Advances in Engineering Software: M. Mayuranathan, S.K. Saravanan, B. Muthusenthil, A. Samydurai
Advances in Engineering Software: M. Mayuranathan, S.K. Saravanan, B. Muthusenthil, A. Samydurai
A R T I C L E I N F O A B S T R A C T
Keywords: Users have been urged to embrace a cloud-based environment by recent technologies and advancements. Because
Attacks of the dispersed nature of cloud solutions, security is a major problem. Because it is highly exposed to intruders
Intrusion for any kind of assault, security and privacy are major roadblocks to the on-demand service’s success. A massive
IDS
increase in network traffic has opened the ground for increasingly difficult and pervasive security vulnerabilities.
Data Preprocessing
Clustering
Several intrusion detection systems (IDS) for cloud computing environments have recently been suggested.
Detection and Classification Current IDS may display over-fitting, low classification accuracy, and a high false positive rate when given with a
large volume of variety of network data (FPR). We provide an effective optimal security solution for intrusion
detection in a cloud computing environment using a hybrid deep learning algorithm in this study (EOS-IDS).
Preprocessing is done using the improved heap optimization (IHO) technique, which assures data quality by
removing unnecessary data from the dataset. Then, for optimum feature selection, we offer a chaotic red deer
optimization (CRDO) technique, which is responsible for dimensionality reduction owing to large data. Then, for
cloud attacks and intrusion detection and classification, a deep Kronecker neural network (DKNN) is shown. To
illustrate its effectiveness, the proposed EOS-IDS strategy is evaluated against two benchmark datasets, DARPA
IDS and CSE-CIC-IDS2018, and the results are compared to different existing IDS strategies.
* Corresponding author.
E-mail addresses: [email protected] (M. Mayuranathan), [email protected] (S.K. Saravanan), muthusenthilb.cse@
srmvalliammai.ac.in (B. Muthusenthil), [email protected] (A. Samydurai).
https://doi.org/10.1016/j.advengsoft.2022.103236
Received 9 July 2022; Received in revised form 29 July 2022; Accepted 5 August 2022
Available online 17 August 2022
0965-9978/© 2022 Published by Elsevier Ltd.
M. Mayuranathan et al. Advances in Engineering Software 173 (2022) 103236
[21] FCM FG-SAR ANN Packet delivery ratio, validity The remainder of the paper is organised like this: Section 2 sum
index marises relevant research on IDS in cloud computing, whereas Section 3
[22] MLIDS VM DBSCAN Accuracy describes the issues and system model of the proposed EOS-IDS
[23] SDAE- MLP GA-SPO Accuracy, error rate approach. The suggested EOS-IDS approach is described in Section 4
IDS
[24] GA LAF ILU Flow time, span time
along with the appropriate mathematical model. Section 5 examines the
[25] IMVO SLA GA,PSO, Response time, reliability proposed EOS-IDS approach as well as a comparison of planned and
MFO current cloud computing IDS frameworks. Section 6 brings the paper to a
[26] GA- Task WOA,GWO Average turn around, close.
WOA scheduling response time
[27] HBI Wamp server PSO Response time, accuracy
[28] Cross FRON GA Cross border limit, Time 2. Related works
border complexity
[29] CI-IDS CC MCC Accuracy, processing time This section reviews recent literature concerning intrusion detection
[30] SFGA CDM SFLA, GA Energy consumption,
system for cloud computing environments. The literature is compiled in
response time, cost
[31] Fuzzy- IDS SMO Precision, recall, f-measure,
various aspects and presented in Table 1.
ANN accuracy, sensitivity, Chenet al. [21] presented a fuzzy cluster for detecting whether
specificity MANET should be introduced in a deep storage system. To boost per
[32] OCSA DoS RNN Precision, recall, f-measure, formance, this document includes logic modelling and testing. On mo
accuracy, processing time
bile terminals or mobile temporary networks, several terminals have
been performed (MANET). The most significant benefit of MANET is that
Using deep-Q network logic, a deep reinforcement learning-based it does not need a pre-defined infrastructure, such as a router connection
IDS discovers and classifies complex network attacks in various and a hub. It has the capacity to construct a time-dependent network,
dispersed agents and attention techniques [13]. Density peak (DPeak) but there is no permanent communication block. MANET may be
[14] is a clustering algorithm that converts data of any dimension into severely damaged by road attacks. Dey et al. [22] suggested machine
two dimensions and automatically detects density centres and noise. A learning software for multi-client networks in mobile clouds. There is no
MapReduce-based intelligent model [15] is presented to intelligently need to update individual project rules, and they may be adjusted to
automate intrusion detection. MR-IMID is a network intrusion detection meet the demands of client networks. The proposed idea comprises two
system that uses commodity hardware to consistently perform a range of steps from a technological standpoint: Multi-Layer Traffic Screening and
data categorization tasks. An intelligent and effective network intrusion Virtual Machine Decision Making. A new notion in cloud computing for
detection system (NIDS) based on deep learning [16] uses a mobile emerges from the mix of mobile computing with conventional
non-symmetric deep auto-encoder to give complete functionality and cloud computing. Because of the mobility of mobile phone cloud
performance for network intrusion detection concerns. The long computing network nodes, security is critical. Client networks for mo
short-term memory (LSTM-CLOUD) [17] is a system designed to identify bile clients, such as car networks and wireless touch networks, have
and mitigate DDoS attacks in a public cloud network. An effective cloud variable security needs based on system complexity, power consump
IDS that improves the overall security of a cloud-based computing tion, and security level, making the security problem more challenging.
environment by using sandpiper-based feature selection and extended To securely combine and integrate information from diverse client
equilibrium deep transfer learning (EEDTL) classification [18]. To networks, such complex systems need the development of novel security
detect attacks at the fog node, a lightweight support vector machine IDS approaches. In moving clouds, which incorporate numerous client net
model based on cloud-fog cooperation is deployed [19]. Distributed works, detection of infiltration is one of the most critical safety pro
Denial of Service (DDoS) attacks are one of the most dangerous types of cedures. Abusitta et al. [23] suggested a Joint IDS that is machine
hostile invasions. DDoS attacks are difficult to counteract because they learning-based and gives active feedback on past feedback data. The
are high-level, difficult-to-absorb threats with a wide range of forms, denonising auto coder (DA) is based on a particular model that is utilized
attacks, and complexity. Machine learning techniques are used in cloud as a foundation for deep neural networks. An crucial aspect of DA is
computing to provide an accurate and comprehensive strategy [20] for learning how to produce IDS feedback from feedback. This helps us to
detecting and preventing attacks. make rapid judgements on suspected infiltration even when we don’t
have entire IDS input.
1.1. Our contributions Aldwyan et al. [24] presented a container-based IDS solution for
categorising attacks and preventing cloud overlays. We are performing
For further enhancement in cloud computing, an efficient optimal experiments on National Instruments for electrical research cooperation
security system is proposed for intrusion detection using hybrid deep and resource research clouds throughout Australia to assess our speci
learning technique (EOS-IDS). The main contributions of our proposed alised strategy. Yaghoubi et al. [25] proposed the IMVO method, an
work are summarized as follows: expanded multivariate optimization technique for a web service system
that improves QoS while meeting service level agreements (SLA). In the
1 An improved heap optimization (IHO) algorithm is used for data pre- cloud, several web services offer identical capabilities (QoS). To guar
processing which ensures the data quality through removal of un antee optimum customer service integration, an adequate service system
wanted data’s from dataset. is required. Furthermore, a service provider’s anticipated SLA should be
2 A chaotic red deer optimization (CRDO) algorithm used for optimal enforced by insufficient service agreements. The introduction of an
feature selection process which selects best optimal features among adequate web-service system algorithm that produces high QAS while
multiple features. fulfilling SLA control is the key difficulty of Cloud Computing. Sanaj
3 The hybrid deep Kronecker neural network (DKNN) is illustrated for et al. [26] have presented an effective method for conveying cloud jobs
cloud attacks and intrusion detection and classification. using the GAP-WOA MAP reduction framework. The task was originally
part of the client’s job. The characteristics are then decreased using the
MRQFLDA approach. The map reduction law is then used to allocate
2
M. Mayuranathan et al. Advances in Engineering Software 173 (2022) 103236
large jobs. Sharma et al. [27] published a study recommending a 94% while lowering error rate by 0.0012. Performance measures
modified bee-inspired algorithm to help with the load balancing plan. including true positive rate, true negative rate, and accuracy are also
According to Wangfi et al. [28], the influence of aggressive trade evaluated. Data is subject to a range of attacks during network
talks on the advance sketch led to wider usage of electrical services. It communication. The importance of detecting network communications
provides a variety of advantages in terms of Internet development in the breaches is growing. Researchers use machine learning methodologies
context of a cross-border E-commerce model, including complete to construct effective intrusion detection systems. However, their usage
exposure, a partial cross-border logistics system, and quick cross-border increases the risk of security attacks, making cloud computing in
compensation. Cloud computing is included into the 5G network design frastructures vulnerable to a wide range of threats. As a consequence, to
via essential networking elements. Cloud memory, network use, envi avoid attacks, IDS for cloud computing systems must be developed. The
ronment, objects, or data source are all examples of lease source oper fundamental issues in IDS are attaining high detection accuracy while
ating systems. Shamshirband et al. [29] suggested that cyber-attacks lowering training time. In contrast, traditional IDS are ineffectual in
will be used more often to stifle the rising Internet and its documenta dealing with them. Traditional IDS models utilize deep learning ap
tion and information services. These security vulnerabilities can be proaches for categorization in the output layer. The training model often
solved using IDS. The hybrid frog leap method suggested by Ibrahim leads to a low detection rate of attacks in the face of large
et al. [30] employs an energy-sensitive system to enhance the mobile high-dimensional data due to the effect of data dimensions, decreasing
cloud system utilizing the evolutionary algorithm (SFGA). The compo overall detection efficiency. To overcome the problems described above,
nents provide a broad variety of passive quality of service services (QoS). the following research aims were used:
In accordance with the issue of mobile energy security, the growth of
variety of energy sources in mobile energy clouds is becoming a greater 1 To introduce optimal preprocessing algorithm for unwanted artifacts
difficulty. In infiltration detection systems, Samriya et al. [31] devel removal from the original dataset. Moreover, preprocessing phase is
oped a hybrid strategy to increase the overall security of cloud-based optional for proposed EOS-IDS model which only required us
computer environments. Theja et al. [32] have proposed DoS attack possible to use real-time data’s.
detection system using oppositional crow search algorithm (OCSA), 2 2. Develop an efficient feature selection technique to reduce the IDS
which combines crow search algorithm (CSA) and opposition based model’s complexity by avoiding overfitting due to the high dimen
training (OBL) system to solve such problems. sional feature space.
3 To create a hybrid classifier that can detect/classify the kind of
3. Problem methodology and system architecture attack/intrusion with high accuracy and low error rate.
4 To validate our proposed EOS-IDS model through the two standard
3.1. Problem methodology benchmark DARPA and CSE-CIC-IDS2018 datasets to prove the
effectiveness.
Integrating powerful machine learning algorithms into IDSs is
becoming more important in safeguarding mobile edge computing sys
tems. However, our current society’s mobility necessitates increasingly 3.2. System architecture
complex IDSs to strike a fair balance between dealing with the enormous
rise of traffic data and reacting to attacks. For intrusion detection, the In the domain of IDS model in cloud computing, we present a deep
Ant Lion optimization technique is combined with a novel optimized Kronecker neural network (DKNN) for IDS detection and categorization
custom recurrent convolutional neural network (RC-NN) [33]. CNN is of cloud intrusion. This provides it an edge when dealing with material
combined with LSTM. As a result, all attacks detected at the cloud’s that has statistical consistency and local significance. Fig. 1 depicts the
network layer are effectively categorized. The experimental results basic system architecture of our proposed EOS-IDS model. The method
below demonstrate how the IDS classification model provides high ac for a suggested model may be broken down into four steps: The data type
curacy while boosting detection rates and minimizing mistake rates. The format used in the following phase is preprocessed for each entry in the
revised custom RC-NN-IDS model increased classification accuracy by IDS data collection. The processed data is sent into an optimal feature
selection algorithm, which accurately isolates the distinguishing traits
3
M. Mayuranathan et al. Advances in Engineering Software 173 (2022) 103236
and selects the best features from them. Finally, the IDS detection and where R is a random number generated using the uniform distribution
classification phase receives the ideally selected best characteristics. from the range [0, 1]. In Eq. (1), c is a determined parameter, and it is
calculated as follows:
4. Proposed methodology ⃒ ⃒
⃒ ⃒
⃒ s mod Sc ⃒⃒
The working method of our suggested IDS model for cloud ⃒
γ = ⃒2 − S ⃒ (3)
⃒ ⃒
computing environment employing hybrid deep learning approach is ⃒ 4c ⃒
described in this part (EOS-IDS). The working process is divided as three
steps as follows: where s stands for the current iteration, S stands for the total number of
iterations, and C stands for a user-defined parameter that will be dis
1 Preprocessing using improved heap optimization (IHO) algorithm cussed later. During iterations, γ decreases linearly from 2 to 0 and then
2 Feature selection using chaotic red deer optimization (CRDO) begins to increase back to 2 with successive iterations. The c parameter,
algorithm on the other hand, specifies how many cycles γ completes in S repeats.
3 Intrusion detection and classification using a deep Kronecker neural After doing this experiment for a variety of functions, we decided to
network (DKNN) calculate the balanced value of c as follows:
c = ⌊S / 25⌋ (4)
4.1. Preprocessing Colleagues are officials who are of the same rank. They communicate
with one another in order to carry out official duties. We assume that
Preprocessing the initial data collection with procedures like data nodes on the same level in the heap are colleagues, and that each search
cleaning and data transformation is required to build an IDS detection agent →
̅→
y travels in respect to a randomly chosen colleague T , as shown
j R
and classification model. Filthy data is information that is missing, in the equation below:
noisy, or inconsistent. Internal laws of the original data are lost, ⎧ ⃒ ⃒ ( ̅→) (→ )
resulting in poor data analysis and processing performance. As a result, ⎪ ⃒ ⃒
⎨ TRK + γλK ⃒TRK − yKj (s)⃒, F TR < F Yj (s)
filthy data must be cleaned and transformed into data that fulfils data yKj (s + 1) = ⃒ ⃒ ( ) (→ ) (5)
quality standards. Missing values, erroneous data, outliers, and noise are ⎩ yKj + γλK ⃒⃒TRK − yKj (s)⃒⃒, F ̅→
⎪ TR ≥ F Yj (s)
the most common data cleaning issues. The aim is to fill in the missing
data set with the same constant while clearing or modifying the existing F is the objective function that determines the fitness of the search
special symbols and garbled codes. The improved heap optimization agent. Eq. (5) uses a position update technique similar to Eq. (1), but it
(IHO) approach was utilized for preprocessing in this research, which also allows the search agent to explore the area surrounding TRK if
̅→
assures data quality by removing extraneous data from the dataset. F(T ) > F(→
R y (s)) is present, and the region around yK if N is not.
j j
Corporate titles are awarded to firm or business executives (designa Exploration and exploitation are both encouraged by this behavior. The
tions). Work descriptions and duties are specified in employee titles. haphazard selection of coworkers creates variety, and the continual hunt
Although the titles vary from company to company and business to for exceptional answers fosters exploitation. We’ll duplicate this
business, they are always structured in a hierarchy and are known as behaviour in the upcoming release by keeping the employee’s old po
corporate rank hierarchy, organizational chart tree, or corporate hier sition, as seen below.
archy structure, among other things. Subordinates obey their immediate
supervisor as upper-level laws and policies are executed in a centralized yKj (s + 1) = yKj (s) (6)
organizational structure. To demonstrate this behavior, change the po
In successive iterations of Eq, the search agent →yj does not modify its
sition of each search agent → yj in relation to its parent node A.
location for its Kth design variable (6). This feature enables us to control
⃒ ⃒
⃒
yKj (s + 1) = AK + γλK ⃒AK − yKj (s)⃒
⃒
(1) how often a search agent changes. The next section shows how this
equation may be used to direct research. To balance these options,
which are separated into three proportions: q1,q2,andq3, → yj , and q1, a
where s is the current iteration, K denotes the vector’s Kth component,
roulette wheel is employed. A search agent may use Eq. to update its
and | | denotes the absolute value. λK is the Kth component of vector →
y,
location by selecting the percentageq1. (6). The q1 limit is calculated as
and it is created at random:
follows:
λK = 2r − 1 (2) s
q1 = 1 − (7)
S
Algorithm 1 where S signifies the maximum number of iterations and s denotes the
Data pre-processing using HBO algorithm. current iteration. When percentage q2 is chosen, a search agent may use
Input: component of vector → y, →
yj Eq. to update its location (1). q2’s limit is calculated as follows:
Output: q1,q2,andq3
1 − q1
1 Initialize the best population
⃒ ⃒ q2 = q1 + 1 − (8)
2 ⃒ ⃒ 2
Reference to parent node A by yKj (s + 1) = AK + γλK ⃒AK − yKj (s)⃒
3 While do Finally, using Eq. (5), the selection of q3 symbolizes updating posi
4 If j=0, i=1 tion, and the limit of q3 3 is calculated as follows:
⃒ ⃒
5 ⃒ ⃒ ̅→ →
TKR + γλK ⃒TRK − yKj (s)⃒, F( TR ) < F(Yj (s))
̅→
Colleague TR yKj (s + 1) = {
1 − q1
⃒
⃒
⃒
⃒ ̅→ → q3 = q2 + 1 − =1 (9)
yKj + γλK ⃒TRK − yKj (s)⃒, F( TR ) ≥ F(Yj (s)) 2
6 1 − q1
Limit of q2 is compute byq2 = q1 + 1 − The following equation depicts HBO’s general position update
2
7 Next iteration is compute by yKj (s + 1) = yKj (s) mechanism:
8 Update HBO
9 End else
10 End
4
M. Mayuranathan et al. Advances in Engineering Software 173 (2022) 103236
⎧
⎪ yKj (s) q ≤ q1 We provide a chaotic red deer optimization (CRDO) technique for
⎪
⎪
⎪
⎪
⎪
⃒ ⃒ optimum feature selection in this paper, which is responsible for
⎪ K⃒ K ⃒
dimensionality reduction owing to large data. There is no metaheuristic
K
⎪
⎨ A + γλ ⃒A − yKj (s)⃒, q > q1 and q ≤ q2
K
yj (s+1) = ⃒ ⃒ ( ̅→) algorithm in the literature that can sustain exploration and exploitation
⃒ ⃒ →
⎪
⎪ TjK + γλK ⃒TRK − yKj (s)⃒, q > q2 and q ≤ q3 and F TR < F(Yj (s)
⎪
⎪
⎪ ⃒ ⃒ ( ) at the same time. It has been attempted in the suggested strategy to
⎪
⎪
⎪ ⃒ ⃒ ̅→ →
⎩ yKj + γλK ⃒TRK − yKj (s)⃒, q > q2 and q ≤ q3 and F TR ≥ F(Yj (s) balance these two qualities almost equally. The following subsections
detail the many phases of the modified version of this method. This
(10) improved version, like the original CRDO method, is designed to identify
global or near-optimal solutions to the given issue. Any viable solution
where q is an integer selected at random from 0 to 1. It’s crucial to talk
defined as follows in a solution space (Q):
about why we’re calculating M the way we are. The influence of
different combinations of N and O on exploitation of these functions is rd = [Q1, Q2, Q3, .....Qd] (12)
investigated using two well-known functions, sphere and grievance. The
pseudo code for our suggested preprocessing utilizing the HBO tech where d is the best solution’s dimension. The fitness functions that
nique is described in Algorithm 1. determine a solution’s quality or badness are well-defined and expressed
as
Algorithm 2
The value of α2 is a random constant between 0.2 and 0.5. As a
Optimal feature selection using CRDO algorithm. consequence, males account for 20 to 50 percent of commanders. The
surviving males are referred to as stags, and the number of stags (nstag) is
Input: correlation coefficient (ρ)
Output: ne1 and ne2
calculated as follows:
1 Initialize the best population
nstag = nmale − ncm (17)
2 Define partial solution ρ =
∑N ∑N
1 j=1 i=1 (Hji − H)(dji − d)
√̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅
The mathematical procedure used in this improved version is based
N 2 √̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅
on a single random constant, the current iteration (j), and the overall
1 ∑N ∑N 1 ∑N ∑N 2
(Hji − H)2 (d − d)
N 2 j=1 i=1 N2 j=1 i=1 ji number of iterations (N). The mathematical representation of the
3 While Do fighting process aims to keep dominant features while reducing reces
4 Number of males nmale = round{α1.nQ}
sive traits. Two new solutions are found during the battle between the
5 If j=0, i=1
6 Define commander males (nCM) nCM = round{α2.nmale} commander (cm) and the stags (ts), and the mathematical equations are
7 Number of stags are computed as nstag = nmale − ncm as follows:
8 j
N− N − Nj
Define mating process nOF1 = b ∗ Cm + (1 − b) ∗ gN − b ∗ (ua − la) ∗ 2 N, b ne1 = b ∗ Cm + (1 − b) ∗ ts − b ∗ (ua − la) ∗ , b < 0.5 (18)
j ∗N j2 ∗ N
< 0.5
9 Find the best solution of MRDA
10 End
5
M. Mayuranathan et al. Advances in Engineering Software 173 (2022) 103236
N − Nj
ne2 = (1 − b) ∗ Cm + b ∗ ts + (1 − b) ∗ (ua − la) ∗ , b ≤ 0.5 (19) p ∑
∑ p 2
j2 ∗ N ‖ N ‖ 2
F = N , ‖ N ‖ ∞ = max |Nx | (27)
‖x‖ = 1
i=1 i=1
The fighting process has created two new solutions: ne1 and ne2.
ij
The search space’s upper and lower limits are marked by ’ua’ and The (i, j) -component of is N i j. Assume the matrix 1u×t for size u × t
’la,’ respectively. Where b is a random value between 0 and 1, and which has all entries with 1u. Assume fixed +ve integer as K. Define the
Commander mates with a particular percentage of hinds in his harem block bias vector and weight matrix for lth block respectively.
under the original RD system. With no border limits, every commander ⎡ l … ⎤
W Wl
in the CRDO algorithm mates with every hind (gN) in his captivity. The ⎡ l⎤
⎢ ⎥
b
mating process may be mathematically expressed as follows: 1KX l ⊗ bl = ⎣ ⋮ ⎦ ∈ RN1 K 1KXK ⊗ W l = ⎢
⎢ ⎥
(28)
⎢ ⋮ ⋱ ⋮ ⎥ ⎥∈R
N1 K X Nl− 1 K
bl ⎣ ⎦
N − Nj
nOF1 = b ∗ Cm + (1 − b) ∗ gN − b ∗ (ua − la) ∗ , b < 0.5 (20) Wl … Wl
j2 ∗ N
where Kronecker product is denoted by symbol ⊗. A block initiation
N − Nj
nOF2 = (1 − b) ∗ Cm + b ∗ gN − (1 − b) ∗ (ua − la) ∗ , b ≤ 0.5 function →φ is defined that applies block-wise. So, sn ∈ Rm for 1 ≤ n ≤ K,
j2 ∗ N
let s = [s1, ⋅ ⋅ ⋅,sK]T ∈ RmK and
(21) ⎡→ ⎤
φ 1 (s1 )
With the particular goal of achieving a gradient shift in values, the ⎢ ⎥
mathematical expression has been specifically developed to maintain
→φ (s) = ⎢⎣ ⋮
⎥
⎦ (29)
more of the dominant qualities and less of the recessive features. The ̅→
φK (s)K
Algorithm 2 describes the pseudo code of our proposed optimal feature
selection using CRDO algorithm. φjs are initiation functions that are applied to each element indi
vidually. Then, using the block and block bias vectors’ weight matrices
4.3. Intrusion detection and classification and the equation below, construct a neural network: Let s0 = s is the
input and s1 = (1KXK ⊗ Wl )(1KX1 ⊗ s0 ) + 1KX1 ⊗ b1
For cloud attacks and intrusion detection and classification, we used ( )
sD = (11XK ⊗ WD ) →
φ sD− 1 + bD and sl = (1KXK ⊗ W l ) →
φ (1KX1 ⊗ bl )
a deep Kronecker neural network (DKNN) in this part. In the develop
ment of the weight matrices, the Kronecker product is utilized by the (30)
D FF
Kronecker neural networks (KNN). In actuality, standard FNN or feed- S is a D-layer KNN with KNl number of neurons and u number of
forward neural networks have similarity with the KNN for having an network parameters at the lth layer. The weight matrices of block and
overall versatile initiation function as follows: block bias vectors are scaled using the scaling parameters αl, ωl ∈ RK,
∑M where αl is the row vector and P is the column vector. The block bias
φα,ω (y) = m=1
αm φm (ωm y), M ∈ N ≥ 1, α = (αm ), ω = ωm (22) vector and scaled block weight matrices are defined as follows:
( ) ( )
where α, ω are trainable parameters andαmis fixed activation functions.
⌢l ⌢l
W = ωl ⊗ αl ⊗ W l , b = ωl ⊗ bl , 1 ≤ l < D (31)
KNN execution doesn’t need the real processing of Kronecker item. Be
that as it may, the Kronecker product permits one to develop a lot more ⌢D ( ) ⌢D
extensive organization than a KNN, while keeping up with practically W = 11XK ⊗ W D ⊗ W l and b = bD (32)
similar number of boundaries. A function definition for an FFN with ( )
⌢l ⌢l
depth D is among a group of numerous layers comprising of input layer,
⌢
sl : = L l sl− 1 = W sl− 1 , + b (33)
hidden-layers D− 1 and a resultant layer. The number of neurons Nl are
available in the lth hidden-layer. Each hidden-layer gets Sl − 1 ∈ RNl – 1 as Representation obtained is as follows:
a result from past layer, in which a relative change is done. (⌢ ⌢ ⌢
)
( ) uKΘ (s) = L D ∘φ ∘ L D− 1 ∘...... ∘φ ∘ L 1 (1KX1 ⊗ s) (34)
Ll sl− 1 = W l Sl− 1 + bl (23)
The DNN network parameter set defines as follows:
bl RN l N N
l is the bias vector associated with the lth layer. W ∈ R l l - 1 is the { }D { }D− 1
weight matrix. Before transmitting the altered vector as a commitment ΘK = W l , bl l=1 U ωl , αl l=1 (35)
to the next layer, apply a nonlinear activation function φ1(•) to each
⌢l
component of it. After a consequent layer, the same function indicates a DKNN may be completed without the block weight matrices {W }l
beginning function. ⌢l
and block bias vectors { b }l . This work features KNN.
uFF (s) = (LD ∘φ 1 ∘LD− 1 ∘..∘φ 1 ∘L1 )(s), (24) ( )
(36)
⌢ ⌢
uK (s) = LD ∘φ LD− 1 ∘...... ∘φ 1 ∘L1 (s )
where ◦ is the composition operator used. Network’s trainable param
eter denotes as follows: where the lth layer’s initiation function is dependent on the trainable
{ }D parameters {ωl, αl}, but is no longer deterministic.
ΘFF = W l , bl l=1 (25)
(
⌢l ) ∑K
( )
For a vector w = [w1, ⋅ ⋅ ⋅, wn]T ∈ RN, the various norms of w are: φ L1 (s) ; ωl , αl = αlk φk ωlk L1 (s) , l = 1, ...D − 1 (37)
k=1
∑n ∑n
‖ w ‖ 1= i=1
|wi | , ‖ w ‖2 = i=1
|wi | 2 , ‖ w ‖ ∞ = max |wi |
1<i<q
In the proposed deep Kronecker NN (DKNN), the neurons in corre
sponding hidden-layers are indicated by the yellow circles. The neuron’s
(26)
result passes to multiple initiation function when it is dissimilar to the
For a matrix N ∈ Rpxq, let N be the qth highest singular value of σ conventional neural network design. In this section, DKNN is analyzed
min(N), where p ≥ q. The following are the definitions of the spectral by viewing the the square loss function with the supervised learning.
norm and the Frobenius norm: Assume m-training data points set Tm = {(xi , yi )}m
i=1 . Define the square
loss as follows:
6
M. Mayuranathan et al. Advances in Engineering Software 173 (2022) 103236
2 Table 2
1∑ M
( Type )
L(Θ) = u (xi ) − yi (38) Performance analysis for DARPA-IDS dataset.
2 j=1 Θ
Metric/Classifiers Attacks/Intrusions
uType Accuracy Normal DoS U2R R2L Probe
Θ (xi ) stands for the chosen network, which might be either FF
network uFFΘ (x) or DKNN uΘ (x). Consider the two-layer networks
K LSTM-SGDM 62.020 63.540 62.472 62.441 62.374
described below: LSTM-ADAM 63.300 64.820 63.752 63.721 63.654
CNN 58.110 59.630 58.562 58.531 58.464
∑
N
( ) ∑
N ∑
K
( ) CNN-LSTM 62.970 64.490 63.422 63.391 63.324
uFF
ΘFF (x) = ci φ1 wTi x + bi uKΘK (x) = ci αk φk (ωk wTi x + bi ) RC-NN 94.010 95.530 94.462 94.431 94.364
I=1 I=1 k=1 DKNN 96.780 98.300 97.232 97.201 97.134
(39) Precision Normal DoS U2R R2L Probe
LSTM-SGDM 62.020 63.540 62.472 62.441 62.374
The respective network parameters ΘFF = {ci , wi , bi }Ni=1 andΘK = LSTM-ADAM 62.910 64.430 63.362 63.331 63.264
CNN 61.560 63.080 62.012 61.981 61.914
{ci , wi , bi }Ni=1
U{α K
k , wk }k=1 ,
are denoted correspondingly. The learning CNN-LSTM 62.950 64.470 63.402 63.371 63.304
objective is finding network parameters for loss function reduction. RC-NN 80.450 81.970 80.902 80.871 80.804
DKNN 95.450 96.970 95.902 95.871 95.804
min ΘType L(ΘType) where Type = FF or K (40) Recall Normal DoS U2R R2L Probe
LSTM-SGDM 85.450 86.970 85.902 85.871 85.804
The minimization problem is solved using the gradient descent LSTM-ADAM 86.780 88.300 87.232 87.201 87.134
approach. The technique for boundary initialization starts with Θ (0). CNN 89.540 91.060 89.992 89.961 89.894
Change the boundaries on the kth iteration as follows: CNN-LSTM 87.650 89.170 88.102 88.071 88.004
RC-NN 91.230 92.750 91.682 91.651 91.584
Θ (k) = Θ (k− 1)
− ηk ∇ Θ LΘ | Θ = Θ (k) (41) DKNN 94.780 96.300 95.232 95.201 95.134
F-measure Normal DoS U2R R2L Probe
where ηk > 0 is the learning rate for the kth iteration, which is generally LSTM-SGDM 76.650 78.170 77.102 77.071 77.004
LSTM-ADAM 77.080 78.600 77.532 77.501 77.434
set low to ensure convergence. The network boundary advancement that
CNN 73.420 74.940 73.872 73.841 73.774
changes in time consistently is portrayed by the gradient flow dynamics CNN-LSTM 77.120 78.640 77.572 77.541 77.474
as: RC-NN 89.180 90.700 89.632 89.601 89.534
DKNN 95.114 96.634 95.566 95.535 95.468
Θ̇ (t) = − ∇ Θ (LΘ (t)) , t ≥ 0 , Θ(0) = Θ (0) (42)
where L(t) is loss function with a little notation abuse. The loss function 0.19.1, and Pandas version 0.23.1. In terms of accuracy, true positive
is written as LK (t) when employed with KNN. LFF(t) is written for the loss rate (TPR), true negative rate (TNR), precision, recall, and F-measure,
function, when employed with FF network. For the analysis, the the proposed DKNN classifier outperformed current state-of-the-art
parameter initialization and the activation functions are given as LSTM-SGDM, LSTM-ADAM, CNN, CNN-LSTM, RC-NN, and DKNN
sumptions. For comparing two networks fairly, an initialization is classifiers.
considered that makes LK(0) = LFF(0). The network is as follows for any
FF initialization ΘFF(0):
5.1. Dataset description
ΘK (0) = ΘFF (0) U (ω (0), α (0)} (43)
DARPA dataset: It has fewer features and a wider range of threshold
where, limits, with 22 characteristics recommended for accuracy and sensi
tivity, which is almost comparable to the 41 attribute dataset. Normal,
ω (0) = 1 KX1 , α (0) = [1 0 ...... 0] (44)
DoS, U2R, R2L, and Probe are the seven intrusion scenarios contained in
It gives two similar networks at the initialization, which causes the final dataset.
similar loss value LK (0) = LFF (0). Assume that c and ω are trained and Data set CSE-CIC-IDS2018: Using a realistic cyber defence dataset
fixed for the convergence evaluation, only for{wi, bi}Ni=1 U {αk } Kk=1 . from the Canadian Institute for Cyber Security (CIC), we created a DKNN
Without loss of generality, from the training data set{(xi , yi )}m Classifier model using Amazon Web Services (AWS). The CIC and ISCX
i=1 , assume
√̅̅̅
x̃i= [xi; 1 / 2] such that for 1 ≤ i ≤ m is || x̃i ||= 1. The combination of datasets are used for security testing and malware prevention all across
initiation functions are selected for the adaptive initiation function for the globe. The dataset, which is kept in Resource type -S3 Bucket with
the general DKNN classifier. It is also known as Rowdy-Net and serves as Amazon resource name (ARN) arn:aws:s3:::cse-cic-ids2018 and AWS
a neural network with Rowdy activation characteristics. {φ1} is chosen region ca-central-1 under License, requires knowledge of AWS. It con
as the standard initiation function, such as Tanh, sine, ReLU, ELU, and so tains both a detailed explanation of incursions and abstract distribution
models for applications, protocols, and lower-level network compo
on, while the other {φk }Kk=2 initiation functions are chosen as follows:
nents. The final dataset includes seven intrusion scenarios: brute-force,
φ k (x) = nsin ((k − 1) nx) or cos ((k − 1) nx), ∀ 2 ≤ k ≤ K (45) Heartbleed, Botnet, DoS, DDoS, Web attacks, and internal network
7
M. Mayuranathan et al. Advances in Engineering Software 173 (2022) 103236
Table 4
Performance analysis for CSE-CIC-IDS2018 dataset.
Metric/Classifiers Attacks/Intrusions
Accuracy Normal Brute-force Heart bleed Botnet DoS DDoS Web attacks Infiltration
8
M. Mayuranathan et al. Advances in Engineering Software 173 (2022) 103236
[6] Satam P, Hariri S. WIDS: an anomaly based intrusion detection system for Wi-Fi
(IEEE 802.11) protocol. IEEE Trans Netw Serv Manage 2020;18(1):1077–91.
[7] Balamurugan E, Mehbodniya A, Kariri E, Yadav K, Kumar A, Haq MA. Network
optimization using defender system in cloud computing security based intrusion
detection system withgame theory deep neural network (IDSGT-DNN). Pattern
Recognit Lett 2022;156:142–51.
[8] Singh P, Kaur A, Aujla GS, Batth RS, Kanhere S. DaaS: dew computing as a service
for intelligent intrusion detection in edge-of-things ecosystem. IEEE Internet Things
J 2020;8(16):12569–77.
[9] Alkadi O, Moustafa N, Turnbull B, Choo KKR. A deep blockchain framework-
enabled collaborative intrusion detection for protecting IoT and cloud networks.
IEEE Internet Things J 2020;8(12):9463–72.
[10] Samriya JK, Tiwari R, Cheng X, Singh RK, Shankar A, Kumar M. Network intrusion
detection using ACO-DNN model with DVFS based energy optimization in cloud
Fig. 3. Analysis of proposed and existing classifiers for CSE-CIC- framework. Sustain Comput Inf Syst 2022:100746.
IDS2018 dataset. [11] Imran M, Haider N, Shoaib M, Razzak I. An intelligent and efficient network
intrusion detection system using deep learning. Comput Electr Eng 2022;99:
107764.
19.918 %, respectively. The proposed DKNN classifier outperforms the [12] Qiu W, Ma Y, Chen X, Yu H, Chen L. Hybrid intrusion detection system based on
current LSTM-SGDM, LSTM-ADAM, CNN, CNN-LSTM, RC-NN, and Dempster-Shafer evidence theory. Comput Secur 2022:102709.
DKNN classifiers by 52.121 %, 42.309 %, 33.267 %, 16.702 %, and [13] Sethi K, Madhav YV, Kumar R, Bera P. Attention based multi-agent intrusion
detection systems using reinforcement learning. J Inf Secur Appl 2021;61:102923.
5.507 %, respectively. [14] Yan M, Chen Y, Hu X, Cheng D, Chen Y, Du J. Intrusion detection based on
The proposed DKNN classifier outperforms the current LSTM-SGDM, improved density peak clustering for imbalanced data on sensor-cloud systems.
LSTM-ADAM, CNN, CNN-LSTM, RC-NN, and DKNN classifiers by 30.557 J Syst Arch 2021;118:102212.
[15] Asif M, Abbas S, Khan MA, Ftima A, Khan MA, Lee SW. MapReduce Based
%, 33.818 %, 35.240 %, 33.787 %, and 6.021 %, respectively. LSTM- Intelligent Model for Intrusion Detection Using Machine Learning Technique.
SGDM, LSTM-ADAM, CNN, CNN-LSTM, RC-NN, and DKNN classifiers J King Saud Univ-Comput Inf Sci 2021.
now in use outperform our suggested DKNN classifier by 29.769 %, [16] Imran M, Haider N, Shoaib M, Razzak I. An intelligent and efficient network
intrusion detection system using deep learning. Comput Electr Eng 2022;99:
34.332 %, 32.916 %, and 5.866 %, respectively. Our suggested DKNN
107764.
classifier was beaten by 30.17 %, 33.391 %, 34.796 %, 33.360 %, and [17] Aydın H, Orman Z, Aydın MA. A long short-term memory (LSTM)-based distributed
5.945 %, respectively, by current LSTM-SGDM, LSTM-ADAM, CNN, denial of service (DDoS) detection and defense system design in public cloud
CNN-LSTM, RC-NN, and DKNN classifiers. Fig. 3 shows a graphical network environment. Comput Secur 2022:102725.
[18] Sreelatha G, Babu AV, Midhunchakkaravarthy D. Improved security in cloud using
depiction of planned and existing classifiers for the CSE-CIC-IDS2018 sandpiper and extended equilibrium deep transfer learning based intrusion
dataset. detection. Cluster Comput 2022:1–16.
[19] Du R, Li Y, Liang X, Tian J. Support vector machine intrusion detection scheme
based on cloud-fog collaboration. Mob Netw Appl 2022:1–10.
6. Conclusion [20] Arunkumar M, Ashok Kumar K. Malicious attack detection approach in cloud
computing using machine learning techniques. Soft Comput 2022:1–11.
Using a hybrid deep learning method, we suggested an efficient [21] Chen M, Wang N, Zhou H, Chen Y. FCM technique for efficient intrusion detection
system for wireless networks in cloud environment. Comput Electr Eng 2018;71:
optimum security solution for IDS in cloud computing (EOS-IDS). The 978–87.
following are the primary contributions of our suggested EOS-IDS [22] Dey S, Ye Q, Sampalli S. A machine learning based intrusion detection scheme for
model: An improved heap optimization (IHO) algorithm is used for data fusion in mobile clouds involving heterogeneous client networks. Inf Fusion
2019;49:205–15.
pre-processing which ensures the data quality through removal of un [23] Abusitta A, Bellaiche M, Dagenais M, Halabi T. A deep learning approach for
wanted data’s from dataset. A chaotic red deer optimization (CRDO) proactive multi-cloud cooperative intrusion detection system. Future Gener
algorithm is utilized for optimal feature selection which responsible for Comput Syst 2019;98:308–18.
[24] Aldwyan Y, Sinnott RO. Latency-aware failover strategies for containerized web
dimensionality reduction due to huge data. A deep Kronecker neural
applications in distributed clouds. Future Gener Comput Syst 2019;101:1081–95.
network (DKNN) is used for cloud attacks and intrusion detection and [25] Yaghoubi M, Maroosi A. Simulation and modeling of an improved multi- verse
classification. Finally, the performance of our proposed EOS-IDS tech optimization algorithm for QoS-aware web service composition with service level
nique has evaluated using two benchmark DARPA IDS and CSE-CIC- agreements in the cloud environments. Simul Model Pract Theory, 103; 2020,
102090.
IDS2018 datasets. According to the simulation findings, the accuracy [26] Sanaj MS, Prathap PJ. An efficient approach to the map-reduce framework and
of our proposed DKNN classifier is 97.221 % for DARPA IDS datasets and genetic algorithm based whale optimization algorithm for task scheduling in cloud
97.118 % for CSE-CIC-IDS2018 datasets, respectively. computing environment. Mater Today Proc 2020.
[27] Sharma AK, Upreti K, Vargis B. Experimental performance analysis of load
balancing of tasks using honey bee inspired algorithm for resource allocation in
Declaration of Competing Interest cloud environment. Mater Today Proc 2020.
[28] Wangfi S, Wang W, Tan Y. Internet cross-border service model based on 5G
environment and cloud computing data platform. Microprocess Microsyst 2020:
The authors declare no conflict of the interest. 103520.
[29] Shamshirband S, Fathi M, Chronopoulos AT, Montieri A, Palumbo F, Pescapè A.
References Computational intelligence intrusion detection techniques in mobile cloud
computing environments: review, taxonomy, and open research issues. J Inf Secur
Appl 2020;55:102582.
[1] Ferrag MA, Shu L, Friha O, Yang X. Cyber security intrusion detection for
[30] Ibrahim GJ, Rashid TA, Akinsolu MO. An energy efficient service composition
agriculture 4.0: machine learning-based solutions, datasets, and future directions.
mechanism using a hybrid meta-heuristic algorithm in a mobile cloud
IEEE/CAA J Autom Sin 2021;9(3):407–36.
environment. J Parallel Distrib Comput 2020;143:77–87.
[2] Nadeem M, Arshad A, Riaz S, Band SS, Mosavi A. Intercept the cloud network from
[31] Samriya JK, Kumar N. A novel intrusion detection system using hybrid clustering-
brute force and DDoS attacks via intrusion detection and prevention system. IEEE
optimization approach in cloud computing. Mater Today Proc 2020.
Access 2021;9:152300–9.
[32] SaiSindhuTheja R, Shyam GK. An efficient metaheuristic algorithm based feature
[3] Fatani A, Abd Elaziz M, Dahou A, Al-Qaness MA, Lu S. IoT intrusion detection
selection and recurrent neural network for DoS attack detection in cloud
system using deep learning and enhanced transient search optimization. IEEE
computing environment. Appl Soft Comput 2021;100:106997.
Access 2021;9:123448–64.
[33] Fathollahi-Fard AM, Hajiaghaei-Keshteli M, Tavakkoli-Moghaddam R. Red deer
[4] Kasongo SM. An advanced intrusion detection system for IIoT based on GA and tree
algorithm (RDA): a new nature-inspired meta-heuristic. Soft Comput 2020;24(19):
based algorithms. IEEE Access 2021;9:113199–212.
14637–65.
[5] Mishra P, Aggarwal P, Vidyarthi A, Singh P, Khan B, Alhelou HH, et al. VMShield:
memory introspection-based malware detection to secure cloud-based services
against stealthy attacks. IEEE Trans Ind Inf 2021;17(10):6754–64.