FCM–SVM based intrusion detection system for cloud computing environment (original) (raw)

References

  1. Velte, A., Velte, T.: Cloud Computing: A Practical Approach. McGraw-Hill, Ney York (2019)
    MATH Google Scholar
  2. Prakash, S.: Role of virtualization techniques in cloud computing environment. In: Bhatia, S.K., Tiwari, S., Mishra, K.K., Trivedi, M.C. (eds.) Advances in Computer Communication and Computational Sciences, pp. 439–450. Springer, Singapore (2019)
    Google Scholar
  3. Bawa, P., Rehman, S., Manickam, S.: Enhanced mechanism to detect and mitigate economic denial of sustainability (EDoS) attack in cloud computing environments. Int. J. Adv. Comput. Sci. Appl. 8(9), 51–58 (2017)
    Google Scholar
  4. Singh, P., Manickam, S., & Rehman, S.: A survey of mitigation techniques against Economic Denial of Sustainability (EDoS) attack on cloud computing architecture. In: Proceedings of 3rd International Conference on Reliability, Infocom Technologies and Optimization. IEEE pp. 1–4, (2014)
  5. Osanaiye, O., Choo, K.K., Dlodlo, M.: Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework. J. Netw. Comput. Appl. 67(1), 147–165 (2016)
    Article Google Scholar
  6. Kuang, F., Xu, W., Zhang, S.: A novel hybrid KPCA and SVM with GA model for intrusion detection. Appl. Soft Comput. 18(1), 178–184 (2014)
    Article Google Scholar
  7. Nkikabahizi, C., Cheruiyot, W., Kibe, A.: Classification and analysis of techniques applied in intrusion detection systems. Int. J. Sci. Eng. Technol. 6(7), 216–219 (2017)
    Google Scholar
  8. Ghamisi, P., Benediktsson, J.: Feature selection based on hybridization of genetic algorithm and particle swarm optimization. IEEE Geosci. Remote Sens. Lett. 12(2), 309–313 (2014)
    Article Google Scholar
  9. Saljoughi, A., Mehrvarz, M., Mirvaziri, H.: Attacks and intrusion detection in cloud computing using neural networks and particle swarm optimization algorithms. Emerg. Sci. J. 1(4), 179–191 (2017)
    Google Scholar
  10. Costa, K., Pereira, C., Nakamura, R., Pereira, L., Papa, J.: Boosting Optimum-Path Forest clustering through harmony Search and its applications for intrusion detection in computer networks. In: 2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN), pp.181-185 (2012)
  11. Aljawarneh, S., Aldwairi, M., Yassein, M.: Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J. Comput. Sci. 25(1), 152–160 (2018)
    Article Google Scholar
  12. Raja, S., Ramaiah, S.: Performance comparison of neuro-fuzzy cloud intrusion detection systems. Int. Arab J. Inf. Technol. 13(1A), 142–149 (2016)
    Google Scholar
  13. Akoglu, L., Tong, H., Koutra, D.: Graph based anomaly detection and description: a survey. Data Min. Knowl. Discov. 29(3), 626–688 (2015)
    Article MathSciNet Google Scholar
  14. AL-Utrakchi, E., AL-Mousa, M.: Analyzing network traffic to enhance the IDS accuracy using intrusion blacklist. Int. J. Comput. Sci. Inform. Secur. 15(1), 46–47 (2017)
    Google Scholar
  15. Kenkre, P., Pai, A., Colaco, L.: Real time intrusion detection and prevention system. In: Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA), pp. 405–411 (2015)
  16. Saied, A., Overill, R., Radzik, T.: Detection of known and unknown DDoS attacks using Artificial Neural Networks. Neurocomputing 172(1), 385–393 (2016)
    Article Google Scholar
  17. Freedman, A. T., Pye, I. G., Ellis, D. P., Applegate, I.: Network monitoring, detection, and analysis system. U.S. Patent 9,942,253, issued April 10 (2018)
  18. Rosli, A., Taib, A., Ali, W.: Utilizing the enhanced risk assessment equation to determine the apparent risk due to user datagram protocol (UDP) flooding attack. Sains Hum. 9(1), 1–4 (2017)
    Google Scholar
  19. Kaur, G., Saxena, V., Gupta, J.: Detection of TCP targeted high bandwidth attacks using self-similarity. J. King Saud Univ.-Comput. Inform. Sci. 49, 105–110 (2017)
    Google Scholar
  20. Kumar, D.: DDoS attacks and their types. In: Network security attacks and countermeasures. IGI, Global (2016). https://doi.org/10.4018/978-1-4666-8761-5.ch007
  21. Suhasaria, P., Garg, A., Agarwal, A., Selvakumar, K.: Distributed denial of service attacks: a survey. Imp. J. Interdiscip. Res. 3(2), 71–80 (2017)
    Google Scholar
  22. Bhushan, K., Gupta, B.: Security challenges in cloud computing: state-of-art. Int. J. Big Data Intell. 4(2), 81–107 (2017)
    Article Google Scholar
  23. Hota, H.S., Shrivas, A.K.: Data mining approach for developing various models based on types of attack and feature selection as intrusion detection systems (IDS). In: Mohapatra, D., Patnaik, S. (eds.) Intelligent computing, networking, and informatics. Advances in intelligent systems and computing, vol. 243. Springer, New Delhi (2014). https://doi.org/10.1007/978-81-322-1665-0_85
  24. Pervez, M., Farid, D.: Feature selection and intrusion classification in NSL-KDD cup 99 dataset employing SVMs. In: 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA). IEEE, pp. 1–6 (2014)
  25. Enache, A.C., Patriciu, V.: Intrusions detection based on support vector machine optimized with swarm intelligence. In: 9th international symposium on applied computational intelligence and informatics (SACI). IEEE, pp. 153–58 (2014)
  26. Eid, H., Darwish, A., Hassanien, A., Kim, T.H.: Intelligent hybrid anomaly network intrusion detection system. In: International Conference on Future Generation Communication and Networking, pp. 209–218 (2011)
  27. De la Hoz, E., De La Hoz, E., Ortiz, A., Ortega, J., Martínez-Álvarez, A.: Feature selection by multi-objective optimisation: application to network anomaly detection by hierarchical self-organizing maps. Knowl.-Based Syst. 71, 322–338 (2014)
    Article Google Scholar
  28. Rastegari, S., Hingston, P., Lam, C.P.: Evolving statistical rulesets for network intrusion detection. Appl. Soft Comput. 33, 348–359 (2015)
    Article Google Scholar
  29. Kanakarajan, N., Muniasamy, K.: Improving the accuracy of intrusion detection using GAR-Forest with feature selection. In: Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA), pp. 539–547 (2016)
  30. Hassanien, A., Kim, T.H., Kacprzyk, J., Awad, A.: Bio-inspiring cyber security and cloud services: trends and innovations. Springer, New York (2014)
    Book Google Scholar
  31. Pajouh, H., Dastghaibyfard, G., Hashemi, S.: Two-tier network anomaly detection model: a machine learning approach. Jo. Intell. Inform. Syst. 48(1), 61–74 (2017)
    Article Google Scholar
  32. Pandeeswari, N., Kumar, G.: Anomaly detection system in cloud environment using fuzzy clustering-based ANN. Mob. Netw. Appl. 21(3), 494–505 (2016)
    Article Google Scholar
  33. Ingre, B., & Yadav, A.: Performance analysis of NSL-KDD dataset using ANN. In: International Conference on Signal Processing and Communication Engineering Systems, pp. 92–96 (2015)
  34. Bamakan, S., Wang, H., Yingjie, T., Shi, Y.: An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization. Neurocomputing 199, 90–102 (2016)
    Article Google Scholar
  35. Raman, M., Somu, N., Kirthivasan, K., Sriram, V.: A hypergraph and arithmetic residue-based probabilistic neural network for classification in intrusion detection systems. Neural Netw. 92, 89–97 (2017)
    Article Google Scholar
  36. Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.: A detailed analysis of the KDD CUP 99 data set. In: 2009 Symposium on Computational Intelligence for Security and Defense Applications. IEEE, pp. 1–6 (2009)
  37. Revathi, S., Malathi, A.: A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection. Int. J. Eng. Res. Technol. (IJERT) 2(12), 1848–1853 (2013)
    Google Scholar
  38. Zadeh, L.: Fuzzy logic: a personal perspective. Fuzzy Sets Syst. 281, 4–20 (2015)
    Article MathSciNet MATH Google Scholar
  39. Weka Simulation: Weka 3 Machine Learning Software in Java. University of Waikato. https://www.cs.waikato.ac.nz/ml/weka/ (2019). Accessed 16 Mar 2019

Download references