Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing

被引:1
|
作者
Fahad, Ahmed Mohammed [1 ]
Ahmed, Abdulghani Ali [1 ]
Kahar, Mohd Nizam Mohmad [1 ]
机构
[1] Univ Malaysia Pahang, Fac Comp Syst & Software Engn, Kuantan 26300, Malaysia
来源
关键词
IDS; WOA; ANN; TUIDS; Cloud computing;
D O I
10.1007/978-3-030-00979-3_6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing is a rapidly developing Internet technology for facilitating various services to consumers. This technology suggests a considerable potential to the public or to large companies, such as Amazon, Google, Microsoft and IBM. This technology is aimed at providing a flexible IT architecture which is accessible through the Internet for lightweight portability. However, many issues must be resolved before cloud computing can be accepted as a viable option to business computing. Cloud computing undergoes several challenges in security because it is prone to numerous attacks, such as flooding attacks which are the major problems in cloud computing and one of the serious threat to cloud computing originates came from denial of service. This research is aimed at exploring the mechanisms or models that can detect attacks. Intrusion detection system is a detection model for these attacks and is divided into two-type H-IDS and N-IDS. We focus on the N-IDS in Eucalyptus cloud computing to detect DDoS attacks, such as UDP and TCP, to evaluate the output dataset in MATLAB. Therefore, all technology reviews will be solely based on network traffic data. Furthermore, the H-IDS is disregarded in this work.
引用
收藏
页码:56 / 65
页数:10
相关论文
共 50 条
  • [1] A NOVEL INTRUSION DETECTION MECHANISM IN CLOUD COMPUTING ENVIRONMENTS BASED ON ARTIFICIAL NEURAL NETWORK AND GENETIC ALGORITHM
    Ge, Ziheng
    Jiang, Guiyan
    [J]. Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika), 2024, 83 (12): : 51 - 64
  • [2] Network Intrusion Detection Based on the Improved Artificial Fish Swarm Algorithm
    Wang, Guo
    Dai, Dong
    [J]. JOURNAL OF COMPUTERS, 2013, 8 (11) : 2990 - 2996
  • [3] A Cooperative and Hybrid Network Intrusion Detection Framework in Cloud Computing Based on Snort and Optimized Back Propagation Neural Network
    Chiba, Z.
    Abghour, N.
    Moussaid, K.
    El Omri, A.
    Rida, M.
    [J]. 7TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2016) / THE 6TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2016) / AFFILIATED WORKSHOPS, 2016, 83 : 1200 - 1206
  • [4] An IoT Intrusion Detection Approach Based on Salp Swarm and Artificial Neural Network
    Alzubi, Omar A.
    Alzubi, Jafar A.
    Qiqieh, Issa
    Al-Zoubi, Ala' M.
    [J]. INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2024,
  • [5] Improving the Particle Swarm Algorithm and Optimizing the Network Intrusion Detection of Neural Network
    Yang, Xu
    Hui, Zhao
    [J]. PROCEEDINGS 2015 SIXTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND ENGINEERING APPLICATIONS ISDEA 2015, 2015, : 452 - 455
  • [6] Network Intrusion Detection Analysis with Neural Network and Particle Swarm Optimization Algorithm
    Tian, WenJie
    Liu, JiCheng
    [J]. 2010 CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-5, 2010, : 1749 - 1752
  • [7] Based sliding window cloud computing platform of network intrusion detection algorithm
    He Xue-Ni
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2014, : 927 - 930
  • [8] Network intrusion detection algorithm based on deep neural network
    Jia, Yang
    Wang, Meng
    Wang, Yagang
    [J]. IET INFORMATION SECURITY, 2019, 13 (01) : 48 - 53
  • [9] A framework for Network Intrusion Detection in Cloud
    Prwez, Md Tarique
    Chatterjee, Kakali
    [J]. 2016 IEEE 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (IACC), 2016, : 512 - 516
  • [10] A whale optimization algorithm-trained artificial neural network for smart grid cyber intrusion detection
    Lida Haghnegahdar
    Yong Wang
    [J]. Neural Computing and Applications, 2020, 32 : 9427 - 9441