Enhanced Chimp Optimization-Based Feature Selection with Fuzzy Logic-Based Intrusion Detection System in Cloud Environment
Cloud computing (CC) refers to an Internet-based computing technology in which shared resources, such as storage, software, information, and platform, are offered to users on demand. CC is a technology through which virtualized and dynamically scalable resources are presented to users on the Interne...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-02-01
|
Series: | Applied Sciences |
Subjects: | |
Online Access: | https://www.mdpi.com/2076-3417/13/4/2580 |
_version_ | 1827758771141607424 |
---|---|
author | Manal Abdullah Alohali Muna Elsadig Fahd N. Al-Wesabi Mesfer Al Duhayyim Anwer Mustafa Hilal Abdelwahed Motwakel |
author_facet | Manal Abdullah Alohali Muna Elsadig Fahd N. Al-Wesabi Mesfer Al Duhayyim Anwer Mustafa Hilal Abdelwahed Motwakel |
author_sort | Manal Abdullah Alohali |
collection | DOAJ |
description | Cloud computing (CC) refers to an Internet-based computing technology in which shared resources, such as storage, software, information, and platform, are offered to users on demand. CC is a technology through which virtualized and dynamically scalable resources are presented to users on the Internet. Security is highly significant in this on-demand CC. Therefore, this paper presents improved metaheuristics with a fuzzy logic-based intrusion detection system for the cloud security (IMFL-IDSCS) technique. The IMFL-IDSCS technique can identify intrusions in the distributed CC platform and secure it from probable threats. An individual sample of IDS is deployed for every client, and it utilizes an individual controller for data management. In addition, the IMFL-IDSCS technique uses an enhanced chimp optimization algorithm-based feature selection (ECOA-FS) method for choosing optimal features, followed by an adaptive neuro-fuzzy inference system (ANFIS) model enforced to recognize intrusions. Finally, the hybrid jaya shark smell optimization (JSSO) algorithm is used to optimize the membership functions (MFs). A widespread simulation analysis is performed to examine the enhanced outcomes of the IMFL-IDSCS technique. The extensive comparison study reported the enhanced outcomes of the IMFL-IDSCS model with maximum detection efficiency with accuracy of 99.31%, precision of 92.03%, recall of 78.25%, and F-score of 81.80%. |
first_indexed | 2024-03-11T09:12:13Z |
format | Article |
id | doaj.art-9726290156ee4fa0bb3b4eeff010d912 |
institution | Directory Open Access Journal |
issn | 2076-3417 |
language | English |
last_indexed | 2024-03-11T09:12:13Z |
publishDate | 2023-02-01 |
publisher | MDPI AG |
record_format | Article |
series | Applied Sciences |
spelling | doaj.art-9726290156ee4fa0bb3b4eeff010d9122023-11-16T18:57:48ZengMDPI AGApplied Sciences2076-34172023-02-01134258010.3390/app13042580Enhanced Chimp Optimization-Based Feature Selection with Fuzzy Logic-Based Intrusion Detection System in Cloud EnvironmentManal Abdullah Alohali0Muna Elsadig1Fahd N. Al-Wesabi2Mesfer Al Duhayyim3Anwer Mustafa Hilal4Abdelwahed Motwakel5Department of Information Systems, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi ArabiaDepartment of Information Systems, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi ArabiaDepartment of Computer Science, College of Science & Art at Mahayil, King Khalid University, Abha 62529, Saudi ArabiaDepartment of Computer Science, College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj 16273, Saudi ArabiaDepartment of Computer and Self Development, Preparatory Year Deanship, Prince Sattam Bin Abdulaziz University, Al-Kharj 16278, Saudi ArabiaDepartment of Information Systems, College of Business Administration in Hawtat bani Tamim, Prince Sattam Bin Abdulaziz University, Al-Kharj 16278, Saudi ArabiaCloud computing (CC) refers to an Internet-based computing technology in which shared resources, such as storage, software, information, and platform, are offered to users on demand. CC is a technology through which virtualized and dynamically scalable resources are presented to users on the Internet. Security is highly significant in this on-demand CC. Therefore, this paper presents improved metaheuristics with a fuzzy logic-based intrusion detection system for the cloud security (IMFL-IDSCS) technique. The IMFL-IDSCS technique can identify intrusions in the distributed CC platform and secure it from probable threats. An individual sample of IDS is deployed for every client, and it utilizes an individual controller for data management. In addition, the IMFL-IDSCS technique uses an enhanced chimp optimization algorithm-based feature selection (ECOA-FS) method for choosing optimal features, followed by an adaptive neuro-fuzzy inference system (ANFIS) model enforced to recognize intrusions. Finally, the hybrid jaya shark smell optimization (JSSO) algorithm is used to optimize the membership functions (MFs). A widespread simulation analysis is performed to examine the enhanced outcomes of the IMFL-IDSCS technique. The extensive comparison study reported the enhanced outcomes of the IMFL-IDSCS model with maximum detection efficiency with accuracy of 99.31%, precision of 92.03%, recall of 78.25%, and F-score of 81.80%.https://www.mdpi.com/2076-3417/13/4/2580cloud securitymetaheuristicsoptimization algorithmfeature selectionfuzzy logicintrusion detection |
spellingShingle | Manal Abdullah Alohali Muna Elsadig Fahd N. Al-Wesabi Mesfer Al Duhayyim Anwer Mustafa Hilal Abdelwahed Motwakel Enhanced Chimp Optimization-Based Feature Selection with Fuzzy Logic-Based Intrusion Detection System in Cloud Environment Applied Sciences cloud security metaheuristics optimization algorithm feature selection fuzzy logic intrusion detection |
title | Enhanced Chimp Optimization-Based Feature Selection with Fuzzy Logic-Based Intrusion Detection System in Cloud Environment |
title_full | Enhanced Chimp Optimization-Based Feature Selection with Fuzzy Logic-Based Intrusion Detection System in Cloud Environment |
title_fullStr | Enhanced Chimp Optimization-Based Feature Selection with Fuzzy Logic-Based Intrusion Detection System in Cloud Environment |
title_full_unstemmed | Enhanced Chimp Optimization-Based Feature Selection with Fuzzy Logic-Based Intrusion Detection System in Cloud Environment |
title_short | Enhanced Chimp Optimization-Based Feature Selection with Fuzzy Logic-Based Intrusion Detection System in Cloud Environment |
title_sort | enhanced chimp optimization based feature selection with fuzzy logic based intrusion detection system in cloud environment |
topic | cloud security metaheuristics optimization algorithm feature selection fuzzy logic intrusion detection |
url | https://www.mdpi.com/2076-3417/13/4/2580 |
work_keys_str_mv | AT manalabdullahalohali enhancedchimpoptimizationbasedfeatureselectionwithfuzzylogicbasedintrusiondetectionsystemincloudenvironment AT munaelsadig enhancedchimpoptimizationbasedfeatureselectionwithfuzzylogicbasedintrusiondetectionsystemincloudenvironment AT fahdnalwesabi enhancedchimpoptimizationbasedfeatureselectionwithfuzzylogicbasedintrusiondetectionsystemincloudenvironment AT mesferalduhayyim enhancedchimpoptimizationbasedfeatureselectionwithfuzzylogicbasedintrusiondetectionsystemincloudenvironment AT anwermustafahilal enhancedchimpoptimizationbasedfeatureselectionwithfuzzylogicbasedintrusiondetectionsystemincloudenvironment AT abdelwahedmotwakel enhancedchimpoptimizationbasedfeatureselectionwithfuzzylogicbasedintrusiondetectionsystemincloudenvironment |