A Novel Cloud Computing System Intrusion Detection Model Based on Modified Genetic Algorithm

被引:0
作者
Huang, Wen-zhun [1 ]
Xie, Xin-xin [1 ]
机构
[1] Xijing Univ, Dept Elect Informat Engn, Xian 710123, Peoples R China
来源
2016 INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY, ENVIRONMENT AND INFORMATION ENGINEERING (SEEIE 2016) | 2016年
关键词
Cloud computing; Intrusion detection; Genetic algorithm; Modification; Model;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In this paper, we propose novel cloud computing system intrusion detection model based on the modified genetic algorithm. Intrusion detection system as an important part of network security technology, in recent years has been rapid development, and technology already quite mature, today's mainstream IDS need to constantly upgrade feature library to ensure detection rules to prevent a new attack behavior, but for the IDS for a wider range of application, also must improve the test efficiency, reduce false positives and non-response rates. It depends on how the further research, including the new test model and detection method is put forward. In addition, the detection rules of good direction for the development of the study do not lose the IDS. In our method, the enhanced genetic algorithm is applied to optimize the traditional approaches.
引用
收藏
页码:383 / 388
页数:6
相关论文
共 8 条
[1]   On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks [J].
Abduvaliyev, Abror ;
Pathan, Al-Sakib Khan ;
Zhou, Jianying ;
Roman, Rodrigo ;
Wong, Wai-Choong .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (03) :1223-1237
[2]  
[Anonymous], ARXIV13077833
[3]  
Fatma Hachmi, 2013, MOD SIM APPL OPT ICM
[4]   Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection [J].
Bao, Fenye ;
Chen, Ing-Ray ;
Chang, MoonJeong ;
Cho, Jin-Hee .
IEEE Transactions on Network and Service Management, 2012, 9 (02) :169-183
[5]   IDSEP: a novel intrusion detection scheme based on energy prediction in cluster-based wireless sensor networks [J].
Han, Guangjie ;
Jiang, Jinfang ;
Shen, Wen ;
Shu, Lei ;
Rodrigues, Joel .
IET INFORMATION SECURITY, 2013, 7 (02) :97-105
[6]   EAACK-A Secure Intrusion-Detection System for MANETs [J].
Shakshuki, Elhadi M. ;
Kang, Nan ;
Sheltami, Tarek R. .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2013, 60 (03) :1089-1098
[7]  
Sharma S. K., 2012, ADV ENG SCI MAN ICAE
[8]   Toward developing a systematic approach to generate benchmark datasets for intrusion detection [J].
Shiravi, Ali ;
Shiravi, Hadi ;
Tavallaee, Mahbod ;
Ghorbani, Ali A. .
COMPUTERS & SECURITY, 2012, 31 (03) :357-374