An Intrusion Detection System Using Modified-Firefly Algorithm in Cloud Environment

被引:9
作者
Ghosh, Partha [1 ]
Sarkar, Dipankar [2 ]
Sharma, Joy [1 ]
Phadikar, Santanu [3 ]
机构
[1] Netaji Subhash Engn Coll, Kolkata, W Bengal, India
[2] Tata Consultancy Serv, Mumbai, Maharashtra, India
[3] Maulana Abul Kalam Azad Univ Technol, Dept Comp Sci & Engn, Kolkata, W Bengal, India
关键词
Cloud Computing; Feature Selection; Firefly Algorithm (FA); Intrusion Detection System (IDS); NSL-KDD Dataset; Particle Swarm Optimization (PSO); CLASSIFICATION;
D O I
10.4018/IJDCF.2021030105
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The present era is being dominated by cloud computing technology which provides services to the users as per demand over the internet. Satisfying the needs of huge people makes the technology prone to activities which come up as a threat. Intrusion detection system (IDS) is an effective method of providing data security to the information stored in the cloud which works by analyzing the network traffic and informs in case of any malicious activities. In order to control high amount of data stored in cloud, data is stored as per relevance leading to distributed computing. To remove redundant data, the authors have implemented data mining process such as feature selection which is used to generate an optimum subset of features from a dataset. In this paper, the proposed IDS provides security working upon the idea of feature selection. The authors have prepared a modified-firefly algorithm which acts as a proficient feature selection method and enables the NSL-KDD dataset to consume less storage space by reducing dimensions as well as less training time with greater classification accuracy.
引用
收藏
页码:77 / 93
页数:17
相关论文
共 37 条
  • [1] Transcriptional network growing models using motif-based preferential attachment
    Abdelzaher, Ahmed F.
    Al-Musawi, Ahmad F.
    Ghosh, Preetam
    Mayo, Michael L.
    Perkins, Edward J.
    [J]. FRONTIERS IN BIOENGINEERING AND BIOTECHNOLOGY, 2015, 3
  • [2] Agrawal G., 2012, IJCSIT INT J COMPUTE, V3, P5040
  • [3] Akbar S., 2010, INT J COMPUTER APPL, V5, P10, DOI [10.5120/892-1266, DOI 10.5120/892-1266]
  • [4] [Anonymous], 2013, J EMERG TRENDS COMPU
  • [5] [Anonymous], 2011, INT J COMPUTER APPL, DOI DOI 10.5120/1810-2331
  • [6] Araújo JD, 2012, INT J COMPUT SCI NET, V12, P9
  • [7] Balas-timar D. V., 2016, 9 INT C MOD RES PSYC, P105
  • [8] Banati H., 2011, IJCSI International Journal of Computer Science Issues, V8, P473
  • [9] Basu J., 2010, International Journal of Software Engineering and its Applications, V4, P23
  • [10] Boucheham A, 2017, INT J APPL METAHEUR, V8, P22, DOI 10.4018/IJAMC.2017040102