{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T10:21:21Z","timestamp":1777890081911,"version":"3.51.4"},"reference-count":23,"publisher":"SAGE Publications","issue":"3-4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["MGS"],"published-print":{"date-parts":[[2023,2,3]]},"abstract":"<jats:p>The tremendous development and rapid evolution in computing advancements has urged a lot of organizations to expand their data as well as computational needs. Such type of services offers security concepts like confidentiality, integrity, and availability. Thus, a highly secured domain is the fundamental need of cloud environments. In addition, security breaches are also growing equally in the cloud because of the sophisticated services of the cloud, which cannot be mitigated efficiently through firewall rules and packet filtering methods. In order to mitigate the malicious attacks and to detect the malicious behavior with high detection accuracy, an effective strategy named Multiverse Fractional Calculus (MFC) based hybrid deep learning approach is proposed. Here, two network classifiers namely Hierarchical Attention Network (HAN) and Random Multimodel Deep Learning (RMDL) are employed to detect the presence of malicious behavior. The network classifier is trained by exploiting proposed MFC, which is an integration of multi-verse optimizer and fractional calculus. The proposed MFC-based hybrid deep learning approach has attained superior results with utmost testing sensitivity, accuracy, and specificity of 0.949, 0.939, and 0.947.<\/jats:p>","DOI":"10.3233\/mgs-220214","type":"journal-article","created":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T11:59:06Z","timestamp":1675166346000},"page":"193-217","source":"Crossref","is-referenced-by-count":3,"title":["Multiverse fractional calculus based hybrid deep learning and fusion approach for detecting malicious behavior in cloud computing environment"],"prefix":"10.1177","volume":"18","author":[{"given":"Chandra Sekhar","family":"Kolli","sequence":"first","affiliation":[{"name":"Department of Computer Science, GITAM School of Science, Gandhi Institute of Technology and Management, Visakhapatnam, Andhra Pradesh, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nihar M.","family":"Ranjan","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Rajarshi Shahu College of Engineering, Pune, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dharani Kumar","family":"Talapula","sequence":"additional","affiliation":[{"name":"SoCS, University of Petroleum and Energy Studies, Dehradun, Uttarakhand, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Vikram S.","family":"Gawali","sequence":"additional","affiliation":[{"name":"Department of Electronics and Telecommunication Engineering, Government College of Engineering, Chandrapur, Maharashtra, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Siddhartha Sankar","family":"Biswas","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, School of Engineering Sciences and Technology, Jamia Hamdard, New Delhi, India"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"179","reference":[{"key":"10.3233\/MGS-220214_ref1","doi-asserted-by":"crossref","first-page":"102507","DOI":"10.1016\/j.jnca.2019.102507","article-title":"A hybrid machine learning approach for malicious behaviour detection and recognition in cloud computing","volume":"151","author":"Rabbani","year":"2020","journal-title":"Journal of Network and Computer Applications"},{"issue":"2","key":"10.3233\/MGS-220214_ref3","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1007\/s11277-020-07608-4","article-title":"Development of Reinforcement Learning and Pattern Matching (RLPM) Based Firewall for Secured Cloud Infrastructure","volume":"115","author":"Praise","year":"2020","journal-title":"Wireless Personal Communications"},{"key":"10.3233\/MGS-220214_ref4","doi-asserted-by":"crossref","first-page":"101646","DOI":"10.1016\/j.cose.2019.101646","article-title":"Hypervisor-based cloud intrusion detection through online multivariate statistical change tracking","volume":"88","author":"Aldribi","year":"2020","journal-title":"Computers & Security"},{"issue":"24","key":"10.3233\/MGS-220214_ref5","doi-asserted-by":"crossref","first-page":"5922","DOI":"10.1002\/cpe.5922","article-title":"An intrusion detection algorithm based on bag representation with ensemble support vector machine in cloud computing","volume":"32","author":"Wei","year":"2020","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"10.3233\/MGS-220214_ref7","doi-asserted-by":"crossref","first-page":"3221","DOI":"10.1007\/s10586-020-03082-6","article-title":"FCM\u2013SVM based intrusion detection system for cloud computing environment","volume":"23","author":"Jaber","year":"2020","journal-title":"Cluster Computing"},{"key":"10.3233\/MGS-220214_ref8","doi-asserted-by":"crossref","unstructured":"V. Ravindranath, S. Ramasamy, R. Somula, K.S. Sahoo and A.H. Gandomi, Swarm intelligence based feature selection for intrusion and detection system in cloud infrastructure, in: IEEE Congress on Evolutionary Computation (CEC), Glasgow, UK, Date of Conference: 19\u201324 July, 2020, pp. 1\u20136.","DOI":"10.1109\/CEC48606.2020.9185887"},{"issue":"2","key":"10.3233\/MGS-220214_ref9","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-981-13-5934-7","article-title":"Detection of online malicious behavior: An overview, Ambient communications and computer systems","volume":"904","author":"Deshpande","year":"2019","journal-title":"Advances in Intelligent Systems and Computing"},{"issue":"4","key":"10.3233\/MGS-220214_ref10","first-page":"179","article-title":"Attacks and intrusion detection in cloud computing using neural networks and particle swarm optimization algorithms","volume":"1","author":"Saljoughi","year":"2017","journal-title":"Emerging Science Journal"},{"key":"10.3233\/MGS-220214_ref11","doi-asserted-by":"crossref","unstructured":"Z. Yang, D. Yang, C. Dyer, X. He, A. Smola and E. Hovy, Hierarchical attention networks for document classification, in: Proceedings of the 2016 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, NAACL, San Diego, California, 2016, pp. 1480\u20131489.","DOI":"10.18653\/v1\/N16-1174"},{"key":"10.3233\/MGS-220214_ref12","doi-asserted-by":"crossref","unstructured":"K. Kowsari, M. Heidarysafa, D.E. Brown, K.J. Meimandi and L.E. Barnes, Rmdl: Random multimodel deep learning for classification, in: Proceedings of the 2nd International Conference on Information System and Data Mining, Lakeland FL USA April 9 \u2013 11, 2018, pp. 19\u201328.","DOI":"10.1145\/3206098.3206111"},{"issue":"2","key":"10.3233\/MGS-220214_ref13","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1007\/s00521-015-1870-7","article-title":"Multi-verse optimizer: A nature-inspired algorithm for global optimization","volume":"27","author":"Mirjalili","year":"2016","journal-title":"Neural Computing and Applications"},{"issue":"1\u20132","key":"10.3233\/MGS-220214_ref17","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1016\/S0004-3702(97)00043-X","article-title":"Wrappers for feature subset selection","volume":"97","author":"Kohavi","year":"1997","journal-title":"Artificial Intelligence"},{"issue":"4","key":"10.3233\/MGS-220214_ref18","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1002\/wics.101","article-title":"Principal component analysis","volume":"2","author":"Abdi","year":"2010","journal-title":"Wiley Interdisciplinary Reviews: Computational Statistics"},{"issue":"10","key":"10.3233\/MGS-220214_ref19","doi-asserted-by":"crossref","first-page":"2986","DOI":"10.1109\/TC.2016.2519914","article-title":"Building an intrusion detection system using a filter-based feature selection algorithm","volume":"65","author":"Ambusaidi","year":"2016","journal-title":"IEEE Transactions on Computers"},{"issue":"1","key":"10.3233\/MGS-220214_ref20","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1109\/SURV.2013.052213.00046","article-title":"Network anomaly detection: Methods, systems and tools","volume":"16","author":"Bhuyan","year":"2013","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"10.3233\/MGS-220214_ref21","doi-asserted-by":"crossref","unstructured":"S. Binu and M. Misbahuddin, A survey of traditional and cloud specific security issues, in: International Symposium on Security in Computing and Communication, Springer, Berlin, Heidelberg, 2013, pp. 110\u2013129.","DOI":"10.1007\/978-3-642-40576-1_12"},{"key":"10.3233\/MGS-220214_ref22","doi-asserted-by":"crossref","unstructured":"N. Jain, S. Pawar and D. Kalbande, Network security analyzer: Detection and prevention of web attacks, in: Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems, Springer, Cham, Vol. 1, 2016, pp. 497\u2013505.","DOI":"10.1007\/978-3-319-30933-0_50"},{"issue":"2","key":"10.3233\/MGS-220214_ref24","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1080\/13682199.2017.1376781","article-title":"Automatic text classification using BPLion-neural network and semantic word processing","volume":"66","author":"Ranjan","year":"2018","journal-title":"The Imaging Science Journal"},{"key":"10.3233\/MGS-220214_ref25","doi-asserted-by":"crossref","first-page":"994","DOI":"10.1016\/j.asoc.2018.07.016","article-title":"LFNN: Lion fuzzy neural network-based evolutionary model for text classification using context and sense based features","volume":"71","author":"Ranjan","year":"2018","journal-title":"Applied Soft Computing"},{"issue":"1","key":"10.3233\/MGS-220214_ref26","first-page":"587","article-title":"Evolutionary and incremental text document classifier using deep learning","volume":"14","author":"Ranjan","year":"2021","journal-title":"International Journal of Grid and Distributed Computing"},{"key":"10.3233\/MGS-220214_ref27","first-page":"25246","article-title":"A brief survey of machine learning algorithms for text document classification on incremental database","volume":"83","author":"Ranjan","year":"2020","journal-title":"Test Engineering and Management"},{"issue":"2","key":"10.3233\/MGS-220214_ref28","first-page":"19","article-title":"Face image forgery detection by weight optimized neural network model","volume":"2","author":"Cristin","year":"2019","journal-title":"Multimedia Research"},{"issue":"1","key":"10.3233\/MGS-220214_ref29","first-page":"21","article-title":"Image forgery detection using back propagation neural network model and particle swarm optimization algorithm","volume":"3","author":"Cristin","year":"2020","journal-title":"Multimedia Research"}],"container-title":["Multiagent and Grid Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/MGS-220214","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T05:28:53Z","timestamp":1777613333000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/MGS-220214"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,3]]},"references-count":23,"journal-issue":{"issue":"3-4"},"URL":"https:\/\/doi.org\/10.3233\/mgs-220214","relation":{},"ISSN":["1875-9076","1574-1702"],"issn-type":[{"value":"1875-9076","type":"electronic"},{"value":"1574-1702","type":"print"}],"subject":[],"published":{"date-parts":[[2023,2,3]]}}}