Applications and Evaluations of Bio-Inspired Approaches in Cloud Security: A Review

Cloud computing gained much popularity in the recent past due to its many internet-based services related to data, application, operating system, and eliminating the need for central hardware access. Many of the challenges associated with cloud computing can be specified as network load, security intrusion, authentication, biometric identification, and information leakage. Numerous algorithms have been proposed and evaluated to solve those challenges. Among those, bio-inspired algorithms such as Evolutionary, Swarm, Immune, and Neural algorithms are the most prominent ones which are developed based on nature’s ecosystems. Bio-inspired algorithms’ adaptability allows many researchers and practitioners to utilize them to solve many security-related cloud computing issues. This paper aims to explore previous research, recent studies, challenges, and scope for further analysis of cloud security. Therefore, this study provides an overview of bio-inspired algorithms application and evaluations, taking into account cloud security challenges, such as Identity and Authentication, Access Control Systems, Protocol and Network Security, Trust Management, Intrusion Detection, Virtualization, and Forensic.

[1]  Kim-Kwang Raymond Choo,et al.  A Deep CNN Ensemble Framework for Efficient DDoS Attack Detection in Software Defined Networks , 2020, IEEE Access.

[2]  Heung-Il Suk,et al.  Person authentication from neural activity of face-specific visual self-representation , 2013, Pattern Recognit..

[3]  Sanjay Kumar,et al.  A New User Identity Based Authentication, Using Security and Distributed for Cloud Computing , 2020, IOP Conference Series: Materials Science and Engineering.

[4]  Muddassar Farooq,et al.  BeeAIS: Artificial Immune System Security for Nature Inspired, MANET Routing Protocol, BeeAdHoc , 2007, ICARIS.

[5]  Dawei Li,et al.  An energy-efficient algorithm for virtual machine placement optimization in cloud data centers , 2020, Cluster Computing.

[6]  Amir H. Gandomi,et al.  Ant Colony Optimization Based Quality of Service Aware Energy Balancing Secure Routing Algorithm for Wireless Sensor Networks , 2021, IEEE Transactions on Engineering Management.

[7]  Dipankar Dasgupta,et al.  Negative Authentication Systems , 2017 .

[8]  Ajith Abraham,et al.  Web usage mining using artificial ant colony clustering and linear genetic programming , 2003, The 2003 Congress on Evolutionary Computation, 2003. CEC '03..

[9]  Tao Huang,et al.  Service-differentiated QoS routing based on ant colony optimisation for named data networking , 2018, Peer-to-Peer Networking and Applications.

[10]  Vallipuram Muthukkumarasamy,et al.  An Encryption Scheme Using Chaotic Map and Genetic Operations for Wireless Sensor Networks , 2015, IEEE Sensors Journal.

[11]  John R. Williams,et al.  Design and implementation of Negative Authentication System , 2017, International Journal of Information Security.

[12]  Luca Maria Gambardella,et al.  Swarm intelligence for routing in mobile ad hoc networks , 2005, Proceedings 2005 IEEE Swarm Intelligence Symposium, 2005. SIS 2005..

[13]  Waldo Delport,et al.  Forensic evidence isolation in clouds , 2014 .

[14]  Mohd Faizal Abdollah,et al.  Cloud Forensic Challenges and Recommendations: A Review , 2020 .

[15]  Salwani Abdullah,et al.  A Migration-Based Cuttlefish Algorithm With Short-Term Memory for Optimization Problems , 2020, IEEE Access.

[16]  J J Hopfield,et al.  Neural networks and physical systems with emergent collective computational abilities. , 1982, Proceedings of the National Academy of Sciences of the United States of America.

[17]  Yuval Elovici,et al.  A Neural Attention Model for Real-Time Network Intrusion Detection , 2019, 2019 IEEE 44th Conference on Local Computer Networks (LCN).

[18]  Manvi Breja,et al.  Secure DNA and Morse code based Profile access control models for Cloud Computing Environment , 2020, Procedia Computer Science.

[19]  Jong Hyuk Park,et al.  Secure Secondary Authentication Framework for Efficient Mutual Authentication on a 5G Data Network , 2020 .

[20]  Giovanni Pilato,et al.  Verification of Ink-on-paper Fingerprints by Using Image Processing Techniques and a New Matching Operator , 2002 .

[21]  Wei-Chi Ku Weaknesses and drawbacks of a password authentication scheme using neural networks for multiserver architecture , 2005, IEEE Transactions on Neural Networks.

[22]  Kah Phooi Seng,et al.  Classical and swarm intelligence based routing protocols for wireless sensor networks: A survey and comparison , 2012, J. Netw. Comput. Appl..

[23]  Wei Jin,et al.  Face recognition method based on support vector machine and particle swarm optimization , 2011, Expert Syst. Appl..

[24]  Vishwa Teja Alaparthy,et al.  A Multi-Level Intrusion Detection System for Wireless Sensor Networks Based on Immune Theory , 2018, IEEE Access.

[25]  Ahmed Hamid Mohsin,et al.  A Study of 2.5D Face Recognition for Forensic Analysis , 2020 .

[26]  Ali Daud,et al.  CC-GA: A clustering coefficient based genetic algorithm for detecting communities in social networks , 2018, Appl. Soft Comput..

[27]  Kalyanmoy Deb,et al.  An Adaptive Approach for Active Multi-Factor Authentication , 2014 .

[28]  네벤카 디미트로바,et al.  System for parental control in video programs based on multimedia content information , 2002 .

[29]  Ling Tian,et al.  Identity-Based Authentication for Cloud Computing , 2009, CloudCom.

[30]  Abdulsalam Ya’u Gital,et al.  Efficient Metaheuristic Population-Based and Deterministic Algorithm for Resource Provisioning Using Ant Colony Optimization and Spanning Tree , 2020, Int. J. Cloud Appl. Comput..

[31]  Mohammed Abo-Zahhad,et al.  Mobile Sink-Based Adaptive Immune Energy-Efficient Clustering Protocol for Improving the Lifetime and Stability Period of Wireless Sensor Networks , 2015, IEEE Sensors Journal.

[32]  Kazuyuki Mori,et al.  Immune Algorithm with Searching Diversity and its Application to Resource Allocation Problem , 1993 .

[33]  Vijay Dhir,et al.  Hypercube Based Genetic Algorithm for Efficient VM Migration for Energy Reduction in Cloud Computing , 2019, Statistics, Optimization & Information Computing.

[34]  Cord Spreckelsen,et al.  Privacy-Preserving Deep Learning for the Detection of Protected Health Information in Real-World Data: Comparative Evaluation , 2020, JMIR formative research.

[35]  Julie Greensmith,et al.  Immune system approaches to intrusion detection – a review , 2004, Natural Computing.

[36]  Le Zhang,et al.  Developing a Novel Hybrid Biogeography-Based Optimization Algorithm for Multilayer Perceptron Training under Big Data Challenge , 2018, Sci. Program..

[37]  Md. Akhtaruzzaman Adnan,et al.  Bio-Mimic Optimization Strategies in Wireless Sensor Networks: A Survey , 2013, Sensors.

[38]  H.E. Rauch,et al.  Neural networks for routing communication traffic , 1988, IEEE Control Systems Magazine.

[39]  Gaby Abou Haidar,et al.  High Perception Intrusion Detection System Using Neural Networks , 2015, 2015 Ninth International Conference on Complex, Intelligent, and Software Intensive Systems.

[40]  Quan-Ke Pan,et al.  An improved fruit fly optimization algorithm for solving the multidimensional knapsack problem , 2017, Appl. Soft Comput..

[41]  Kishor Datta Gupta,et al.  A Genetic Algorithm Approach to Optimize Dispatching for A Microgrid Energy System with Renewable Energy Sources , 2019 .

[42]  Vir V. Phoha,et al.  Neural network-based reputation model in a distributed system , 2004, Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004..

[43]  Philip Hingston,et al.  Evolving statistical rulesets for network intrusion detection , 2015, Appl. Soft Comput..

[44]  Joe Carthy,et al.  Cloud Computing Reference Architecture and Its Forensic Implications: A Preliminary Analysis , 2012, ICDF2C.

[45]  Mounir Ghogho,et al.  Deep Recurrent Neural Network for Intrusion Detection in SDN-based Networks , 2018, 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft).

[46]  Anshu Parashar,et al.  Secure User Data in Cloud Computing Using Encryption Algorithms , 2013 .

[47]  Zhu Wang,et al.  A research using hybrid RBF/Elman neural networks for intrusion detection system secure model , 2009, Comput. Phys. Commun..

[48]  Maria Dolores Gil Montoya,et al.  A Pareto-based multi-objective evolutionary algorithm for automatic rule generation in network intrusion detection systems , 2013, Soft Comput..

[49]  M. Tahar Kechadi,et al.  Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results , 2013, Digit. Investig..

[50]  L. D. Dhinesh Babu,et al.  A firefly swarm approach for establishing new connections in social networks based on big data analytics , 2015, Int. J. Commun. Networks Distributed Syst..

[51]  Xiao Lu,et al.  Negative Purchase Intent Identification in Twitter , 2020, WWW.

[52]  ChenKai,et al.  Multi-key privacy-preserving deep learning in cloud computing , 2017 .

[53]  Mauro Birattari,et al.  Swarm Intelligence , 2012, Lecture Notes in Computer Science.

[54]  Dongmei Zhang,et al.  AATMS: An Anti-Attack Trust Management Scheme in VANET , 2020, IEEE Access.

[55]  Min-Shiang Hwang,et al.  A remote password authentication scheme for multiserver architecture using neural networks , 2001, IEEE Trans. Neural Networks.

[56]  Dipankar Dasgupta,et al.  Determining Sequence of Image Processing Technique (IPT) to Detect Adversarial Attacks , 2021, SN Comput. Sci..

[57]  Ramesh C. Poonia,et al.  A performance evaluation of routing protocols for vehicular ad hoc networks with swarm intelligence , 2018, Int. J. Syst. Assur. Eng. Manag..

[58]  Mohammad S. Obaidat,et al.  An ant colony optimization approach for reputation and quality-of-service-based security in wireless sensor networks , 2009, Secur. Commun. Networks.

[59]  Abdul Wahid,et al.  Intrusion Detection and Prevention on Flow of Big Data Using Bacterial Foraging , 2015 .

[60]  Dipankar Dasgupta,et al.  An Overview of Artificial Immune Systems and Their Applications , 1993 .

[61]  Shuyu Li,et al.  Research on a Privacy Preserving Clustering Method for Social Network , 2019, 2019 IEEE 4th International Conference on Cloud Computing and Big Data Analysis (ICCCBDA).

[62]  Dan Pei,et al.  ZeroWall: Detecting Zero-Day Web Attacks through Encoder-Decoder Recurrent Neural Networks , 2020, IEEE INFOCOM 2020 - IEEE Conference on Computer Communications.

[63]  Longbing Cao,et al.  Novel Intrusion Detection using Probabilistic Neural Network and Adaptive Boosting , 2009, ArXiv.

[64]  Ajay K. Sharma,et al.  Genetic Algorithm-based Optimized Cluster Head selection for single and multiple data sinks in Heterogeneous Wireless Sensor Network , 2019, Appl. Soft Comput..

[65]  Sevil Sen,et al.  Evolving Trust Formula to Evaluate Data Trustworthiness in VANETs Using Genetic Programming , 2019, EvoApplications.

[66]  Ramachandra Raghavendra,et al.  Multisensor biometric evidence fusion of face and palmprint for person authentication using Particle Swarm Optimisation (PSO) , 2010, Int. J. Biom..

[67]  Ozgur Koray Sahingoz,et al.  Neural network based intrusion detection systems with different training functions , 2018, 2018 6th International Symposium on Digital Forensic and Security (ISDFS).

[68]  Athman Bouguettaya,et al.  Genetic Algorithm Based QoS-Aware Service Compositions in Cloud Computing , 2011, DASFAA.

[69]  Vassil Roussev,et al.  Cloud forensics-Tool development studies & future outlook , 2016, Digit. Investig..

[70]  Li Tao An Immune Based Model for Network Monitoring , 2006 .

[71]  Lei Chen,et al.  Intrusion detection and security calculation in industrial cloud storage based on an improved dynamic immune algorithm , 2019, Inf. Sci..

[72]  Chou-Yuan Lee,et al.  A hybrid search algorithm with heuristics for resource allocation problem , 2005, Inf. Sci..

[73]  Jason Brownlee,et al.  Clever Algorithms: Nature-Inspired Programming Recipes , 2012 .

[74]  Luis Rodero-Merino,et al.  Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing , 2014, CCRV.

[75]  John R. Williams,et al.  G-NAS: A grid-based approach for negative authentication , 2014, 2014 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).

[76]  The Writer OF The Article,et al.  The Origin of Species , 1871, Nature.

[77]  Barbara Webb,et al.  Swarm Intelligence: From Natural to Artificial Systems , 2002, Connect. Sci..

[78]  Vatsala Vijayan,et al.  Artificial Neural Network (ANN): An Artificial Intelligent (AI) Tool to Predict Fraudulent Financial Reporting and Financial Distress , 2020 .

[79]  Hsiangting Shatina Chen,et al.  The inhospitable vulnerability , 2018, Journal of Hospitality and Tourism Technology.

[80]  A. Sampathkumar,et al.  Glowworm swarm optimization for effectual load balancing and routing strategies in wireless sensor networks , 2020, Wirel. Networks.

[81]  Ali A. Ghorbani,et al.  Improved competitive learning neural networks for network intrusion and fraud detection , 2012, Neurocomputing.

[82]  Zulaiha Ali Othman,et al.  2.5 D Facial Analysis via Bio-Inspired Active Appearance Model and Support Vector Machine for Forensic Application , 2017 .

[83]  Pratyay Kuila,et al.  Nature-Inspired Algorithms for k-Coverage and m-Connectivity Problems in Wireless Sensor Networks , 2019, Lecture Notes in Networks and Systems.

[84]  Md. Abu Naser Bikas,et al.  An Implementation of Intrusion Detection System Using Genetic Algorithm , 2012, ArXiv.

[85]  Norman W. Paton,et al.  Optimizing virtual machine placement for energy and SLA in clouds using utility functions , 2016, Journal of Cloud Computing.

[86]  Xiaohong Yuan,et al.  Applying Long Short-Term Memory Recurrent Neural Network for Intrusion Detection , 2018, SoutheastCon 2018.

[87]  Shucheng Yu,et al.  Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing , 2014, IEEE Transactions on Parallel and Distributed Systems.

[88]  Vidushi Sharma,et al.  Heuristic Load Balancing Algorithms in Vulnerable Cloud Computing Environment , 2018, 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN).

[89]  Tommy W. S. Chow,et al.  A recurrent neural-network-based real-time learning control strategy applying to nonlinear systems with unknown dynamics , 1998, IEEE Trans. Ind. Electron..

[90]  Deevi Radha Rani,et al.  Challenges of Digital Forensics in Cloud Computing Environment , 2016 .

[91]  Jan H. P. Eloff,et al.  An approach to implement a network intrusion detection system using genetic algorithms , 2004 .

[92]  Andrew H. Sung,et al.  Identifying Significant Features for Network Forensic Analysis Using Artificial Intelligence Techniques , 2003, Int. J. Digit. EVid..

[93]  Kishor Datta Gupta,et al.  Leveraging Machine Learning Approach to Setup Software-Defined Network(SDN) Controller Rules During DDoS Attack , 2018, IJCCI.

[94]  L. G. Malik,et al.  An approach towards digital forensic framework for cloud , 2014, 2014 IEEE International Advance Computing Conference (IACC).

[95]  Mohammad S. Obaidat,et al.  An ant swarm-inspired energy-aware routing protocol for wireless ad-hoc networks , 2010, J. Syst. Softw..

[96]  Faouzi Kamoun,et al.  Neural networks for shortest path computation and routing in computer networks , 1993, IEEE Trans. Neural Networks.

[97]  Dipankar Dasgupta,et al.  Toward the design of adaptive selection strategies for multi-factor authentication , 2016, Comput. Secur..

[98]  Omar Almomani,et al.  Improved Security Particle Swarm Optimization (PSO) Algorithm to Detect Radio Jamming Attacks in Mobile Networks , 2020 .

[99]  Dipankar Dasgupta,et al.  Advances in User Authentication , 2017, Infosys Science Foundation Series.

[100]  Tianbo Lu,et al.  Next Big Thing in Big Data: The Security of the ICT Supply Chain , 2013, 2013 International Conference on Social Computing.

[101]  Katia Obraczka,et al.  Energy-efficient collision-free medium access control for wireless sensor networks , 2003, SenSys '03.

[102]  Ming Cao,et al.  Swarm Intelligence Algorithms for Weapon-Target Assignment in a Multilayer Defense Scenario: A Comparative Study , 2020, Symmetry.

[103]  Keke Gai,et al.  Cost-Aware Multimedia Data Allocation for Heterogeneous Memory Using Genetic Algorithm in Cloud Computing , 2020, IEEE Transactions on Cloud Computing.

[104]  John H. Hartman,et al.  The Swarm scalable storage system , 1999, Proceedings. 19th IEEE International Conference on Distributed Computing Systems (Cat. No.99CB37003).

[105]  Ganesh Chandra Deka,et al.  Handbook of Research on Securing Cloud-Based Databases with Biometric Applications , 2014 .

[106]  Donghai Guan,et al.  Optimized Trust-Aware Recommender System using Genetic Algorithm , 2017 .

[107]  Saurabh Shah,et al.  Exploration of Vulnerabilities, Threats and Forensic Issues and its impact on the Distributed Environment of Cloud and its mitigation , 2020 .

[108]  PanQuan-Ke,et al.  An improved fruit fly optimization algorithm for solving the multidimensional knapsack problem , 2017 .

[109]  Ali Balador,et al.  Malicious Node Detection in Vehicular Ad-Hoc Network Using Machine Learning and Deep Learning , 2018, 2018 IEEE Globecom Workshops (GC Wkshps).

[110]  Dipankar Dasgupta,et al.  Shamir's Secret Sharing for Authentication without Reconstructing Password , 2020, 2020 10th Annual Computing and Communication Workshop and Conference (CCWC).

[111]  Joydev Ghosh,et al.  Features Extraction for Network Intrusion Detection Using Genetic Algorithm (GA) , 2020 .

[112]  Wen-Guey Tzeng,et al.  A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy , 2002, IEEE Trans. Knowl. Data Eng..

[113]  Georgios Kambourakis,et al.  Dendron : Genetic trees driven rule induction for network intrusion detection systems , 2018, Future Gener. Comput. Syst..

[114]  John Zic,et al.  A Cloud Architecture of Virtual Trusted Platform Modules , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[115]  Sungzoon Cho,et al.  GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification , 2003, Proceedings of the International Joint Conference on Neural Networks, 2003..

[116]  Yi Yue,et al.  Traffic-Aware and Reliability-Guaranteed Virtual Machine Placement Optimization in Cloud Datacenters , 2019, 2019 IEEE 12th International Conference on Cloud Computing (CLOUD).

[117]  Zijing Mao,et al.  EEG-based biometric identification with convolutional neural network , 2019, Multimedia Tools and Applications.

[118]  Michael L. Littman,et al.  Packet Routing in Dynamically Changing Networks: A Reinforcement Learning Approach , 1993, NIPS.

[119]  Lathies Bhasker Genetically derived secure cluster-based data aggregation in wireless sensor networks , 2014, IET Inf. Secur..

[120]  Xiaoping Wu,et al.  Cloud Computing System Based on Trusted Computing Platform , 2010, 2010 International Conference on Intelligent Computation Technology and Automation.

[121]  Hussein Al-Zoubi Efficient Task Scheduling for Applications on Clouds , 2019, 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom).

[122]  Nour Moustafa,et al.  Enhancing network forensics with particle swarm and deep learning: The particle deep framework , 2020, 7th International Conference on Artificial Intelligence and Applications.

[123]  Dipankar Dasgupta,et al.  An Investigation of Negative Authentication Systems 1 , 2008 .

[124]  Siyang Zhang,et al.  A novel hybrid KPCA and SVM with GA model for intrusion detection , 2014, Appl. Soft Comput..

[125]  Ahmed Aliyu,et al.  Energy-efficient Virtual Machine Allocation Technique Using Flower Pollination Algorithm in Cloud Datacenter: A Panacea to Green Computing , 2019, Journal of Bionic Engineering.

[126]  F. Xu,et al.  A broker-assisting trust and reputation system based on artificial neural network , 2009, 2009 IEEE International Conference on Systems, Man and Cybernetics.

[127]  Gurpreet Singh Chhabra,et al.  Efficient fuzzy ant colony-based multipath QoS aware routing protocol in mobile ad hoc network , 2018 .

[128]  Yuanman Li,et al.  Privacy-Preserving distributed deep learning based on secret sharing , 2020, Inf. Sci..

[129]  Osman Ghazali,et al.  Trust Management in Cloud Computing: A Critical Review , 2012, ArXiv.

[130]  Guangyi Cao,et al.  Topology-aware multi-objective virtual machine dynamic consolidation for cloud datacenter , 2019, Sustain. Comput. Informatics Syst..

[131]  Susan M. Bridges,et al.  FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION , 2002 .

[132]  Jun Zhang,et al.  An Energy Efficient Ant Colony System for Virtual Machine Placement in Cloud Computing , 2018, IEEE Transactions on Evolutionary Computation.

[133]  Manoj Duhan,et al.  An effective implementation of security based algorithmic approach in mobile adhoc networks , 2014, Human-centric Computing and Information Sciences.

[134]  Muddassar Farooq,et al.  Routing Protocols for Next-Generation Networks Inspired by Collective Behaviors of Insect Societies: An Overview , 2008, Swarm Intelligence.

[135]  Ahmet Burak Can,et al.  GenTrust: A genetic trust management model for peer-to-peer systems , 2015, Appl. Soft Comput..

[136]  NamUk Kim,et al.  Attribute Relationship Evaluation Methodology for Big Data Security , 2013, 2013 International Conference on IT Convergence and Security (ICITCS).

[137]  Dipankar Dasgupta,et al.  Smart Crowdsourcing Based Content Review System (SCCRS): An Approach to Improve Trustworthiness of Online Contents , 2018, CSoNet.

[138]  Maolin Tang,et al.  A Hybrid Genetic Algorithm for the Energy-Efficient Virtual Machine Placement Problem in Data Centers , 2014, Neural Processing Letters.

[139]  D. P. Gaikwad,et al.  Real time hybrid intrusion detection system using signature matching algorithm and fuzzy-GA , 2016, 2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT).

[140]  Rodrigo Roman,et al.  Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..

[141]  Tao Wang,et al.  EEG Signal Processing Based on Genetic Algorithm for Extracting Mixed Features , 2019, Int. J. Pattern Recognit. Artif. Intell..

[142]  Min Lei,et al.  MTBAC: A mutual trust based access control model in Cloud computing , 2014, China Communications.

[143]  Nina H. Fefferman,et al.  A Case Study in Tailoring a Bio-Inspired Cyber-Security Algorithm: Designing Anomaly Detection for Multilayer Networks , 2018, 2018 IEEE Security and Privacy Workshops (SPW).

[144]  Sangjin Lee,et al.  Digital forensic investigation of cloud storage services , 2012, Digit. Investig..

[145]  Basem E. Elnaghi,et al.  Osmotic Bio-Inspired Load Balancing Algorithm in Cloud Computing , 2019, IEEE Access.

[146]  Xu Sun,et al.  A Security Aware Fuzzy Enhanced Reliable Ant Colony Optimization Routing in Vehicular Ad hoc Networks , 2018, 2018 IEEE Intelligent Vehicles Symposium (IV).

[147]  Oleg Starostenko,et al.  Intrusion Detection and Classification of Attacks in High-Level Network Protocols Using Recurrent Neural Networks , 2008, TeNe.

[148]  Yuanquan Shi,et al.  Anomaly Detection for Network Flow Using Immune Network and Density Peak , 2020, Int. J. Netw. Secur..

[149]  Dhananjay Singh,et al.  Developing a Cloud Computing Data Center Virtual Machine Consolidation Based on Multi-objective Hybrid Fruit-fly Cuckoo Search Algorithm , 2018, 2018 IEEE 5G World Forum (5GWF).

[150]  JoyceRick,et al.  Identity authentication based on keystroke latencies , 1990 .