Secure Detection Model Using Black Widow Optimized Features with Bidirectional Learning in Cloud and Fog Network

IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS
S. S. Sreeja Mole, P. Kanimozhi, Vinu Sundararaj, M. R. Rejeesh
{"title":"Secure Detection Model Using Black Widow Optimized Features with Bidirectional Learning in Cloud and Fog Network","authors":"S. S. Sreeja Mole,&nbsp;P. Kanimozhi,&nbsp;Vinu Sundararaj,&nbsp;M. R. Rejeesh","doi":"10.1002/ett.70214","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>The Internet of Things, fog, and cloud computing technologies are integrated to provide an effective large-scale computing infrastructure for data-intensive and compute-intensive tasks. Nevertheless, such networks are becoming more susceptible to different intrusions owing to their intrinsically interlinked structure and their extensive use of large-scale network devices. Securing these systems against threats is crucial to ensure trust for end users and protect private information. Recently, Intrusion Detection Systems have been adopted to strengthen security by detecting malicious behavior. Yet, the current attack detection methods suffer from several limitations, such as lower detection accuracy, higher dimensionality, lower computational efficiency, and overfitting issues. Thus, an effective security framework is essential to safeguard against evolving threats in the realm of the Internet of Things, fog, and cloud computing. This research work designed an innovative Deep Learning-based detection methodology for accurate threat detection. The proposed study designed a self-adaptive learning black widow optimization-based rough set theory algorithm for optimal feature selection. This algorithm is deployed to reduce the higher dimensionality of features and computational complexity by selecting significant features. This proposed model adopted a Bidirectional Long Short-Term Memory technique to examine data sequences in both directions, enabling it to capture underlying contextual and temporal relationships within the data. This dual processing enhances the model's ability to identify patterns and anomalies that may indicate an attack. To validate the effectiveness of the proposed framework, comprehensive testing was conducted using UNSW-NB15 and NSL-KDD datasets, along with multiple evaluation criteria. This analysis reveals that the proposed method delivers more accurate and reliable detection outcomes than existing solutions.</p>\n </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 8","pages":""},"PeriodicalIF":2.5000,"publicationDate":"2025-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Transactions on Emerging Telecommunications Technologies","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/ett.70214","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0

Abstract

The Internet of Things, fog, and cloud computing technologies are integrated to provide an effective large-scale computing infrastructure for data-intensive and compute-intensive tasks. Nevertheless, such networks are becoming more susceptible to different intrusions owing to their intrinsically interlinked structure and their extensive use of large-scale network devices. Securing these systems against threats is crucial to ensure trust for end users and protect private information. Recently, Intrusion Detection Systems have been adopted to strengthen security by detecting malicious behavior. Yet, the current attack detection methods suffer from several limitations, such as lower detection accuracy, higher dimensionality, lower computational efficiency, and overfitting issues. Thus, an effective security framework is essential to safeguard against evolving threats in the realm of the Internet of Things, fog, and cloud computing. This research work designed an innovative Deep Learning-based detection methodology for accurate threat detection. The proposed study designed a self-adaptive learning black widow optimization-based rough set theory algorithm for optimal feature selection. This algorithm is deployed to reduce the higher dimensionality of features and computational complexity by selecting significant features. This proposed model adopted a Bidirectional Long Short-Term Memory technique to examine data sequences in both directions, enabling it to capture underlying contextual and temporal relationships within the data. This dual processing enhances the model's ability to identify patterns and anomalies that may indicate an attack. To validate the effectiveness of the proposed framework, comprehensive testing was conducted using UNSW-NB15 and NSL-KDD datasets, along with multiple evaluation criteria. This analysis reveals that the proposed method delivers more accurate and reliable detection outcomes than existing solutions.

Abstract Image

基于黑寡妇优化特征的云雾网络双向学习安全检测模型
融合物联网、雾和云计算技术,为数据密集型和计算密集型任务提供有效的大规模计算基础设施。然而,由于其内在互连的结构和大规模网络设备的广泛使用,此类网络越来越容易受到各种入侵。保护这些系统免受威胁对于确保最终用户的信任和保护私人信息至关重要。近年来,入侵检测系统通过检测恶意行为来增强安全性。然而,目前的攻击检测方法存在检测精度低、维数高、计算效率低、过拟合等问题。因此,有效的安全框架对于防范物联网、雾和云计算领域不断变化的威胁至关重要。本研究工作设计了一种创新的基于深度学习的检测方法,用于准确检测威胁。本研究设计了一种基于自适应学习黑寡妇优化的粗糙集理论算法,用于最优特征选择。该算法通过选择重要特征来降低特征的高维数和计算复杂度。该模型采用了双向长短期记忆技术来检查两个方向的数据序列,使其能够捕获数据中潜在的上下文和时间关系。这种双重处理增强了模型识别可能指示攻击的模式和异常的能力。为了验证所提出框架的有效性,使用UNSW-NB15和NSL-KDD数据集以及多个评估标准进行了全面测试。分析表明,所提出的方法比现有的解决方案提供了更准确和可靠的检测结果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
8.90
自引率
13.90%
发文量
249
期刊介绍: ransactions on Emerging Telecommunications Technologies (ETT), formerly known as European Transactions on Telecommunications (ETT), has the following aims: - to attract cutting-edge publications from leading researchers and research groups around the world - to become a highly cited source of timely research findings in emerging fields of telecommunications - to limit revision and publication cycles to a few months and thus significantly increase attractiveness to publish - to become the leading journal for publishing the latest developments in telecommunications
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信