Enhanced Chimp Optimization-Based Feature Selection with Fuzzy Logic-Based Intrusion Detection System in Cloud Environment

Cloud computing (CC) refers to an Internet-based computing technology in which shared resources, such as storage, software, information, and platform, are offered to users on demand. CC is a technology through which virtualized and dynamically scalable resources are presented to users on the Interne...

Full description

Bibliographic Details
Main Authors: Manal Abdullah Alohali, Muna Elsadig, Fahd N. Al-Wesabi, Mesfer Al Duhayyim, Anwer Mustafa Hilal, Abdelwahed Motwakel
Format: Article
Language:English
Published: MDPI AG 2023-02-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/13/4/2580
_version_ 1827758771141607424
author Manal Abdullah Alohali
Muna Elsadig
Fahd N. Al-Wesabi
Mesfer Al Duhayyim
Anwer Mustafa Hilal
Abdelwahed Motwakel
author_facet Manal Abdullah Alohali
Muna Elsadig
Fahd N. Al-Wesabi
Mesfer Al Duhayyim
Anwer Mustafa Hilal
Abdelwahed Motwakel
author_sort Manal Abdullah Alohali
collection DOAJ
description Cloud computing (CC) refers to an Internet-based computing technology in which shared resources, such as storage, software, information, and platform, are offered to users on demand. CC is a technology through which virtualized and dynamically scalable resources are presented to users on the Internet. Security is highly significant in this on-demand CC. Therefore, this paper presents improved metaheuristics with a fuzzy logic-based intrusion detection system for the cloud security (IMFL-IDSCS) technique. The IMFL-IDSCS technique can identify intrusions in the distributed CC platform and secure it from probable threats. An individual sample of IDS is deployed for every client, and it utilizes an individual controller for data management. In addition, the IMFL-IDSCS technique uses an enhanced chimp optimization algorithm-based feature selection (ECOA-FS) method for choosing optimal features, followed by an adaptive neuro-fuzzy inference system (ANFIS) model enforced to recognize intrusions. Finally, the hybrid jaya shark smell optimization (JSSO) algorithm is used to optimize the membership functions (MFs). A widespread simulation analysis is performed to examine the enhanced outcomes of the IMFL-IDSCS technique. The extensive comparison study reported the enhanced outcomes of the IMFL-IDSCS model with maximum detection efficiency with accuracy of 99.31%, precision of 92.03%, recall of 78.25%, and F-score of 81.80%.
first_indexed 2024-03-11T09:12:13Z
format Article
id doaj.art-9726290156ee4fa0bb3b4eeff010d912
institution Directory Open Access Journal
issn 2076-3417
language English
last_indexed 2024-03-11T09:12:13Z
publishDate 2023-02-01
publisher MDPI AG
record_format Article
series Applied Sciences
spelling doaj.art-9726290156ee4fa0bb3b4eeff010d9122023-11-16T18:57:48ZengMDPI AGApplied Sciences2076-34172023-02-01134258010.3390/app13042580Enhanced Chimp Optimization-Based Feature Selection with Fuzzy Logic-Based Intrusion Detection System in Cloud EnvironmentManal Abdullah Alohali0Muna Elsadig1Fahd N. Al-Wesabi2Mesfer Al Duhayyim3Anwer Mustafa Hilal4Abdelwahed Motwakel5Department of Information Systems, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi ArabiaDepartment of Information Systems, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi ArabiaDepartment of Computer Science, College of Science & Art at Mahayil, King Khalid University, Abha 62529, Saudi ArabiaDepartment of Computer Science, College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj 16273, Saudi ArabiaDepartment of Computer and Self Development, Preparatory Year Deanship, Prince Sattam Bin Abdulaziz University, Al-Kharj 16278, Saudi ArabiaDepartment of Information Systems, College of Business Administration in Hawtat bani Tamim, Prince Sattam Bin Abdulaziz University, Al-Kharj 16278, Saudi ArabiaCloud computing (CC) refers to an Internet-based computing technology in which shared resources, such as storage, software, information, and platform, are offered to users on demand. CC is a technology through which virtualized and dynamically scalable resources are presented to users on the Internet. Security is highly significant in this on-demand CC. Therefore, this paper presents improved metaheuristics with a fuzzy logic-based intrusion detection system for the cloud security (IMFL-IDSCS) technique. The IMFL-IDSCS technique can identify intrusions in the distributed CC platform and secure it from probable threats. An individual sample of IDS is deployed for every client, and it utilizes an individual controller for data management. In addition, the IMFL-IDSCS technique uses an enhanced chimp optimization algorithm-based feature selection (ECOA-FS) method for choosing optimal features, followed by an adaptive neuro-fuzzy inference system (ANFIS) model enforced to recognize intrusions. Finally, the hybrid jaya shark smell optimization (JSSO) algorithm is used to optimize the membership functions (MFs). A widespread simulation analysis is performed to examine the enhanced outcomes of the IMFL-IDSCS technique. The extensive comparison study reported the enhanced outcomes of the IMFL-IDSCS model with maximum detection efficiency with accuracy of 99.31%, precision of 92.03%, recall of 78.25%, and F-score of 81.80%.https://www.mdpi.com/2076-3417/13/4/2580cloud securitymetaheuristicsoptimization algorithmfeature selectionfuzzy logicintrusion detection
spellingShingle Manal Abdullah Alohali
Muna Elsadig
Fahd N. Al-Wesabi
Mesfer Al Duhayyim
Anwer Mustafa Hilal
Abdelwahed Motwakel
Enhanced Chimp Optimization-Based Feature Selection with Fuzzy Logic-Based Intrusion Detection System in Cloud Environment
Applied Sciences
cloud security
metaheuristics
optimization algorithm
feature selection
fuzzy logic
intrusion detection
title Enhanced Chimp Optimization-Based Feature Selection with Fuzzy Logic-Based Intrusion Detection System in Cloud Environment
title_full Enhanced Chimp Optimization-Based Feature Selection with Fuzzy Logic-Based Intrusion Detection System in Cloud Environment
title_fullStr Enhanced Chimp Optimization-Based Feature Selection with Fuzzy Logic-Based Intrusion Detection System in Cloud Environment
title_full_unstemmed Enhanced Chimp Optimization-Based Feature Selection with Fuzzy Logic-Based Intrusion Detection System in Cloud Environment
title_short Enhanced Chimp Optimization-Based Feature Selection with Fuzzy Logic-Based Intrusion Detection System in Cloud Environment
title_sort enhanced chimp optimization based feature selection with fuzzy logic based intrusion detection system in cloud environment
topic cloud security
metaheuristics
optimization algorithm
feature selection
fuzzy logic
intrusion detection
url https://www.mdpi.com/2076-3417/13/4/2580
work_keys_str_mv AT manalabdullahalohali enhancedchimpoptimizationbasedfeatureselectionwithfuzzylogicbasedintrusiondetectionsystemincloudenvironment
AT munaelsadig enhancedchimpoptimizationbasedfeatureselectionwithfuzzylogicbasedintrusiondetectionsystemincloudenvironment
AT fahdnalwesabi enhancedchimpoptimizationbasedfeatureselectionwithfuzzylogicbasedintrusiondetectionsystemincloudenvironment
AT mesferalduhayyim enhancedchimpoptimizationbasedfeatureselectionwithfuzzylogicbasedintrusiondetectionsystemincloudenvironment
AT anwermustafahilal enhancedchimpoptimizationbasedfeatureselectionwithfuzzylogicbasedintrusiondetectionsystemincloudenvironment
AT abdelwahedmotwakel enhancedchimpoptimizationbasedfeatureselectionwithfuzzylogicbasedintrusiondetectionsystemincloudenvironment