Reviewing a New Optimized an ANFIS-Based Framework for Detecting Intrusion Detection System with Machine Learning Algorithms (Deep Learning Algorithm)
Creators
- 1. Department of Computer Science and Engineering, LNCT University, Bhopal (M.P), India.
Contributors
Contact person:
- 1. Department of Computer Science and Engineering, LNCT University, Bhopal (M.P), India.
Description
Abstract: Today's world is becoming more interconnected due to the current global internet, communication, or ways of doing business that have recently shifted to cloud computing platforms in order to increase their speed and productivity. But such can also be affected by cyber attacks on cloud infrastructure services to be executed on various cloud platforms, increasing the number of attacks on such systems to neutralize any harm caused by a cyber attack on such cloud-based infrastructure. Although network administrators utilize intrusion detection systems (IDS) to detect threats and anomalies, they frequently only make available post-attack ready to act in cyber warfare. If we could predict risky behavior, network administrators or security-enhancing software could intervene before harm was done. Incoming intrusion detection messages should be viewed as a sequence. The fundamental function of an intrusion detection system (IDS) is to distinguish between regular and abnormal network traffic. As a result, robust intrusion detection systems (IDS) using deep learning model are required to find such cyber risk in form of threats and anomalies on cloud based infrastructure.
Notes
Files
B39161212222.pdf
Files
(548.7 kB)
Name | Size | Download all |
---|---|---|
md5:1c770bd7155fbdbf52224629a397de46
|
548.7 kB | Preview Download |
Additional details
Related works
- Is cited by
- Journal article: 2249-8958 (ISSN)
References
- Ray, L.L. "Challenges to multi-layer feed forward neural networks in intrusion detection", Issues in Information Systems, 17(1), 89-98, 2016.
- Ray, L.L. "Training and testing anomaly-based neural network intrusion detection systems", International Journal of Information Security Science, 2(2), 57-63, 2013.
- Lee S, Kleiner BH. "Electronic surveillance in the workplace. Management Research" News. Mar 1, 2003.
- Palayoor, Alex Joy, and D. Mavoothu. "Ethical Orientation: A Solution for Workplace Monitoring and Privacy Issues." ISBN: 978-1-943295-14-2, Jan 2020.
- Straehle C. "Introduction: Vulnerability, Autonomy and Applied Ethics. In Vulnerability, Autonomy, and Applied Ethics" Oct 4 (pp. 7-16), 2016.
- Inadyuti Dutt, Soumya Paul and Dipayan Bandyopadyay. "Security in All-Optical Network using Artificial Neural Network", International Journal of Advanced Research in Computer Science, Vol. 3, No. 2. 2012.
- Yang X S "Introduction to computational mathematics". World Scientific, Singapore, 2008.
- J. H. Holland, "Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence". Cambridge, MA, USA: MIT Press, 1992.
- S. Kirkpatrick, C. D. Gelatt, and M. P. Vecchi, "Optimization by simulated annealing,'' Science, vol. 220, no. 4598, pp. 671-680, 1983.
- F. Glover and C. Mcmillan, "The general employee scheduling problem. An integration of MS and AI,'' Comput. Oper. Res., vol. 13, no. 5, pp. 563-573, Jan. 1986.
- R. Eberhart and J. Kennedy, ``A new optimizer using particle swarm theory,'' in Proc. 6th Int. Symp. Micro Mach. Human Sci., pp. 39-43, Oct. 1995.
- P. Civicioglu, ``Transforming geocentric Cartesian coordinates to geodetic coordinates by using differential search algorithm,'' Comput. Geosci., vol. 46, pp. 229-247, Sep. 2012.
- Z. Woo Geem, J. Hoon Kim, and G. V. Loganathan, ``A new heuristic optimization algorithm: Harmony search,'' SIMULATION, vol. 76, no. 2, pp. 60-68, Feb. 2001.
- S.-C. Chu, P.-W. Tsai, and J.-S. Pan, ``Cat swarm optimization,'' in Proc. Paci c Rim Int. Conf. Artif. Intell. Berlin, Germany: Springer, pp. 854-858, 2006.
- X.-S. Yang, Nature-Inspired Metaheuristic Algorithms. Bristol, U.K.: Luniver Press, 2010.
- X.-S. Yang and S. Deb, ``Engineering optimisation by cuckoo search,'' Int. J. Math. Model. Numer. Optim., vol. 1, no. 4, pp. 330-343, 2010.
- X.-S. Yang, ``A new metaheuristic bat-inspired algorithm,'' in Nature Inspired Cooperative Strategies for Optimization (NICSO). Berlin, Germany: Springer, pp. 65-74, 2010.
- M. Dorigo and M. Birattari, ``Ant colony optimization,'' in Encyclopedia of Machine Learning. Springer, pp. 36-39, 2011.
- A. H. Gandomi and A. H. Alavi, ``Krill herd: A new bio-inspired optimization algorithm,'' Commun. Nonlinear Sci. Numer. Simul., vol. 17, no. 12, pp. 4831-4845, Dec. 2012.
- X. Meng, Y. Liu, X. Gao, and H. Zhang, ``A new bio-inspired algorithm: Chicken swarm optimization,'' in Proc. Int. Conf. Swarm Intell. Springer, pp. 86-94, 2014.
- S. Mirjalili, S. M. Mirjalili, and A. Lewis, ``Grey wolf optimizer,'' Adv. Eng. Softw., vol. 69, pp. 46-61, Mar. 2014.
- A. S. Assiri, A. G. Hussien, and M. Amin, ``Ant lion optimization: Variants, hybrids, and applications,'' IEEE Access, vol. 8, pp. 77746-77764, 2020.
- A. G. Hussien, A. E. Hassanien, E. H. Houssein, M. Amin, and A. T. Azar, ``New binary whale optimization algorithm for discrete optimization problems,'' Eng. Optim., vol. 52, no. 6, pp. 945-959, Jun. 2020.
- S. Mirjalili, ``Dragon y algorithm: A new meta-heuristic optimization technique for solving single-objective, discrete, and multi-objective problems,'' Neural Comput. Appl., vol. 27, no. 4, pp. 1053-1073, May 2016.
- S. Saremi, S. Mirjalili, and A. Lewis, ``Grasshopper optimisation algorithm: Theory and application,'' Adv. Eng. Softw., vol. 105, pp. 30-47, Mar. 2017.
- A. G. Hussien, A. E. Hassanien, and E. H. Houssein, ``Swarming behaviour of salps algorithm for predicting chemical compound activities,'' in Proc. 8th Int. Conf. Intell. Comput. Inf. Syst. (ICICIS), pp. 315-320, Dec. 2017.
- A. A. Heidari, S. Mirjalili, H. Faris, I. Aljarah, M. Mafarja, and H. Chen, ``Harris hawks optimization: Algorithm and applications,'' Future Gener. Comput. Syst., vol. 97, pp. 849-872, Aug. 2019.
- Z. Wei, C. Huang, X. Wang, T. Han, and Y. Li, ``Nuclear reaction optimization: A novel and powerful physics-based algorithm for global optimization,'' IEEE Access, vol. 7, pp. 66084-66109, 2019.
- Askarzadeh A A novel metaheuristic method for solving constrained engineering optimization problems: crow search algorithm. Comput Struct 169:1–12, 2016.
- Hassanien AE, Rizk-Allah RM, Elhoseny M, A hybrid crow search algorithm based on rough searching scheme for solving engineering optimization problems. J Amb Intell Hum Comput. https://doi.org/10.1007/s1265 2-018-0924-y, 2018.
- P.Anuradha T. Agrawal, P. S. "An Expert System for Home Health Monitoring: The ANFIS Approach". , International Journal of Scientific and Research Publications, Volume 3, Issue ISSN 2250-3153, July 2013.
- Vinayakumar et al., "Deep Learning Approach for Intelligent Intrusion Detection System", IEEE Access, Vol. 7, pp. 41525- 41550, 2019.
- T. A. Tang, L. Mhamdi, D. McLernon, S. A. R. Zaidi, and M. Ghogho, "Deep learning approach for network intrusion detection in software defined networking," in 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM). IEEE, pp. 258–263, 2016.
- Z. Wang, "The applications of deep learning on traffic identification," BlackHat USA, vol. 24, no. 11, pp. 1–10, 2015.
- A. Javaid, Q. Niyaz, W. Sun, and M. Alam, "A deep learning approach for network intrusion detection system," in Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), pp. 21–26, 2016.
- G. Zhao, C. Zhang, and L. Zheng, "Intrusion detection using deep belief network and probabilistic neural network," in 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), vol. 1. IEEE, pp. 639–642, 2017.
- J. Li, Y. Liu, Z. Zhang, J. Ren, and N. Zhao, "Towards Green IoT Networking: Performance Optimization of Network Coding Based Communication and Reliable Storage," IEEE Access, vol. 5, pp. 8780– 8791, 2017, doi: 10.1109/ACCESS.2017.2706328.
- A. K. Jones and R. S. Sielken. Computer System Intrusion Detection: A Survey. [Online]. Available: http://www.cs.virginia.edu/~jones/IDSresearch/Documents/jonessielken-survey-v11.pdf
- S Manimurugan , Al-qdah Majdi , Mustaffa Mohmmed , C Narmatha , R Varatharajan , Intrusion Detection in Networks using Crow Search Optimization algorithm with Adaptive Neuro-Fuzzy Inference System, Microprocessors and Microsystems (2020), doi: https://doi.org/10.1016/j.micpro.2020.103261
Subjects
- ISSN: 2249-8958 (Online)
- https://portal.issn.org/resource/ISSN/2249-8958#
- Retrieval Number: 100.1/ijeat.B39161212222
- https://www.ijeat.org/portfolio-item/B39161212222/
- Journal Website: www.ijeat.org
- https://www.ijeat.org
- Publisher: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP)
- https://www.blueeyesintelligence.org