Soft computing in computer network security protection system with machine learning based on level protection in the cloud environment

被引:2
|
作者
Thomas, Merin [1 ]
Gupta, Mohan Vishal [2 ]
Rajan, V. Gokul [3 ]
Rajalakshmi, R. [4 ]
Dixit, Rinku Sharma [5 ]
Choudhary, Shailee Lohmor [5 ]
机构
[1] Jain Deemed Univ, Fac Engn & Technol, Dept Comp Sci Engn, Bangalore, India
[2] Teerthanker Mahaveer Univ, Coll Comp Sci & IT, Moradabad, Uttar Pradesh, India
[3] Galgotias Univ, Sch Comp Sci & Engn, Greater Noida, Uttar Pradesh, India
[4] Panimalar Engn Coll, Panimalar Engn Coll ECE, Chennai, India
[5] New Delhi Inst Management, Dept Artificial Intelligence & Machine Learning Da, New Delhi, India
关键词
Computing network; Security enhancement; Machine learning; Cloud environment; Encoder architecture; Soft computing environment;
D O I
10.1007/s00500-023-08395-3
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Artificial neural networks (ANN), fuzzy inference systems, approximate reasoning, and derivative-free optimization approaches like evolutionary computation, among others, are all components of Soft Computing (SC), an innovative method for building computationally intelligent methods. Due to its widespread use and benefits, cloud computing is currently a major focus for researchers. The distributed nature of cloud computing and its complete reliance on the internet for service provision present security challenges, the most serious of which is insider Distributed Denial of Service (DDoS) which results in complete deactivation of services. Based on machine learning and the cloud, this study proposes a novel method for improving computing network security. Using a trust-based secure cloud environment and the Kernel principal component encoder architecture, the network monitoring is carried out. The soft computing environment-based detection of a cyberattack on the network is the purpose for the security enhancement. Throughput, QoS, latency, and packet delivery ratio for various monitored cyber security datasets are the focus of the experimental analysis. The proposed technique attained network security analysis of 89%, throughput of 98%, QoS of 66%, latency of 59%, packet delivery ratio of 83%.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] A Scheme of Memory Privacy Protection in Cloud Computing Environment
    LIU Kehao
    CAO Ming
    FU Nan
    MA Jing
    WuhanUniversityJournalofNaturalSciences, 2015, 20 (04) : 307 - 312
  • [32] Computer Network Information Security and Protection Measures
    Meng, Qingbao
    PROCEEDINGS OF THE 2017 7TH INTERNATIONAL CONFERENCE ON MECHATRONICS, COMPUTER AND EDUCATION INFORMATIONIZATION (MCEI 2017), 2017, 75 : 903 - 905
  • [33] The Strategy of Computer Network Information Security and Protection
    Long, Teng
    2019 4TH INTERNATIONAL WORKSHOP ON MATERIALS ENGINEERING AND COMPUTER SCIENCES (IWMECS 2019), 2019, : 31 - 35
  • [34] Analysis and Protection of Computer Network Security Issues
    Ju Jinquan
    Al-Absi, Mohammed Abdulhakim
    Al-Absi, Ahmed Abdulhakim
    Lee, Hoon Jae
    2020 22ND INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): DIGITAL SECURITY GLOBAL AGENDA FOR SAFE SOCIETY!, 2020, : 577 - 580
  • [35] Enhancing power system security using soft computing and machine learning
    Venkatesh, P.
    Visali, N.
    ELECTRICAL ENGINEERING & ELECTROMECHANICS, 2023, (04) : 90 - 94
  • [36] Research on the Measures of the Computer Network Security Protection
    Fu, Longsheng
    Wu, Mingzhu
    2016 ISSGBM INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND SOCIAL SCIENCES (ISSGBM-ICS 2016), PT 3, 2016, 68 : 341 - 345
  • [37] Discussion on the Protection and Problem of Computer Network Security
    Wan, Biao
    PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, ARTS, ECONOMICS AND SOCIAL SCIENCE, 2016, 49 : 344 - 347
  • [38] Security Protection Strategies of Computer Communication Network
    Sun, Jiangyan
    PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY (ICMMCT 2017), 2017, 126 : 1293 - 1297
  • [39] The Research of Computer Network Security and Protection Strategy
    He, Jian
    MATERIALS SCIENCE, ENERGY TECHNOLOGY, AND POWER ENGINEERING I, 2017, 1839
  • [40] Formal Protection Architecture for Cloud Computing System
    Yasha Chen
    Jianpeng Zhao
    Junmao Zhu
    Fei Yan
    ZTECommunications, 2014, 12 (02) : 63 - 66