Enhanced Network Security Hybrid Cloud Workflow Scheduling Using Levy-Optimized Slime Mould Algorithm
Abstract
Mainstream network security models based on PSO and other algorithms have not been optimized for hybrid cloud environments, resulting in limitations in their application. To ensure network security in hybrid cloud environments, the study first introduces the Levy distribution, uses the Levy distribution to generate random numbers and redesign the position update formula. Then, the penalty parameters of SVM and the radial basis kernel function parameters of SVM are used as individuals to improve SMA. After iteration, the optimal position is the optimal solution of the two parameters. After determining the optimal parameters, an improved slime mould algorithm optimization algorithm is designed. Finally, the algorithm is applied to the encoded hybrid cloud workflow scheduling to propose a method based on the improved slime mould algorithm. The test results showed that when the number of tasks was 1000, the proposed algorithm took 13.7 hours to run, which was better than the traditional 18.2 hours and more than 50 hours of the particle swarm algorithm (P<0.05). Except for Guess passward attack, the detection rate of the proposed algorithm exceeded 91%, while that of other algorithms was between 77% and 91%. For Guess passward attacks, the detection rate of the traditional slime mould algorithm was 8.93%, but the proposed algorithm increased to 11.54% (P<0.05). After applying this method, the task completion time in the hybrid cloud environment reduced by 61.9%, the resource utilization rate increased by 27.5%, and the incidence of network security events reduced by 87.9%. Based on the testing results, the proposed algorithm has considerable detection performance for network security issues in hybrid cloud environments. It can correctly identify the types of network attacks in network security monitoring and improves its application effectiveness in network security.DOI:
https://doi.org/10.31449/inf.v49i18.7327Downloads
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika







