scispace - formally typeset
Journal ArticleDOI

A network intrusion detection system in cloud computing environment using dragonfly improved invasive weed optimization integrated Shepard convolutional neural network

TLDR
An effective dragonfly improved invasive weed optimization‐based Shepard convolutional neural network (DIIWO‐based ShCNN) to detect the intruders and to mitigate the attacks in cloud paradigm and are more feasible to detectThe intruders with ShCNN.
Abstract
In cloud computing, the resources and memory are dynamically allocated to the user based on their needs. Security is considered as a major issue in cloud as the use of cloud is increased. Intrusion detection is considered as a significant tool to develop a reliable and secure cloud environment. Performing intrusion detection in cloud is a difficult task because of its distributed nature and extensive usage. Intrusion detection system (IDS) is widely considered to find the malicious actions in network. In cloud, most conventional IDS are vulnerable to attacks and have no capability for maintaining the balance between sensitivity and accuracy. Thus, we proposed an effective dragonfly improved invasive weed optimization‐based Shepard convolutional neural network (DIIWO‐based ShCNN) to detect the intruders and to mitigate the attacks in cloud paradigm and are more feasible to detect the intruders with ShCNN. The proposed method outperforms the existing method with maximum accuracy of 0.960%, sensitivity of 0.967%, and specificity 0.961%, respectively.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Enhanced Chimp Optimization-Based Feature Selection with Fuzzy Logic-Based Intrusion Detection System in Cloud Environment

TL;DR: In this article , the authors presented improved metaheuristics with a fuzzy logic-based intrusion detection system for the cloud security (IMFL-IDSCS) technique, which can identify intrusions in the distributed CC platform and secure it from probable threats.
Journal ArticleDOI

Intrusion Detection-Data Security Protection Scheme Based on Particle Swarm-BP Network Algorithm in Cloud Computing Environment

TL;DR: Wang et al. as mentioned in this paper proposed an intrusion detection-data security protection scheme based on particle swarm-BP network algorithm in a cloud computing environment, and the results show that the detection rate and false detection rate of the method proposed in this paper are the best under five different types of sample data.
OtherDOI

Issue Information

TL;DR: In this paper , the authors present a full-text version of this article with the link below to share a fulltext version with your friends and colleagues, using the link provided by the Wiley Online Library Terms and Conditions of Use.
Journal ArticleDOI

Applying SDR with CNN to Identify Weld Defect: A New Processing Method

TL;DR: X-ray weld images are investigated to achieve nondestructive identification of defects in oil and gas pipeline welds in this paper , where the content mainly includes image filtering and enhancement, weld defect suspected defect region (SDR) segmentation, and defect identification.
References
More filters
Journal ArticleDOI

Dragonfly algorithm: a new meta-heuristic optimization technique for solving single-objective, discrete, and multi-objective problems

TL;DR: The results of DA and BDA prove that the proposed algorithms are able to improve the initial random population for a given problem, converge towards the global optimum, and provide very competitive results compared to other well-known algorithms in the literature.
Proceedings Article

Shepard convolutional neural networks

TL;DR: This paper draws on Shepard interpolation and design Shepard Convolutional Neural Networks (ShCNN) which efficiently realizes end-to-end trainable TVI operators in the network and shows that by adding only a few feature maps in the new Shepard layers, the network is able to achieve stronger results than a much deeper architecture.
Journal ArticleDOI

Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm

TL;DR: A new intrusion detection system based on a combination of a multilayer perceptron (MLP) network, and artificial bee colony (ABC) and fuzzy clustering algorithms and the obtained results have indicated the superiority of the proposed method in comparison with state-of-the-art methods.
Journal ArticleDOI

LR-HIDS: logistic regression host-based intrusion detection system for cloud environments

TL;DR: A host-based intrusion detection system (H-IDS) for protecting virtual machines in the cloud environment is proposed and shows acceptable accuracy of about 97.51 for detecting attacks against normal states.
Journal ArticleDOI

Improved invasive weed optimization algorithm (IWO) based on chaos theory for optimal design of PID controller

TL;DR: Improved chaotic weed algorithm based on chaos theory has gained fast convergence rate and high accuracy, and the problem of setting the PID controller parameters for a DC motor using the proposed method is discussed.
Related Papers (5)
Trending Questions (1)
How can the intrusion detection in fog computing be improved?

The paper proposes a dragonfly improved invasive weed optimization-based Shepard convolutional neural network (DIIWO-based ShCNN) to improve intrusion detection in cloud computing.