2023
DOI: 10.1007/s00500-023-08573-3
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid feature selection and BWTDO enabled DeepCNN-TL for intrusion detection in fuzzy cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 23 publications
0
0
0
Order By: Relevance
“…The performance of VTR-HLSTM is validated on both the Bot-IoT and NSL-KDD datasets. In comparison to the existing methods such as BETDO_Deep CNN-TL [13], Chronological SSA-based DBN [18], and DIIWO-based ShCNN [19] EICDL [14], LeNet [16], FDNN-HBAID [17], and IMFL-IDSCS [20], the VTR-HLSTM achieves 0.995% and 99.50% of accuracy on the respective Bot-IoT and NSL-KDD datasets. The VTR-LSTM exhibits finer performance guaranteeing reliability, strength and accuracy of the proposed model over the previous methods.…”
Section: Discussionmentioning
confidence: 96%
See 3 more Smart Citations
“…The performance of VTR-HLSTM is validated on both the Bot-IoT and NSL-KDD datasets. In comparison to the existing methods such as BETDO_Deep CNN-TL [13], Chronological SSA-based DBN [18], and DIIWO-based ShCNN [19] EICDL [14], LeNet [16], FDNN-HBAID [17], and IMFL-IDSCS [20], the VTR-HLSTM achieves 0.995% and 99.50% of accuracy on the respective Bot-IoT and NSL-KDD datasets. The VTR-LSTM exhibits finer performance guaranteeing reliability, strength and accuracy of the proposed model over the previous methods.…”
Section: Discussionmentioning
confidence: 96%
“…The suggested VTR-HLSTM's individual performance, as well as its comparative study with the previously introduced methods namely, BETDO_Deep CNN-TL [13], Chronological SSA-based DBN [18], and DIIWO-based ShCNN [19] EICDL [14], LeNet [16], FDNN-HBAID [17], and IMFL-IDSCS [20] as given in section 4.3 are discussed in this section. The existing method BWTDO_DeepCNN-TL [17], has limitations such as the requirement to enhance the outlier detection techniques as well as the clustering incorporation for an efficient detection. Furthermore, the EICDL [18] model does not possess an adequate ability to detect prior unknown attacks.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Its allure originated from its inherent cost-efficiency and remarkable reliability, which allowed organizations to scale their operations with unprecedented flexibility. However, with the increasing reliance on cloud infrastructure, there emerged an ominous and ever-present threat of cyberattacks [3][4][5]. These nefarious assaults on digital infrastructure disrupt normal system operations, perpetrating malicious activities that compromise data integrity, confidentiality, availability, and privacy.…”
Section: Introductionmentioning
confidence: 99%