Cloud intrusion detection framework using variational auto encoder Wasserstein generative adversarial network optimized with archerfish hunting optimization algorithm
G. Senthilkumar,K. Tamilarasi,J. K. Periasamy
DOI: https://doi.org/10.1007/s11276-023-03571-7
IF: 2.701
2023-12-02
Wireless Networks
Abstract:The cloud computing environment has been severely harmed by security issues, which has a negative impact on the healthy and sustainable development of the cloud. Intrusion detection technologies are protecting the cloud computing environment from malicious attacks. To overcome this problem, Variational auto encoder Wasserstein generative adversarial networks enhanced by Gazelle optimization algorithm embraced cloud intrusion detection (CIDF-VAWGAN-GOA) is proposed in this manuscript. Here, the data is collected via NSL-KDD dataset. Then the data is supplied to pre-processing. In pre-processing, it purges the redundancy and missing value is restored using Difference of Gaussian filtering. Then the pre-processing output is fed to the feature selection. In feature selection, the optimal feature is selected using archerfish hunting optimizer (AHOA). The optimal features based, data is characterized by normal and anomalous under VAWGAN. Generally, VAWGAN does not adopt any optimization techniques to compute the optimum parameters for assuring accurate detection of intruder in cloud intrusion detection. Therefore, in this work, GOA is used for optimizing VAWGAN. The proposed CIDF-VAWGAN-GOA technique is implemented in Python under NSL-KDD data set. The performance metrics, like accuracy, sensitivity, specificity, precision, F-Score, Computation Time, Error rate, AUC are examined. The proposed method provides higher recall of 17.58%, 23.18% and 13.92%, high AUC of 19.43%, 12.84% and 21.63% and lower computation Time of 15.37%, 1.83%,18.34% compared to the existing methods, like Cloud intrusion detection depending on stacked contractive auto-encoder with support vector machine (CIDF-SVM), Efficient feature selection with classification using ensemble method for network intrusion detection on cloud computing (CIDF-DNN) and Deep belief network under chronological salp swarm approach for intrusion detection in cloud utilizing fuzzy entropy (CIDF-DBN) respectively.
computer science, information systems,telecommunications,engineering, electrical & electronic