An Intrusion Detection System Using Modified-Firefly Algorithm in Cloud Environment

نویسندگان

چکیده

The present era is being dominated by cloud computing technology which provides services to the users as per demand over internet. Satisfying needs of huge people makes prone activities come up a threat. Intrusion detection system (IDS) an effective method providing data security information stored in works analyzing network traffic and informs case any malicious activities. In order control high amount cloud, relevance leading distributed computing. To remove redundant data, authors have implemented mining process such feature selection used generate optimum subset features from dataset. this paper, proposed IDS working upon idea selection. prepared modified-firefly algorithm acts proficient enables NSL-KDD dataset consume less storage space reducing dimensions well training time with greater classification accuracy.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Modified Intrusion Detection System using Fuzzy Genetic Algorithm

computing environment is continually growing and changing with new technology and the Internet. In addition, vulnerabilities in this environment are also steadily increasing. So Intrusion Detection Systems (IDS) have turn out to be an important part in provisions of computer and network security. This paper presents a fuzzy-genetic approach to detecting network intrusion. To implement and measu...

متن کامل

Intrusion Detection System in Secure Shell Traffic in Cloud Environment

Due to growth of Cloud computing usage, the need to apply encrypted protocols to provide confidentiality and integrity of data increases dramatically. Attacker can take advantage of these protocols to hide the intrusion and evade detection. Many traditional attack detection techniques have been proposed to provide security in the networks but none of them can be implemented properly in encrypte...

متن کامل

The Research Of Intrusion Detection System In Cloud Computing Environment

This paper analyzes real-time intrusion response systems in order to mitigate attacks that compromise integrity, confidentiality and availability. In this article we explain exactly what an Intrusion Detection System, why you need one IT Whitepapers Get the latest business IT research and intelligence. Cloud computing is one of the most important technologies in the world right now, but it whic...

متن کامل

Intrusion Detection in Wireless Sensor Networks using Genetic Algorithm

Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...

متن کامل

Composing Signatures for Misuse Intrusion Detection System Using Genetic Algorithm in an Offline Environment

In recent years Internet has experienced a rapid expansion and also facing increased no. of security threats. However many technological innovations have been proposed for information assurance but still protection of computer systems has been difficult. With the rapid growth of Internet technology, a high level of security is needed for keeping the data resources and equipments secure. In this...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Digital Crime and Forensics

سال: 2021

ISSN: ['1941-6229', '1941-6210']

DOI: https://doi.org/10.4018/ijdcf.2021030105