Published February 28, 2023 | Version CC BY-NC-ND 4.0
Journal article Open

Reviewing a New Optimized an ANFIS-Based Framework for Detecting Intrusion Detection System with Machine Learning Algorithms (Deep Learning Algorithm)

  • 1. Department of Computer Science and Engineering, LNCT University, Bhopal (M.P), India.

Contributors

Contact person:

  • 1. Department of Computer Science and Engineering, LNCT University, Bhopal (M.P), India.

Description

Abstract: Today's world is becoming more interconnected due to the current global internet, communication, or ways of doing business that have recently shifted to cloud computing platforms in order to increase their speed and productivity. But such can also be affected by cyber attacks on cloud infrastructure services to be executed on various cloud platforms, increasing the number of attacks on such systems to neutralize any harm caused by a cyber attack on such cloud-based infrastructure. Although network administrators utilize intrusion detection systems (IDS) to detect threats and anomalies, they frequently only make available post-attack ready to act in cyber warfare. If we could predict risky behavior, network administrators or security-enhancing software could intervene before harm was done. Incoming intrusion detection messages should be viewed as a sequence. The fundamental function of an intrusion detection system (IDS) is to distinguish between regular and abnormal network traffic. As a result, robust intrusion detection systems (IDS) using deep learning model are required to find such cyber risk in form of threats and anomalies on cloud based infrastructure.

Notes

Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP) © Copyright: All rights reserved.

Files

B39161212222.pdf

Files (548.7 kB)

Name Size Download all
md5:1c770bd7155fbdbf52224629a397de46
548.7 kB Preview Download

Additional details

Related works

Is cited by
Journal article: 2249-8958 (ISSN)

References

  • Ray, L.L. "Challenges to multi-layer feed forward neural networks in intrusion detection", Issues in Information Systems, 17(1), 89-98, 2016.
  • Ray, L.L. "Training and testing anomaly-based neural network intrusion detection systems", International Journal of Information Security Science, 2(2), 57-63, 2013.
  • Lee S, Kleiner BH. "Electronic surveillance in the workplace. Management Research" News. Mar 1, 2003.
  • Palayoor, Alex Joy, and D. Mavoothu. "Ethical Orientation: A Solution for Workplace Monitoring and Privacy Issues." ISBN: 978-1-943295-14-2, Jan 2020.
  • Straehle C. "Introduction: Vulnerability, Autonomy and Applied Ethics. In Vulnerability, Autonomy, and Applied Ethics" Oct 4 (pp. 7-16), 2016.
  • Inadyuti Dutt, Soumya Paul and Dipayan Bandyopadyay. "Security in All-Optical Network using Artificial Neural Network", International Journal of Advanced Research in Computer Science, Vol. 3, No. 2. 2012.
  • Yang X S "Introduction to computational mathematics". World Scientific, Singapore, 2008.
  • J. H. Holland, "Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence". Cambridge, MA, USA: MIT Press, 1992.
  • S. Kirkpatrick, C. D. Gelatt, and M. P. Vecchi, "Optimization by simulated annealing,'' Science, vol. 220, no. 4598, pp. 671-680, 1983.
  • F. Glover and C. Mcmillan, "The general employee scheduling problem. An integration of MS and AI,'' Comput. Oper. Res., vol. 13, no. 5, pp. 563-573, Jan. 1986.
  • R. Eberhart and J. Kennedy, ``A new optimizer using particle swarm theory,'' in Proc. 6th Int. Symp. Micro Mach. Human Sci., pp. 39-43, Oct. 1995.
  • P. Civicioglu, ``Transforming geocentric Cartesian coordinates to geodetic coordinates by using differential search algorithm,'' Comput. Geosci., vol. 46, pp. 229-247, Sep. 2012.
  • Z. Woo Geem, J. Hoon Kim, and G. V. Loganathan, ``A new heuristic optimization algorithm: Harmony search,'' SIMULATION, vol. 76, no. 2, pp. 60-68, Feb. 2001.
  • S.-C. Chu, P.-W. Tsai, and J.-S. Pan, ``Cat swarm optimization,'' in Proc. Paci c Rim Int. Conf. Artif. Intell. Berlin, Germany: Springer, pp. 854-858, 2006.
  • X.-S. Yang, Nature-Inspired Metaheuristic Algorithms. Bristol, U.K.: Luniver Press, 2010.
  • X.-S. Yang and S. Deb, ``Engineering optimisation by cuckoo search,'' Int. J. Math. Model. Numer. Optim., vol. 1, no. 4, pp. 330-343, 2010.
  • X.-S. Yang, ``A new metaheuristic bat-inspired algorithm,'' in Nature Inspired Cooperative Strategies for Optimization (NICSO). Berlin, Germany: Springer, pp. 65-74, 2010.
  • M. Dorigo and M. Birattari, ``Ant colony optimization,'' in Encyclopedia of Machine Learning. Springer, pp. 36-39, 2011.
  • A. H. Gandomi and A. H. Alavi, ``Krill herd: A new bio-inspired optimization algorithm,'' Commun. Nonlinear Sci. Numer. Simul., vol. 17, no. 12, pp. 4831-4845, Dec. 2012.
  • X. Meng, Y. Liu, X. Gao, and H. Zhang, ``A new bio-inspired algorithm: Chicken swarm optimization,'' in Proc. Int. Conf. Swarm Intell. Springer, pp. 86-94, 2014.
  • S. Mirjalili, S. M. Mirjalili, and A. Lewis, ``Grey wolf optimizer,'' Adv. Eng. Softw., vol. 69, pp. 46-61, Mar. 2014.
  • A. S. Assiri, A. G. Hussien, and M. Amin, ``Ant lion optimization: Variants, hybrids, and applications,'' IEEE Access, vol. 8, pp. 77746-77764, 2020.
  • A. G. Hussien, A. E. Hassanien, E. H. Houssein, M. Amin, and A. T. Azar, ``New binary whale optimization algorithm for discrete optimization problems,'' Eng. Optim., vol. 52, no. 6, pp. 945-959, Jun. 2020.
  • S. Mirjalili, ``Dragon y algorithm: A new meta-heuristic optimization technique for solving single-objective, discrete, and multi-objective problems,'' Neural Comput. Appl., vol. 27, no. 4, pp. 1053-1073, May 2016.
  • S. Saremi, S. Mirjalili, and A. Lewis, ``Grasshopper optimisation algorithm: Theory and application,'' Adv. Eng. Softw., vol. 105, pp. 30-47, Mar. 2017.
  • A. G. Hussien, A. E. Hassanien, and E. H. Houssein, ``Swarming behaviour of salps algorithm for predicting chemical compound activities,'' in Proc. 8th Int. Conf. Intell. Comput. Inf. Syst. (ICICIS), pp. 315-320, Dec. 2017.
  • A. A. Heidari, S. Mirjalili, H. Faris, I. Aljarah, M. Mafarja, and H. Chen, ``Harris hawks optimization: Algorithm and applications,'' Future Gener. Comput. Syst., vol. 97, pp. 849-872, Aug. 2019.
  • Z. Wei, C. Huang, X. Wang, T. Han, and Y. Li, ``Nuclear reaction optimization: A novel and powerful physics-based algorithm for global optimization,'' IEEE Access, vol. 7, pp. 66084-66109, 2019.
  • Askarzadeh A A novel metaheuristic method for solving constrained engineering optimization problems: crow search algorithm. Comput Struct 169:1–12, 2016.
  • Hassanien AE, Rizk-Allah RM, Elhoseny M, A hybrid crow search algorithm based on rough searching scheme for solving engineering optimization problems. J Amb Intell Hum Comput. https://doi.org/10.1007/s1265 2-018-0924-y, 2018.
  • P.Anuradha T. Agrawal, P. S. "An Expert System for Home Health Monitoring: The ANFIS Approach". , International Journal of Scientific and Research Publications, Volume 3, Issue ISSN 2250-3153, July 2013.
  • Vinayakumar et al., "Deep Learning Approach for Intelligent Intrusion Detection System", IEEE Access, Vol. 7, pp. 41525- 41550, 2019.
  • T. A. Tang, L. Mhamdi, D. McLernon, S. A. R. Zaidi, and M. Ghogho, "Deep learning approach for network intrusion detection in software defined networking," in 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM). IEEE, pp. 258–263, 2016.
  • Z. Wang, "The applications of deep learning on traffic identification," BlackHat USA, vol. 24, no. 11, pp. 1–10, 2015.
  • A. Javaid, Q. Niyaz, W. Sun, and M. Alam, "A deep learning approach for network intrusion detection system," in Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), pp. 21–26, 2016.
  • G. Zhao, C. Zhang, and L. Zheng, "Intrusion detection using deep belief network and probabilistic neural network," in 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), vol. 1. IEEE, pp. 639–642, 2017.
  • J. Li, Y. Liu, Z. Zhang, J. Ren, and N. Zhao, "Towards Green IoT Networking: Performance Optimization of Network Coding Based Communication and Reliable Storage," IEEE Access, vol. 5, pp. 8780– 8791, 2017, doi: 10.1109/ACCESS.2017.2706328.
  • A. K. Jones and R. S. Sielken. Computer System Intrusion Detection: A Survey. [Online]. Available: http://www.cs.virginia.edu/~jones/IDSresearch/Documents/jonessielken-survey-v11.pdf
  • S Manimurugan , Al-qdah Majdi , Mustaffa Mohmmed , C Narmatha , R Varatharajan , Intrusion Detection in Networks using Crow Search Optimization algorithm with Adaptive Neuro-Fuzzy Inference System, Microprocessors and Microsystems (2020), doi: https://doi.org/10.1016/j.micpro.2020.103261

Subjects

ISSN: 2249-8958 (Online)
https://portal.issn.org/resource/ISSN/2249-8958#
Retrieval Number: 100.1/ijeat.B39161212222
https://www.ijeat.org/portfolio-item/B39161212222/
Journal Website: www.ijeat.org
https://www.ijeat.org
Publisher: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP)
https://www.blueeyesintelligence.org