Soft computing in computer network security protection system with machine learning based on level protection in the cloud environment

被引:2
|
作者
Thomas, Merin [1 ]
Gupta, Mohan Vishal [2 ]
Rajan, V. Gokul [3 ]
Rajalakshmi, R. [4 ]
Dixit, Rinku Sharma [5 ]
Choudhary, Shailee Lohmor [5 ]
机构
[1] Jain Deemed Univ, Fac Engn & Technol, Dept Comp Sci Engn, Bangalore, India
[2] Teerthanker Mahaveer Univ, Coll Comp Sci & IT, Moradabad, Uttar Pradesh, India
[3] Galgotias Univ, Sch Comp Sci & Engn, Greater Noida, Uttar Pradesh, India
[4] Panimalar Engn Coll, Panimalar Engn Coll ECE, Chennai, India
[5] New Delhi Inst Management, Dept Artificial Intelligence & Machine Learning Da, New Delhi, India
关键词
Computing network; Security enhancement; Machine learning; Cloud environment; Encoder architecture; Soft computing environment;
D O I
10.1007/s00500-023-08395-3
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Artificial neural networks (ANN), fuzzy inference systems, approximate reasoning, and derivative-free optimization approaches like evolutionary computation, among others, are all components of Soft Computing (SC), an innovative method for building computationally intelligent methods. Due to its widespread use and benefits, cloud computing is currently a major focus for researchers. The distributed nature of cloud computing and its complete reliance on the internet for service provision present security challenges, the most serious of which is insider Distributed Denial of Service (DDoS) which results in complete deactivation of services. Based on machine learning and the cloud, this study proposes a novel method for improving computing network security. Using a trust-based secure cloud environment and the Kernel principal component encoder architecture, the network monitoring is carried out. The soft computing environment-based detection of a cyberattack on the network is the purpose for the security enhancement. Throughput, QoS, latency, and packet delivery ratio for various monitored cyber security datasets are the focus of the experimental analysis. The proposed technique attained network security analysis of 89%, throughput of 98%, QoS of 66%, latency of 59%, packet delivery ratio of 83%.
引用
收藏
页数:12
相关论文
共 50 条
  • [41] A New Architecture for Cloud Computing System Protection
    Chen, Yasha
    Zhao, Xinjie
    Li, Wen
    Zhao, Jianpeng
    2013 INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD), 2013, : 46 - 50
  • [42] Security Protection of System Sharing Data with Improved CP-ABE Encryption Algorithm under Cloud Computing Environment
    Xue, Shumin
    Ren, Chengjuan
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2019, 53 (04) : 342 - 350
  • [44] Research on the Security of Computer Network under Cloud Computing
    Luo, Lei
    Ge, Wei
    PROCEEDINGS OF THE 2018 3RD INTERNATIONAL WORKSHOP ON MATERIALS ENGINEERING AND COMPUTER SCIENCES (IWMECS 2018), 2018, 78 : 278 - 281
  • [45] Cloud Computing Security Challenges and Critical Technologies of Its Protection
    Yang, Yuxing
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY, 2016, 60 : 372 - 377
  • [46] A Privacy Protection Solution for the Balance of Performance and Security in Cloud Computing
    Ji Yi-mu
    Kang Jia-bang
    Liu Hai
    Pan Qiao-yu
    Sun Yan-peng
    Kuang Zizhuo
    Zhao Chuanxin
    WEB INFORMATION SYSTEMS ENGINEERING - WISE 2013 WORKSHOPS, 2014, 8182 : 335 - 345
  • [47] A Study on the Needs for Enhancement of Personal Information Protection in Cloud Computing Security Certification System
    Kang, Minju
    Kwon, Hun-Yeoung
    2019 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON), 2019, : 66 - 70
  • [48] Research on computer network security protection technology based on a superiority algorithm
    Wang Z.
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01):
  • [49] DATA PROTECTION AND PRIVACY PROTECTION OF ADVERTISING BASED ON CLOUD COMPUTING PLATFORM
    Chen, Zhishe
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (05): : 3484 - 3488
  • [50] Protection System for Network Boundary Security
    Huang, Xiaobo
    Zhang, Mingxue
    Wang, Xiaoyan
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 6, 2010, : 620 - 623