2019 5th International Conference on Advanced Computing &Amp; Communication Systems (ICACCS) 2019
DOI: 10.1109/icaccs.2019.8728450
|View full text |Cite
|
Sign up to set email alerts
|

An Effective Swarm Optimization Based Intrusion Detection Classifier System for Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(7 citation statements)
references
References 7 publications
0
7
0
Order By: Relevance
“…At present, researchers have proposed different algorithms for optimizing parameters in the context of Swarm Intelligence (SI) [2,4,[11][12], which has had a significant impact on the field of computational science over the past decade, inspired by the natural evolution of organisms and is especially useful for solving optimization problems. For example, Kalaivani et al proposed an effective classifier based on Artificial Bee Colony (ABC) for intrusion detection [4]. Neha et al introduced Salp Swarm Optimization (SSO) to optimize the hyperparameters of classifiers [2].…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…At present, researchers have proposed different algorithms for optimizing parameters in the context of Swarm Intelligence (SI) [2,4,[11][12], which has had a significant impact on the field of computational science over the past decade, inspired by the natural evolution of organisms and is especially useful for solving optimization problems. For example, Kalaivani et al proposed an effective classifier based on Artificial Bee Colony (ABC) for intrusion detection [4]. Neha et al introduced Salp Swarm Optimization (SSO) to optimize the hyperparameters of classifiers [2].…”
Section: Background and Related Workmentioning
confidence: 99%
“…WSN is a kind of network with limited energy consumption and weak storage capacity, in which nodes are often placed in "no man's land". Considering factors such as the "openness" of the network, the fixed routing mechanism of the data, and the limitation of resources in terms of time and space, some critical and sensitive data could be subject to several attacks, resulting in serious security problems [2][3][4]28].…”
Section: Introductionmentioning
confidence: 99%
“…Indeed, SI can build security decision making models to fight against malicious threats and intrusions based on security postures and intelligence information using full-text search, mathematical optimization, logical reasoning, and probability analytic. For a typical use case, the work in [166] tries to adopt SI for intrusion detection in cloud computing. An ABC-based optimization classifier is built to perform classification of the cloud data packets for intrusion identification that is potential to solve security issues such as denial-of-service attack (DoS attack), replay attack, and flooding attacks in cloud computing.…”
Section: Attack Detectionmentioning
confidence: 99%
“…Attack detection [166] ABC An ABC-based optimization classifier is built to perform classification of the cloud data packets for intrusion identification that is potential to solve DoS attacks.…”
Section: A Antenna Designmentioning
confidence: 99%
“…Nowadays, SIA using metaheuristic algorithm which is inspired by nature are emerging and becoming more popular. Ant Colony Optimization (ACO) algorithm is one successful examples of SIA that has been developed by M. Dorigo [12]. The ACO algorithm is inspired by the behavior of an ant colony in finding the shortest path to food source [13].…”
Section: Introductionmentioning
confidence: 99%