S. S. Sreeja Mole, P. Kanimozhi, Vinu Sundararaj, M. R. Rejeesh
{"title":"基于黑寡妇优化特征的云雾网络双向学习安全检测模型","authors":"S. S. Sreeja Mole, P. Kanimozhi, Vinu Sundararaj, M. R. Rejeesh","doi":"10.1002/ett.70214","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>The Internet of Things, fog, and cloud computing technologies are integrated to provide an effective large-scale computing infrastructure for data-intensive and compute-intensive tasks. Nevertheless, such networks are becoming more susceptible to different intrusions owing to their intrinsically interlinked structure and their extensive use of large-scale network devices. Securing these systems against threats is crucial to ensure trust for end users and protect private information. Recently, Intrusion Detection Systems have been adopted to strengthen security by detecting malicious behavior. Yet, the current attack detection methods suffer from several limitations, such as lower detection accuracy, higher dimensionality, lower computational efficiency, and overfitting issues. Thus, an effective security framework is essential to safeguard against evolving threats in the realm of the Internet of Things, fog, and cloud computing. This research work designed an innovative Deep Learning-based detection methodology for accurate threat detection. The proposed study designed a self-adaptive learning black widow optimization-based rough set theory algorithm for optimal feature selection. This algorithm is deployed to reduce the higher dimensionality of features and computational complexity by selecting significant features. This proposed model adopted a Bidirectional Long Short-Term Memory technique to examine data sequences in both directions, enabling it to capture underlying contextual and temporal relationships within the data. This dual processing enhances the model's ability to identify patterns and anomalies that may indicate an attack. To validate the effectiveness of the proposed framework, comprehensive testing was conducted using UNSW-NB15 and NSL-KDD datasets, along with multiple evaluation criteria. This analysis reveals that the proposed method delivers more accurate and reliable detection outcomes than existing solutions.</p>\n </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 8","pages":""},"PeriodicalIF":2.5000,"publicationDate":"2025-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure Detection Model Using Black Widow Optimized Features with Bidirectional Learning in Cloud and Fog Network\",\"authors\":\"S. S. Sreeja Mole, P. Kanimozhi, Vinu Sundararaj, M. R. Rejeesh\",\"doi\":\"10.1002/ett.70214\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div>\\n \\n <p>The Internet of Things, fog, and cloud computing technologies are integrated to provide an effective large-scale computing infrastructure for data-intensive and compute-intensive tasks. Nevertheless, such networks are becoming more susceptible to different intrusions owing to their intrinsically interlinked structure and their extensive use of large-scale network devices. Securing these systems against threats is crucial to ensure trust for end users and protect private information. Recently, Intrusion Detection Systems have been adopted to strengthen security by detecting malicious behavior. Yet, the current attack detection methods suffer from several limitations, such as lower detection accuracy, higher dimensionality, lower computational efficiency, and overfitting issues. Thus, an effective security framework is essential to safeguard against evolving threats in the realm of the Internet of Things, fog, and cloud computing. This research work designed an innovative Deep Learning-based detection methodology for accurate threat detection. The proposed study designed a self-adaptive learning black widow optimization-based rough set theory algorithm for optimal feature selection. This algorithm is deployed to reduce the higher dimensionality of features and computational complexity by selecting significant features. This proposed model adopted a Bidirectional Long Short-Term Memory technique to examine data sequences in both directions, enabling it to capture underlying contextual and temporal relationships within the data. This dual processing enhances the model's ability to identify patterns and anomalies that may indicate an attack. To validate the effectiveness of the proposed framework, comprehensive testing was conducted using UNSW-NB15 and NSL-KDD datasets, along with multiple evaluation criteria. This analysis reveals that the proposed method delivers more accurate and reliable detection outcomes than existing solutions.</p>\\n </div>\",\"PeriodicalId\":23282,\"journal\":{\"name\":\"Transactions on Emerging Telecommunications Technologies\",\"volume\":\"36 8\",\"pages\":\"\"},\"PeriodicalIF\":2.5000,\"publicationDate\":\"2025-08-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Transactions on Emerging Telecommunications Technologies\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1002/ett.70214\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"TELECOMMUNICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Transactions on Emerging Telecommunications Technologies","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/ett.70214","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
Secure Detection Model Using Black Widow Optimized Features with Bidirectional Learning in Cloud and Fog Network
The Internet of Things, fog, and cloud computing technologies are integrated to provide an effective large-scale computing infrastructure for data-intensive and compute-intensive tasks. Nevertheless, such networks are becoming more susceptible to different intrusions owing to their intrinsically interlinked structure and their extensive use of large-scale network devices. Securing these systems against threats is crucial to ensure trust for end users and protect private information. Recently, Intrusion Detection Systems have been adopted to strengthen security by detecting malicious behavior. Yet, the current attack detection methods suffer from several limitations, such as lower detection accuracy, higher dimensionality, lower computational efficiency, and overfitting issues. Thus, an effective security framework is essential to safeguard against evolving threats in the realm of the Internet of Things, fog, and cloud computing. This research work designed an innovative Deep Learning-based detection methodology for accurate threat detection. The proposed study designed a self-adaptive learning black widow optimization-based rough set theory algorithm for optimal feature selection. This algorithm is deployed to reduce the higher dimensionality of features and computational complexity by selecting significant features. This proposed model adopted a Bidirectional Long Short-Term Memory technique to examine data sequences in both directions, enabling it to capture underlying contextual and temporal relationships within the data. This dual processing enhances the model's ability to identify patterns and anomalies that may indicate an attack. To validate the effectiveness of the proposed framework, comprehensive testing was conducted using UNSW-NB15 and NSL-KDD datasets, along with multiple evaluation criteria. This analysis reveals that the proposed method delivers more accurate and reliable detection outcomes than existing solutions.
期刊介绍:
ransactions on Emerging Telecommunications Technologies (ETT), formerly known as European Transactions on Telecommunications (ETT), has the following aims:
- to attract cutting-edge publications from leading researchers and research groups around the world
- to become a highly cited source of timely research findings in emerging fields of telecommunications
- to limit revision and publication cycles to a few months and thus significantly increase attractiveness to publish
- to become the leading journal for publishing the latest developments in telecommunications