Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2015
DOI: 10.4018/978-1-4666-6559-0.ch018
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection and Prevention on Flow of Big Data Using Bacterial Foraging

Abstract: Rapid connectivity and exchange of information across the globe with extension of computer networks during the past decade has led to security threats in network communication and has become a critical concern for network management. It is necessary to retain high security measures to ensure safe and trusted communication across the network. Diverse soft-computing-based methods have been devised in the past for the perfection of intrusion detection systems on host-based and host-independent systems. This chapt… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 32 publications
0
3
0
Order By: Relevance
“…Moreover, there are distinct author clusters, denoted as different clusters or subgroups within the network, reflecting different collaborative patterns among researchers. For instance, authors like li [11], meng [12], ahmad [13] and "wahid a" belong to separate clusters, indicating potential isolated or distinct collaborations within their groups.…”
Section: Collaboration Networkmentioning
confidence: 99%
“…Moreover, there are distinct author clusters, denoted as different clusters or subgroups within the network, reflecting different collaborative patterns among researchers. For instance, authors like li [11], meng [12], ahmad [13] and "wahid a" belong to separate clusters, indicating potential isolated or distinct collaborations within their groups.…”
Section: Collaboration Networkmentioning
confidence: 99%
“…On the other hand, Bacterial Foraging Optimization is another inspiring example of SI, where bacteria's formation based on environmental parameters were inspired to develop a sophisticated algorithm for multi-agent optimization. The implementation of Swarm algorithms in cloud security can be found in the following fields: Authentications [17], [18], Forensics [19], and Virtualizations [20].…”
Section: B Swarm Algorithmsmentioning
confidence: 99%
“…[107] proposed a Firefly Swarm approach for developing new connections in social networks based on big data analysis. [20] offered Bacterial Foraging to prevent security threats on the flow of big-data information. [108] developed a novel hybrid bio-inspired algorithm using a Multilayer Perceptron (MLP) to handle big data security.…”
Section: G Virtualizationmentioning
confidence: 99%