Evolutionary gravitational neocognitron neural network espoused blockchain-based intrusion detection framework for enhancing cybersecurity in a cloud computing environment
Cloud computing offers scalable, on-demand resources but remains highly vulnerable to cyberattacks, where the nonlinear and dynamic nature of network traffic makes detection especially challenging. This study introduces EGNNN-GROA-BGPoW-IDS-CC, a novel intrusion detection framework that explicitly a...
Uloženo v:
| Vydáno v: | Ain Shams Engineering Journal Ročník 16; číslo 12; s. 103805 |
|---|---|
| Hlavní autoři: | , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Elsevier B.V
01.12.2025
|
| Témata: | |
| ISSN: | 2090-4479 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Cloud computing offers scalable, on-demand resources but remains highly vulnerable to cyberattacks, where the nonlinear and dynamic nature of network traffic makes detection especially challenging. This study introduces EGNNN-GROA-BGPoW-IDS-CC, a novel intrusion detection framework that explicitly addresses the nonlinear complexities of attack patterns by integrating deep neural modeling, evolutionary optimization, and blockchain technology. Central to the system is the Evolutionary Gravitational Neocognitron Neural Network (EGNNN), capable of learning nonlinear feature hierarchies, and optimized using the GarraRufa Fish Optimization Algorithm (GROA) for enhanced detection accuracy. Input data from the NSL-KDD dataset are preprocessed using the Developed Random Forest with Local Least Squares (DRFLLS) to reduce noise and nonlinear redundancy, followed by feature selection through the Dynamic Recursive Feature Selection Algorithm (DRFSA) to capture the most influential nonlinear dependencies. For secure alert logging, a Blockchain-based Green Proof of Work (BGPoW) ensures lightweight, tamper-proof consensus while maintaining energy efficiency. Implemented in Python, the proposed model demonstrates superior performance, outperforming state-of-the-art systems such as BiLSTM-DBF-IDS-CC and DBN-ResNet-IDS-CC, with accuracy improvements of 32.76% and 15.78%, respectively. Overall, EGNNN-GROA-BGPoW-IDS-CC presents a high-performance, energy-efficient solution that explicitly addresses the nonlinear behavior of cyber threats, thereby advancing sustainable cybersecurity in cloud environments. |
|---|---|
| AbstractList | Cloud computing offers scalable, on-demand resources but remains highly vulnerable to cyberattacks, where the nonlinear and dynamic nature of network traffic makes detection especially challenging. This study introduces EGNNN-GROA-BGPoW-IDS-CC, a novel intrusion detection framework that explicitly addresses the nonlinear complexities of attack patterns by integrating deep neural modeling, evolutionary optimization, and blockchain technology. Central to the system is the Evolutionary Gravitational Neocognitron Neural Network (EGNNN), capable of learning nonlinear feature hierarchies, and optimized using the GarraRufa Fish Optimization Algorithm (GROA) for enhanced detection accuracy. Input data from the NSL-KDD dataset are preprocessed using the Developed Random Forest with Local Least Squares (DRFLLS) to reduce noise and nonlinear redundancy, followed by feature selection through the Dynamic Recursive Feature Selection Algorithm (DRFSA) to capture the most influential nonlinear dependencies. For secure alert logging, a Blockchain-based Green Proof of Work (BGPoW) ensures lightweight, tamper-proof consensus while maintaining energy efficiency. Implemented in Python, the proposed model demonstrates superior performance, outperforming state-of-the-art systems such as BiLSTM-DBF-IDS-CC and DBN-ResNet-IDS-CC, with accuracy improvements of 32.76% and 15.78%, respectively. Overall, EGNNN-GROA-BGPoW-IDS-CC presents a high-performance, energy-efficient solution that explicitly addresses the nonlinear behavior of cyber threats, thereby advancing sustainable cybersecurity in cloud environments. |
| ArticleNumber | 103805 |
| Author | Prem Jacob, T. Ravi Kanth, R. |
| Author_xml | – sequence: 1 givenname: R. surname: Ravi Kanth fullname: Ravi Kanth, R. email: ravi.kranthi787@gmail.com – sequence: 2 givenname: T. surname: Prem Jacob fullname: Prem Jacob, T. email: premjac@yahoo.com |
| BookMark | eNp9kMtuwyAQRVmkUtM0P9AVP-AUPyC21E0VpQ8pUjftGuHxOCGxIQKcKt_UnyxOuu4K5opzGZ07MjHWICEPKVukLBWP-4XyuF9kLOMxyEvGJ2SasYolRbGsbsnce12zeM9KXvIp-VmfbDcEbY1yZ7p16qSDuowdNWjBbo0Ozpo4DO6ShW_rDhT90Q4eG1p3Fg6wU9oktRoDbYIbfGygDQaEsYu2TvV44VrrKJqdMqDNlsK5RucRBqfDOZJUUejs0FCw_TFuFZ-gOen4f48m3JObVnUe53_njHy9rD9Xb8nm4_V99bxJIKuWISmUQCYaTLEVRaFq1gLwSvE8FXmT8aUQNZSgIC9FiVXVFm3VKFHWFQLnucjyGcmuveCs9w5beXS6j35kyuRoWe7laFmOluXVcoSerhDGzU4anfSg0QA22kULsrH6P_wXMu2RdQ |
| Cites_doi | 10.1007/s00500-019-03972-x 10.1007/s11042-019-7301-5 10.1002/cpe.8252 10.1002/cpe.8091 10.1007/s11227-021-03825-1 10.1016/j.jpdc.2020.12.015 10.1007/s10586-024-04351-4 10.28991/HIJ-2024-05-02-014 10.1016/j.aml.2025.109615 10.1109/JIOT.2021.3088115 10.1109/JIOT.2020.2996590 10.1016/j.cosrev.2020.100312 10.3390/fi17010049 10.1007/s11831-021-09573-y 10.1109/IOTM.1021.2000160 10.28991/ESJ-2024-08-04-06 10.1109/ACCESS.2021.3098795 10.1109/ACCESS.2020.3010789 10.1002/nem.2296 10.28991/ESJ-2024-08-06-011 10.1016/j.compeleceng.2021.107209 10.1007/s13344-025-0057-y 10.1109/TEM.2020.3045661 10.1007/s11227-020-03313-y 10.1002/int.22274 10.1109/ACCESS.2021.3077123 10.1016/j.comnet.2022.109118 10.1155/2022/3999039 10.1109/ACCESS.2023.3349019 10.1016/j.jpdc.2021.03.011 10.1016/j.compeleceng.2021.107044 10.1049/iet-com.2019.0172 |
| ContentType | Journal Article |
| Copyright | 2025 The Authors |
| Copyright_xml | – notice: 2025 The Authors |
| DBID | 6I. AAFTH AAYXX CITATION |
| DOI | 10.1016/j.asej.2025.103805 |
| DatabaseName | ScienceDirect Open Access Titles Elsevier:ScienceDirect:Open Access CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| ExternalDocumentID | 10_1016_j_asej_2025_103805 S2090447925005465 |
| GroupedDBID | 6I. AAFTH ALMA_UNASSIGNED_HOLDINGS M~E AAYXX CITATION |
| ID | FETCH-LOGICAL-c297t-4a6e06de1ef644ab0fcc59a53163d25766bc8cac3868e99f4f9da68b9ec553623 |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001603311300001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2090-4479 |
| IngestDate | Sat Oct 25 05:23:33 EDT 2025 Sat Nov 15 16:53:17 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 12 |
| Keywords | Cloud computing EGNNN ABC DBF DoS SVM IoT ResNet MLP DBN LLS QoS Blockchain Green Proof of Work (BGPoW) XGBoost IDS SRCC GA GROA GWO SSA Nonlinear attack patterns Evolutionary Gravitational Neocognitron Neural Network (EGNNN) DRFSA Dynamic Recursive Feature Selection Algorithm (DRFSA) Intrusion Detection Systems (IDS) HEPDA HCD GarraRufa Fish Optimization (GROA) Cybersecurity BiLSTM PSO R2L BGPoW PCC RST WSN U2R DRFLLS PPSC BCAI |
| Language | English |
| License | This is an open access article under the CC BY-NC-ND license. |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c297t-4a6e06de1ef644ab0fcc59a53163d25766bc8cac3868e99f4f9da68b9ec553623 |
| OpenAccessLink | https://dx.doi.org/10.1016/j.asej.2025.103805 |
| ParticipantIDs | crossref_primary_10_1016_j_asej_2025_103805 elsevier_sciencedirect_doi_10_1016_j_asej_2025_103805 |
| PublicationCentury | 2000 |
| PublicationDate | December 2025 2025-12-00 |
| PublicationDateYYYYMMDD | 2025-12-01 |
| PublicationDate_xml | – month: 12 year: 2025 text: December 2025 |
| PublicationDecade | 2020 |
| PublicationTitle | Ain Shams Engineering Journal |
| PublicationYear | 2025 |
| Publisher | Elsevier B.V |
| Publisher_xml | – name: Elsevier B.V |
| References | Al-Janabi, Alkaim (b0115) 2020; 24 Kshirsagar, Kumar (b0015) 2022 Mansouri, Ali Babar (b0045) 2021; 150 Vakili, Al-Khafaji, Darbandi, Heidari, Jafari Navimipour, Unal (b0180) 2024; 36 Touqeer, Zaman, Amin, Hussain, Al-Turjman, Bilal (b0050) 2021; 77 Kuznetsov, Sernani, Romeo, Frontoni, Mancini (b0080) 2024; 12 Megouache, Zitouni, Djoudi (b0020) 2020; 10 Singh, Masud, Shamim Hossain, Kaur (b0165) 2021; 93 Zaqeeba, Alqudah, Rawashdeh, Lutfi, Alrawad, Almaiah (b0105) 2024; 5 Heidari, Shishehlou, Darbandi, Navimipour, Yalcin (b0185) 2024; 27 Deebak, TurjmanFadi (b0150) 2021; 58 Nancy, Muthurajkumar, Ganapathy, SanthoshKumar, Selvi, Arputharaj (b0120) 2020; 14 Lasla, Al-Sahan, Abdallah, Younis (b0135) 2022; 214 NSL-KDD dataset. [Online]. Available: https://www.unb.ca/cic/datasets/nsl.html. Alkadi, Moustafa, Turnbull, Choo (b0140) 2020; 8 Rana, Batra, Malik, Imoize, Kim, Pani, Goyal, Kumar, Rho (b0175) 2022; 2022 Gadekallu, Manoj, Kumar, Hakak, Bhattacharya (b0085) 2021; 4 Shamshirband, Fathi, Chronopoulos, Montieri, Palumbo, Pescapè (b0065) 2020; 55 Qashlan, Nanda, He, Mohanty (b0170) 2021; 9 Ramírez-Gordillo, Maciá-Lillo, Pujol, García-D’Urso, Azorín-López, Mora (b0075) 2025; 17 Awadallah, Samsudin, Teh, Almazrooie (b0155) 2021; 9 Awaysheh, Aladwan, Alazab, Alawadi, Cabaleiro, Pena (b0010) 2021; 69 Alzubi, Alzubi, Qiqieh, Al-Zoubi (b0195) 2025; 35 Gao (b0095) 2025; 39 Krishnaveni, Palani Vigneshwar, Kishore, Sivamohan (b0040) 2020 Hammami, Yahia, Obaidat (b0030) 2021; 77 Gomathi, Baskar, Mohamed Shakeel, Dhulipala (b0125) 2020; 79 El Kafhali, El Mir, Hanini (b0035) 2022; 29 Latif, Idrees, Ahmad, Zheng, Zou (b0005) 2021; 21 Halkiopoulos, Papadopoulos, Stamatiou, Theodorakopoulos, Vlachos (b0100) 2024; 8 Nguyen, Viet, Mohamed Elhoseny, Gupta, Abd El-Latif (b0145) 2021; 153 Yoo, Jo, Kim, Seo (b0070) 2020; 8 Ogonji, Okeyo, Wafula (b0025) 2020; 38 Thakur, Chakraborty, De, Kumar, Sarkar (b0060) 2021; 91 Gao, Liu, Wang (b0090) 2025; 171 Alsumayt A. BSHPC: Improve Big Data Privacy Based on Blockchain and High-Performance Computing (HPC); 2024. doi: 10.28991/ESJ-2024-08-06-011. Heidari, Amiri, Jamali, Jafari (b0190) 2024; 36 Chattaraj, Bera, Das, Rodrigues, Park (b0055) 2021; 9 Jaber, Abdulbari, Shalash, Abdalla (b0130) 2020; 35 Yadav, Sharma, Kumar, Arora (b0160) 2022 Vakili (10.1016/j.asej.2025.103805_b0180) 2024; 36 Ramírez-Gordillo (10.1016/j.asej.2025.103805_b0075) 2025; 17 Jaber (10.1016/j.asej.2025.103805_b0130) 2020; 35 Qashlan (10.1016/j.asej.2025.103805_b0170) 2021; 9 El Kafhali (10.1016/j.asej.2025.103805_b0035) 2022; 29 Touqeer (10.1016/j.asej.2025.103805_b0050) 2021; 77 Ogonji (10.1016/j.asej.2025.103805_b0025) 2020; 38 Gao (10.1016/j.asej.2025.103805_b0090) 2025; 171 Nancy (10.1016/j.asej.2025.103805_b0120) 2020; 14 Yoo (10.1016/j.asej.2025.103805_b0070) 2020; 8 10.1016/j.asej.2025.103805_b0110 Hammami (10.1016/j.asej.2025.103805_b0030) 2021; 77 Gadekallu (10.1016/j.asej.2025.103805_b0085) 2021; 4 Nguyen (10.1016/j.asej.2025.103805_b0145) 2021; 153 Deebak (10.1016/j.asej.2025.103805_b0150) 2021; 58 Krishnaveni (10.1016/j.asej.2025.103805_b0040) 2020 Al-Janabi (10.1016/j.asej.2025.103805_b0115) 2020; 24 Shamshirband (10.1016/j.asej.2025.103805_b0065) 2020; 55 Latif (10.1016/j.asej.2025.103805_b0005) 2021; 21 Kuznetsov (10.1016/j.asej.2025.103805_b0080) 2024; 12 Rana (10.1016/j.asej.2025.103805_b0175) 2022; 2022 Zaqeeba (10.1016/j.asej.2025.103805_b0105) 2024; 5 Heidari (10.1016/j.asej.2025.103805_b0190) 2024; 36 Gao (10.1016/j.asej.2025.103805_b0095) 2025; 39 Gomathi (10.1016/j.asej.2025.103805_b0125) 2020; 79 Alkadi (10.1016/j.asej.2025.103805_b0140) 2020; 8 Megouache (10.1016/j.asej.2025.103805_b0020) 2020; 10 Singh (10.1016/j.asej.2025.103805_b0165) 2021; 93 Yadav (10.1016/j.asej.2025.103805_b0160) 2022 Awadallah (10.1016/j.asej.2025.103805_b0155) 2021; 9 Chattaraj (10.1016/j.asej.2025.103805_b0055) 2021; 9 Halkiopoulos (10.1016/j.asej.2025.103805_b0100) 2024; 8 Mansouri (10.1016/j.asej.2025.103805_b0045) 2021; 150 Heidari (10.1016/j.asej.2025.103805_b0185) 2024; 27 Awaysheh (10.1016/j.asej.2025.103805_b0010) 2021; 69 Kshirsagar (10.1016/j.asej.2025.103805_b0015) 2022 Lasla (10.1016/j.asej.2025.103805_b0135) 2022; 214 Thakur (10.1016/j.asej.2025.103805_b0060) 2021; 91 10.1016/j.asej.2025.103805_b0200 Alzubi (10.1016/j.asej.2025.103805_b0195) 2025; 35 |
| References_xml | – volume: 8 start-page: 1320 year: 2024 end-page: 1344 ident: b0100 article-title: A digital service for citizens: Multi-parameter optimization model for cost-benefit analysis of cybercrime and cyberdefense publication-title: Emerg Sci J – volume: 9 start-page: 69513 year: 2021 end-page: 69526 ident: b0155 article-title: An integrated architecture for maintaining security in cloud computing based on blockchain publication-title: IEEE Access – volume: 14 start-page: 888 year: 2020 end-page: 895 ident: b0120 article-title: Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks publication-title: IET Commun – volume: 27 start-page: 7521 year: 2024 end-page: 7539 ident: b0185 article-title: A reliable method for data aggregation on the industrial internet of things using a hybrid optimization algorithm and density correlation degree publication-title: Clust Comput – volume: 9 start-page: 103651 year: 2021 end-page: 103669 ident: b0170 article-title: Privacy-preserving mechanism in smart home using blockchain publication-title: IEEE Access – volume: 150 start-page: 155 year: 2021 end-page: 183 ident: b0045 article-title: A review of edge computing: Features and resource virtualization publication-title: J Parallel Distribut Comput – start-page: 1 year: 2022 end-page: 22 ident: b0160 article-title: Blockchain-based synergistic solution to current cybersecurity frameworks publication-title: Multimed Tools Appl – volume: 55 year: 2020 ident: b0065 article-title: Computational intelligence intrusion detection techniques in mobile cloud computing environments: review, taxonomy, and open research issues publication-title: J Inform Secur Appl – volume: 171 year: 2025 ident: b0090 article-title: Inhomogeneity, magnetic auto-Bäcklund transformations and magnetic solitons for a generalized variable-coefficient Kraenkel-Manna-Merle system in a deformed ferrite publication-title: Appl Math Lett – volume: 24 start-page: 555 year: 2020 end-page: 569 ident: b0115 article-title: A nifty collaborative analysis to predicting a novel tool (DRFLLS) for missing values estimation publication-title: Soft Comput – volume: 153 start-page: 150 year: 2021 end-page: 160 ident: b0145 article-title: Secure blockchain enabled Cyber–physical systems in healthcare using deep belief network with ResNet model publication-title: J Parallel Distrib Comput – volume: 39 start-page: 541 year: 2025 end-page: 547 ident: b0095 article-title: Open-ocean shallow-water dynamics via a (2+1)-dimensional generalized variable-coefficient hirota-satsuma-ito system: oceanic auto- bäcklund transformation and oceanic solitons publication-title: China Ocean Eng – volume: 214 year: 2022 ident: b0135 article-title: Green-PoW: an energy-efficient blockchain Proof-of-Work consensus algorithm publication-title: Comput Netw – volume: 91 year: 2021 ident: b0060 article-title: Intrusion detection in cyber-physical systems using a generic and domain specific deep autoencoder model publication-title: Comput Electr Eng – volume: 5 start-page: 420 year: 2024 end-page: 430 ident: b0105 article-title: The measurement of blockchain technology in financial reports in commercial banks publication-title: HighTech Innov J – volume: 69 start-page: 3676 year: 2021 end-page: 3693 ident: b0010 article-title: Security by design for big data frameworks over cloud computing publication-title: IEEE Trans Eng Manag – volume: 8 start-page: 133865 year: 2020 end-page: 133881 ident: b0070 article-title: Hyperion: a visual analytics tool for an intrusion detection and prevention system publication-title: IEEE Access – volume: 8 start-page: 9463 year: 2020 end-page: 9472 ident: b0140 article-title: A deep blockchain framework-enabled collaborative intrusion detection for protecting IoT and cloud networks publication-title: IEEE Internet Things J – volume: 36 start-page: e8091 year: 2024 ident: b0180 article-title: A new service composition method in the cloud‐based internet of things environment using a grey wolf optimization algorithm and MapReduce framework publication-title: Concurrency Comput Pract Exper – volume: 4 start-page: 30 year: 2021 end-page: 33 ident: b0085 article-title: Blockchain-based attack detection on machine learning algorithms for IoT-based e-health applications publication-title: IEEE Internet Things Mag – volume: 58 year: 2021 ident: b0150 article-title: Privacy-preserving in smart contracts using blockchain and artificial intelligence for cyber risk measurements publication-title: J Inform Secur Appl – volume: 79 year: 2020 ident: b0125 article-title: Identifying brain abnormalities from electroencephalogram using evolutionary gravitational neocognitron neural network publication-title: Multimedia Tools Appl – volume: 17 start-page: 49 year: 2025 ident: b0075 article-title: Decentralized identity management for internet of things (iot) devices using iota blockchain technology publication-title: Future Internet – volume: 36 start-page: e8252 year: 2024 ident: b0190 article-title: Assessment of reliability and availability of wireless sensor networks in industrial applications by considering permanent faults publication-title: Concurrency Comput Pract Exper – volume: 21 year: 2021 ident: b0005 article-title: A blockchain-based architecture for secure and trustworthy operations in the industrial internet of things publication-title: J Ind Inf Integr – volume: 9 start-page: 1542 year: 2021 end-page: 1559 ident: b0055 article-title: Designing fine-grained access control for software-defined networks using private blockchain publication-title: IEEE Internet Things J – volume: 77 start-page: 1693 year: 2021 end-page: 1713 ident: b0030 article-title: A lightweight anonymous authentication scheme for secure cloud computing services publication-title: J Supercomput – start-page: 723 year: 2020 end-page: 731 ident: b0040 article-title: Anomaly based intrusion detection system using support vector machine publication-title: Artificial Intelligence and Evolutionary Computations in Engineering Systems – volume: 35 start-page: e2296 year: 2025 ident: b0195 article-title: An IoT intrusion detection approach based on salp swarm and artificial neural network publication-title: Int J Netw Manag – volume: 2022 year: 2022 ident: b0175 article-title: Intrusion detection systems in cloud computing paradigm: Analysis and overview publication-title: Complexity – reference: Alsumayt A. BSHPC: Improve Big Data Privacy Based on Blockchain and High-Performance Computing (HPC); 2024. doi: 10.28991/ESJ-2024-08-06-011. – volume: 93 year: 2021 ident: b0165 article-title: Blockchain and homomorphic encryption-based privacy-preserving data aggregation model in smart grid publication-title: Comput Electr Eng – volume: 38 year: 2020 ident: b0025 article-title: A survey on privacy and security of internet of things publication-title: Comput Sci Rev – volume: 12 start-page: 3881 year: 2024 end-page: 3897 ident: b0080 article-title: On the integration of artificial intelligence and blockchain technology: a perspective about security publication-title: IEEE Access – volume: 77 start-page: 14053 year: 2021 end-page: 14089 ident: b0050 article-title: Smart home security: challenges, issues and solutions at different IoT layers publication-title: J Supercomput – start-page: 1 year: 2022 end-page: 13 ident: b0015 article-title: A feature reduction based reflected and exploited DDoS attacks detection system publication-title: J Ambient Intell Hum Comput – reference: NSL-KDD dataset. [Online]. Available: https://www.unb.ca/cic/datasets/nsl.html. – volume: 29 start-page: 223 year: 2022 end-page: 246 ident: b0035 article-title: Security threats, defense mechanisms, challenges, and future directions in cloud computing publication-title: Arch Comput Meth Eng – volume: 35 start-page: 1831 year: 2020 end-page: 1856 ident: b0130 article-title: Garra Rufa‐inspired optimization technique publication-title: Int J Intell Syst – volume: 10 start-page: 1 year: 2020 end-page: 20 ident: b0020 article-title: Ensuring user authentication and data integrity in multicloud environment publication-title: HCIS – volume: 24 start-page: 555 issue: 1 year: 2020 ident: 10.1016/j.asej.2025.103805_b0115 article-title: A nifty collaborative analysis to predicting a novel tool (DRFLLS) for missing values estimation publication-title: Soft Comput doi: 10.1007/s00500-019-03972-x – volume: 79 year: 2020 ident: 10.1016/j.asej.2025.103805_b0125 article-title: Identifying brain abnormalities from electroencephalogram using evolutionary gravitational neocognitron neural network publication-title: Multimedia Tools Appl doi: 10.1007/s11042-019-7301-5 – volume: 36 start-page: e8252 issue: 27 year: 2024 ident: 10.1016/j.asej.2025.103805_b0190 article-title: Assessment of reliability and availability of wireless sensor networks in industrial applications by considering permanent faults publication-title: Concurrency Comput Pract Exper doi: 10.1002/cpe.8252 – volume: 36 start-page: e8091 issue: 16 year: 2024 ident: 10.1016/j.asej.2025.103805_b0180 article-title: A new service composition method in the cloud‐based internet of things environment using a grey wolf optimization algorithm and MapReduce framework publication-title: Concurrency Comput Pract Exper doi: 10.1002/cpe.8091 – volume: 77 start-page: 14053 issue: 12 year: 2021 ident: 10.1016/j.asej.2025.103805_b0050 article-title: Smart home security: challenges, issues and solutions at different IoT layers publication-title: J Supercomput doi: 10.1007/s11227-021-03825-1 – volume: 150 start-page: 155 year: 2021 ident: 10.1016/j.asej.2025.103805_b0045 article-title: A review of edge computing: Features and resource virtualization publication-title: J Parallel Distribut Comput doi: 10.1016/j.jpdc.2020.12.015 – volume: 58 year: 2021 ident: 10.1016/j.asej.2025.103805_b0150 article-title: Privacy-preserving in smart contracts using blockchain and artificial intelligence for cyber risk measurements publication-title: J Inform Secur Appl – volume: 27 start-page: 7521 issue: 6 year: 2024 ident: 10.1016/j.asej.2025.103805_b0185 article-title: A reliable method for data aggregation on the industrial internet of things using a hybrid optimization algorithm and density correlation degree publication-title: Clust Comput doi: 10.1007/s10586-024-04351-4 – volume: 5 start-page: 420 issue: 2 year: 2024 ident: 10.1016/j.asej.2025.103805_b0105 article-title: The measurement of blockchain technology in financial reports in commercial banks publication-title: HighTech Innov J doi: 10.28991/HIJ-2024-05-02-014 – volume: 21 year: 2021 ident: 10.1016/j.asej.2025.103805_b0005 article-title: A blockchain-based architecture for secure and trustworthy operations in the industrial internet of things publication-title: J Ind Inf Integr – volume: 171 year: 2025 ident: 10.1016/j.asej.2025.103805_b0090 article-title: Inhomogeneity, magnetic auto-Bäcklund transformations and magnetic solitons for a generalized variable-coefficient Kraenkel-Manna-Merle system in a deformed ferrite publication-title: Appl Math Lett doi: 10.1016/j.aml.2025.109615 – volume: 9 start-page: 1542 issue: 2 year: 2021 ident: 10.1016/j.asej.2025.103805_b0055 article-title: Designing fine-grained access control for software-defined networks using private blockchain publication-title: IEEE Internet Things J doi: 10.1109/JIOT.2021.3088115 – volume: 8 start-page: 9463 issue: 12 year: 2020 ident: 10.1016/j.asej.2025.103805_b0140 article-title: A deep blockchain framework-enabled collaborative intrusion detection for protecting IoT and cloud networks publication-title: IEEE Internet Things J doi: 10.1109/JIOT.2020.2996590 – start-page: 1 year: 2022 ident: 10.1016/j.asej.2025.103805_b0160 article-title: Blockchain-based synergistic solution to current cybersecurity frameworks publication-title: Multimed Tools Appl – volume: 38 year: 2020 ident: 10.1016/j.asej.2025.103805_b0025 article-title: A survey on privacy and security of internet of things publication-title: Comput Sci Rev doi: 10.1016/j.cosrev.2020.100312 – volume: 17 start-page: 49 issue: 1 year: 2025 ident: 10.1016/j.asej.2025.103805_b0075 article-title: Decentralized identity management for internet of things (iot) devices using iota blockchain technology publication-title: Future Internet doi: 10.3390/fi17010049 – volume: 29 start-page: 223 issue: 1 year: 2022 ident: 10.1016/j.asej.2025.103805_b0035 article-title: Security threats, defense mechanisms, challenges, and future directions in cloud computing publication-title: Arch Comput Meth Eng doi: 10.1007/s11831-021-09573-y – volume: 4 start-page: 30 issue: 3 year: 2021 ident: 10.1016/j.asej.2025.103805_b0085 article-title: Blockchain-based attack detection on machine learning algorithms for IoT-based e-health applications publication-title: IEEE Internet Things Mag doi: 10.1109/IOTM.1021.2000160 – volume: 10 start-page: 1 year: 2020 ident: 10.1016/j.asej.2025.103805_b0020 article-title: Ensuring user authentication and data integrity in multicloud environment publication-title: HCIS – volume: 8 start-page: 1320 issue: 4 year: 2024 ident: 10.1016/j.asej.2025.103805_b0100 article-title: A digital service for citizens: Multi-parameter optimization model for cost-benefit analysis of cybercrime and cyberdefense publication-title: Emerg Sci J doi: 10.28991/ESJ-2024-08-04-06 – ident: 10.1016/j.asej.2025.103805_b0200 – volume: 9 start-page: 103651 year: 2021 ident: 10.1016/j.asej.2025.103805_b0170 article-title: Privacy-preserving mechanism in smart home using blockchain publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3098795 – start-page: 723 year: 2020 ident: 10.1016/j.asej.2025.103805_b0040 article-title: Anomaly based intrusion detection system using support vector machine – volume: 8 start-page: 133865 year: 2020 ident: 10.1016/j.asej.2025.103805_b0070 article-title: Hyperion: a visual analytics tool for an intrusion detection and prevention system publication-title: IEEE Access doi: 10.1109/ACCESS.2020.3010789 – volume: 55 year: 2020 ident: 10.1016/j.asej.2025.103805_b0065 article-title: Computational intelligence intrusion detection techniques in mobile cloud computing environments: review, taxonomy, and open research issues publication-title: J Inform Secur Appl – volume: 35 start-page: e2296 issue: 1 year: 2025 ident: 10.1016/j.asej.2025.103805_b0195 article-title: An IoT intrusion detection approach based on salp swarm and artificial neural network publication-title: Int J Netw Manag doi: 10.1002/nem.2296 – ident: 10.1016/j.asej.2025.103805_b0110 doi: 10.28991/ESJ-2024-08-06-011 – volume: 93 year: 2021 ident: 10.1016/j.asej.2025.103805_b0165 article-title: Blockchain and homomorphic encryption-based privacy-preserving data aggregation model in smart grid publication-title: Comput Electr Eng doi: 10.1016/j.compeleceng.2021.107209 – volume: 39 start-page: 541 issue: 3 year: 2025 ident: 10.1016/j.asej.2025.103805_b0095 article-title: Open-ocean shallow-water dynamics via a (2+1)-dimensional generalized variable-coefficient hirota-satsuma-ito system: oceanic auto- bäcklund transformation and oceanic solitons publication-title: China Ocean Eng doi: 10.1007/s13344-025-0057-y – volume: 69 start-page: 3676 issue: 6 year: 2021 ident: 10.1016/j.asej.2025.103805_b0010 article-title: Security by design for big data frameworks over cloud computing publication-title: IEEE Trans Eng Manag doi: 10.1109/TEM.2020.3045661 – volume: 77 start-page: 1693 year: 2021 ident: 10.1016/j.asej.2025.103805_b0030 article-title: A lightweight anonymous authentication scheme for secure cloud computing services publication-title: J Supercomput doi: 10.1007/s11227-020-03313-y – volume: 35 start-page: 1831 issue: 11 year: 2020 ident: 10.1016/j.asej.2025.103805_b0130 article-title: Garra Rufa‐inspired optimization technique publication-title: Int J Intell Syst doi: 10.1002/int.22274 – volume: 9 start-page: 69513 year: 2021 ident: 10.1016/j.asej.2025.103805_b0155 article-title: An integrated architecture for maintaining security in cloud computing based on blockchain publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3077123 – volume: 214 year: 2022 ident: 10.1016/j.asej.2025.103805_b0135 article-title: Green-PoW: an energy-efficient blockchain Proof-of-Work consensus algorithm publication-title: Comput Netw doi: 10.1016/j.comnet.2022.109118 – volume: 2022 year: 2022 ident: 10.1016/j.asej.2025.103805_b0175 article-title: Intrusion detection systems in cloud computing paradigm: Analysis and overview publication-title: Complexity doi: 10.1155/2022/3999039 – start-page: 1 year: 2022 ident: 10.1016/j.asej.2025.103805_b0015 article-title: A feature reduction based reflected and exploited DDoS attacks detection system publication-title: J Ambient Intell Hum Comput – volume: 12 start-page: 3881 year: 2024 ident: 10.1016/j.asej.2025.103805_b0080 article-title: On the integration of artificial intelligence and blockchain technology: a perspective about security publication-title: IEEE Access doi: 10.1109/ACCESS.2023.3349019 – volume: 153 start-page: 150 year: 2021 ident: 10.1016/j.asej.2025.103805_b0145 article-title: Secure blockchain enabled Cyber–physical systems in healthcare using deep belief network with ResNet model publication-title: J Parallel Distrib Comput doi: 10.1016/j.jpdc.2021.03.011 – volume: 91 year: 2021 ident: 10.1016/j.asej.2025.103805_b0060 article-title: Intrusion detection in cyber-physical systems using a generic and domain specific deep autoencoder model publication-title: Comput Electr Eng doi: 10.1016/j.compeleceng.2021.107044 – volume: 14 start-page: 888 issue: 5 year: 2020 ident: 10.1016/j.asej.2025.103805_b0120 article-title: Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks publication-title: IET Commun doi: 10.1049/iet-com.2019.0172 |
| SSID | ssib044728585 |
| Score | 2.3568408 |
| Snippet | Cloud computing offers scalable, on-demand resources but remains highly vulnerable to cyberattacks, where the nonlinear and dynamic nature of network traffic... |
| SourceID | crossref elsevier |
| SourceType | Index Database Publisher |
| StartPage | 103805 |
| SubjectTerms | Blockchain Green Proof of Work (BGPoW) Cloud computing Cybersecurity Dynamic Recursive Feature Selection Algorithm (DRFSA) Evolutionary Gravitational Neocognitron Neural Network (EGNNN) GarraRufa Fish Optimization (GROA) Intrusion Detection Systems (IDS) Nonlinear attack patterns |
| Title | Evolutionary gravitational neocognitron neural network espoused blockchain-based intrusion detection framework for enhancing cybersecurity in a cloud computing environment |
| URI | https://dx.doi.org/10.1016/j.asej.2025.103805 |
| Volume | 16 |
| WOSCitedRecordID | wos001603311300001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources issn: 2090-4479 databaseCode: M~E dateStart: 20100101 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://road.issn.org omitProxy: false ssIdentifier: ssib044728585 providerName: ISSN International Centre |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lj9MwELbKwoELAgFieckHblWiNInj-LhCRYjHCkFBe4sc21FblrTqttVy4Q_Bj2TGjlO3PMQeuERVlDiJ5-t4bH_zDSHPWA0TaaZUNNJGwwSF60jwRkRloWQzyrSWVqf70xt-elqenYl3g8EPnwuzPedtW15eiuV_NTWcA2Nj6uwVzN03CifgNxgdjmB2OP6T4cfbrnnkw2F1oU6FG2zRmoWjC63A5qhkac9ZHvgQubKbC4xHYXj7rKZy1kY4xKE2EyZmIEy0WRtXWrzxnC4nGd5OUbYD03e_1hBPdjXxcC0Fcy8XG5s6t9xYinWQWhdGxidw8Ycp6kMEEol-t3y3G7WdDV8DGOxi0Pu4d-wr82X4Cpy73V2axOFaRsoCXoh1eWkikijPXXmZ3j8XIQ7TwNuiuLtN2v51IHBrEvMY-mke46Pi3cX7qtsHo2HPUfT0t3mFbVTYRuXauEaup5wJJBC-_Tb23gteO8VNVqxm6D-jy9JyhMLDV_l9JBREN5Pb5FbXzfTEwekOGZj2LvkeQonuQYmGUKIOSrSDEvVQoodQoj2UaA8l2kOJApRoDyW6ByW4k0pqoUR7KNEASvfIxxfjyfOXUVfcI1Kp4Osol4VJCm1GpoGQXNZJoxQTEoaEItM4Cy5qVSqpsrIojRBN3ggti7IWRjEGUVd2nxy1i9Y8IBTmPJk2JVeJTmH-LWqWN6zhpdE8gwg_OyZD39HV0mm4VH-27jFh3hZVF4W66LICbP3lvodXesojcnP3B3hMjqD3zRNyQ23Xs4vVUwusnz5jtcE |
| linkProvider | ISSN International Centre |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Evolutionary+gravitational+neocognitron+neural+network+espoused+blockchain-based+intrusion+detection+framework+for+enhancing+cybersecurity+in+a+cloud+computing+environment&rft.jtitle=Ain+Shams+Engineering+Journal&rft.au=Ravi+Kanth%2C+R.&rft.au=Prem+Jacob%2C+T.&rft.date=2025-12-01&rft.issn=2090-4479&rft.volume=16&rft.issue=12&rft.spage=103805&rft_id=info:doi/10.1016%2Fj.asej.2025.103805&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_asej_2025_103805 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2090-4479&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2090-4479&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2090-4479&client=summon |