Soft computing in computer network security protection system with machine learning based on level protection in the cloud environment

被引:2
|
作者
Thomas, Merin [1 ]
Gupta, Mohan Vishal [2 ]
Rajan, V. Gokul [3 ]
Rajalakshmi, R. [4 ]
Dixit, Rinku Sharma [5 ]
Choudhary, Shailee Lohmor [5 ]
机构
[1] Jain Deemed Univ, Fac Engn & Technol, Dept Comp Sci Engn, Bangalore, India
[2] Teerthanker Mahaveer Univ, Coll Comp Sci & IT, Moradabad, Uttar Pradesh, India
[3] Galgotias Univ, Sch Comp Sci & Engn, Greater Noida, Uttar Pradesh, India
[4] Panimalar Engn Coll, Panimalar Engn Coll ECE, Chennai, India
[5] New Delhi Inst Management, Dept Artificial Intelligence & Machine Learning Da, New Delhi, India
关键词
Computing network; Security enhancement; Machine learning; Cloud environment; Encoder architecture; Soft computing environment;
D O I
10.1007/s00500-023-08395-3
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Artificial neural networks (ANN), fuzzy inference systems, approximate reasoning, and derivative-free optimization approaches like evolutionary computation, among others, are all components of Soft Computing (SC), an innovative method for building computationally intelligent methods. Due to its widespread use and benefits, cloud computing is currently a major focus for researchers. The distributed nature of cloud computing and its complete reliance on the internet for service provision present security challenges, the most serious of which is insider Distributed Denial of Service (DDoS) which results in complete deactivation of services. Based on machine learning and the cloud, this study proposes a novel method for improving computing network security. Using a trust-based secure cloud environment and the Kernel principal component encoder architecture, the network monitoring is carried out. The soft computing environment-based detection of a cyberattack on the network is the purpose for the security enhancement. Throughput, QoS, latency, and packet delivery ratio for various monitored cyber security datasets are the focus of the experimental analysis. The proposed technique attained network security analysis of 89%, throughput of 98%, QoS of 66%, latency of 59%, packet delivery ratio of 83%.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Design and Implementation of Cloud Computing Network Security Level Protection Evaluation System Based on Python
    Guizhou Branch of National Computer Network and Information Security Management Center, Guizhou Province, Guiyang City
    550003, China
    不详
    562400, China
    Proc SPIE Int Soc Opt Eng, 1600,
  • [3] Security Protection Mechanism in Cloud Computing Authorization Model Using Machine Learning Techniques
    Tiwari, Pradeep Kumar
    Kannan, K.
    Veeraiah, Duggineni
    Ranjan, Nikhil
    Singh, Jain
    Alshammri, Ghalib H.
    Halifa, Awal
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [4] A Security Protection Framework for Cloud Computing
    Zhu, Wenzheng
    Lee, Changhoon
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2016, 12 (03): : 538 - 547
  • [5] Marketing data security and privacy protection based on federated gamma in cloud computing environment
    Zhang C.
    Pan Z.
    Hou C.
    International Journal of Intelligent Networks, 2023, 4 : 261 - 271
  • [6] Computer Network Security Research under Cloud Computing Environment
    Ren, Qiong
    Tao, Jun
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 28 : 890 - 893
  • [7] Computer Network Information Security and Protection Strategy Based on Big Data Environment
    Jin, Min
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGIES AND SYSTEMS APPROACH, 2023, 16 (02)
  • [8] Computer Multimedia Security Protection System Based on the Network Security Active Defense Model
    Shang, Yanhong
    Zhang, Jing
    Zhang, Jing (2016120252@jou.edu.cn), 1600, Hindawi Limited (2021):
  • [9] Security Techniques for Data Protection in Cloud Computing
    Jakimoski, Kire
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2016, 9 (01): : 49 - 56
  • [10] Data Security and Privacy Protection of Cloud Computing
    Dai Xuebing
    Wang Zhaojing
    Zhang Yan
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1570 - +