Malicious host detection and classification in cloud forensics with DNN and SFLO approaches
G. Nandita () and
T. Munesh Chandra ()
Additional contact information
G. Nandita: Kalam Technical University
T. Munesh Chandra: National Institute of Technology
International Journal of System Assurance Engineering and Management, 2024, vol. 15, issue 2, No 2, 578-590
Abstract:
Abstract The rate of using cloud service is increased in recent years. The service provided by cloud computing (CC) is pre-owned by various laptops, smartphones, desktop computers, and notebook users. Cloud service enable the authorization practice due to an increasing number of cloud service users. Cloud service employs different host to deliver service to the users. But some hosts may be malicious and steal the user’s information or else it provides an unwanted file instead of original files to the user. In previous works, this malicious hosts are identified by site re-routing links, distinguishing file types and so on. The main impact of this malicious host is that it delivers infected data or files to the user or it divert the user to the non-requested data and files. In this paper, we focus on identification and classification of malicious hosts. The host list is examined to extract the features of malicious host by applying firefly algorithm. This identified features are then pre-processed by principal component analysis (PCA) method. The Deep Neural Network based Shuffled Frog Leap Optimization (DNN-SFLO) algorithm is a famous deep learning (DL) approach proposed to test the optimized weights of an identified features. DNN-SFLO accurately detects the malicious host, because the presence of malicious host may affect the cloud service. Performance of DNN-SFLO based host detection is compared with Naïve Bayes, Neural Network (NN), Artificial NN (ANN), Fuzzy C-Means (FCM), Fuzzy k-Nearest Neighbour (FKNN), Support vector machine (SVM). Implementation for this host detection process is carried out in python. The performance metrics taken to evaluate the effectiveness of DNN-SFLO is F-measure, precision, G-mean, sensitivity, error detection probability, and recall
Keywords: Cloud computing (CC); Firefly algorithm; Principal component analysis; Malicious host identification; Classification (search for similar items in EconPapers)
Date: 2024
References: View complete reference list from CitEc
Citations:
Downloads: (external link)
http://link.springer.com/10.1007/s13198-021-01168-x Abstract (text/html)
Access to the full text of the articles in this series is restricted.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:ijsaem:v:15:y:2024:i:2:d:10.1007_s13198-021-01168-x
Ordering information: This journal article can be ordered from
http://www.springer.com/engineering/journal/13198
DOI: 10.1007/s13198-021-01168-x
Access Statistics for this article
International Journal of System Assurance Engineering and Management is currently edited by P.K. Kapur, A.K. Verma and U. Kumar
More articles in International Journal of System Assurance Engineering and Management from Springer, The Society for Reliability, Engineering Quality and Operations Management (SREQOM),India, and Division of Operation and Maintenance, Lulea University of Technology, Sweden
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().