Feature Selection using the concept of Peafowl Mating in IDS
- URL: http://arxiv.org/abs/2402.02052v1
- Date: Sat, 3 Feb 2024 06:04:49 GMT
- Title: Feature Selection using the concept of Peafowl Mating in IDS
- Authors: Partha Ghosh, Joy Sharma and Nilesh Pandey
- Abstract summary: Cloud computing provides services that are Infrastructure based, Platform based and Software based.
The popularity of this technology is due to its superb performance, high level of computing ability, low cost of services, scalability, availability and flexibility.
The obtainability and openness of data in cloud environment make it vulnerable to the world of cyber-attacks.
To detect the attacks Intrusion Detection System is used, that can identify the attacks and ensure information security.
- Score: 2.184775414778289
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Cloud computing has high applicability as an Internet based service that
relies on sharing computing resources. Cloud computing provides services that
are Infrastructure based, Platform based and Software based. The popularity of
this technology is due to its superb performance, high level of computing
ability, low cost of services, scalability, availability and flexibility. The
obtainability and openness of data in cloud environment make it vulnerable to
the world of cyber-attacks. To detect the attacks Intrusion Detection System is
used, that can identify the attacks and ensure information security. Such a
coherent and proficient Intrusion Detection System is proposed in this paper to
achieve higher certainty levels regarding safety in cloud environment. In this
paper, the mating behavior of peafowl is incorporated into an optimization
algorithm which in turn is used as a feature selection algorithm. The algorithm
is used to reduce the huge size of cloud data so that the IDS can work
efficiently on the cloud to detect intrusions. The proposed model has been
experimented with NSL-KDD dataset as well as Kyoto dataset and have proved to
be a better as well as an efficient IDS.
Related papers
- Homomorphic Encryption-Enabled Federated Learning for Privacy-Preserving Intrusion Detection in Resource-Constrained IoV Networks [20.864048794953664]
This paper proposes a novel framework to address the data privacy issue for Federated Learning (FL)-based Intrusion Detection Systems (IDSs) in Internet-of-Vehicles (IoVs) with limited computational resources.
We first propose a highly-effective framework using homomorphic encryption to secure data that requires offloading to a centralized server for processing.
We develop an effective training algorithm tailored to handle the challenges of FL-based systems with encrypted data.
arXiv Detail & Related papers (2024-07-26T04:19:37Z) - AI-Enabled System for Efficient and Effective Cyber Incident Detection and Response in Cloud Environments [0.0]
The escalating sophistication and volume of cyber threats in cloud environments necessitate a paradigm shift in strategies.
This research explores the application of AI and ML and proposes an AI-powered cyber incident response system for cloud environments.
The findings highlight the effectiveness of the Random Forest model, achieving an accuracy 90% for the Network Traffic and 96% for the Malware Analysis Dual Model application.
arXiv Detail & Related papers (2024-04-08T15:22:03Z) - Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-based Federated Learning [52.6706505729803]
We introduce Federated Learning (FL) to collaboratively train a decentralized shared model of Intrusion Detection Systems (IDS)
FLEKD enables a more flexible aggregation method than conventional model fusion techniques.
Experiment results show that the proposed approach outperforms local training and traditional FL in terms of both speed and performance.
arXiv Detail & Related papers (2024-01-22T14:16:37Z) - Toward a real-time TCP SYN Flood DDoS mitigation using Adaptive Neuro-Fuzzy classifier and SDN Assistance in Fog Computing [0.31318403497744784]
We propose mitigation of Fog computing-based SYN Flood DDoS attacks using an Adaptive Neuro-Fuzzy Inference System (ANFIS) and Software Defined Networking (SDN) Assistance (FASA)
The simulation results show that FASA system outperforms other algorithms in terms of accuracy, precision, recall, and F1-score.
arXiv Detail & Related papers (2023-11-27T08:54:00Z) - Risk-optimized Outlier Removal for Robust 3D Point Cloud Classification [54.286437930350445]
This paper highlights the challenges of point cloud classification posed by various forms of noise.
We introduce an innovative point outlier cleansing method that harnesses the power of downstream classification models.
Our proposed technique not only robustly filters diverse point cloud outliers but also consistently and significantly enhances existing robust methods for point cloud classification.
arXiv Detail & Related papers (2023-07-20T13:47:30Z) - Measuring the Carbon Intensity of AI in Cloud Instances [91.28501520271972]
We provide a framework for measuring software carbon intensity, and propose to measure operational carbon emissions.
We evaluate a suite of approaches for reducing emissions on the Microsoft Azure cloud compute platform.
arXiv Detail & Related papers (2022-06-10T17:04:04Z) - FedSup: A Communication-Efficient Federated Learning Fatigue Driving
Behaviors Supervision Framework [10.38729333916008]
FedSup is a client-edge-cloud framework for privacy and efficient fatigue detection.
Inspired by the federated learning technique, FedSup intelligently utilizes the collaboration between client, edge, and cloud server.
arXiv Detail & Related papers (2021-04-25T07:16:49Z) - Machine Learning Algorithms for Active Monitoring of High Performance
Computing as a Service (HPCaaS) Cloud Environments [0.0]
This paper explores the viability of engineering applications running on a cloud infrastructure configured as an HPC platform.
The engineering applications considered in this work include MCNP6, a radiation transport code developed by Los Alamos National Laboratory, OpenFOAM, an open source computational fluid dynamics code, and CADONFS, a numerical implementation of the general number field sieve algorithm used for prime number factorization.
arXiv Detail & Related papers (2020-09-26T01:29:19Z) - Bayesian Optimization with Machine Learning Algorithms Towards Anomaly
Detection [66.05992706105224]
In this paper, an effective anomaly detection framework is proposed utilizing Bayesian Optimization technique.
The performance of the considered algorithms is evaluated using the ISCX 2012 dataset.
Experimental results show the effectiveness of the proposed framework in term of accuracy rate, precision, low-false alarm rate, and recall.
arXiv Detail & Related papers (2020-08-05T19:29:35Z) - Data Mining with Big Data in Intrusion Detection Systems: A Systematic
Literature Review [68.15472610671748]
Cloud computing has become a powerful and indispensable technology for complex, high performance and scalable computation.
The rapid rate and volume of data creation has begun to pose significant challenges for data management and security.
The design and deployment of intrusion detection systems (IDS) in the big data setting has, therefore, become a topic of importance.
arXiv Detail & Related papers (2020-05-23T20:57:12Z) - A Privacy-Preserving Distributed Architecture for
Deep-Learning-as-a-Service [68.84245063902908]
This paper introduces a novel distributed architecture for deep-learning-as-a-service.
It is able to preserve the user sensitive data while providing Cloud-based machine and deep learning services.
arXiv Detail & Related papers (2020-03-30T15:12:03Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.