A Hybrid Model is Proposed Based in The Combination of Genetic and MAFS in Cloud Environment

Authors

  • V. Chinnasamy  Assistant Professor, Sri Vijay Vidyalaya College of Arts & Science, Dharmapuri, Tamilnadu, India
  • Dr. D. Maruthanayagam  Head/Professor, PG and Research Department of Computer Science, Sri Vijay Vidyalaya College of Arts & Science, Dharmapuri, Tamilnadu, India

DOI:

https://doi.org//10.32628/CSEIT183887

Keywords:

Intrusion Detection System (IDS), Genetic, Modified Artificial Fish Swarm (MAFS), Mechanism, Cloud Computing and Regression.

Abstract

Cloud computing is being heralded as an important trend in information technology throughout the world. Data security has a major issue in cloud computing environment; An intrusion detection system (IDS) is a component that helps to detect various types of malicious network traffic which cannot be detected by a conventional firewall. Many IDS have been developed based on machine learning techniques. In recent growth, advanced detection approaches created by combining or integrating multiple learning techniques have shown better detection performance than general single learning technique. The feature representation method is an important pattern classifier that facilitates correct classifications, however, there have been very few related studies focusing how to extractor representative features for normal connections and effective detection of attacks. The objective of this paper is to suggest new security mechanisms using various trust approaches in broker based federated cloud architecture, ranking the providers with the help of regression tree approach using Service Measurement Index security attributes and new hybrid computation intelligence built on the combination of genetic with Artificial Fish Swarm in Intrusion Detection system.

References

  1. Daejoon Joo, Taeho Hong and Ingoo Han, "The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors," Expert System with Applications 25, 2003, pp.69-75.
  2. Davide Ariu, Roberto, Tronci, Giorgio Giacinto, "HMMpayl: An Intrusion Detection System based on Hidden Markov Models" Journal of computers and Security, vol 30 issue 4 2011 pp 221-241.
  3. Yeo, C., Buyya, R.: Integrated Risk Analysis for a Commercial Computing Service. In: Proc. of the 21st IEEE International Parallel and Distributed Processing Symposium, Long Beach, California, USA March 2007.
  4. Sulistio, A., Kim, K., Buyya, R.: Managing Cancellations and No-shows of Reservations with Overbooking to Increase Resource Revenue. In: Proceedings of the 8th IEEE International Symposium on Cluster Computing and the Grid, Lyon, France, May 2008.
  5. Fujun Feng, Chuang Lin, Dongsheng Peng and Junshan Li: A Trust and Context Based Access Control Model for Distributed Systems. In 10th IEEE International Conference on High Performance Computing and Communications, 629–634, 2008.
  6. Yogendra Kumar Jain and Upendra, "An Efficient Intrusion Detection based on Decision Tree Classifier Using Feature Reduction," International Journal of Scientific and Research Publication, Volume 2, Issue 1, pp. 1-6, January 2012
  7. Tadashi Dohi, Toshikazu Uemura, "An adaptive mode control algorithm of a scalable intrusion Tolerant Architecture", Journal of computer and system sciences, Vol 8], 2012, pages 1751-1774.
  8. W. T.Luke Teacy, Michael Luck, Alex Rogers, Nicholas R.Jennings, " An Efficient and Versatile Approach to trust and Reputation Using Hierachical Bayesian Modelling", Journal of Artificial Intelligence Vol.193, 2012, pages 149-185.
  9. Wei-Chao lin, Shih Wen ke, Chih-Fong Tsai, " CANN: An intrusion Detection system based on combining cluster centers and nearest neighbors", Journal of knowledge based systems vol 78 2015 pages 13-21.
  10. Meng-Hui Chen, Pei-Chann Chang, Jheng-Long Wu, "A population based incremental learning approach with artificial immune system for Network Intrusion Detection", Journal of Engineering Applications of Artificial Intelligence, Jan 2016 .
  11. Levent Koc, Thomas A Mazzuchi, Shahram Sarkani, "A Network Intrusion Detection system based on a Hidden Naïve Bayes Multiclass Classifier", Journal of Expert Systems with Applications Vol 39 Dec 2012, pages 13492-13500.
  12. Yuxin Meng, Lam For Kwok, "Adaptive Blacklist based Packet Filter with a Statistic based Approach in Network Intrusion Detection", Journal of Network and Computer Applications Vol 39, 2014 pp 83-92.

Downloads

Published

2018-12-30

Issue

Section

Research Articles

How to Cite

[1]
V. Chinnasamy, Dr. D. Maruthanayagam, " A Hybrid Model is Proposed Based in The Combination of Genetic and MAFS in Cloud Environment, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 8, pp.257-266, November-December-2018. Available at doi : https://doi.org/10.32628/CSEIT183887