Malicious behavior identification using Dual Attention Based dense bi-directional gated recurrent network in the cloud computing environment

IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS
Nandita Goyal , Kanika Taneja , Shivani Agarwal , Harsh Khatter
{"title":"Malicious behavior identification using Dual Attention Based dense bi-directional gated recurrent network in the cloud computing environment","authors":"Nandita Goyal ,&nbsp;Kanika Taneja ,&nbsp;Shivani Agarwal ,&nbsp;Harsh Khatter","doi":"10.1016/j.cose.2025.104418","DOIUrl":null,"url":null,"abstract":"<div><div>The rapid expansion of novel computing technologies has driven organizations to collaborate through cloud-based platforms, making robust security frameworks to ensure integrity, security, and accessibility. This paper proposes a deep learning approach to enhance malicious behaviour detection in cloud environments. Initially, the input data undergoes pre-processing using Min-Max Normalization, Missing Value Imputation, and Data Reduction to eliminate noise and inconsistencies. Feature selection is performed using the Improved Cheetah Optimization (ICO) algorithm. Finally, a Dual Attention-Based Dense Bi-Directional Gated Recurrent Unit (DA-Dense-BiGRU) is then employed to detect and classify malicious activity. The proposed approach is evaluated on five distinct datasets, achieving good accuracy rates of 99.35 %, 99.5 %, 99.4 %, 99.2 %, and 98.8 %. These results indicate the model's ability to detect harmful activities and improve security monitoring in cloud computing environments.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"154 ","pages":"Article 104418"},"PeriodicalIF":4.8000,"publicationDate":"2025-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404825001075","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

The rapid expansion of novel computing technologies has driven organizations to collaborate through cloud-based platforms, making robust security frameworks to ensure integrity, security, and accessibility. This paper proposes a deep learning approach to enhance malicious behaviour detection in cloud environments. Initially, the input data undergoes pre-processing using Min-Max Normalization, Missing Value Imputation, and Data Reduction to eliminate noise and inconsistencies. Feature selection is performed using the Improved Cheetah Optimization (ICO) algorithm. Finally, a Dual Attention-Based Dense Bi-Directional Gated Recurrent Unit (DA-Dense-BiGRU) is then employed to detect and classify malicious activity. The proposed approach is evaluated on five distinct datasets, achieving good accuracy rates of 99.35 %, 99.5 %, 99.4 %, 99.2 %, and 98.8 %. These results indicate the model's ability to detect harmful activities and improve security monitoring in cloud computing environments.
云计算环境下基于双注意的密集双向门控循环网络恶意行为识别
新型计算技术的快速发展促使组织通过基于云的平台进行协作,从而建立健壮的安全框架来确保完整性、安全性和可访问性。本文提出了一种深度学习方法来增强云环境中的恶意行为检测。首先,输入数据经过预处理,使用最小-最大归一化,缺失值输入和数据减少,以消除噪音和不一致。特征选择使用改进的猎豹优化(ICO)算法进行。最后,采用基于双注意力的密集双向门控循环单元(DA-Dense-BiGRU)对恶意活动进行检测和分类。该方法在5个不同的数据集上进行了评估,获得了99.35%、99.5%、99.4%、99.2%和98.8%的良好准确率。这些结果表明,该模型能够在云计算环境中检测有害活动并改善安全监控。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Computers & Security
Computers & Security 工程技术-计算机:信息系统
CiteScore
12.40
自引率
7.10%
发文量
365
审稿时长
10.7 months
期刊介绍: Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world. Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信