Author:
Dahiya Mahima,Nitin Nitin,Dahiya Deepak
Abstract
Cyber security is identified as an emerging concern for information technology management in business and society, owing to swift advances in telecommunication and wireless technologies. Cyberspace security has had a tremendous impact on numerous crucial infrastructures. Along with current security status data, historical data should be acquired by the system to implement the latest cyber security defense and protection. It also makes intelligent decisions that can provide adaptive security management and control. An intelligent cyber security framework using Hyperparameter Tuning based on Regularized Long Short-Term Memory (HT-RLSTM) technique was developed in this work to elevate the security level of core system assets. To detect various attacks, the proposed framework was trained and tested on the collection of data. Owing to missing values, poor scaling, imbalanced and overlapped data, the data was primarily incomplete and inconsistent. To elevate the decision making for detecting attacks, the inconsistent or unstructured data issue was addressed. The missing values were handled by this work along with scaling performance using the developed Kernelized Robust Scaler (KRS). Using the developed Random Over Sample-Based Density-Based Spatial Clustering Associated with Noise (ROS-DBSCAN), the imbalanced and overlapped data were handled, which was followed by the relevant feature selection of data utilizing the Sine Cosine-Based Artificial Jellyfish Search Optimization (SC-AJSO) technique. The data were split under the provision of Stratified K-Fold cross-validation along being trained in the proposed HT-RLSTM. The experimental analysis depicted that better accuracy was attained in detecting attacks by the proposed work for different datasets. When analogized with prevailing state-of-the-art methods, a low false detection rate, as well as computation time, was attained by the proposed scheme.
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference23 articles.
1. A cloud computing based architecture for cyber bsecurity situation awareness;Yu;Proceedings of the IEEE Conference on Communications and Network Security (CNS),2013
2. A proactive approach for cyber attack mitigation in cloud network;Puri;Proceedings of the International Conference on Energy, Communication, Data Analytics and Soft Computing,2017
3. An Efficient DDoS TCP Flood Attack Detection and Prevention System in a Cloud Environment
4. Attack sequence detection in cloud using hidden markov model;Chen;Proceedings of the Seventh Asia Joint Conference on Information Security,2012
5. Protocol specific multi-threades network intrusion detection system (PM-NIDS) for DoS/DDoS attack detection in cloud;Patil;Proceedings of the 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT),2018
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献