Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

An Efficient Automatic Intrusion Detection in Cloud Using Optimized Fuzzy Inference System

View through CrossRef
Security incidents such as denial of service (DoS), scanning, malware code injection, viruses, worms, and password cracking are becoming common in a cloud environment that affects companies and may produce a financial loss if not detected in time. Such problems are handled by presenting an intrusion detection system (IDS) into the cloud. The existing cloud IDSs affect low detection accuracy, high false detection rate, and execution time. To overcome this problem, in this article, a gravitational search algorithm-based fuzzy inference system (GSA-FIS) is developed as intrusion detection. In this approach, fuzzy parameters are optimized using GSA. The proposed consist of two modules namely; possibilistic fuzzy c-means (PFCM) based clustering, training based on the GSA-FIS, and testing process. Initially, the incoming data is pre-processed and clustered with the help of PFCM. PFCM detects the noise of fuzzy c-means clustering (FCM), then conquers the coincident cluster problem of possibilistic fuzzy c-means (PCM) and eradicate the row sum constraints of fuzzy possibilistic c-means clustering (FPCM). After the clustering process, the clustered data is given to the optimized fuzzy inference system (OFIS). Here, normal and abnormal data are identified by the fuzzy score, while the training is done by the GSA through optimizing the entire fuzzy system. In this approach, four types of abnormal data are detected namely- probe, remote to local (R2L), user to root (U2R), and DoS. Simulation results show that the performance of the proposed GSA-FIS based IDS outperforms that of the different schemes in terms of precision, recall and F-measure.
Title: An Efficient Automatic Intrusion Detection in Cloud Using Optimized Fuzzy Inference System
Description:
Security incidents such as denial of service (DoS), scanning, malware code injection, viruses, worms, and password cracking are becoming common in a cloud environment that affects companies and may produce a financial loss if not detected in time.
Such problems are handled by presenting an intrusion detection system (IDS) into the cloud.
The existing cloud IDSs affect low detection accuracy, high false detection rate, and execution time.
To overcome this problem, in this article, a gravitational search algorithm-based fuzzy inference system (GSA-FIS) is developed as intrusion detection.
In this approach, fuzzy parameters are optimized using GSA.
The proposed consist of two modules namely; possibilistic fuzzy c-means (PFCM) based clustering, training based on the GSA-FIS, and testing process.
Initially, the incoming data is pre-processed and clustered with the help of PFCM.
PFCM detects the noise of fuzzy c-means clustering (FCM), then conquers the coincident cluster problem of possibilistic fuzzy c-means (PCM) and eradicate the row sum constraints of fuzzy possibilistic c-means clustering (FPCM).
After the clustering process, the clustered data is given to the optimized fuzzy inference system (OFIS).
Here, normal and abnormal data are identified by the fuzzy score, while the training is done by the GSA through optimizing the entire fuzzy system.
In this approach, four types of abnormal data are detected namely- probe, remote to local (R2L), user to root (U2R), and DoS.
Simulation results show that the performance of the proposed GSA-FIS based IDS outperforms that of the different schemes in terms of precision, recall and F-measure.

Related Results

Konstruksi Sistem Inferensi Fuzzy Menggunakan Subtractive Fuzzy C-Means pada Data Parkinson
Konstruksi Sistem Inferensi Fuzzy Menggunakan Subtractive Fuzzy C-Means pada Data Parkinson
Abstract. Fuzzy Inference System requires several stages to get the output, 1) formation of fuzzy sets, 2) formation of rules, 3) application of implication functions, 4) compositi...
Generated Fuzzy Quasi-ideals in Ternary Semigroups
Generated Fuzzy Quasi-ideals in Ternary Semigroups
Here in this paper, we provide characterizations of fuzzy quasi-ideal in terms of level and strong level subsets. Along with it, we provide expression for the generated fuzzy quasi...
New Approaches of Generalised Fuzzy Soft sets on fuzzy Codes and Its Properties on Decision-Makings
New Approaches of Generalised Fuzzy Soft sets on fuzzy Codes and Its Properties on Decision-Makings
Background Several scholars defined the concepts of fuzzy soft set theory and their application on decision-making problem. Based on this concept, researchers defined the generalis...
New Approaches of Generalised Fuzzy Soft sets on fuzzy Codes and Its Properties on Decision-Makings
New Approaches of Generalised Fuzzy Soft sets on fuzzy Codes and Its Properties on Decision-Makings
Background Several scholars defined the concepts of fuzzy soft set theory and their application on decision-making problem. Based on this concept, researchers defined the generalis...
Fuzzy Chaotic Neural Networks
Fuzzy Chaotic Neural Networks
An understanding of the human brain’s local function has improved in recent years. But the cognition of human brain’s working process as a whole is still obscure. Both fuzzy logic ...
Fuzzy Semantic Models of Fuzzy Concepts in Fuzzy Systems
Fuzzy Semantic Models of Fuzzy Concepts in Fuzzy Systems
The fuzzy properties of language semantics are a central problem towards machine-enabled natural language processing in cognitive linguistics, fuzzy systems, and computational ling...
FUZZY RINGS AND ITS PROPERTIES
FUZZY RINGS AND ITS PROPERTIES
Abstract One of algebraic structure that involves a binary operation is a group that is defined  an un empty set (classical) with an associative binary operation, it has identity e...
INTELLIGENT INTRUSION DETECTION FOR ENHANCED SECURITY IN CLOUD COMPUTING
INTELLIGENT INTRUSION DETECTION FOR ENHANCED SECURITY IN CLOUD COMPUTING
Advancements of cloud computing called for the storage of big data through the use of clouds but this came with a lot of risk. Thus, this thesis is aimed to manage these risks by p...

Back to Top