An Online Intrusion Detection System to Cloud Computing Based on Neucube Algorithms
This article describes how as network traffic grows, attacks on traffic become more complicated and harder to detect. Recently, researchers have begun to explore machine learning techniques with cloud computing technologies to classify network threats. So, new and creative ways are needed to enhance intrusion detection system. This article addresses the source of the above issues through detecting an intrusion in cloud computing before it further disrupts normal network operations, because the complexity of malicious attack techniques have evolved from traditional malicious attack technologies (direct malicious attack), which include different malicious attack classes, such as DoS, Probe, R2L, and U2R malicious attacks, especially the zero-day attack in online mode. The proposed online intrusion detection cloud system (OIDCS) adopts the principles of the new spiking neural network architecture called NeuCube algorithm. It is proposed that this system is the first filtering system approach that utilizes the NeuCube algorithm. The OIDCS inherits the hybrid (supervised/unsupervised) learning feature of the NeuCube algorithm and uses this algorithm in an online system with lifelong learning to classify input while learning the system. The system is accurate, especially when working with a zero-day attack, reaching approximately 97% accuracy based on the to-be-remembered (TBR) encoding algorithm.
Year of publication: |
2018
|
---|---|
Authors: | Dorgham, O. ; Almomani, Ammar ; Alauthman, Mohammad ; Albalas, Firas ; Obeidat, Atef |
Published in: |
International Journal of Cloud Applications and Computing (IJCAC). - IGI Global, ISSN 2156-1826, ZDB-ID 2628467-4. - Vol. 8.2018, 2 (01.04.), p. 96-112
|
Publisher: |
IGI Global |
Subject: | Cloud Computing | Neucube Algorithms | Online Intrusion Detection | Zero-Day Attack |
Saved in:
Online Resource
Saved in favorites
Similar items by subject
-
A lightweight and proactive rule-based incremental construction approach to detect phishing scam
SatheeshKumar, M., (2022)
-
Let's switch to the cloud : cloud adaption and its effect on IT investment and productivity
Duso, Tomaso, (2022)
-
A reconfiguration approach for a supply chain tracking platform
Zidi, Hedi, (2022)
- More ...
Similar items by person