Enhanced Chimp Optimization-Based Feature Selection with Fuzzy Logic-Based Intrusion Detection System in Cloud Environment

Author:

Alohali Manal Abdullah1,Elsadig Muna1,Al-Wesabi Fahd N.2ORCID,Al Duhayyim Mesfer3,Mustafa Hilal Anwer4,Motwakel Abdelwahed5ORCID

Affiliation:

1. Department of Information Systems, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia

2. Department of Computer Science, College of Science & Art at Mahayil, King Khalid University, Abha 62529, Saudi Arabia

3. Department of Computer Science, College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj 16273, Saudi Arabia

4. Department of Computer and Self Development, Preparatory Year Deanship, Prince Sattam Bin Abdulaziz University, Al-Kharj 16278, Saudi Arabia

5. Department of Information Systems, College of Business Administration in Hawtat bani Tamim, Prince Sattam Bin Abdulaziz University, Al-Kharj 16278, Saudi Arabia

Abstract

Cloud computing (CC) refers to an Internet-based computing technology in which shared resources, such as storage, software, information, and platform, are offered to users on demand. CC is a technology through which virtualized and dynamically scalable resources are presented to users on the Internet. Security is highly significant in this on-demand CC. Therefore, this paper presents improved metaheuristics with a fuzzy logic-based intrusion detection system for the cloud security (IMFL-IDSCS) technique. The IMFL-IDSCS technique can identify intrusions in the distributed CC platform and secure it from probable threats. An individual sample of IDS is deployed for every client, and it utilizes an individual controller for data management. In addition, the IMFL-IDSCS technique uses an enhanced chimp optimization algorithm-based feature selection (ECOA-FS) method for choosing optimal features, followed by an adaptive neuro-fuzzy inference system (ANFIS) model enforced to recognize intrusions. Finally, the hybrid jaya shark smell optimization (JSSO) algorithm is used to optimize the membership functions (MFs). A widespread simulation analysis is performed to examine the enhanced outcomes of the IMFL-IDSCS technique. The extensive comparison study reported the enhanced outcomes of the IMFL-IDSCS model with maximum detection efficiency with accuracy of 99.31%, precision of 92.03%, recall of 78.25%, and F-score of 81.80%.

Funder

Deanship of Scientific Research at Princess Nourah bint Abdulrahman University

Publisher

MDPI AG

Subject

Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science

Reference31 articles.

1. Negi, P.S., Garg, A., and Lal, R. (2020, January 29–31). Intrusion detection and prevention using honeypot network for cloud security. Proceedings of the 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida, India.

2. Hybrid intrusion detection system using machine learning;Meryem;Netw. Secur.,2020

3. A new distributed intrusion detection system based on multi-agent system for cloud environment;Achbarou;Int. J. Commun. Netw. Inf. Secur.,2018

4. Cuckoo optimisation based intrusion detection system for cloud computing;Singh;Int. J. Comput. Netw. Inf. Secur.,2018

5. HIDCC: A hybrid intrusion detection approach in cloud computing;Hatef;Concurr. Comput. Pract. Exp.,2018

Cited by 9 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. FLOLSTM: Fuzzy logic‐driven optimized LSTM for improved malicious traffic detection in hypervisor environments;Concurrency and Computation: Practice and Experience;2024-06-06

2. Securing Cloud Computing Environment via Optimal Deep Learning-based Intrusion Detection Systems;2024 Second International Conference on Data Science and Information System (ICDSIS);2024-05-17

3. A bizarre synthesized cascaded optimized predictor (BizSCOP) model for enhancing security in cloud systems;Journal of Cloud Computing;2024-05-14

4. Fusing nature inspired fuzzy neural networks for hypervisor intrusion detection;International Journal of Information Technology;2024-04-23

5. Research on Network Information Security Algorithms based Intrusion Detection using Deep Learning;2024 International Conference on Integrated Circuits and Communication Systems (ICICACS);2024-02-23

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3