Evolutionary gravitational neocognitron neural network espoused blockchain-based intrusion detection framework for enhancing cybersecurity in a cloud computing environment

Cloud computing offers scalable, on-demand resources but remains highly vulnerable to cyberattacks, where the nonlinear and dynamic nature of network traffic makes detection especially challenging. This study introduces EGNNN-GROA-BGPoW-IDS-CC, a novel intrusion detection framework that explicitly a...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Ain Shams Engineering Journal Ročník 16; číslo 12; s. 103805
Hlavní autoři: Ravi Kanth, R., Prem Jacob, T.
Médium: Journal Article
Jazyk:angličtina
Vydáno: Elsevier B.V 01.12.2025
Témata:
ISSN:2090-4479
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract Cloud computing offers scalable, on-demand resources but remains highly vulnerable to cyberattacks, where the nonlinear and dynamic nature of network traffic makes detection especially challenging. This study introduces EGNNN-GROA-BGPoW-IDS-CC, a novel intrusion detection framework that explicitly addresses the nonlinear complexities of attack patterns by integrating deep neural modeling, evolutionary optimization, and blockchain technology. Central to the system is the Evolutionary Gravitational Neocognitron Neural Network (EGNNN), capable of learning nonlinear feature hierarchies, and optimized using the GarraRufa Fish Optimization Algorithm (GROA) for enhanced detection accuracy. Input data from the NSL-KDD dataset are preprocessed using the Developed Random Forest with Local Least Squares (DRFLLS) to reduce noise and nonlinear redundancy, followed by feature selection through the Dynamic Recursive Feature Selection Algorithm (DRFSA) to capture the most influential nonlinear dependencies. For secure alert logging, a Blockchain-based Green Proof of Work (BGPoW) ensures lightweight, tamper-proof consensus while maintaining energy efficiency. Implemented in Python, the proposed model demonstrates superior performance, outperforming state-of-the-art systems such as BiLSTM-DBF-IDS-CC and DBN-ResNet-IDS-CC, with accuracy improvements of 32.76% and 15.78%, respectively. Overall, EGNNN-GROA-BGPoW-IDS-CC presents a high-performance, energy-efficient solution that explicitly addresses the nonlinear behavior of cyber threats, thereby advancing sustainable cybersecurity in cloud environments.
AbstractList Cloud computing offers scalable, on-demand resources but remains highly vulnerable to cyberattacks, where the nonlinear and dynamic nature of network traffic makes detection especially challenging. This study introduces EGNNN-GROA-BGPoW-IDS-CC, a novel intrusion detection framework that explicitly addresses the nonlinear complexities of attack patterns by integrating deep neural modeling, evolutionary optimization, and blockchain technology. Central to the system is the Evolutionary Gravitational Neocognitron Neural Network (EGNNN), capable of learning nonlinear feature hierarchies, and optimized using the GarraRufa Fish Optimization Algorithm (GROA) for enhanced detection accuracy. Input data from the NSL-KDD dataset are preprocessed using the Developed Random Forest with Local Least Squares (DRFLLS) to reduce noise and nonlinear redundancy, followed by feature selection through the Dynamic Recursive Feature Selection Algorithm (DRFSA) to capture the most influential nonlinear dependencies. For secure alert logging, a Blockchain-based Green Proof of Work (BGPoW) ensures lightweight, tamper-proof consensus while maintaining energy efficiency. Implemented in Python, the proposed model demonstrates superior performance, outperforming state-of-the-art systems such as BiLSTM-DBF-IDS-CC and DBN-ResNet-IDS-CC, with accuracy improvements of 32.76% and 15.78%, respectively. Overall, EGNNN-GROA-BGPoW-IDS-CC presents a high-performance, energy-efficient solution that explicitly addresses the nonlinear behavior of cyber threats, thereby advancing sustainable cybersecurity in cloud environments.
ArticleNumber 103805
Author Prem Jacob, T.
Ravi Kanth, R.
Author_xml – sequence: 1
  givenname: R.
  surname: Ravi Kanth
  fullname: Ravi Kanth, R.
  email: ravi.kranthi787@gmail.com
– sequence: 2
  givenname: T.
  surname: Prem Jacob
  fullname: Prem Jacob, T.
  email: premjac@yahoo.com
BookMark eNp9kMtuwyAQRVmkUtM0P9AVP-AUPyC21E0VpQ8pUjftGuHxOCGxIQKcKt_UnyxOuu4K5opzGZ07MjHWICEPKVukLBWP-4XyuF9kLOMxyEvGJ2SasYolRbGsbsnce12zeM9KXvIp-VmfbDcEbY1yZ7p16qSDuowdNWjBbo0Ozpo4DO6ShW_rDhT90Q4eG1p3Fg6wU9oktRoDbYIbfGygDQaEsYu2TvV44VrrKJqdMqDNlsK5RucRBqfDOZJUUejs0FCw_TFuFZ-gOen4f48m3JObVnUe53_njHy9rD9Xb8nm4_V99bxJIKuWISmUQCYaTLEVRaFq1gLwSvE8FXmT8aUQNZSgIC9FiVXVFm3VKFHWFQLnucjyGcmuveCs9w5beXS6j35kyuRoWe7laFmOluXVcoSerhDGzU4anfSg0QA22kULsrH6P_wXMu2RdQ
Cites_doi 10.1007/s00500-019-03972-x
10.1007/s11042-019-7301-5
10.1002/cpe.8252
10.1002/cpe.8091
10.1007/s11227-021-03825-1
10.1016/j.jpdc.2020.12.015
10.1007/s10586-024-04351-4
10.28991/HIJ-2024-05-02-014
10.1016/j.aml.2025.109615
10.1109/JIOT.2021.3088115
10.1109/JIOT.2020.2996590
10.1016/j.cosrev.2020.100312
10.3390/fi17010049
10.1007/s11831-021-09573-y
10.1109/IOTM.1021.2000160
10.28991/ESJ-2024-08-04-06
10.1109/ACCESS.2021.3098795
10.1109/ACCESS.2020.3010789
10.1002/nem.2296
10.28991/ESJ-2024-08-06-011
10.1016/j.compeleceng.2021.107209
10.1007/s13344-025-0057-y
10.1109/TEM.2020.3045661
10.1007/s11227-020-03313-y
10.1002/int.22274
10.1109/ACCESS.2021.3077123
10.1016/j.comnet.2022.109118
10.1155/2022/3999039
10.1109/ACCESS.2023.3349019
10.1016/j.jpdc.2021.03.011
10.1016/j.compeleceng.2021.107044
10.1049/iet-com.2019.0172
ContentType Journal Article
Copyright 2025 The Authors
Copyright_xml – notice: 2025 The Authors
DBID 6I.
AAFTH
AAYXX
CITATION
DOI 10.1016/j.asej.2025.103805
DatabaseName ScienceDirect Open Access Titles
Elsevier:ScienceDirect:Open Access
CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
ExternalDocumentID 10_1016_j_asej_2025_103805
S2090447925005465
GroupedDBID 6I.
AAFTH
ALMA_UNASSIGNED_HOLDINGS
M~E
AAYXX
CITATION
ID FETCH-LOGICAL-c297t-4a6e06de1ef644ab0fcc59a53163d25766bc8cac3868e99f4f9da68b9ec553623
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001603311300001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2090-4479
IngestDate Sat Oct 25 05:23:33 EDT 2025
Sat Nov 15 16:53:17 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 12
Keywords Cloud computing
EGNNN
ABC
DBF
DoS
SVM
IoT
ResNet
MLP
DBN
LLS
QoS
Blockchain Green Proof of Work (BGPoW)
XGBoost
IDS
SRCC
GA
GROA
GWO
SSA
Nonlinear attack patterns
Evolutionary Gravitational Neocognitron Neural Network (EGNNN)
DRFSA
Dynamic Recursive Feature Selection Algorithm (DRFSA)
Intrusion Detection Systems (IDS)
HEPDA
HCD
GarraRufa Fish Optimization (GROA)
Cybersecurity
BiLSTM
PSO
R2L
BGPoW
PCC
RST
WSN
U2R
DRFLLS
PPSC
BCAI
Language English
License This is an open access article under the CC BY-NC-ND license.
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c297t-4a6e06de1ef644ab0fcc59a53163d25766bc8cac3868e99f4f9da68b9ec553623
OpenAccessLink https://dx.doi.org/10.1016/j.asej.2025.103805
ParticipantIDs crossref_primary_10_1016_j_asej_2025_103805
elsevier_sciencedirect_doi_10_1016_j_asej_2025_103805
PublicationCentury 2000
PublicationDate December 2025
2025-12-00
PublicationDateYYYYMMDD 2025-12-01
PublicationDate_xml – month: 12
  year: 2025
  text: December 2025
PublicationDecade 2020
PublicationTitle Ain Shams Engineering Journal
PublicationYear 2025
Publisher Elsevier B.V
Publisher_xml – name: Elsevier B.V
References Al-Janabi, Alkaim (b0115) 2020; 24
Kshirsagar, Kumar (b0015) 2022
Mansouri, Ali Babar (b0045) 2021; 150
Vakili, Al-Khafaji, Darbandi, Heidari, Jafari Navimipour, Unal (b0180) 2024; 36
Touqeer, Zaman, Amin, Hussain, Al-Turjman, Bilal (b0050) 2021; 77
Kuznetsov, Sernani, Romeo, Frontoni, Mancini (b0080) 2024; 12
Megouache, Zitouni, Djoudi (b0020) 2020; 10
Singh, Masud, Shamim Hossain, Kaur (b0165) 2021; 93
Zaqeeba, Alqudah, Rawashdeh, Lutfi, Alrawad, Almaiah (b0105) 2024; 5
Heidari, Shishehlou, Darbandi, Navimipour, Yalcin (b0185) 2024; 27
Deebak, TurjmanFadi (b0150) 2021; 58
Nancy, Muthurajkumar, Ganapathy, SanthoshKumar, Selvi, Arputharaj (b0120) 2020; 14
Lasla, Al-Sahan, Abdallah, Younis (b0135) 2022; 214
NSL-KDD dataset. [Online]. Available: https://www.unb.ca/cic/datasets/nsl.html.
Alkadi, Moustafa, Turnbull, Choo (b0140) 2020; 8
Rana, Batra, Malik, Imoize, Kim, Pani, Goyal, Kumar, Rho (b0175) 2022; 2022
Gadekallu, Manoj, Kumar, Hakak, Bhattacharya (b0085) 2021; 4
Shamshirband, Fathi, Chronopoulos, Montieri, Palumbo, Pescapè (b0065) 2020; 55
Qashlan, Nanda, He, Mohanty (b0170) 2021; 9
Ramírez-Gordillo, Maciá-Lillo, Pujol, García-D’Urso, Azorín-López, Mora (b0075) 2025; 17
Awadallah, Samsudin, Teh, Almazrooie (b0155) 2021; 9
Awaysheh, Aladwan, Alazab, Alawadi, Cabaleiro, Pena (b0010) 2021; 69
Alzubi, Alzubi, Qiqieh, Al-Zoubi (b0195) 2025; 35
Gao (b0095) 2025; 39
Krishnaveni, Palani Vigneshwar, Kishore, Sivamohan (b0040) 2020
Hammami, Yahia, Obaidat (b0030) 2021; 77
Gomathi, Baskar, Mohamed Shakeel, Dhulipala (b0125) 2020; 79
El Kafhali, El Mir, Hanini (b0035) 2022; 29
Latif, Idrees, Ahmad, Zheng, Zou (b0005) 2021; 21
Halkiopoulos, Papadopoulos, Stamatiou, Theodorakopoulos, Vlachos (b0100) 2024; 8
Nguyen, Viet, Mohamed Elhoseny, Gupta, Abd El-Latif (b0145) 2021; 153
Yoo, Jo, Kim, Seo (b0070) 2020; 8
Ogonji, Okeyo, Wafula (b0025) 2020; 38
Thakur, Chakraborty, De, Kumar, Sarkar (b0060) 2021; 91
Gao, Liu, Wang (b0090) 2025; 171
Alsumayt A. BSHPC: Improve Big Data Privacy Based on Blockchain and High-Performance Computing (HPC); 2024. doi: 10.28991/ESJ-2024-08-06-011.
Heidari, Amiri, Jamali, Jafari (b0190) 2024; 36
Chattaraj, Bera, Das, Rodrigues, Park (b0055) 2021; 9
Jaber, Abdulbari, Shalash, Abdalla (b0130) 2020; 35
Yadav, Sharma, Kumar, Arora (b0160) 2022
Vakili (10.1016/j.asej.2025.103805_b0180) 2024; 36
Ramírez-Gordillo (10.1016/j.asej.2025.103805_b0075) 2025; 17
Jaber (10.1016/j.asej.2025.103805_b0130) 2020; 35
Qashlan (10.1016/j.asej.2025.103805_b0170) 2021; 9
El Kafhali (10.1016/j.asej.2025.103805_b0035) 2022; 29
Touqeer (10.1016/j.asej.2025.103805_b0050) 2021; 77
Ogonji (10.1016/j.asej.2025.103805_b0025) 2020; 38
Gao (10.1016/j.asej.2025.103805_b0090) 2025; 171
Nancy (10.1016/j.asej.2025.103805_b0120) 2020; 14
Yoo (10.1016/j.asej.2025.103805_b0070) 2020; 8
10.1016/j.asej.2025.103805_b0110
Hammami (10.1016/j.asej.2025.103805_b0030) 2021; 77
Gadekallu (10.1016/j.asej.2025.103805_b0085) 2021; 4
Nguyen (10.1016/j.asej.2025.103805_b0145) 2021; 153
Deebak (10.1016/j.asej.2025.103805_b0150) 2021; 58
Krishnaveni (10.1016/j.asej.2025.103805_b0040) 2020
Al-Janabi (10.1016/j.asej.2025.103805_b0115) 2020; 24
Shamshirband (10.1016/j.asej.2025.103805_b0065) 2020; 55
Latif (10.1016/j.asej.2025.103805_b0005) 2021; 21
Kuznetsov (10.1016/j.asej.2025.103805_b0080) 2024; 12
Rana (10.1016/j.asej.2025.103805_b0175) 2022; 2022
Zaqeeba (10.1016/j.asej.2025.103805_b0105) 2024; 5
Heidari (10.1016/j.asej.2025.103805_b0190) 2024; 36
Gao (10.1016/j.asej.2025.103805_b0095) 2025; 39
Gomathi (10.1016/j.asej.2025.103805_b0125) 2020; 79
Alkadi (10.1016/j.asej.2025.103805_b0140) 2020; 8
Megouache (10.1016/j.asej.2025.103805_b0020) 2020; 10
Singh (10.1016/j.asej.2025.103805_b0165) 2021; 93
Yadav (10.1016/j.asej.2025.103805_b0160) 2022
Awadallah (10.1016/j.asej.2025.103805_b0155) 2021; 9
Chattaraj (10.1016/j.asej.2025.103805_b0055) 2021; 9
Halkiopoulos (10.1016/j.asej.2025.103805_b0100) 2024; 8
Mansouri (10.1016/j.asej.2025.103805_b0045) 2021; 150
Heidari (10.1016/j.asej.2025.103805_b0185) 2024; 27
Awaysheh (10.1016/j.asej.2025.103805_b0010) 2021; 69
Kshirsagar (10.1016/j.asej.2025.103805_b0015) 2022
Lasla (10.1016/j.asej.2025.103805_b0135) 2022; 214
Thakur (10.1016/j.asej.2025.103805_b0060) 2021; 91
10.1016/j.asej.2025.103805_b0200
Alzubi (10.1016/j.asej.2025.103805_b0195) 2025; 35
References_xml – volume: 8
  start-page: 1320
  year: 2024
  end-page: 1344
  ident: b0100
  article-title: A digital service for citizens: Multi-parameter optimization model for cost-benefit analysis of cybercrime and cyberdefense
  publication-title: Emerg Sci J
– volume: 9
  start-page: 69513
  year: 2021
  end-page: 69526
  ident: b0155
  article-title: An integrated architecture for maintaining security in cloud computing based on blockchain
  publication-title: IEEE Access
– volume: 14
  start-page: 888
  year: 2020
  end-page: 895
  ident: b0120
  article-title: Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks
  publication-title: IET Commun
– volume: 27
  start-page: 7521
  year: 2024
  end-page: 7539
  ident: b0185
  article-title: A reliable method for data aggregation on the industrial internet of things using a hybrid optimization algorithm and density correlation degree
  publication-title: Clust Comput
– volume: 9
  start-page: 103651
  year: 2021
  end-page: 103669
  ident: b0170
  article-title: Privacy-preserving mechanism in smart home using blockchain
  publication-title: IEEE Access
– volume: 150
  start-page: 155
  year: 2021
  end-page: 183
  ident: b0045
  article-title: A review of edge computing: Features and resource virtualization
  publication-title: J Parallel Distribut Comput
– start-page: 1
  year: 2022
  end-page: 22
  ident: b0160
  article-title: Blockchain-based synergistic solution to current cybersecurity frameworks
  publication-title: Multimed Tools Appl
– volume: 55
  year: 2020
  ident: b0065
  article-title: Computational intelligence intrusion detection techniques in mobile cloud computing environments: review, taxonomy, and open research issues
  publication-title: J Inform Secur Appl
– volume: 171
  year: 2025
  ident: b0090
  article-title: Inhomogeneity, magnetic auto-Bäcklund transformations and magnetic solitons for a generalized variable-coefficient Kraenkel-Manna-Merle system in a deformed ferrite
  publication-title: Appl Math Lett
– volume: 24
  start-page: 555
  year: 2020
  end-page: 569
  ident: b0115
  article-title: A nifty collaborative analysis to predicting a novel tool (DRFLLS) for missing values estimation
  publication-title: Soft Comput
– volume: 153
  start-page: 150
  year: 2021
  end-page: 160
  ident: b0145
  article-title: Secure blockchain enabled Cyber–physical systems in healthcare using deep belief network with ResNet model
  publication-title: J Parallel Distrib Comput
– volume: 39
  start-page: 541
  year: 2025
  end-page: 547
  ident: b0095
  article-title: Open-ocean shallow-water dynamics via a (2+1)-dimensional generalized variable-coefficient hirota-satsuma-ito system: oceanic auto- bäcklund transformation and oceanic solitons
  publication-title: China Ocean Eng
– volume: 214
  year: 2022
  ident: b0135
  article-title: Green-PoW: an energy-efficient blockchain Proof-of-Work consensus algorithm
  publication-title: Comput Netw
– volume: 91
  year: 2021
  ident: b0060
  article-title: Intrusion detection in cyber-physical systems using a generic and domain specific deep autoencoder model
  publication-title: Comput Electr Eng
– volume: 5
  start-page: 420
  year: 2024
  end-page: 430
  ident: b0105
  article-title: The measurement of blockchain technology in financial reports in commercial banks
  publication-title: HighTech Innov J
– volume: 69
  start-page: 3676
  year: 2021
  end-page: 3693
  ident: b0010
  article-title: Security by design for big data frameworks over cloud computing
  publication-title: IEEE Trans Eng Manag
– volume: 8
  start-page: 133865
  year: 2020
  end-page: 133881
  ident: b0070
  article-title: Hyperion: a visual analytics tool for an intrusion detection and prevention system
  publication-title: IEEE Access
– volume: 8
  start-page: 9463
  year: 2020
  end-page: 9472
  ident: b0140
  article-title: A deep blockchain framework-enabled collaborative intrusion detection for protecting IoT and cloud networks
  publication-title: IEEE Internet Things J
– volume: 36
  start-page: e8091
  year: 2024
  ident: b0180
  article-title: A new service composition method in the cloud‐based internet of things environment using a grey wolf optimization algorithm and MapReduce framework
  publication-title: Concurrency Comput Pract Exper
– volume: 4
  start-page: 30
  year: 2021
  end-page: 33
  ident: b0085
  article-title: Blockchain-based attack detection on machine learning algorithms for IoT-based e-health applications
  publication-title: IEEE Internet Things Mag
– volume: 58
  year: 2021
  ident: b0150
  article-title: Privacy-preserving in smart contracts using blockchain and artificial intelligence for cyber risk measurements
  publication-title: J Inform Secur Appl
– volume: 79
  year: 2020
  ident: b0125
  article-title: Identifying brain abnormalities from electroencephalogram using evolutionary gravitational neocognitron neural network
  publication-title: Multimedia Tools Appl
– volume: 17
  start-page: 49
  year: 2025
  ident: b0075
  article-title: Decentralized identity management for internet of things (iot) devices using iota blockchain technology
  publication-title: Future Internet
– volume: 36
  start-page: e8252
  year: 2024
  ident: b0190
  article-title: Assessment of reliability and availability of wireless sensor networks in industrial applications by considering permanent faults
  publication-title: Concurrency Comput Pract Exper
– volume: 21
  year: 2021
  ident: b0005
  article-title: A blockchain-based architecture for secure and trustworthy operations in the industrial internet of things
  publication-title: J Ind Inf Integr
– volume: 9
  start-page: 1542
  year: 2021
  end-page: 1559
  ident: b0055
  article-title: Designing fine-grained access control for software-defined networks using private blockchain
  publication-title: IEEE Internet Things J
– volume: 77
  start-page: 1693
  year: 2021
  end-page: 1713
  ident: b0030
  article-title: A lightweight anonymous authentication scheme for secure cloud computing services
  publication-title: J Supercomput
– start-page: 723
  year: 2020
  end-page: 731
  ident: b0040
  article-title: Anomaly based intrusion detection system using support vector machine
  publication-title: Artificial Intelligence and Evolutionary Computations in Engineering Systems
– volume: 35
  start-page: e2296
  year: 2025
  ident: b0195
  article-title: An IoT intrusion detection approach based on salp swarm and artificial neural network
  publication-title: Int J Netw Manag
– volume: 2022
  year: 2022
  ident: b0175
  article-title: Intrusion detection systems in cloud computing paradigm: Analysis and overview
  publication-title: Complexity
– reference: Alsumayt A. BSHPC: Improve Big Data Privacy Based on Blockchain and High-Performance Computing (HPC); 2024. doi: 10.28991/ESJ-2024-08-06-011.
– volume: 93
  year: 2021
  ident: b0165
  article-title: Blockchain and homomorphic encryption-based privacy-preserving data aggregation model in smart grid
  publication-title: Comput Electr Eng
– volume: 38
  year: 2020
  ident: b0025
  article-title: A survey on privacy and security of internet of things
  publication-title: Comput Sci Rev
– volume: 12
  start-page: 3881
  year: 2024
  end-page: 3897
  ident: b0080
  article-title: On the integration of artificial intelligence and blockchain technology: a perspective about security
  publication-title: IEEE Access
– volume: 77
  start-page: 14053
  year: 2021
  end-page: 14089
  ident: b0050
  article-title: Smart home security: challenges, issues and solutions at different IoT layers
  publication-title: J Supercomput
– start-page: 1
  year: 2022
  end-page: 13
  ident: b0015
  article-title: A feature reduction based reflected and exploited DDoS attacks detection system
  publication-title: J Ambient Intell Hum Comput
– reference: NSL-KDD dataset. [Online]. Available: https://www.unb.ca/cic/datasets/nsl.html.
– volume: 29
  start-page: 223
  year: 2022
  end-page: 246
  ident: b0035
  article-title: Security threats, defense mechanisms, challenges, and future directions in cloud computing
  publication-title: Arch Comput Meth Eng
– volume: 35
  start-page: 1831
  year: 2020
  end-page: 1856
  ident: b0130
  article-title: Garra Rufa‐inspired optimization technique
  publication-title: Int J Intell Syst
– volume: 10
  start-page: 1
  year: 2020
  end-page: 20
  ident: b0020
  article-title: Ensuring user authentication and data integrity in multicloud environment
  publication-title: HCIS
– volume: 24
  start-page: 555
  issue: 1
  year: 2020
  ident: 10.1016/j.asej.2025.103805_b0115
  article-title: A nifty collaborative analysis to predicting a novel tool (DRFLLS) for missing values estimation
  publication-title: Soft Comput
  doi: 10.1007/s00500-019-03972-x
– volume: 79
  year: 2020
  ident: 10.1016/j.asej.2025.103805_b0125
  article-title: Identifying brain abnormalities from electroencephalogram using evolutionary gravitational neocognitron neural network
  publication-title: Multimedia Tools Appl
  doi: 10.1007/s11042-019-7301-5
– volume: 36
  start-page: e8252
  issue: 27
  year: 2024
  ident: 10.1016/j.asej.2025.103805_b0190
  article-title: Assessment of reliability and availability of wireless sensor networks in industrial applications by considering permanent faults
  publication-title: Concurrency Comput Pract Exper
  doi: 10.1002/cpe.8252
– volume: 36
  start-page: e8091
  issue: 16
  year: 2024
  ident: 10.1016/j.asej.2025.103805_b0180
  article-title: A new service composition method in the cloud‐based internet of things environment using a grey wolf optimization algorithm and MapReduce framework
  publication-title: Concurrency Comput Pract Exper
  doi: 10.1002/cpe.8091
– volume: 77
  start-page: 14053
  issue: 12
  year: 2021
  ident: 10.1016/j.asej.2025.103805_b0050
  article-title: Smart home security: challenges, issues and solutions at different IoT layers
  publication-title: J Supercomput
  doi: 10.1007/s11227-021-03825-1
– volume: 150
  start-page: 155
  year: 2021
  ident: 10.1016/j.asej.2025.103805_b0045
  article-title: A review of edge computing: Features and resource virtualization
  publication-title: J Parallel Distribut Comput
  doi: 10.1016/j.jpdc.2020.12.015
– volume: 58
  year: 2021
  ident: 10.1016/j.asej.2025.103805_b0150
  article-title: Privacy-preserving in smart contracts using blockchain and artificial intelligence for cyber risk measurements
  publication-title: J Inform Secur Appl
– volume: 27
  start-page: 7521
  issue: 6
  year: 2024
  ident: 10.1016/j.asej.2025.103805_b0185
  article-title: A reliable method for data aggregation on the industrial internet of things using a hybrid optimization algorithm and density correlation degree
  publication-title: Clust Comput
  doi: 10.1007/s10586-024-04351-4
– volume: 5
  start-page: 420
  issue: 2
  year: 2024
  ident: 10.1016/j.asej.2025.103805_b0105
  article-title: The measurement of blockchain technology in financial reports in commercial banks
  publication-title: HighTech Innov J
  doi: 10.28991/HIJ-2024-05-02-014
– volume: 21
  year: 2021
  ident: 10.1016/j.asej.2025.103805_b0005
  article-title: A blockchain-based architecture for secure and trustworthy operations in the industrial internet of things
  publication-title: J Ind Inf Integr
– volume: 171
  year: 2025
  ident: 10.1016/j.asej.2025.103805_b0090
  article-title: Inhomogeneity, magnetic auto-Bäcklund transformations and magnetic solitons for a generalized variable-coefficient Kraenkel-Manna-Merle system in a deformed ferrite
  publication-title: Appl Math Lett
  doi: 10.1016/j.aml.2025.109615
– volume: 9
  start-page: 1542
  issue: 2
  year: 2021
  ident: 10.1016/j.asej.2025.103805_b0055
  article-title: Designing fine-grained access control for software-defined networks using private blockchain
  publication-title: IEEE Internet Things J
  doi: 10.1109/JIOT.2021.3088115
– volume: 8
  start-page: 9463
  issue: 12
  year: 2020
  ident: 10.1016/j.asej.2025.103805_b0140
  article-title: A deep blockchain framework-enabled collaborative intrusion detection for protecting IoT and cloud networks
  publication-title: IEEE Internet Things J
  doi: 10.1109/JIOT.2020.2996590
– start-page: 1
  year: 2022
  ident: 10.1016/j.asej.2025.103805_b0160
  article-title: Blockchain-based synergistic solution to current cybersecurity frameworks
  publication-title: Multimed Tools Appl
– volume: 38
  year: 2020
  ident: 10.1016/j.asej.2025.103805_b0025
  article-title: A survey on privacy and security of internet of things
  publication-title: Comput Sci Rev
  doi: 10.1016/j.cosrev.2020.100312
– volume: 17
  start-page: 49
  issue: 1
  year: 2025
  ident: 10.1016/j.asej.2025.103805_b0075
  article-title: Decentralized identity management for internet of things (iot) devices using iota blockchain technology
  publication-title: Future Internet
  doi: 10.3390/fi17010049
– volume: 29
  start-page: 223
  issue: 1
  year: 2022
  ident: 10.1016/j.asej.2025.103805_b0035
  article-title: Security threats, defense mechanisms, challenges, and future directions in cloud computing
  publication-title: Arch Comput Meth Eng
  doi: 10.1007/s11831-021-09573-y
– volume: 4
  start-page: 30
  issue: 3
  year: 2021
  ident: 10.1016/j.asej.2025.103805_b0085
  article-title: Blockchain-based attack detection on machine learning algorithms for IoT-based e-health applications
  publication-title: IEEE Internet Things Mag
  doi: 10.1109/IOTM.1021.2000160
– volume: 10
  start-page: 1
  year: 2020
  ident: 10.1016/j.asej.2025.103805_b0020
  article-title: Ensuring user authentication and data integrity in multicloud environment
  publication-title: HCIS
– volume: 8
  start-page: 1320
  issue: 4
  year: 2024
  ident: 10.1016/j.asej.2025.103805_b0100
  article-title: A digital service for citizens: Multi-parameter optimization model for cost-benefit analysis of cybercrime and cyberdefense
  publication-title: Emerg Sci J
  doi: 10.28991/ESJ-2024-08-04-06
– ident: 10.1016/j.asej.2025.103805_b0200
– volume: 9
  start-page: 103651
  year: 2021
  ident: 10.1016/j.asej.2025.103805_b0170
  article-title: Privacy-preserving mechanism in smart home using blockchain
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2021.3098795
– start-page: 723
  year: 2020
  ident: 10.1016/j.asej.2025.103805_b0040
  article-title: Anomaly based intrusion detection system using support vector machine
– volume: 8
  start-page: 133865
  year: 2020
  ident: 10.1016/j.asej.2025.103805_b0070
  article-title: Hyperion: a visual analytics tool for an intrusion detection and prevention system
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.3010789
– volume: 55
  year: 2020
  ident: 10.1016/j.asej.2025.103805_b0065
  article-title: Computational intelligence intrusion detection techniques in mobile cloud computing environments: review, taxonomy, and open research issues
  publication-title: J Inform Secur Appl
– volume: 35
  start-page: e2296
  issue: 1
  year: 2025
  ident: 10.1016/j.asej.2025.103805_b0195
  article-title: An IoT intrusion detection approach based on salp swarm and artificial neural network
  publication-title: Int J Netw Manag
  doi: 10.1002/nem.2296
– ident: 10.1016/j.asej.2025.103805_b0110
  doi: 10.28991/ESJ-2024-08-06-011
– volume: 93
  year: 2021
  ident: 10.1016/j.asej.2025.103805_b0165
  article-title: Blockchain and homomorphic encryption-based privacy-preserving data aggregation model in smart grid
  publication-title: Comput Electr Eng
  doi: 10.1016/j.compeleceng.2021.107209
– volume: 39
  start-page: 541
  issue: 3
  year: 2025
  ident: 10.1016/j.asej.2025.103805_b0095
  article-title: Open-ocean shallow-water dynamics via a (2+1)-dimensional generalized variable-coefficient hirota-satsuma-ito system: oceanic auto- bäcklund transformation and oceanic solitons
  publication-title: China Ocean Eng
  doi: 10.1007/s13344-025-0057-y
– volume: 69
  start-page: 3676
  issue: 6
  year: 2021
  ident: 10.1016/j.asej.2025.103805_b0010
  article-title: Security by design for big data frameworks over cloud computing
  publication-title: IEEE Trans Eng Manag
  doi: 10.1109/TEM.2020.3045661
– volume: 77
  start-page: 1693
  year: 2021
  ident: 10.1016/j.asej.2025.103805_b0030
  article-title: A lightweight anonymous authentication scheme for secure cloud computing services
  publication-title: J Supercomput
  doi: 10.1007/s11227-020-03313-y
– volume: 35
  start-page: 1831
  issue: 11
  year: 2020
  ident: 10.1016/j.asej.2025.103805_b0130
  article-title: Garra Rufa‐inspired optimization technique
  publication-title: Int J Intell Syst
  doi: 10.1002/int.22274
– volume: 9
  start-page: 69513
  year: 2021
  ident: 10.1016/j.asej.2025.103805_b0155
  article-title: An integrated architecture for maintaining security in cloud computing based on blockchain
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2021.3077123
– volume: 214
  year: 2022
  ident: 10.1016/j.asej.2025.103805_b0135
  article-title: Green-PoW: an energy-efficient blockchain Proof-of-Work consensus algorithm
  publication-title: Comput Netw
  doi: 10.1016/j.comnet.2022.109118
– volume: 2022
  year: 2022
  ident: 10.1016/j.asej.2025.103805_b0175
  article-title: Intrusion detection systems in cloud computing paradigm: Analysis and overview
  publication-title: Complexity
  doi: 10.1155/2022/3999039
– start-page: 1
  year: 2022
  ident: 10.1016/j.asej.2025.103805_b0015
  article-title: A feature reduction based reflected and exploited DDoS attacks detection system
  publication-title: J Ambient Intell Hum Comput
– volume: 12
  start-page: 3881
  year: 2024
  ident: 10.1016/j.asej.2025.103805_b0080
  article-title: On the integration of artificial intelligence and blockchain technology: a perspective about security
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2023.3349019
– volume: 153
  start-page: 150
  year: 2021
  ident: 10.1016/j.asej.2025.103805_b0145
  article-title: Secure blockchain enabled Cyber–physical systems in healthcare using deep belief network with ResNet model
  publication-title: J Parallel Distrib Comput
  doi: 10.1016/j.jpdc.2021.03.011
– volume: 91
  year: 2021
  ident: 10.1016/j.asej.2025.103805_b0060
  article-title: Intrusion detection in cyber-physical systems using a generic and domain specific deep autoencoder model
  publication-title: Comput Electr Eng
  doi: 10.1016/j.compeleceng.2021.107044
– volume: 14
  start-page: 888
  issue: 5
  year: 2020
  ident: 10.1016/j.asej.2025.103805_b0120
  article-title: Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks
  publication-title: IET Commun
  doi: 10.1049/iet-com.2019.0172
SSID ssib044728585
Score 2.3568408
Snippet Cloud computing offers scalable, on-demand resources but remains highly vulnerable to cyberattacks, where the nonlinear and dynamic nature of network traffic...
SourceID crossref
elsevier
SourceType Index Database
Publisher
StartPage 103805
SubjectTerms Blockchain Green Proof of Work (BGPoW)
Cloud computing
Cybersecurity
Dynamic Recursive Feature Selection Algorithm (DRFSA)
Evolutionary Gravitational Neocognitron Neural Network (EGNNN)
GarraRufa Fish Optimization (GROA)
Intrusion Detection Systems (IDS)
Nonlinear attack patterns
Title Evolutionary gravitational neocognitron neural network espoused blockchain-based intrusion detection framework for enhancing cybersecurity in a cloud computing environment
URI https://dx.doi.org/10.1016/j.asej.2025.103805
Volume 16
WOSCitedRecordID wos001603311300001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  issn: 2090-4479
  databaseCode: M~E
  dateStart: 20100101
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://road.issn.org
  omitProxy: false
  ssIdentifier: ssib044728585
  providerName: ISSN International Centre
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lj9MwELbKwoELAgFieckHblWiNInj-LhCRYjHCkFBe4sc21FblrTqttVy4Q_Bj2TGjlO3PMQeuERVlDiJ5-t4bH_zDSHPWA0TaaZUNNJGwwSF60jwRkRloWQzyrSWVqf70xt-elqenYl3g8EPnwuzPedtW15eiuV_NTWcA2Nj6uwVzN03CifgNxgdjmB2OP6T4cfbrnnkw2F1oU6FG2zRmoWjC63A5qhkac9ZHvgQubKbC4xHYXj7rKZy1kY4xKE2EyZmIEy0WRtXWrzxnC4nGd5OUbYD03e_1hBPdjXxcC0Fcy8XG5s6t9xYinWQWhdGxidw8Ycp6kMEEol-t3y3G7WdDV8DGOxi0Pu4d-wr82X4Cpy73V2axOFaRsoCXoh1eWkikijPXXmZ3j8XIQ7TwNuiuLtN2v51IHBrEvMY-mke46Pi3cX7qtsHo2HPUfT0t3mFbVTYRuXauEaup5wJJBC-_Tb23gteO8VNVqxm6D-jy9JyhMLDV_l9JBREN5Pb5FbXzfTEwekOGZj2LvkeQonuQYmGUKIOSrSDEvVQoodQoj2UaA8l2kOJApRoDyW6ByW4k0pqoUR7KNEASvfIxxfjyfOXUVfcI1Kp4Osol4VJCm1GpoGQXNZJoxQTEoaEItM4Cy5qVSqpsrIojRBN3ggti7IWRjEGUVd2nxy1i9Y8IBTmPJk2JVeJTmH-LWqWN6zhpdE8gwg_OyZD39HV0mm4VH-27jFh3hZVF4W66LICbP3lvodXesojcnP3B3hMjqD3zRNyQ23Xs4vVUwusnz5jtcE
linkProvider ISSN International Centre
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Evolutionary+gravitational+neocognitron+neural+network+espoused+blockchain-based+intrusion+detection+framework+for+enhancing+cybersecurity+in+a+cloud+computing+environment&rft.jtitle=Ain+Shams+Engineering+Journal&rft.au=Ravi+Kanth%2C+R.&rft.au=Prem+Jacob%2C+T.&rft.date=2025-12-01&rft.issn=2090-4479&rft.volume=16&rft.issue=12&rft.spage=103805&rft_id=info:doi/10.1016%2Fj.asej.2025.103805&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_asej_2025_103805
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2090-4479&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2090-4479&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2090-4479&client=summon