Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing
Cloud computing is a rapidly developing Internet technology for facilitating various services to consumers. This technology suggests a considerable potential to the public or to large companies, such as Amazon, Google, Microsoft and IBM. This technology is aimed at providing a flexible IT architectu...
Saved in:
Main Authors: | , , |
---|---|
Other Authors: | |
Format: | Book Section |
Language: | English English |
Published: |
Springer Nature
2019
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/22303/1/Network%20Intrusion%20Detection%20Framework1.pdf http://umpir.ump.edu.my/id/eprint/22303/7/21.%20Network%20Intrusion%20Detection%20Framework%20Based%20on%20Whale%20Swarm%20Algorithm.pdf http://umpir.ump.edu.my/id/eprint/22303/ https://doi.org/10.1007/978-3-030-00979-3_6 https://doi.org/10.1007/978-3-030-00979-3_6 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Cloud computing is a rapidly developing Internet technology for facilitating various services to consumers. This technology suggests a considerable potential to the public or to large companies, such as Amazon, Google, Microsoft and IBM. This technology is aimed at providing a flexible IT architecture which is accessible through the Internet for lightweight portability. However, many issues must be resolved before cloud computing can be accepted as a viable option to business computing. Cloud computing undergoes several challenges in security because it is prone to numerous attacks, such as flooding attacks which are the major problems in cloud computing and one of the serious threat to cloud computing originates came from denial of service. This research is aimed at exploring the mechanisms or models that can detect attacks. Intrusion detection system is a detection model for these attacks and is divided into two-type H-IDS and N-IDS. We focus on the N-IDS in Eucalyptus cloud computing to detect DDoS attacks, such as UDP and TCP, to evaluate the output dataset in MATLAB. Therefore, all technology reviews will be solely based on network traffic data. Furthermore, the H-IDS is disregarded in this work. |
---|