Acceso abierto

A Neuro Fuzzy Based Intrusion Detection System for a Cloud Data Center Using Adaptive Learning


Cite

1. Kevin, S. Security in a Virtualized World. – Journal of Network Security, Vol. 8, 2009, pp. 15-18.10.1016/S1353-4858(09)70077-7Search in Google Scholar

2. Praveen Kumar, P., K. Bhaskar Naik. A Survey on Cloud Based Intrusion Detection System. – International Journal of Software and Web Sciences, Vol. 4, 2013, No 2, pp. 98-102.Search in Google Scholar

3. Sanjay Ram, M., N. Velmurugan, S. Thirukumaran. Effective Analysis of Cloud Based Intrusion Detection System. – International Journal of Computer Applications & Information Technology, Vol. 1, 2012, No 2, pp.16-22.Search in Google Scholar

4. Jin, H., G. Xiang, D. Zou, S. Wu, F. Zhoa, M. Li et al. A VMM-Based Intrusion Prevention System in Cloud Computing Environment. – Journal of Supercomputing, Springer Science Business Media, LLC, Vol. 66, 2013, No 3, pp. 1133-1151.10.1007/s11227-011-0608-2Search in Google Scholar

5. Vieira, K., A. Schulter, C. Westphall, C. Westphall. Intrusion Detection Techniques in Grid and Cloud Computing Environment. – Proc. IEEE IT Professional Magazine, Vol. 12, 2010, No 4, pp. 38-43.10.1109/MITP.2009.89Search in Google Scholar

6. Amjad, H.B., P. Sabyasachi, J. Debasish. Machine Learning Approach for Intrusion Detection on Cloud Virtual Machines. – International Journal of Application or Innovation in Engineering & Management (IJAIEM), Vol. 2, 2013, No 6, pp. 57-66.Search in Google Scholar

7. Garfinkel, T., M. Rosenblum. A Virtual Machine Introspection Based Architecture for Intrusion Detection. – In. Proc. of Network and Distributed Systems Security Symposium, 2003, pp. 191-206.Search in Google Scholar

8. Amirreza, Z., Z. Alireza. Internet Intrusion Detection System Service in a Cloud. – International Journal of Computer Science Issues, Vol. 9, 2012, No 5, pp. 308-315.Search in Google Scholar

9. Kourai, K., S. Chiba. HyperSpector: Virtual Distributed Monitoring Environments for Secure Intrusion Detection. – In: Proc. of International Conference on Virtual Execution Environments, ACM, Chicago, 2005, pp. 197-207.Search in Google Scholar

10. Jones, A. K., R. S. Sielken. Computer System Intrusion Detection: A Survey. – Techreport, September 2000, pp. 1-25. doi=10.1.1.24.7802.Search in Google Scholar

11. Parag, K. S., S. Sneha, A. D. Gawande. Intrusion Detection System for Cloud Computing. – International Journal of Scientific & Technology Research, Vol. 1, 2012, No 4, pp. 67-71.Search in Google Scholar

12. Dunlap, G. W., S. T. King, S. Cinar, M. Basrai, P. M. Chen. Revirt: Enabling Intrusion Analysis through Virtual Machine Logging and Replay. – In: Proc. of 5th Symposium on Operating Systems Design and Implementation, USENIX, Boston, 2002, pp. 211-224.Search in Google Scholar

13. Feng, Z., H. Jin. Automated Approach to Intrusion Detection in VM-Based Dynamic Execution Environment. – Computing and Informatics, Vol. 31, 2012, pp. 271-297.Search in Google Scholar

14. Vikrant, G. D., G. B. Atul, A. A. Nikhil. Intrusion Detection System for Cloud Computing. – International Journal of Engineering Research & Technology (IJERT), Vol. 2, 2013, No 4, pp. 2149-2153.Search in Google Scholar

15. Zeenat, M., A. Chetan, S. H. Syed et al. Intrusion Detection in Cloud Computing Environment Using Neural Network. – International Journal of Research in Computer Engineering and Electronics, Vol. 1, 2012, No 1, pp. 1-4.Search in Google Scholar

16. Ubhale, P. R., A. M. Sahu. Securing Cloud Computing Environment by Means of Intrusion Detection and Prevention System (IDPS). – International Journal of Computer Science and Management Research, Vol. 2, 2013, No 5, pp. 2430-2435.Search in Google Scholar

17. Otte, C., C. Tormann. Improving the Accuracy of Network Intrusion Detectors by Input-Dependent Stacking. – Integrated Computer-Aided Engineering, Vol. 18, 2011, No 3, pp. 291-297.10.3233/ICA-2011-0370Search in Google Scholar

18. Nirmala, A. P., R. Sridaran. Cloud Computing Issues at Design and Implementation Levels – A Survey. – International Journal of Advanced Networking and Applications, Vol. 3, 2012, No 6, pp. 1444-1449.Search in Google Scholar

19. Farzad, S. Secure Virtualization for Cloud Environment Using Hypervisor-Based Technology. – International Journal of Machine Learning and Computing, Vol. 2, 2012, No 1, pp. 39-45.10.7763/IJMLC.2012.V2.87Search in Google Scholar

20. Vinothina, V., R. Sridaran, G. Padmavathi. A Survey on Resource Allocation Strategies in Cloud Computing. – International Journal of Advanced Computer Science and Applications, Vol. 3, 2012, No 6, pp. 97-104.10.14569/IJACSA.2012.030616Search in Google Scholar

21. Jang, J. S. R. ANFIS: Adaptive-Network-Based Fuzzy Inference Systems. – IEEE Transactions on Systems, Man, and Cybernetics, Vol. 23, 1993, No 3, pp. 665-685.10.1109/21.256541Search in Google Scholar

22. Guler, I., E. D. Ubeyli. Application of Adaptive Neuro-Fuzzy Inference System for Detection of Electrocardiographic Changes in Patients with Partial Epilepsy Using Feature Extraction. – Expert Systems with Applications, Vol. 27, 2004, pp. 323-330.10.1016/j.eswa.2004.05.001Search in Google Scholar

23. Guler, I., E. D. Ubeyli. Adaptive Neuro-Fuzzy Inference System for Classification of EEG Signals Using Wavelet Coefficients. – Journal of Neuroscience Methods, 2005, pp. 1-9.Search in Google Scholar

24. Fallahpour, A. R., A. R. Moghassem. Yarn Strength Modeling Using Adaptive Neuro-Fuzzy Inference System (ANFIS) And Gene Expression Programming (GEP). – Journal of Engineered Fibers and Fabrics, Vol. 8, 2013, No 4, pp. 6-18.10.1177/155892501300800409Search in Google Scholar

25. Tavallaee, M., E. Bagheri, L. Wei, A. Ghorbani. Detailed Analysis of the KDD CUP 99 Data Set. – In: Proc. of IEEE Symposium on Computational Intelligence in Security and Defense Applications, Ottawa, 2009, pp. 1-6.10.1109/CISDA.2009.5356528Search in Google Scholar

26. Loganathan, C., K. V. Girija. Hybrid Learning for Adaptive Neuro Fuzzy Inference System. – International Journal of Engineering and Science, Vol. 2, 2013, No 11, pp. 6-13.Search in Google Scholar

27. Gang, W., H. Jinxing, M. Jian, H. Lihua. A New Approach to Intrusion Detection Using Artificial Neural Networks and Fuzzy Clustering. – Expert Systems with Applications, Vol. 37, 2010, No 9, pp. 6225-6232.10.1016/j.eswa.2010.02.102Search in Google Scholar

eISSN:
1314-4081
Idioma:
Inglés
Calendario de la edición:
4 veces al año
Temas de la revista:
Computer Sciences, Information Technology