Publication Cover
Cybernetics and Systems
An International Journal
Volume 54, 2023 - Issue 6
70
Views
0
CrossRef citations to date
0
Altmetric
Research Articles

Optimized Deep Ensemble Technique for Malicious Behavior Classification in Cloud

, &

References

  • Alkadi, O., N. Moustafa, and B. Turnbull. 2020. A review of intrusion detection and blockchain applications in the cloud: Approaches, challenges and solutions. IEEE Access 8:104893–917. doi:10.1109/ACCESS.2020.2999715.
  • Aloysius, G., B. R. Rajakumar and B. Dennis. 2014. Genetic algorithm based airlines booking terminal open/close decision system. In Proceedings of International Conference on Advances in Computing, Communications and Informatics, vol. 174-79, 3–5.
  • Brammya, G., S. Praveena, N. S. Ninu Preetha, R. Ramya, B. R. Rajakumar, and D. Binu. 2019. Deer hunting optimization algorithm: A new nature-inspired meta-heuristic paradigm. The Computer Journal 2019:bxy133. doi:10.1093/comjnl/bxy133.
  • Brammya, G., and A. Deepa. 2019. Job scheduling in cloud environment using Lion algorithm. Journal of Networking and Communication Systems 2 (1):1–14.
  • Chen, M., Y. Qian, J. Chen, K. Hwang, S. Mao, and L. Hu. 2020. Privacy protection and intrusion avoidance for cloudlet-based medical data sharing. IEEE Transactions on Cloud Computing 8 (4):1274–83. doi:10.1109/TCC.2016.2617382.
  • Chkirbene, Z., A. Erbad, R. Hamila, A. Mohamed, M. Guizani, and M. Hamdi. 2020. TIDCS: A dynamic intrusion detection and classification system based feature selection. IEEE Access 8:95864–77. doi:10.1109/ACCESS.2020.2994931.
  • Dbouk, T., A. Mourad, H. Otrok, H. Tout, and C. Talhi. 2019. A novel ad-hoc mobile edge cloud offering security services through intelligent resource-aware offloading. IEEE Transactions on Network and Service Management 16 (4):1665–80. doi:10.1109/TNSM.2019.2939221.
  • Ficco, M., and F. Palmieri. 2017. Introducing fraudulent energy consumption in cloud infrastructures: A new generation of denial-of-service attacks. IEEE Systems Journal 11 (2):460–70. doi:10.1109/JSYST.2015.2414822.
  • Goyal, S., S. Bhushan, Y. Kumar, A. U. H. S. Rana, M. R. Bhutta, M. F. Ijaz, and Y. Son. 2021. An optimized framework for energy-resource allocation in a cloud environment based on the whale optimization algorithm. Sensors 21 (5):1583. doi:10.3390/s21051583.
  • Gupta, B., and N. Mishra. 2021. Optimized deep learning‐based attack detection framework for secure virtualized infrastructures in cloud. International Journal of Numerical Modelling, Electronic Networks, Devices and Fields 2012:2945.
  • Harikrishna, P, and A. Arjunan. 2019. Fuzzy self organizing maps-based DDoS mitigation mechanism for software defined networking in cloud computing. Journal of Ambient Intelligence and Humanized Computing 10:1547–59.
  • Ihsan, H. A., Z. Shijie, S. Muhammad, and A. Akber. 2020. Multi-layered intrusion detection and prevention in the SDN/NFV enabled cloud of 5G networks using AI-based defense mechanisms. Computer Networks 179:107364.
  • Khadidos, A. O., H. Manoharan, S. Selvarajan, A. O. Khadidos, K. H. Alyoubi, and A. Yafoz. 2022. A classy multifacet clustering and fused optimization based classification methodologies for SCADA security. Energies 15 (10):3624. doi:10.3390/en15103624.
  • Krishnaveni, S, and S. Prabakaran. 2021. Ensemble approach for network threat detection and classification on cloud computing. Concurrency and Computation: Practice and Experience 33 (3):e5272. doi:10.1002/cpe.5272.
  • Kriti, B., and B. Gupta. 2019. Network flow analysis for detection and mitigation of Fraudulent Resource Consumption (FRC) attacks in multimedia cloud computing. Multimedia Tools and Applications 78:4267–98.
  • Li, S., Y. Li, W. Han, X. Du, M. Guizani, and Z. Tian. 2021. Malicious mining code detection based on ensemble learning in cloud computing environment. Simulation Modelling Practice and Theory 113:102391. doi:10.1016/j.simpat.2021.102391.
  • Loukas, G., T. Vuong, R. Heartfield, G. Sakellari, Y. Yoon, and D. Gan. 2018. Cloud-based cyber-physical intrusion detection for vehicles using deep learning. IEEE Access. 6:3491–508. doi:10.1109/ACCESS.2017.2782159.
  • Michael Mahesh, K. 2020. Workflow scheduling using improved moth swarm optimization algorithm in cloud computing. Multimedia Research 3 (3).
  • Mishra, P., V. Varadharajan, E. S. Pilli, and U. Tupakula. 2020. VMGuard: A VMI-based security architecture for intrusion detection in cloud environment. IEEE Transactions on Cloud Computing 8 (3):957–71.
  • Mourad, A., H. Tout, O. A. Wahab, H. Otrok, and T. Dbouk. 2021. Ad hoc vehicular fog enabling cooperative low-latency intrusion detection. IEEE Internet of Things Journal 8 (2):829–43. doi:10.1109/JIOT.2020.3008488.
  • Netaji, V., and G. P. Bhole. 2020. Optimal container resource allocation using hybrid SA-MFO algorithm in cloud architecture. Multimedia Research 3 (1):11–20.
  • Nguyen, T. G., T. V. Phan, B. T. Nguyen, C. So-In, Z. A. Baig, and S. Sanguanpong. 2019. SeArch: A collaborative and intelligent NIDS architecture for SDN-based cloud IoT networks. IEEE Access 7:107678–94. doi:10.1109/ACCESS.2019.2932438.
  • Nitesh, B., P. Verma, S. Sharma, and V. Suraparaju. 2018. Distributed denial-of-service attack detection and mitigation using feature selection and intensive care request processing unit. Arabian Journal for Science and Engineering 43:959–67.
  • Pillutla, H, and A. Amuthan. 2020. SDN-based DDoS attack mitigation scheme using convolution recursively enhanced self organizing maps. Sādhanā 45:104.
  • Prabavathy, S., K. Sundarakantham, and S. M. Shalinie. 2018. Design of cognitive fog computing for intrusion detection in internet of things. Journal of Communications and Networks 20 (3):291–8. doi:10.1109/JCN.2018.000041.
  • Rajakumar, B. R. 2012a. Lion algorithm and its applications. Frontier Applications of Nature Inspired Computation in Springer Tracts in Nature-Inspired Computing (STNIC).
  • Rajakumar, B. R. 2012b. The Lion’s algorithm: A new nature inspired search algorithm. Procedia Technology-2nd International Conference on Communication, Computing & Security 6:126–35.
  • Rani, S., D. Koundal, M. F. Ijaz, M. Elhoseny, and M. I. Alghamdi. 2021. An optimized framework for WSN routing in the context of industry 4.0. Sensors 21 (19):6474. doi:10.3390/s21196474.
  • Ravi, N., and S. M. Shalinie. 2020.Learning-driven detection and mitigation of DDoS attack in IoT via SDN-cloud architecture. IEEE Internet of Things Journal 7 (4):3559–70. doi:10.1109/JIOT.2020.2973176.
  • Reddy, S., S. Theja, and K. Gopal Shyamm. 2020. An efficient metaheuristic algorithm based feature selection and recurrent neural network for DoS attack detection in cloud computing environment. Applied Soft Computing 100:106997.
  • Sadaf, K, and J. Sultana. 2020. Intrusion detection based on autoencoder and isolation forest in fog computing. IEEE Access 8:167059–68. doi:10.1109/ACCESS.2020.3022855.
  • Sahi, A., D. Lai, Y. Li, and M. Diykh. 2017. An efficient DDoS TCP flood attack detection and prevention system in a cloud environment. IEEE Access 5:6036–48.
  • Seyedali, M. 2015. Moth-flame optimization algorithm: A novel nature-inspired heuristic paradigm. Knowledge-Based Systems 89:228–49.
  • Shitharth, S., P. R. Kshirsagar, P. K. Balachandran, K. H. Alyoubi, and A. O. Khadidos. 2022. An innovative perceptual pigeon galvanized optimization (PPGO) based likelihood naïve bayes (LNB) classification approach for network intrusion detection system. IEEE Access 10:46424–41. doi:10.1109/ACCESS.2022.3171660.
  • Shitharth, S., K. M. Prasad, K. Sangeetha, P. R. Kshirsagar, T. S. Babu, and H. H. Alhelou. 2021. An enriched RPCO-BCNN mechanisms for attack detection and classification in SCADA systems. IEEE Access. 9:156297–312. doi:10.1109/ACCESS.2021.3129053.
  • Tian, Z., C. Luo, J. Qiu, X. Du, and M. Guizani. 2020. A distributed deep learning system for web attack detection on edge devices. IEEE Transactions on Industrial Informatics 16 (3):1963–71. doi:10.1109/TII.2019.2938778.
  • Velliangiri, S., and H. M. Pandey. 2020. Fuzzy-Taylor-elephant herd optimization inspired Deep Belief Network for DDoS attack detection and comparison with state-of-the-arts algorithms. Future Generation Computer Systems 110:80–90. doi:10.1016/j.future.2020.03.049.
  • Wang, W., X. Du, D. Shan, R. Qin, and N. Wang. 2020. Cloud intrusion detection method based on stacked contractive auto-encoder and support vector machine. IEEE Transactions on Cloud Computing 10 (3):1634–46.
  • Yu, X., A. Aouari, R. F. Mansour, and S. Su. 2021. A hybrid algorithm based on PSO and GA for feature selection. Journal of Cybersecurity 3 (2):117.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.