Next Article in Journal
A Study on the Fault Location of Secondary Equipment in Smart Substation Based on the Graph Attention Network
Previous Article in Journal
BCG Signal Quality Assessment Based on Time-Series Imaging Methods
Previous Article in Special Issue
A Hybrid Approach for Alluring Ads Phishing Attack Detection Using Machine Learning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Multi-Objective Seagull Optimization Algorithm with Deep Learning-Enabled Vulnerability Detection for Secure Cloud Environments

1
Department of Computer Science, Community College, King Saud University, P.O. Box 28095, Riyadh 11437, Saudi Arabia
2
Department of Information Systems, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia
3
Department of Computer Science, College of Science & Art at Mahayil, King Khalid University, Abha 61413, Saudi Arabia
4
SAUDI ARAMCO Cybersecurity Chair, Department of Computer Science, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam 31441, Saudi Arabia
5
Department of Computer Science, Applied College, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam 31441, Saudi Arabia
6
Research Center, Future University in Egypt, New Cairo 11835, Egypt
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(23), 9383; https://doi.org/10.3390/s23239383
Submission received: 8 August 2023 / Revised: 8 November 2023 / Accepted: 14 November 2023 / Published: 24 November 2023
(This article belongs to the Special Issue Security and Privacy in Cloud Computing Environment)

Abstract

:
Cloud computing (CC) is an internet-enabled environment that provides computing services such as networking, databases, and servers to clients and organizations in a cost-effective manner. Despite the benefits rendered by CC, its security remains a prominent concern to overcome. An intrusion detection system (IDS) is generally used to detect both normal and anomalous behavior in networks. The design of IDS using a machine learning (ML) technique comprises a series of methods that can learn patterns from data and forecast the outcomes consequently. In this background, the current study designs a novel multi-objective seagull optimization algorithm with a deep learning-enabled vulnerability detection (MOSOA-DLVD) technique to secure the cloud platform. The MOSOA-DLVD technique uses the feature selection (FS) method and hyperparameter tuning strategy to identify the presence of vulnerabilities or attacks in the cloud infrastructure. Primarily, the FS method is implemented using the MOSOA technique. Furthermore, the MOSOA-DLVD technique uses a deep belief network (DBN) method for intrusion detection and its classification. In order to improve the detection outcomes of the DBN algorithm, the sooty tern optimization algorithm (STOA) is applied for the hyperparameter tuning process. The performance of the proposed MOSOA-DLVD system was validated with extensive simulations upon a benchmark IDS dataset. The improved intrusion detection results of the MOSOA-DLVD approach with a maximum accuracy of 99.34% establish the proficiency of the model compared with recent methods.

1. Introduction

Cloud computing (CC) offers numerous services to users including infrastructure, storage capabilities, and applications [1]. A cloud user can manipulate or access software and hardware over the internet based on their requirements. Though CC provides several advantages to its users, it also has certain limitations and challenges. These challenges include performance management, privacy, security, cost, and load balance [2]. Among the issues encountered by the cloud computing phenomenon, security plays a major role in user data and applications on the cloud infrastructure. CC security encompasses policies and procedures to protect cloud-based information, applications, and frameworks from unauthorized access and attacks [3]. Also, it protects data and infrastructure against Structured Query Language (SQL) injection, software vulnerability, flooding attacks, cross-site scripting, data alteration, and data leakage. In parallel, cloud providers and subscribers continuously report security problems raised by different types of attacks. Hence, it is necessary to provide security against malicious activities and attacks [4].
Intrusion detection systems (IDSs) [5] in cloud networks play a crucial role in terms of providing security against attacks from both outsiders as well as insiders [6]. Traditional IDSs are used in the detection of attacks in internet environments. However, they cannot adjust their working mechanisms for cloud platforms and so remain non-scalable. Furthermore, researchers found them to be not appropriate for cloud platforms and not deterministic [7]. Therefore, new and reliable anomaly based IDSs have been proposed, developed, and validated. Mostly, the existing methods for anomaly detection from cloud platforms used machine learning (ML) approaches. These methods can enhance their performance by upgrading their data according to the pattern detected from the input datasets [8]. When a novel pattern is detected from the input dataset, the ML technique parameters are upgraded for the detection of the same anomalies in future traffic flow. According to the data extracted from the prior outcomes, the solution of the method is enhanced by altering the implementation approach, if required. The feature selection (FS) process helps to focus only on the most related information. FS is an ML method that reduces the quantity of the data to be analyzed [9]. It can be achieved by detecting the relevant features (such as the attributes) of a dataset, leaving behind the insignificant ones. By reducing the dimensionality of a dataset, i.e., retaining only the relevant features, the ML technique can make the classification prediction process an efficient and effective one [10]. This efficacy is particularly related to the intrusion detection (ID) process that needs real-time performance.
The current study designs a new multi-objective seagull optimization algorithm with a deep learning-enabled vulnerability detection (MOSOA-DLVD) system for a secure cloud platform. In the developed MOSOA-DLVD algorithm, the feature selection process is performed with the help of the MOSOA technique. Furthermore, the MOSOA-DLVD technique uses a deep belief network (DBN) method for intrusion detection and classification. To enhance the detection results of the DBN algorithm, the sooty tern optimization algorithm (STOA) is implemented for the hyperparameter tuning process. The performance of the MOSOA-DLVD system is examined with simulations using a benchmark IDS database. The main contributions of the current study are briefly given below.
  • Development of an automated intrusion detection system for the cloud platform, named the MOSOA-DLVD algorithm, which involves MOSA-based FS, DBN-based classification, and STOA-related hyperparameter tuning. To the best of the authors’ knowledge, the MOSOA-DLVD system was previously non-existent in the literature.
  • The development of the MOSOA approach supports the selection of related features, increases accuracy, and reduces higher dimensionality issues.
  • Hyperparameter tuning of the DBN model, using the STOA, enhances the prediction outcomes of the MOSOA-DLVD algorithm for hidden data.
The remaining sections of this paper are explained here. Section 2 offers the related works, and Section 3 provides details about the developed model. Next, Section 4 discusses the outcomes of the analyses, and Section 5 concludes this paper.

2. Related Works

Kavitha et al. [11] examined filter-based ensemble-FS (FEFS) and used the DL method to overcome the problems faced in CC. FEFS is an integration of three feature extraction approaches, namely, embedded, filter, and wrapper methods. In these feature extraction models, the important features were selected to enable the trained model in the DL technique. Lastly, the classifier accomplished the FS. The DL method was an integration of two techniques including the Tasmanian devil optimization (TDO) and the recurrent neural network (RNN). The authors [12] developed an innovative IDS, which incorporates the fuzzy C-means (FCM) technique with SVM to improve the accuracy of the recognition systems at CC platforms. Maheswari et al. [13] suggested a hybrid soft computing-assisted IDS, i.e., ST-IDS for cloud and web platforms. The authors proposed an IDS system for CC and web infrastructure by utilizing the hybrid teacher learning-enabled-DRNN (TL-DRNN) and cluster-related feature optimizer. In their study, the modified manta ray foraging optimizer (MMFO) was used after feature extraction in the selection of optimum features for accurate detection. The hybrid TL-DRNN was devised to classify the intrusions from the web and cloud platforms. In [14], the authors proposed a dual-channel capsule generative adversarial network (GAN) optimized with RFO algorithm-fostered IDS (IDS-CC-DCCGAN-RFOA) to ensure privacy and secure the CC platform from different types of attacks. According to the best features, the data were categorized into two models, namely, privacy attack and secured data, depending on the DCCGAN outcome. Then, the weight of the DCCGAN model was optimally fine-tuned utilizing the RFO method to accomplish the efficient and best outcomes in terms of intrusion detection.
In a study conducted earlier [15], the authors developed the LR-based oppositional tunicate FCM (LR-OTSFCM) method for cloud ID. The important part of this study is the identification of the attacks in the cloud platform. In [16], a novel hybridization approach was suggested for the IDS to enhance the complete security of the cloud-based computing platforms. In addition, the SMO technique was also used in that study to reduce the dimensionality reduction. The datasets were fed into a neural network (NN). The authors [17] recommended the efficient dragonfly-improved invasive weed optimizer-assisted Shepard-CNN (DIIWO-based ShCNN) technique for identifying the attackers and alleviating the attacks in the cloud model. It is highly possible for the model to detect intruders with ShCNN. In [18], an efficient IDS, termed the chronological salp swarm algorithm-based DL model, was designed to identify suspicious intrusions in the cloud platform. The presented method was developed by combining the chronological idea and SSA. The optimum solution to detect the intrusion was exposed by utilizing the fitness function (FF), which considers the minimum error value as the optimal result. In a study conducted earlier [19], a novel design for deep LSTM-based IDS was presented for detecting the network traffic flow designs from the cloud platform and distinguishing them as malicious or normal patterns. The presented IPS avoids the malicious attacks received in the IDS by improving the recognition rate of the malicious attacks and reducing the computational time. The DNN with game theory for cloud security (GT-CSDNN) model was presented in a study conducted earlier [20]. The developed model covered either attacker or defender approaches but used the game theory algorithm. Furthermore, the DNN model utilized the presented game theory approach for classifying the attacks from regular data. In [21], a new ML-based hybrid IDS was presented. In that study, the integrated SVM and GA approach was established with a novel FF to evaluate the accuracy of the system.
Alohali et al. [22] presented the improved metaheuristics with a fuzzy logic-based intrusion detection system for cloud security (IMFL-IDSCS) technique. For their study, an individual IDS sample was deployed, and the IMFL-IDSCS technique used the enhanced chimp optimization algorithm-based feature selection (ECOA-FS) method for the selection of the optimal features, followed by the adaptive neuro-fuzzy inference system (ANFIS) model. In a study conducted earlier [23], the authors suggested a novel IDS by combining leader-based K-means clustering (LKM) and an optimal fuzzy logic system. Initially, the input dataset was grouped into clusters using the LKM technique. Then, the cluster data were fed into the fuzzy logic system (FLS). Both normal and abnormal data were inquired by the FLS, whereas the FLS was trained with the grey wolf optimization algorithm by maximizing the rules. Mahmood et al. [24] proposed an approach for obtaining the optimal number of features so as to build an efficient IDS model. In their study, feature reduction was applied. Generalization ability can be improved in general by generating a small set of features from the actual input variables using feature extraction. For their study, a hybrid algorithm, named the principal component analysis neural network algorithm (PCANNA), was used to reduce the number of computer resources.
Although several studies have been conducted for intrusion detection in the cloud platform, the prominence of the FS with hyperparameter tuning for differentiating attacked traffic from normal traffic is yet to be completely studied. Though the implementation of the ML-based IDS was developed earlier, the unique dynamics of the cloud platforms, represented by its various and dynamic workloads, demand specified methods. The existing research shortages drive the demand for a comprehensive scheme that can select important and essential features from the massive quantity of accessible data in order to increase the proficiency and performance of the intrusion detection process. On the other hand, fine-tuning the hyperparameters is frequently disregarded, which in turn results in sub-optimum model effectiveness. Additionally, the important aids of ensemble learning, in which many detection frameworks are incorporated to use their collected predictive capability, are not progressively combined into the ID pipeline. To overcome this research gap, it is vital to design a highly robust and effective intrusion detection technique that is customized according to the particular challenges, modeled with cloud platforms. This way, it becomes possible to finally improve their security posture and alleviate the development of threats. So, it is essential to enhance the generalizability, robustness, and accuracy of the intrusion detection methods, mainly in dynamic and developing network infrastructures. However, the attacks endure to develop in such sophistication and complication as well. Both FS and hyperparameter tuning include various search spaces. FS normally contains a discrete search space, whereas various integrations of the features are estimated. Alternatively, hyperparameter tuning often comprises semi-continuous or continuous search spaces for parameter values. The contribution of MOSOA for FS and STOA, in terms of hyperparameter tuning, allows every method to consider its corresponding search space and the multiplication of its efficacy and performance. MOSOA was developed for multi-objective optimizer tasks, which makes it a well-suitable FS. However, the aim is to enhance numerous conflicting criteria, namely, interpretability, accuracy, and dimensionality reduction. On the contrary, STOA can be highly proficient at enhancing hyperparameters because of its unique optimization approaches.

3. The Proposed Model

In the current study, the authors designed the MOSOA-DLVD methodology for accomplishing security in the cloud platform. The aim of the MOSOA-DLVD algorithm is to identify the presence of vulnerabilities or attacks in the cloud platform. The model has three phases of function: the MOSOA-based FS, DBN classification, and STOA-based hyperparameter selection. Figure 1 exemplifies the workflow of the MOSOA-DLVD method.

3.1. Feature Selection Using MOSOA

The MOSOA technique is used to select the better feature sets. This technique is imitated for the process of FS in which seagulls function as searching agents (features) [25]. SOA is a meta-heuristic optimizer algorithm inspired by the foraging behavior of seagulls. This algorithm provides the benefits of a modest implementation and architecture. The major benefit of the SOA is that its overall construction and composition are relatively simple, while its global search and local search abilities are strong. Here, the migration method is performed to attain the optimum features out of an accessible group of features and to explore the search space. The main function of the FS method includes a reduction in classification errors and the features that are considered as input.
M i n   F t = δ Ψ + ( 1 δ ) f F    
In this system, the aims are combined into a single objective equation like a preset weight that identifies all the objective importance. In Equation (1), δ corresponds to the parameter inducing the classifier’s output,   F denotes the overall number of features in the data, Ψ specifies the error rate of the classifiers, and f represents the overall feature extraction counts during the extraction feature. The FF needs to have a low value for the proper FS.
Exploration: The exploration of the search agent includes its movement from one place to another as per the FF. The three most important conditions of the exploration method of MOSOA are given below:
(i). Collision Avoidance: It is also possible for a collision to happen, so a parameter is used to calculate the location of the searching agent while exploring the search range. The equation is given below.
c s = A p s x  
In Equation (2), c s shows the location of the searching agent not included in a collision, p s represents the existing location of the searching agent, x denotes the present iteration, and parameter A shows the movement of the searching agent from the performance space. The formula for the parameter is given below.
A = f ι x f , I t r m a x ; x = 0,1 , I t r m a x            
In Equation (3), f controls the frequency of the A parameter.
The movement to the optimum neighbor location: The searching agent that avoids the collision moves to a better neighborhood position, for which the formula is as follows.
m s = B p b s x p s x        
In Equation (4), p s corresponds to the searching agent, p b s stands for the place of the better search agent, and m s represents the movement of p s toward p b s . The random value B is accountable for maintaining the balance between the exploitation and exploration phases. The formula for B is given below.
B = 2 A 2 r n d
In Equation (5), r n d denotes a random value within [0, 1].
(ii). Position Update: Finally, the searching agent updates the location based on the location of a better searching agent in the group. The location updating formula is as follows.
d s = c s + m s      
In Equation (6), d s denotes the distance between the better one in the group and the searching agent.
The MOSOA technique calculates the fitness function of the searching agent, whereas a better solution is upgraded to the archive. Once the archive is established to overflow, the grid technique is used to avoid the crowded solution in the available solutions from the archive. Next, a novel solution is upgraded to archive and later, the boundary of the searching agent is adjusted and evaluated. Finally, the FF estimates the position of the searching agent in the archive, whereas the better searching agent is upgraded with a novel location.
Exploitation: This procedure is imitated during the attacking behavior of the searching agent based on the experience and history of the exploitation. The searching agent spirally moves from the air in a 3D axis and is defined as follows.
x = α c o s l  
y = α s i n l  
z = α l      
l = u e l v
where α represents the radius of each turn in a spiral movement, l denotes the arbitrary value selected in the range of [ 0 , 2 π ] , and u and v are the constants that represent the spiral motion. The last upgraded location of the search agent is shown below.
p s x = d s   x y z + p b s x
In the MOSOA technique, the better Pareto optimum result is compared with that of the current solution. Therefore, this method selects the leader for the group to achieve it. The minimum crowded space from the archive is occupied with the roulette wheel selection process, whereas the better solution in the optimum boundary is taken into account as given below.
U l = h N l
In Equation (12), N l shows the amount of Pareto optimum solutions for the segment and h denotes the constant value higher than l.

3.2. Vulnerability Detection Utilizing the DBN Model

The DBN model has been applied in the detection and classification of the vulnerabilities. DBNs can automatically learn the hierarchical representations of the input data. For the purpose of intrusion detection, it is used for learning and extracting the important features from raw network traffic data and reducing the requirement for manual feature engineering. Primarily, this characteristic is valuable for a network intrusion model as it is complex and develops over some time. DBNs have been well-appropriated for anomaly detection activity, which is an important module of the intrusion detection process. It can model the normal behavior of a network and indicate abnormalities from learned regularities as possible intrusions. It is supported to identify new or earlier hidden attack patterns. It is capable of taking reliance and correlation among the diverse phases of multi-stage attacks. Generally, this is significant as advanced attacks include several stages, and identifying them as a whole could be more efficient than detecting different types of anomalies.
DBN is considered a fusion of unsupervised network models like RBM that act as a hidden layer (HL) of each subnet and a visible layer (VL) of the second layer [26]. The DBN model comprises multiple VLs, HLs, and an LR for classification in the final layer. Initially, the feature vector is mapped, after which, each layer of the RBM is trained using an unsupervised method for maintaining the feature data. Next, a fine adjustment is made. In the RBM technique, the v i in the VL and HL are characterized as h i . w i j represents the weights between v i and h j , while the latter denotes the guided values. The VL and HL nodes have biases and are denoted by the c and b vectors. The b i ,   c i , and w i j values of the RBM form the parameter θ in the DBN and appear in the model with a probability of the energy function and the HL. Figure 2 represents the framework of the DBN.
E θ , v , h = i = 1 m v i c i j = 1 n h j b j
i = 1 m j = 1 n v i h i w i j          
Subsequently, there is no interlayer linked from the DBN model, whereas the probability distribution of the VL and HL is computed as given below.
P v i = 1 h = 1 / 1 + e b i Σ h i w i j              
P h i = 1 v = 1 / 1 + e c i Σ v i w i j    
The reconstructed data are returned and defined with the p v h computation after the weight calculation is completed. The output σ takes place once the data are transferred back to the HL. Now, the logistic function σ can be described as follows.
σ ( x ) = ( 1 + e x ) 1
Similarly, if v i = 1 , the conditional probability of v i can be computed as follows:
P v i = 1 v = σ a i + i = 1 W i j h j

3.3. Hyperparameter Tuning Using the STOA

Eventually, the STOA is utilized for the optimum hyperparameter selection of the DBN approach. The STOA is a new optimization technique derived from the natural foraging behavior of seabirds [27]. The sooty tern is an omnivorous bird that preys on fish, earthworms, and other insects. The technique has high precision and a strong global search ability. The STOA can be a population-based technique separated into local and global search phases. The global search phase mainly comprises collision avoidance, position update, and convergence to the optimum solution.
(1)
The mathematical equation is used for collision avoidance is as follows.
B = γ × P k
γ = α k × α M a x i i e r a i i o n k = 0,1 , 2 ,   M a x i t e r a t i o n ,              
where B refers to the safer location to make sure that no collision occurs between the black terns;   γ denotes the collision avoidance aspect; and P ( k ) shows the existing location of the black tern. k represents the number of iterations; and the α value is 2.
(2)
Convergence to the optimum solution is formulated as follows.
M = β × P b k P k β = 0.5 × r
In Equation (20),   p ( k ) shows the existing optimum tern, M denotes the optimum location of the sooty tern colony; β refers to the arbitrary regulator; a n d   r is an arbitrary integer in the range of [ 0 ,   1 ] .
(3)
To update the position, the following equation is used.
D = B + M
In Equation (21), D denotes the existing and optimum locations of a sooty tern.
During the local exploration stage, the bird uses its wings to gain height and also changes its angle and speed of attack during the migration process. The hovering behavior at the time of attacking prey is described as follows.
x = R × c o s ( θ ) y = R × c o s ( θ ) z = R × θ r = u × e k v
In Equation (11), θ represents the angle of attack in the range of 0,2 , R denotes the spiral radius, a n d   u and v show the spiral constant and are fixed as 1 . The equation to update the location of the sooty tern is as follows.
P k = D × x × y × z × P b k
FF is a key feature of the STOA system. The encoder performance is used to develop the optimum candidate outcome. Presently, accuracy is the main condition deployed to develop the FF.
F i t n e s s = m a x T P T P + F P
where T P and F P stand for true and false positive values, respectively.

4. Results and Discussion

The MOSOA-DLVD methodology was experimentally validated using the NSL-KDD database [28]. The dataset has a total of 125,973 samples under five classes, as shown in Table 1.
In Figure 3, the confusion matrices generated using the MOSOA-DLVD system are shown. The outcomes indicate that the MOSOA-DLVD algorithm accurately recognized all five classes.
In Table 2 and Figure 4, the overall detection results of the MOSOA-DLVD method at 80:20 of the TRS/TSS are given. The achieved outcomes show that the MOSOA-DLVD system proficiently recognized all five class labels. At 80% of the TRS, the MOSOA-DLVD algorithm achieved an average a c c u y of 99.23%, p r e c n of 74.15%, r e c a l of 73.44%, F s c o r e of 73.78%, and an MCC of 73.14%. Next, with 20% of the TSS, the MOSOA-DLVD system obtained an average a c c u y of 99.28%, p r e c n of 74.05%, r e c a l of 73%, F s c o r e of 73.50%, and an MCC of 72.90%.
The overall detection outcomes of the MOSOA-DLVD algorithm at 70:30 of TRS/TSS are portrayed in Table 3 and Figure 5. The outcomes illustrate that the MOSOA-DLVD method efficiently recognized all five classes. For 70% of the TRS, the MOSOA-DLVD methodology attained an average a c c u y of 99.34%, p r e c n of 74.37%, r e c a l of 74.13%, F s c o r e of 74.24%, and an MCC of 73.76%. With 30% of the TSS, the MOSOA-DLVD system attained an average a c c u y of 99.31%, p r e c n of 73.21%, r e c a l of 73.28%, F s c o r e of 73.24%, and an MCC of 72.73%.
Figure 6 represents the training accuracy T R _ a c c u y and V L _ a c c u y values attained with the MOSOA-DLVD algorithm. T L _ a c c u y is determined by validating the MOSOA-DLVD methodology using the TR database, whereas V L _ a c c u y is measured as the effectiveness of the model upon a distinct TS dataset. The results show that the T R _ a c c u y and V L _ a c c u y values increase with an increase in the number of epochs. Accordingly, the effectiveness of the MOSOA-DLVD algorithm is enriched with the TS and TR datasets.
In Figure 7, the T R _ l o s s and V R _ l o s s   curves of the MOSOA-DLVD methodology are illustrated. T R _ l o s s corresponds to the errors between the original and the predicted values in the TR data. V R _ l o s s denotes the measurement of the MOSOA-DLVD system on specific validation data. The obtained outcomes confirm that both T R _ l o s s and V R _ l o s s values are reduced with an increasing number of epochs. This outcome describes the enriched effectiveness of the MOSOA-DLVD approach as well as its ability to achieve accurate classification. The minimal T R _ l o s s and V R _ l o s s values reveal the superior performance of the MOSOA-DLVD algorithm on correlation and capturing patterns.
The comprehensive precision–recall examination outcomes produced using the MOSOA-DLVD approach with the test dataset are shown in Figure 8. The MOSOA-DLVD algorithm was found to achieve increased PR values. In addition, it is obvious that the MOSOA-DLVD algorithm attains superior precision–recall values for all five classes.
In Figure 9, the ROC outcomes of the MOSOA-DLVD methodology are exhibited. The outcomes show that the MOSOA-DLVD system produced enhanced ROC values. Furthermore, it is apparent that the MOSOA-DLVD algorithm extends greater ROC values with all five classes. The ROC curves produced using the MOSOA-DLVD system exhibit its capability to differentiate the classes. This figure indicates the valued perceptions of the trade-off between the FPR and TPR rates over individual categorization thresholds as well as the changing number of epochs. This figure displays the predicted a c c u y efficiency of the MOSOA-DLVD model for the categorization of diverse classes.
A comparison analysis was conducted between the MOSOA-DLVD methodology and other existing systems such as the leader-based K-means clustering (LKM) with the OFLS [22], K-means with OFLS [23], MLP [23], and PCA with NN [24] methods, and the results are portrayed in Table 4 and Figure 10 [22,23,24]. The achieved outcomes show that the LKM-OFLS and PCA-NN models obtained poorer results than the rest of the models. Along with that, the K-means-OFLS and MLP techniques accomplished a closer performance. But the MOSOA-DLVD technique reported the maximum performance with a c c u y , p r e c n , r e c a l , and F s c o r e values being 99.34%, 74.37%, 74.13%, and 74.24%, respectively. This phenomenal performance establishes the enhanced outcomes of the MOSOA-DLVD methodology.
In summary, the MOSOA-DLVD method exhibited superior performance with a maximum accu_y of 99.34%. The high effectiveness of the MOSOA-DLVD system is due to the incorporation of the MOSOA-assisted FS algorithm and STOA-based hyperparameter tuning. The MOSOA algorithm selects the relevant and beneficial features at accessible feature sets. With the elimination of unrelated features, the proposed model can be considered a crucial finding in terms of aspects contributing to the classification method. This model can improve the accuracy of classification. Alternatively, the STOA optimizer prefers the optimal values for the hyperparameters of the specified DBN system. If the hyperparameters cannot be learned during the training period, then they should be set before the training. It has an important effect on the model’s performance as well, and the selection of the optimum values could result in higher accuracy. By integrating the MOSOA-based FS algorithm and STOA-based hyperparameter tuning, the MOSOA-DLVD system achieved the best solution by emphasizing major related features as well as selecting the optimal sets for the method. These attained outcomes confirm the better performance of the MOSOA-DLVD methodology over other systems.

5. Conclusions

In the current study, the MOSOA-DLVD technique was presented to accomplish security in the cloud platform. The primary aim of the MOSOA-DLVD methodology is to identify the presence of vulnerabilities or attacks in the cloud platform. In the developed MOSOA-DLVD method, three phases of processes are executed such as the DBN classification, STOA-based hyperparameter selection, and the MOSOA-based FS. To enhance the detection results of the DBN algorithm, the STOA was used for hyperparameter tuning. The performance of the MOSOA-DLVD method was examined using the benchmark NSL-KDD dataset. A wide range of simulations was conducted, and the outcomes established the improved intrusion detection outcomes of the MOSOA-DLVD system over existing methodologies with a higher accuracy of 99.34%. In the future, the MOSOA-DLVD method can be extended to the big data environment. Furthermore, the class imbalance data handling issue needs to be resolved in order to achieve improved classification results. Future works can explore further techniques for intrusion detection that can operate on encrypted or privacy-preserving data. This might ensure the confidentiality of sensitive information, while detecting intrusions in an effective manner and remains important, especially in multi-tenant cloud environments.

Author Contributions

Conceptualization, M.A. and M.A.A.; methodology, M.A.A., H.M., A.S. and S.S.A.; software, A.A.; validation, M.A.A., A.S. and A.A.; investigation, M.A.; data curation, S.S.A.; writing—original draft, M.A., M.A.A., H.M., A.S. and S.S.A.; writing—review and editing, M.A.A., A.S., A.A. and M.A.; visualization, A.A.; project administration, M.A.A.; funding acquisition, M.A.A. and H.M. All authors have read and agreed to the published version of the manuscript.

Funding

The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through a large group Research Project under grant number (RGP2/95/44), Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2023R330), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia, and Research Supporting Project number (RSP2023R459), King Saud University, Riyadh, Saudi Arabia. We would like to thank the SAUDI ARAMCO Cybersecurity Chair for funding this project. This study is partially funded by the Future University in Egypt (FUE).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare without conflict of interest. This manuscript was written with the contributions of all authors. All authors have approved the final version of this manuscript.

References

  1. Vinolia, A.; Kanya, N.; Rajavarman, V.N. Machine Learning and Deep Learning based Intrusion Detection in Cloud Environment: A Review. In Proceedings of the 2023 5th International Conference on Smart Systems and Inventive Technology (ICSSIT), Tirunelveli, India, 23–25 January 2023; pp. 952–960. [Google Scholar]
  2. Tariq, M.; Suaib, M. A Review on Intrusion Detection in Cloud Computing. Int. J. Eng. Manag. Res. 2023, 13, 207–215. [Google Scholar]
  3. Chang, V.; Golightly, L.; Modesti, P.; Xu, Q.A.; Doan, L.M.T.; Hall, K.; Boddu, S.; Kobusińska, A. A survey on intrusion detection systems for fog and cloud computing. Future Internet 2022, 14, 89. [Google Scholar] [CrossRef]
  4. Patel, S.K. Improving intrusion detection in cloud-based healthcare using neural network. Biomed. Signal Process. Control. 2023, 83, 104680. [Google Scholar] [CrossRef]
  5. Liu, Z.; Xu, B.; Cheng, B.; Hu, X.; Darbandi, M. Intrusion detection systems in cloud computing: A comprehensive and deep literature review. Concurr. Comput. Pract. Exp. 2022, 34, e6646. [Google Scholar] [CrossRef]
  6. Thangasamy, A.; Sundan, B.; Govindaraj, L. Dynamic phad/ahad analysis for network intrusion detection and prevention system for cloud environment. In Proceedings of the 2021 4th International Conference on Computing and Communications Technologies (ICCCT), Chennai, India, 16–17 December 2021; pp. 273–279. [Google Scholar]
  7. Lin, H.; Xue, Q.; Feng, J.; Bai, D. Internet of Things intrusion detection model and algorithm based on cloud computing and multi-feature extraction extreme learning machine. Digit. Commun. Netw. 2023, 9, 111–124. [Google Scholar] [CrossRef]
  8. Balamurugan, E.; Mehbodniya, A.; Kariri, E.; Yadav, K.; Kumar, A.; Haq, M.A. Network optimization using defender system in cloud computing security-based intrusion detection system with game theory deep neural network (IDSGT-DNN). Pattern Recognit. Lett. 2022, 156, 142–151. [Google Scholar] [CrossRef]
  9. Mohamed, D.; Ismael, O. Enhancement of an IoT hybrid intrusion detection system based on fog-to-cloud computing. J. Cloud Comput. 2023, 12, 41. [Google Scholar] [CrossRef]
  10. Snehi, J.; Snehi, M.; Bhandari, A.; Baggan, V.; Ahuja, R. Introspecting Intrusion Detection Systems in Dealing with Security Concerns in Cloud Environment. In Proceedings of the 2021 10th International Conference on System Modeling & Advancement in Research Trends (SMART), Moradabad, India, 10–11 December 2021; pp. 345–349. [Google Scholar]
  11. Kavitha, C.; Gadekallu, T.R.; Nimala, K.; Kavin, B.P.; Lai, W.C. Filter-Based Ensemble Feature Selection and Deep Learning Model for Intrusion Detection in Cloud Computing. Electronics 2023, 12, 556. [Google Scholar] [CrossRef]
  12. Jaber, A.N.; Rehman, S.U. FCM–SVM-based intrusion detection system for the cloud computing environment. Clust. Comput. 2020, 23, 3221–3231. [Google Scholar] [CrossRef]
  13. Maheswari, K.G.; Siva, C.; Nalinipriya, G. Optimal cluster-based feature selection for intrusion detection systems in web and cloud computing environments using hybrid teacher learning optimization enables deep recurrent neural networks. Comput. Commun. 2023, 202, 145–153. [Google Scholar] [CrossRef]
  14. Devi, K.; Muthusenthil, B. Intrusion detection framework for securing privacy attacks in a cloud computing environment using DCCGAN-RFOA. Trans. Emerg. Telecommun. Technol. 2022, 33, e4561. [Google Scholar] [CrossRef]
  15. Kanimozhi, P.; Aruldoss Albert Victoire, T. Oppositional tunicate fuzzy C-means algorithm and logistic regression for intrusion detection on cloud. Concurr. Comput. Pract. Exp. 2022, 34, e6624. [Google Scholar] [CrossRef]
  16. Samriya, J.K.; Kumar, N. A novel intrusion detection system using hybrid clustering-optimization approach in cloud computing. Mater. Today Proc. 2020, 2, 23–54. [Google Scholar] [CrossRef]
  17. Sathiyadhas, S.S.; Soosai Antony, M.C.V. A network intrusion detection system in a cloud computing environment using dragonfly improved invasive weed optimization integrated Shepard convolutional neural network. Int. J. Adapt. Control. Signal Process. 2022, 36, 1060–1076. [Google Scholar] [CrossRef]
  18. Karuppusamy, L.; Ravi, J.; Dabbu, M.; Lakshmanan, S. Chronological salp swarm algorithm-based deep belief network for intrusion detection in the cloud using fuzzy entropy. Int. J. Numer. Model. Electron. Netw. Devices Fields 2022, 35, e2948. [Google Scholar] [CrossRef]
  19. Mani, S.; Sundan, B.; Thangasamy, A.; Govindaraj, L. A new intrusion detection and prevention system using a hybrid deep neural network in the cloud environment. In Computer Networks, Big Data and IoT: Proceedings of ICCBI 2021; Springer Nature: Singapore, 2022; pp. 981–994. [Google Scholar]
  20. Varun, P.; Ashokkumar, K. Intrusion detection system in cloud security using deep convolutional network. Appl. Math. Inf. Sci. 2022, 16, 581–588. [Google Scholar]
  21. Aldallal, A.; Alisa, F. Effective intrusion detection system to secure data in the cloud using machine learning. Symmetry 2021, 13, 2306. [Google Scholar] [CrossRef]
  22. Alohali, M.A.; Elsadig, M.; Al-Wesabi, F.N.; Al Duhayyim, M.; Mustafa Hilal, A.; Motwakel, A. Enhanced Chimp OptimizationBased Feature Selection with Fuzzy Logic-Based Intrusion Detection System in Cloud Environment. Appl. Sci. 2023, 13, 2580. [Google Scholar] [CrossRef]
  23. Shyla, S.I.; Sujatha, S.S. Cloud security: LKM and optimal fuzzy system for intrusion detection in cloud environment. J. Intell. Syst. 2020, 29, 1626–1642. [Google Scholar] [CrossRef]
  24. Mahmood, Z.; Agrawal, C.; Hasan, S.S.; Zenab, S. Intrusion detection in a cloud computing environment using neural network. Int. J. Res. Comput. Eng. Electron. 2012, 1, 1–4. [Google Scholar]
  25. Jagannathan, P.; Gurumoorthy, S.; Stateczny, A.; Divakarachar, P.B.; Sengupta, J. Collision-aware routing using multi-objective seagull optimization algorithm for WSN-based IoT. Sensors 2021, 21, 8496. [Google Scholar] [CrossRef] [PubMed]
  26. Al-Khazraji, H.; Nasser, A.R.; Hasan, A.M.; Al Mhdawi, A.K.; Al-Raweshidy, H.; Humaidi, A.J. Aircraft engines remain useful for life prediction based on a hybrid model of autoencoder and deep belief network. IEEE Access 2022, 10, 82156–82163. [Google Scholar] [CrossRef]
  27. Shen, S.; Du, Y.; Xu, Z.; Qin, X.; Chen, J. Temperature Prediction Based on STOA-SVR Rolling Adaptive Optimization Model. Sustainability 2023, 15, 11068. [Google Scholar] [CrossRef]
  28. Available online: https://www.unb.ca/cic/datasets/nsl.html (accessed on 13 July 2023).
Figure 1. The overall flow of the MOSOA-DLVD algorithm.
Figure 1. The overall flow of the MOSOA-DLVD algorithm.
Sensors 23 09383 g001
Figure 2. DBN structure.
Figure 2. DBN structure.
Sensors 23 09383 g002
Figure 3. (a,b) Confusion matrices at 80:20 of TRS/TSS and (c,d) 70:30 of TRS/TSS.
Figure 3. (a,b) Confusion matrices at 80:20 of TRS/TSS and (c,d) 70:30 of TRS/TSS.
Sensors 23 09383 g003
Figure 4. Average analysis outcomes of the MOSOA-DLVD model with 80% of TRS/20% of TSS.
Figure 4. Average analysis outcomes of the MOSOA-DLVD model with 80% of TRS/20% of TSS.
Sensors 23 09383 g004
Figure 5. Average analysis outcomes of the MOSOA-DLVD method with 70% of TRS/30% of TSS.
Figure 5. Average analysis outcomes of the MOSOA-DLVD method with 70% of TRS/30% of TSS.
Sensors 23 09383 g005
Figure 6. A c c u y curve of the MOSOA-DLVD algorithm.
Figure 6. A c c u y curve of the MOSOA-DLVD algorithm.
Sensors 23 09383 g006
Figure 7. Loss curve of the MOSOA-DLVD system.
Figure 7. Loss curve of the MOSOA-DLVD system.
Sensors 23 09383 g007
Figure 8. PR analysis of the MOSOA-DLVD model.
Figure 8. PR analysis of the MOSOA-DLVD model.
Sensors 23 09383 g008
Figure 9. ROC curve of the MOSOA-DLVD algorithm.
Figure 9. ROC curve of the MOSOA-DLVD algorithm.
Sensors 23 09383 g009
Figure 10. Comparative analysis of the outcomes of the MOSOA-DLVD algorithm and other systems.
Figure 10. Comparative analysis of the outcomes of the MOSOA-DLVD algorithm and other systems.
Sensors 23 09383 g010
Table 1. Description of the dataset.
Table 1. Description of the dataset.
ClassNo. of Samples
Dos45,927
R2l995
Probe11,656
U2r52
Normal67,343
Total no. of Samples125,973
Table 2. Detection outcomes of the MOSOA-DLVD algorithm on 80% of TRS/20% of TSS.
Table 2. Detection outcomes of the MOSOA-DLVD algorithm on 80% of TRS/20% of TSS.
Labels A c c u y P r e c n R e c a l F S c o r e MCC
TSR (80%)
DoS98.6297.9598.2598.1097.01
R2L99.6077.2172.4174.7374.57
Probe99.5496.9098.1697.5397.27
U2R99.9500.0000.0000.00-0.02
Normal98.4398.6798.3998.5396.84
Average99.2374.1573.4473.7873.14
TSS (20%)
DoS98.7198.1898.3398.2597.24
R2L99.6476.4069.8973.0072.89
Probe99.5697.0098.2697.6397.39
U2R99.9500.0000.0000.0000.00
Normal98.5198.6798.5498.6097.01
Average99.2874.0573.0073.5072.90
Table 3. Detection outcomes of the MOSOA-DLVD algorithm on 70% of TRS/30% of TSS.
Table 3. Detection outcomes of the MOSOA-DLVD algorithm on 70% of TRS/30% of TSS.
Labels A c c u y P r e c n R e c a l F S c o r e MCC
TRS (70%)
DoS98.7998.3898.2898.3397.38
R2L99.6880.9277.6879.2779.12
Probe98.9193.0295.4394.2193.62
U2R99.9600.0000.0000.0000.00
Normal99.3499.5199.2699.3898.67
Average99.3474.3774.1374.2473.76
TSS (30%)
DoS98.7998.4298.3098.3697.39
R2L99.6074.9173.6574.2874.08
Probe98.9493.3495.2294.2793.69
U2R99.9600.0000.0000.0000.00
Normal99.2599.3899.2299.3098.50
Average99.3173.2173.2873.2472.73
Table 4. Comparative analysis of the outcomes of the MOSOA-DLVD algorithm and other algorithms [26,27,28].
Table 4. Comparative analysis of the outcomes of the MOSOA-DLVD algorithm and other algorithms [26,27,28].
Methods A c c u y P r e c n R e c a l F S c o r e
MOSOA-DLVD99.3474.3774.1374.24
LKM-OFLS [22]89.3464.6454.6858.26
K-Means-OFLS [23]91.4365.7455.5158.33
MLP algorithm [23]91.4666.6156.7654.99
PCA-NN [24]90.0864.5656.0657.54
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Aljebreen, M.; Alohali, M.A.; Mahgoub, H.; Aljameel, S.S.; Alsumayt, A.; Sayed, A. Multi-Objective Seagull Optimization Algorithm with Deep Learning-Enabled Vulnerability Detection for Secure Cloud Environments. Sensors 2023, 23, 9383. https://doi.org/10.3390/s23239383

AMA Style

Aljebreen M, Alohali MA, Mahgoub H, Aljameel SS, Alsumayt A, Sayed A. Multi-Objective Seagull Optimization Algorithm with Deep Learning-Enabled Vulnerability Detection for Secure Cloud Environments. Sensors. 2023; 23(23):9383. https://doi.org/10.3390/s23239383

Chicago/Turabian Style

Aljebreen, Mohammed, Manal Abdullah Alohali, Hany Mahgoub, Sumayh S. Aljameel, Albandari Alsumayt, and Ahmed Sayed. 2023. "Multi-Objective Seagull Optimization Algorithm with Deep Learning-Enabled Vulnerability Detection for Secure Cloud Environments" Sensors 23, no. 23: 9383. https://doi.org/10.3390/s23239383

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop