximizes the false rate. A novel Modified CSA-based Levenberg-Marquardt Neural Network (MCS-LM NN) is proposed in this paper to recognize the intrusion behavior. At first, the cloud network experiences producing the clusters by exploiting the WLI fuzzy clustering model. This model attains the diverse count of clusters in that the data objects are clustered together. Subsequently, the clustered data is subjected to the MCS-LM NN, which is the integration of the Levenberg-Marquardt method of NN and Modified CSA. The CSA is exploited to update the weight, as well as it also exploits to ascertain the optimal weight to identify the malicious activity via training procedure. Hence, the diverse clustered data is subjected to the developed optimization technique. After training the data, the data requires to be aggregated. Then that data is subjected to the MCS-LMNN model, whereas the intrusion behavior is recognized. At last, the experimentation outcomes of the developed technique and the performance analysis are carried out using the False Positive Rate (FPR), accuracy, and True Positive Rate (TPR). Therefore, the developed model obtains superior accuracy and it assures improved detection performance.

References

  • Abdulaziz AldribiIssa TraoréOnyekachi Nwamuo,"Hypervisor-based cloud intrusion detection through online multivariate statistical change tracking", Computers & Security, vol. 88, 10 October 2019.
  • Adel AbusittaMartine BellaicheTalal Halabi,"A deep learning approach for proactive multi-cloud cooperative intrusion detection system", Future Generation Computer Systems, vol. 98, pp. 308-318, 29 March 2019.
    Mohamed IdhammadKarim AfdelMustapha Belouch,"Distributed Intrusion Detection System for Cloud Environments based on Data Mining techniques", Procedia Computer Science, vol. 127, pp.35-41, 12 March 2018.
  • Mingming ChenNing WangYuzhi Chen,"FCM technique for efficient intrusion detection system for wireless networks in cloud environment",Computers & Electrical Engineering24 October 2017.
  • Bahram HajimirzaeiNima Jafari Navimipour,"Intrusion detection for cloud computing using neural networksand artificial bee colony optimization algorithm", ICT Express, vol.5, no. 1, pp. 56-59, 16 May 2018.
  • Sina MakhdoomiAlireza Askarzadeh,"Optimizing operation of a photovoltaic/diesel generator hybrid energy system with pumped hydro storage by a modified crow search algorithm", Journal of Energy Storage, vol.27, 6 November 2019.
  • Sotiris Konstantinidis, Pythagoras Karampiperis and Miguel-Angel Sicilia, "Enhancing the LevenbergMarquardt Method in Neural Network training using the direct computation of the Error Cost Function Hessian", In proceedings of ACM International Conference on Engineering Applications of Neural Network, pp.1-5, 2015.
  • Chih-Hung Wu, Chen-Sen Ouyang, Li-Wen Chen, and Li-Wei Lu, "A New Fuzzy Clustering Validity Index with a Median Factor for Centroid-based Clustering", IEEE Transactions on Fuzzy Systems, vol. 23, no. 3, pp. 701-718, June 2015.
  • Amol V Dhumane,"Examining User Experience of eLearning Systems using EKhool Learners", Journal of Networking and Communication Systems, vol. 3, no. 4, October 2020.
  • Amit Sarkar,Senthil Murugan T," Adaptive Cuckoo Search and Squirrel Search Algorithm for Optimal Cluster Head Selection in WSN", Journal of Networking and Communication Systems, vol. 2, no. 3, July 2019.
  • Suresh Babu Chandanapalli,Sreenivasa Reddy E,Rajya Lakshmi D,"Convolutional Neural Network for Water Quality Prediction in WSN",, Journal of Networking and Communication Systems, vol. 2, no. 3, July 2019.