Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing

Cloud computing is a rapidly developing Internet technology for facilitating various services to consumers. This technology suggests a considerable potential to the public or to large companies, such as Amazon, Google, Microsoft and IBM. This technology is aimed at providing a flexible IT architectu...

Full description

Bibliographic Details
Main Authors: Fahad, Ahmed Mohammed, Ahmed, Abdulghani Ali, M. N. M., Kahar
Other Authors: Vasant, Pandian
Format: Book Section
Language:English
English
Published: Springer Nature 2019
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/22303/
http://umpir.ump.edu.my/id/eprint/22303/
http://umpir.ump.edu.my/id/eprint/22303/
http://umpir.ump.edu.my/id/eprint/22303/1/Network%20Intrusion%20Detection%20Framework1.pdf
http://umpir.ump.edu.my/id/eprint/22303/7/21.%20Network%20Intrusion%20Detection%20Framework%20Based%20on%20Whale%20Swarm%20Algorithm.pdf
id ump-22303
recordtype eprints
spelling ump-223032019-11-12T03:15:13Z http://umpir.ump.edu.my/id/eprint/22303/ Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing Fahad, Ahmed Mohammed Ahmed, Abdulghani Ali M. N. M., Kahar QA75 Electronic computers. Computer science Cloud computing is a rapidly developing Internet technology for facilitating various services to consumers. This technology suggests a considerable potential to the public or to large companies, such as Amazon, Google, Microsoft and IBM. This technology is aimed at providing a flexible IT architecture which is accessible through the Internet for lightweight portability. However, many issues must be resolved before cloud computing can be accepted as a viable option to business computing. Cloud computing undergoes several challenges in security because it is prone to numerous attacks, such as flooding attacks which are the major problems in cloud computing and one of the serious threat to cloud computing originates came from denial of service. This research is aimed at exploring the mechanisms or models that can detect attacks. Intrusion detection system is a detection model for these attacks and is divided into two-type H-IDS and N-IDS. We focus on the N-IDS in Eucalyptus cloud computing to detect DDoS attacks, such as UDP and TCP, to evaluate the output dataset in MATLAB. Therefore, all technology reviews will be solely based on network traffic data. Furthermore, the H-IDS is disregarded in this work. Springer Nature Vasant, Pandian Zelinka, Ivan Weber, Gerhard-Wilhelm 2019 Book Section PeerReviewed pdf en http://umpir.ump.edu.my/id/eprint/22303/1/Network%20Intrusion%20Detection%20Framework1.pdf pdf en http://umpir.ump.edu.my/id/eprint/22303/7/21.%20Network%20Intrusion%20Detection%20Framework%20Based%20on%20Whale%20Swarm%20Algorithm.pdf Fahad, Ahmed Mohammed and Ahmed, Abdulghani Ali and M. N. M., Kahar (2019) Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing. In: ICO 2018: Intelligent Computing & Optimization. Advances in Intelligent Systems and Computing, 866 . Springer Nature, Switzerland, pp. 56-65. ISBN 978-3-030-00979-3 https://doi.org/10.1007/978-3-030-00979-3_6 https://doi.org/10.1007/978-3-030-00979-3_6
repository_type Digital Repository
institution_category Local University
institution Universiti Malaysia Pahang
building UMP Institutional Repository
collection Online Access
language English
English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Fahad, Ahmed Mohammed
Ahmed, Abdulghani Ali
M. N. M., Kahar
Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing
description Cloud computing is a rapidly developing Internet technology for facilitating various services to consumers. This technology suggests a considerable potential to the public or to large companies, such as Amazon, Google, Microsoft and IBM. This technology is aimed at providing a flexible IT architecture which is accessible through the Internet for lightweight portability. However, many issues must be resolved before cloud computing can be accepted as a viable option to business computing. Cloud computing undergoes several challenges in security because it is prone to numerous attacks, such as flooding attacks which are the major problems in cloud computing and one of the serious threat to cloud computing originates came from denial of service. This research is aimed at exploring the mechanisms or models that can detect attacks. Intrusion detection system is a detection model for these attacks and is divided into two-type H-IDS and N-IDS. We focus on the N-IDS in Eucalyptus cloud computing to detect DDoS attacks, such as UDP and TCP, to evaluate the output dataset in MATLAB. Therefore, all technology reviews will be solely based on network traffic data. Furthermore, the H-IDS is disregarded in this work.
author2 Vasant, Pandian
author_facet Vasant, Pandian
Fahad, Ahmed Mohammed
Ahmed, Abdulghani Ali
M. N. M., Kahar
format Book Section
author Fahad, Ahmed Mohammed
Ahmed, Abdulghani Ali
M. N. M., Kahar
author_sort Fahad, Ahmed Mohammed
title Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing
title_short Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing
title_full Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing
title_fullStr Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing
title_full_unstemmed Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing
title_sort network intrusion detection framework based on whale swarm algorithm and artificial neural network in cloud computing
publisher Springer Nature
publishDate 2019
url http://umpir.ump.edu.my/id/eprint/22303/
http://umpir.ump.edu.my/id/eprint/22303/
http://umpir.ump.edu.my/id/eprint/22303/
http://umpir.ump.edu.my/id/eprint/22303/1/Network%20Intrusion%20Detection%20Framework1.pdf
http://umpir.ump.edu.my/id/eprint/22303/7/21.%20Network%20Intrusion%20Detection%20Framework%20Based%20on%20Whale%20Swarm%20Algorithm.pdf
first_indexed 2023-09-18T22:33:07Z
last_indexed 2023-09-18T22:33:07Z
_version_ 1777416418399092736