Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing

Cloud computing is a rapidly developing Internet technology for facilitating various services to consumers. This technology suggests a considerable potential to the public or to large companies, such as Amazon, Google, Microsoft and IBM. This technology is aimed at providing a flexible IT architectu...

Full description

Saved in:
Bibliographic Details
Main Authors: Fahad, Ahmed Mohammed, Ahmed, Abdulghani Ali, M. N. M., Kahar
Other Authors: Vasant, Pandian
Format: Book Section
Language:English
English
Published: Springer Nature 2019
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/22303/1/Network%20Intrusion%20Detection%20Framework1.pdf
http://umpir.ump.edu.my/id/eprint/22303/7/21.%20Network%20Intrusion%20Detection%20Framework%20Based%20on%20Whale%20Swarm%20Algorithm.pdf
http://umpir.ump.edu.my/id/eprint/22303/
https://doi.org/10.1007/978-3-030-00979-3_6
https://doi.org/10.1007/978-3-030-00979-3_6
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.ump.umpir.22303
record_format eprints
spelling my.ump.umpir.223032019-11-12T03:15:13Z http://umpir.ump.edu.my/id/eprint/22303/ Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing Fahad, Ahmed Mohammed Ahmed, Abdulghani Ali M. N. M., Kahar QA75 Electronic computers. Computer science Cloud computing is a rapidly developing Internet technology for facilitating various services to consumers. This technology suggests a considerable potential to the public or to large companies, such as Amazon, Google, Microsoft and IBM. This technology is aimed at providing a flexible IT architecture which is accessible through the Internet for lightweight portability. However, many issues must be resolved before cloud computing can be accepted as a viable option to business computing. Cloud computing undergoes several challenges in security because it is prone to numerous attacks, such as flooding attacks which are the major problems in cloud computing and one of the serious threat to cloud computing originates came from denial of service. This research is aimed at exploring the mechanisms or models that can detect attacks. Intrusion detection system is a detection model for these attacks and is divided into two-type H-IDS and N-IDS. We focus on the N-IDS in Eucalyptus cloud computing to detect DDoS attacks, such as UDP and TCP, to evaluate the output dataset in MATLAB. Therefore, all technology reviews will be solely based on network traffic data. Furthermore, the H-IDS is disregarded in this work. Springer Nature Vasant, Pandian Zelinka, Ivan Weber, Gerhard-Wilhelm 2019 Book Section PeerReviewed pdf en http://umpir.ump.edu.my/id/eprint/22303/1/Network%20Intrusion%20Detection%20Framework1.pdf pdf en http://umpir.ump.edu.my/id/eprint/22303/7/21.%20Network%20Intrusion%20Detection%20Framework%20Based%20on%20Whale%20Swarm%20Algorithm.pdf Fahad, Ahmed Mohammed and Ahmed, Abdulghani Ali and M. N. M., Kahar (2019) Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing. In: ICO 2018: Intelligent Computing & Optimization. Advances in Intelligent Systems and Computing, 866 . Springer Nature, Switzerland, pp. 56-65. ISBN 978-3-030-00979-3 https://doi.org/10.1007/978-3-030-00979-3_6 https://doi.org/10.1007/978-3-030-00979-3_6
institution Universiti Malaysia Pahang
building UMP Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaysia Pahang
content_source UMP Institutional Repository
url_provider http://umpir.ump.edu.my/
language English
English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Fahad, Ahmed Mohammed
Ahmed, Abdulghani Ali
M. N. M., Kahar
Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing
description Cloud computing is a rapidly developing Internet technology for facilitating various services to consumers. This technology suggests a considerable potential to the public or to large companies, such as Amazon, Google, Microsoft and IBM. This technology is aimed at providing a flexible IT architecture which is accessible through the Internet for lightweight portability. However, many issues must be resolved before cloud computing can be accepted as a viable option to business computing. Cloud computing undergoes several challenges in security because it is prone to numerous attacks, such as flooding attacks which are the major problems in cloud computing and one of the serious threat to cloud computing originates came from denial of service. This research is aimed at exploring the mechanisms or models that can detect attacks. Intrusion detection system is a detection model for these attacks and is divided into two-type H-IDS and N-IDS. We focus on the N-IDS in Eucalyptus cloud computing to detect DDoS attacks, such as UDP and TCP, to evaluate the output dataset in MATLAB. Therefore, all technology reviews will be solely based on network traffic data. Furthermore, the H-IDS is disregarded in this work.
author2 Vasant, Pandian
author_facet Vasant, Pandian
Fahad, Ahmed Mohammed
Ahmed, Abdulghani Ali
M. N. M., Kahar
format Book Section
author Fahad, Ahmed Mohammed
Ahmed, Abdulghani Ali
M. N. M., Kahar
author_sort Fahad, Ahmed Mohammed
title Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing
title_short Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing
title_full Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing
title_fullStr Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing
title_full_unstemmed Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing
title_sort network intrusion detection framework based on whale swarm algorithm and artificial neural network in cloud computing
publisher Springer Nature
publishDate 2019
url http://umpir.ump.edu.my/id/eprint/22303/1/Network%20Intrusion%20Detection%20Framework1.pdf
http://umpir.ump.edu.my/id/eprint/22303/7/21.%20Network%20Intrusion%20Detection%20Framework%20Based%20on%20Whale%20Swarm%20Algorithm.pdf
http://umpir.ump.edu.my/id/eprint/22303/
https://doi.org/10.1007/978-3-030-00979-3_6
https://doi.org/10.1007/978-3-030-00979-3_6
_version_ 1651866904951783424
score 13.160551