Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing
Cloud computing is a rapidly developing Internet technology for facilitating various services to consumers. This technology suggests a considerable potential to the public or to large companies, such as Amazon, Google, Microsoft and IBM. This technology is aimed at providing a flexible IT architectu...
| Main Authors: | Fahad, Ahmed Mohammed, Ahmed, Abdulghani Ali, M. N. M., Kahar |
|---|---|
| Other Authors: | Vasant, Pandian |
| Format: | Book Chapter |
| Language: | English English |
| Published: |
Springer Nature
2019
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/22303/ http://umpir.ump.edu.my/id/eprint/22303/1/Network%20Intrusion%20Detection%20Framework1.pdf http://umpir.ump.edu.my/id/eprint/22303/7/21.%20Network%20Intrusion%20Detection%20Framework%20Based%20on%20Whale%20Swarm%20Algorithm.pdf |
Similar Items
The importance of monitoring cloud computing: An intensive review
by: Fahad, Ahmed Mohammed, et al.
Published: (2017)
by: Fahad, Ahmed Mohammed, et al.
Published: (2017)
Artificial neural network-salp-swarm algorithm for stock price prediction
by: Zuriani, Mustaffa, et al.
Published: (2024)
by: Zuriani, Mustaffa, et al.
Published: (2024)
Botnet Detection Using a Feed-Forward Backpropagation Artificial Neural Network
by: Ahmed, Abdulghani Ali
Published: (2019)
by: Ahmed, Abdulghani Ali
Published: (2019)
Artificial Neural Network Approaches to Intrusion Detection: A Review
Published: (2009)
Published: (2009)
Artificial Neural Network Approaches to Intrusion Detection: A Review
by: Ahmad, Iftikhar
Published: (2009)
by: Ahmad, Iftikhar
Published: (2009)
Artificial Neural Network Approaches to Intrusion Detection: A Review
by: Ahmad, iftikhar, et al.
Published: (2009)
by: Ahmad, iftikhar, et al.
Published: (2009)
Artificial Neural Network Approaches to Intrusion Detection: A Review
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
Intrusion-Detection System Based on Fast Learning Network in Cloud Computing
by: Mohammed Hasan, Ali, et al.
Published: (2018)
by: Mohammed Hasan, Ali, et al.
Published: (2018)
Intrusion detection using artificial neural network / Gan Sze Kai
by: Gan , Sze Kai
Published: (2002)
by: Gan , Sze Kai
Published: (2002)
A novel swarm-based optimisation algorithm inspired by artificial neural glial network for autonomous robots
by: Ismail, Amelia Ritahani, et al.
Published: (2019)
by: Ismail, Amelia Ritahani, et al.
Published: (2019)
A Conceptual Model Using The Elliptic Curve Diffie–Hellman With An Artificial Neural Network Over Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2016)
by: Jaber, Aws Naser, et al.
Published: (2016)
Epilepsy detection from EEG signals using artificial neural network
by: Sallam, Amer A., et al.
Published: (2019)
by: Sallam, Amer A., et al.
Published: (2019)
Investigating Supervised Neural Networks to Intrusion Detection
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
Particle swarm optimization for neural network learning enhancement
by: Abdull Hamed, Haza Nuzly
Published: (2006)
by: Abdull Hamed, Haza Nuzly
Published: (2006)
Towards the Selection of Best Neural Network System for Intrusion Detection
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
An optimal tasks scheduling algorithm based on QoS in cloud computing network
by: Alhakimi, Mohammed Ameen Mohammed Abdo
Published: (2017)
by: Alhakimi, Mohammed Ameen Mohammed Abdo
Published: (2017)
IDPS: an integrated intrusion handling model for cloud computing environment
by: Alsafi, Hassen Mohammed, et al.
Published: (2012)
by: Alsafi, Hassen Mohammed, et al.
Published: (2012)
An efficient anomaly intrusion detection method with evolutionary neural network
by: Sarvari, Samira
Published: (2020)
by: Sarvari, Samira
Published: (2020)
Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
Review of access control mechanisms in cloud computing
by: Muhammad Rizwan, Ghori, et al.
Published: (2018)
by: Muhammad Rizwan, Ghori, et al.
Published: (2018)
A fast learning network with improved particle swarm optimization for intrusion detection system
by: Ali, Mohammed Hasan
Published: (2019)
by: Ali, Mohammed Hasan
Published: (2019)
A new intrusion detection system based on fast learning network and particle swarm optimization
by: Ali, Mohammed Hasan, et al.
Published: (2018)
by: Ali, Mohammed Hasan, et al.
Published: (2018)
CCS501 – NEURAL NETWORKS AND GENETIC ALGORITHMS
CSC513 – ARTIFICIAL NEURAL NETWORKS - SEPT. 2001
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2001)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2001)
Dynamic reciprocal authentication protocol for mobile cloud computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
Sales Prediction Using Artificial Neural Network
by: Ilham Ariff, Mohammad Fadzli
Published: (2023)
by: Ilham Ariff, Mohammad Fadzli
Published: (2023)
Threat analysis using artificial neural network
by: Yee, Chan Pheng
Published: (2009)
by: Yee, Chan Pheng
Published: (2009)
Signature recognition using artificial neural network
by: Abushariah, Ahmad A. M., et al.
Published: (2011)
by: Abushariah, Ahmad A. M., et al.
Published: (2011)
The impact of VMAX activation function in particle swarm optimization neural network
by: Lee, Yiew Siang
Published: (2008)
by: Lee, Yiew Siang
Published: (2008)
A sequential handwriting recognition model based on a dynamically configurable convolution recurrent neural network and hybrid salp swarm algorithm
by: Ahmed Ali Mohammed, Al-saffar
Published: (2024)
by: Ahmed Ali Mohammed, Al-saffar
Published: (2024)
Convolutional neural network training with artificial pattern for Bangla handwritten numeral recognition
by: Akhand, M. A. H, et al.
Published: (2016)
by: Akhand, M. A. H, et al.
Published: (2016)
Evaluating Neural Network Intrusion Detection Approaches Using Analytic Hierarchy Process
by: Ahmad, iftikhar, et al.
Published: (2010)
by: Ahmad, iftikhar, et al.
Published: (2010)
Web Phishing Classification Model using Artificial Neural Network and Deep Learning Neural Network
by: Noor Hazirah, Hassan, et al.
Published: (2023)
by: Noor Hazirah, Hassan, et al.
Published: (2023)
Metaheuristic-Based Neural Network
Training And Feature Selector For
Intrusion Detection
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
Prediction of Vehicle Fuel Consumption Model Based on Artificial Neural Network
by: Noraziah, Ahmad, et al.
Published: (2014)
by: Noraziah, Ahmad, et al.
Published: (2014)
Defending against wireless network intrusion
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
Application of Artificial Neural Network in Detection of Probing Attacks
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
Application of Artificial Neural Network in Detection of Probing Attacks
by: Ahmad, iftikhar, et al.
Published: (2009)
by: Ahmad, iftikhar, et al.
Published: (2009)
Identification of tajwid using artificial neural networks / Zunnajah Kamaruddin
by: Kamaruddin, Zunnajah
Published: (2005)
by: Kamaruddin, Zunnajah
Published: (2005)
SAIRF: A similarity approach for attack intention recognition using fuzzy min-max neural network
by: Ahmed, Abdulghani Ali, et al.
Published: (2018)
by: Ahmed, Abdulghani Ali, et al.
Published: (2018)
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2018)
by: Jaber, Aws Naser, et al.
Published: (2018)
Similar Items
-
The importance of monitoring cloud computing: An intensive review
by: Fahad, Ahmed Mohammed, et al.
Published: (2017) -
Artificial neural network-salp-swarm algorithm for stock price prediction
by: Zuriani, Mustaffa, et al.
Published: (2024) -
Botnet Detection Using a Feed-Forward Backpropagation Artificial Neural Network
by: Ahmed, Abdulghani Ali
Published: (2019) -
Artificial Neural Network Approaches to Intrusion Detection: A Review
Published: (2009) -
Artificial Neural Network Approaches to Intrusion Detection: A Review
by: Ahmad, Iftikhar
Published: (2009)