Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing
Cloud computing is a rapidly developing Internet technology for facilitating various services to consumers. This technology suggests a considerable potential to the public or to large companies, such as Amazon, Google, Microsoft and IBM. This technology is aimed at providing a flexible IT architectu...
Main Authors: | , , |
---|---|
Other Authors: | |
Format: | Book Section |
Language: | English English |
Published: |
Springer Nature
2019
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/22303/ http://umpir.ump.edu.my/id/eprint/22303/ http://umpir.ump.edu.my/id/eprint/22303/ http://umpir.ump.edu.my/id/eprint/22303/1/Network%20Intrusion%20Detection%20Framework1.pdf http://umpir.ump.edu.my/id/eprint/22303/7/21.%20Network%20Intrusion%20Detection%20Framework%20Based%20on%20Whale%20Swarm%20Algorithm.pdf |
id |
ump-22303 |
---|---|
recordtype |
eprints |
spelling |
ump-223032019-11-12T03:15:13Z http://umpir.ump.edu.my/id/eprint/22303/ Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing Fahad, Ahmed Mohammed Ahmed, Abdulghani Ali M. N. M., Kahar QA75 Electronic computers. Computer science Cloud computing is a rapidly developing Internet technology for facilitating various services to consumers. This technology suggests a considerable potential to the public or to large companies, such as Amazon, Google, Microsoft and IBM. This technology is aimed at providing a flexible IT architecture which is accessible through the Internet for lightweight portability. However, many issues must be resolved before cloud computing can be accepted as a viable option to business computing. Cloud computing undergoes several challenges in security because it is prone to numerous attacks, such as flooding attacks which are the major problems in cloud computing and one of the serious threat to cloud computing originates came from denial of service. This research is aimed at exploring the mechanisms or models that can detect attacks. Intrusion detection system is a detection model for these attacks and is divided into two-type H-IDS and N-IDS. We focus on the N-IDS in Eucalyptus cloud computing to detect DDoS attacks, such as UDP and TCP, to evaluate the output dataset in MATLAB. Therefore, all technology reviews will be solely based on network traffic data. Furthermore, the H-IDS is disregarded in this work. Springer Nature Vasant, Pandian Zelinka, Ivan Weber, Gerhard-Wilhelm 2019 Book Section PeerReviewed pdf en http://umpir.ump.edu.my/id/eprint/22303/1/Network%20Intrusion%20Detection%20Framework1.pdf pdf en http://umpir.ump.edu.my/id/eprint/22303/7/21.%20Network%20Intrusion%20Detection%20Framework%20Based%20on%20Whale%20Swarm%20Algorithm.pdf Fahad, Ahmed Mohammed and Ahmed, Abdulghani Ali and M. N. M., Kahar (2019) Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing. In: ICO 2018: Intelligent Computing & Optimization. Advances in Intelligent Systems and Computing, 866 . Springer Nature, Switzerland, pp. 56-65. ISBN 978-3-030-00979-3 https://doi.org/10.1007/978-3-030-00979-3_6 https://doi.org/10.1007/978-3-030-00979-3_6 |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
Universiti Malaysia Pahang |
building |
UMP Institutional Repository |
collection |
Online Access |
language |
English English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Fahad, Ahmed Mohammed Ahmed, Abdulghani Ali M. N. M., Kahar Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing |
description |
Cloud computing is a rapidly developing Internet technology for facilitating various services to consumers. This technology suggests a considerable potential to the public or to large companies, such as Amazon, Google, Microsoft and IBM. This technology is aimed at providing a flexible IT architecture which is accessible through the Internet for lightweight portability. However, many issues must be resolved before cloud computing can be accepted as a viable option to business computing. Cloud computing undergoes several challenges in security because it is prone to numerous attacks, such as flooding attacks which are the major problems in cloud computing and one of the serious threat to cloud computing originates came from denial of service. This research is aimed at exploring the mechanisms or models that can detect attacks. Intrusion detection system is a detection model for these attacks and is divided into two-type H-IDS and N-IDS. We focus on the N-IDS in Eucalyptus cloud computing to detect DDoS attacks, such as UDP and TCP, to evaluate the output dataset in MATLAB. Therefore, all technology reviews will be solely based on network traffic data. Furthermore, the H-IDS is disregarded in this work. |
author2 |
Vasant, Pandian |
author_facet |
Vasant, Pandian Fahad, Ahmed Mohammed Ahmed, Abdulghani Ali M. N. M., Kahar |
format |
Book Section |
author |
Fahad, Ahmed Mohammed Ahmed, Abdulghani Ali M. N. M., Kahar |
author_sort |
Fahad, Ahmed Mohammed |
title |
Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing |
title_short |
Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing |
title_full |
Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing |
title_fullStr |
Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing |
title_full_unstemmed |
Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing |
title_sort |
network intrusion detection framework based on whale swarm algorithm and artificial neural network in cloud computing |
publisher |
Springer Nature |
publishDate |
2019 |
url |
http://umpir.ump.edu.my/id/eprint/22303/ http://umpir.ump.edu.my/id/eprint/22303/ http://umpir.ump.edu.my/id/eprint/22303/ http://umpir.ump.edu.my/id/eprint/22303/1/Network%20Intrusion%20Detection%20Framework1.pdf http://umpir.ump.edu.my/id/eprint/22303/7/21.%20Network%20Intrusion%20Detection%20Framework%20Based%20on%20Whale%20Swarm%20Algorithm.pdf |
first_indexed |
2023-09-18T22:33:07Z |
last_indexed |
2023-09-18T22:33:07Z |
_version_ |
1777416418399092736 |