Abstract
A capability of cloud-based IDS in identifying complicated and anonymous attacks is rising in the current era. However, unwanted delays hinder the detection rate. A malicious user might utilize vast quantities of computational power. The cloud provides to perform attacks both within and without the cloud. Furthermore, there are major challenges for intrusion detection due to the ease of the cloud and also the continual restructuring and movement of cloud resources. Intruder detection, feature extraction, and data processing are all included in the novel optimization-based Intrusion Detection System (IDS) paradigm that will be presented in this study. Data normalization is used to first pre-process the input data. Then, appropriate feature extraction is carried out, including the extraction of (a) raw features, (b) statistical features, then (c) higher-order statistical features using suggested kurtosis. The detection phase is then applied to the retrieved features. A two-stage ensemble method is suggested for finding intruders in clouds. Random forest (RF), Support Vector Machine (SVM), optimal Neural Network (NN), and RNN make up the suggested ensemble technique. The RF, SVM, and Optimized NN algorithms are directly fed the collected features. The output of these classifiers is then provided to the RNN classifier (i.e.), RF output to RNN1, SVM output to RNN2, and optimized NN output to RNN3. Then, the weighted average of RNN 1, 2, and 3 is considered as the final output. A Self Adaptive Salp Swarm Optimization optimizes the weights of NN for exact detection (SA-SSO). Finally, a test is conducted to confirm the developed model’s superiority.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.