2021
DOI: 10.1007/s10586-021-03281-9
|View full text |Cite
|
Sign up to set email alerts
|

Cloud-based intrusion detection using kernel fuzzy clustering and optimal type-2 fuzzy neural network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 14 publications
0
10
0
Order By: Relevance
“…First, the performance of the DL-based ID models is evaluated in terms of f-measure, accuracy, false alarm rate, and training time. The existing models taken for comparison are T2FNN [19], ensemble model [20], BP-NN [21], SVNN [22], and HLDNS [23]. Each existing model uses different datasets for ID and different working platforms with unique configurations for performance analysis.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…First, the performance of the DL-based ID models is evaluated in terms of f-measure, accuracy, false alarm rate, and training time. The existing models taken for comparison are T2FNN [19], ensemble model [20], BP-NN [21], SVNN [22], and HLDNS [23]. Each existing model uses different datasets for ID and different working platforms with unique configurations for performance analysis.…”
Section: Resultsmentioning
confidence: 99%
“…Doddi Srilatha and Gopal K. Shyam [19] developed the cloud-based IDS that combined kernel fuzzy c-means clustering (KFCM) and an ideal type-2 fuzzy neural network (OT2FNN). T2FNN parameters were optimally selected for weight optimization employing the lion optimization technique (LOA).…”
Section: Intrusion Detection Frameworkmentioning
confidence: 99%
See 1 more Smart Citation
“…Srilatha et al 25 OT2FNN, KFCM Automatically detect the attack data, including low frequent attacks and new attacks.…”
Section: References Approaches Used Advantages Disadvantagesmentioning
confidence: 99%
“…Srilatha et al 25 had developed an IDS system by combining an optimal type‐2 fuzzy neural network (T2FNN) and kernel fuzzy c‐means clustering (KFCM) for detecting low frequent attacks. By combining these approaches, clustering was formed in which attacks such as remote‐to‐local (R2L), DoS, user‐to‐root (U2R), and probe were detected.…”
Section: Related Workmentioning
confidence: 99%