Enhanced Chimp Optimization-Based Feature Selection with Fuzzy Logic-Based Intrusion Detection System in Cloud Environment

被引:10
作者
Alohali, Manal Abdullah [1 ]
Elsadig, Muna [1 ]
Al-Wesabi, Fahd N. N. [2 ]
Al Duhayyim, Mesfer [3 ]
Hilal, Anwer Mustafa [4 ]
Motwakel, Abdelwahed [5 ]
机构
[1] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Syst, POB 84428, Riyadh 11671, Saudi Arabia
[2] King Khalid Univ, Coll Sci & Art Mahayil, Dept Comp Sci, Abha 62529, Saudi Arabia
[3] Prince Sattam Bin Abdulaziz Univ, Coll Comp Engn & Sci, Dept Comp Sci, Al Kharj 16273, Saudi Arabia
[4] Prince Sattam Bin Abdulaziz Univ, Dept Comp & Self Dev, Preparatory Year Deanship, Al Kharj 16278, Saudi Arabia
[5] Prince Sattam Bin Abdulaziz Univ, Coll Business Adm Hawtat bani Tamim, Dept Informat Syst, Al Kharj 16278, Saudi Arabia
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 04期
关键词
cloud security; metaheuristics; optimization algorithm; feature selection; fuzzy logic; intrusion detection;
D O I
10.3390/app13042580
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Cloud computing (CC) refers to an Internet-based computing technology in which shared resources, such as storage, software, information, and platform, are offered to users on demand. CC is a technology through which virtualized and dynamically scalable resources are presented to users on the Internet. Security is highly significant in this on-demand CC. Therefore, this paper presents improved metaheuristics with a fuzzy logic-based intrusion detection system for the cloud security (IMFL-IDSCS) technique. The IMFL-IDSCS technique can identify intrusions in the distributed CC platform and secure it from probable threats. An individual sample of IDS is deployed for every client, and it utilizes an individual controller for data management. In addition, the IMFL-IDSCS technique uses an enhanced chimp optimization algorithm-based feature selection (ECOA-FS) method for choosing optimal features, followed by an adaptive neuro-fuzzy inference system (ANFIS) model enforced to recognize intrusions. Finally, the hybrid jaya shark smell optimization (JSSO) algorithm is used to optimize the membership functions (MFs). A widespread simulation analysis is performed to examine the enhanced outcomes of the IMFL-IDSCS technique. The extensive comparison study reported the enhanced outcomes of the IMFL-IDSCS model with maximum detection efficiency with accuracy of 99.31%, precision of 92.03%, recall of 78.25%, and F-score of 81.80%.
引用
收藏
页数:16
相关论文
共 31 条
[1]  
Achbarou Omar, 2018, International Journal of Communication Networks and Information Security, V10, P526
[2]   A multi-objective privacy preservation model for cloud security using hybrid Jaya-based shark smell optimization [J].
Ahamad, Danish ;
Hameed, Shabi Alam ;
Akhtar, Mobin .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (06) :2343-2358
[3]   Effective Intrusion Detection System to Secure Data in Cloud Using Machine Learning [J].
Aldallal, Ammar ;
Alisa, Faisal .
SYMMETRY-BASEL, 2021, 13 (12)
[4]   Cloud security based attack detection using transductive learning integrated with Hidden Markov Model [J].
Aoudni, Yassine ;
Donald, Cecil ;
Farouk, Ahmed ;
Sahay, Kishan Bhushan ;
Babu, D. Vijendra ;
Tripathi, Vikas ;
Dhabliya, Dharmesh .
PATTERN RECOGNITION LETTERS, 2022, 157 :16-26
[5]   A Survey on Intrusion Detection Systems for Fog and Cloud Computing [J].
Chang, Victor ;
Golightly, Lewis ;
Modesti, Paolo ;
Xu, Qianwen Ariel ;
Doan, Le Minh Thao ;
Hall, Karl ;
Boddu, Sreeja .
FUTURE INTERNET, 2022, 14 (03)
[6]  
Department of Computer Science Faculty of Computers and Information Menoufia University Egypt, 2019, International Journal of Computer Network and Information Security, V11, P22, DOI [10.5815/ijcnis.2019.03.04, DOI 10.5815/IJCNIS.2019.03.04]
[7]   A Design Of An Integrated Cloud-based Intrusion Detection System With Third Party Cloud Service [J].
Elmasry, Wisam ;
Akbulut, Akhan ;
Zaim, Abdul Halim .
OPEN COMPUTER SCIENCE, 2021, 11 (01) :365-379
[8]  
Fontaine J., 2019, INT C P2P PARALLEL G, P197
[9]  
Fu X., 2019, P IEEE GLOBAL COMMUN, P1
[10]   A FKPCA-GWO WDBiLSTM classifier for intrusion detection system in cloud environments [J].
Geetha, T., V ;
Deepa, A. J. .
KNOWLEDGE-BASED SYSTEMS, 2022, 253