A NOVEL APPROACH TO INTRUSION-DETECTION SYSTEM: COMBINING LSTM AND THE SNAKE ALGORITHM
sanaa Ali Jebbar, Soukaena H hashem, Shatha Habib Jafer.
Abstract
In the epoch of digital transformation, cloud computing remains paramount, acting as the linchpin for a plethora of services from enterprise solutions to day-to-day consumer applications. Yet, its expansive nature has invariably rendered it susceptible to a myriad of cyber threats, necessitating advanced, adaptive defense mechanisms. This paper introduces a novel intrusion detection method tailored for cloud environments, ingeniously amalgamating the temporal pattern recognition capabilities of Long Short-Term Memory (LSTM) networks with the heuristic finesse of the Snake algorithm. Our research meticulously delineates the LSTM-Snake model’s design, implementation, and exhaustive benchmarking against prevailing approaches. Experimental results underscore the model’s prowess, registering a commendable 99% accuracy rate in intrusion detection—a marked improvement over current state-of-the-art methodologies. The ensuing discussions offer insights into the model’s practical implications, potential limitations, and avenues for future research, paving the way for a fortified cloud computing landscape
Key words: Cyber Threats, Intrusion Detection, Cloud Environments, Long Short-Term Memory (LSTM), Snake algorithm, Intrusion Detection Systems (IDS).
scite shows how a scientific paper has been cited by providing the context of the citation, a classification describing whether it supports, mentions, or contrasts the cited claim, and a label indicating in which section the citation was made.
The articles in Bibliomed are open access articles licensed under Creative Commons Attribution 4.0 International License (CC BY), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
We use cookies and other tracking technologies to work properly, to analyze our website traffic, and to understand where our visitors are coming from. More InfoGot It!