{"title":"Reviewing a New Optimized an ANFIS-Based Framework for Detecting Intrusion Detection System with Machine Learning Algorithms (Deep Learning Algorithm)","authors":"Khushbu Rai, Dr. Megha Kamble","doi":"10.35940/ijeat.b3916.0212323","DOIUrl":null,"url":null,"abstract":"Today's world is becoming more interconnected due to the current global internet, communication, or ways of doing business that have recently shifted to cloud computing platforms in order to increase their speed and productivity. But such can also be affected by cyber attacks on cloud infrastructure services to be executed on various cloud platforms, increasing the number of attacks on such systems to neutralize any harm caused by a cyber attack on such cloud-based infrastructure. Although network administrators utilize intrusion detection systems (IDS) to detect threats and anomalies, they frequently only make available post-attack ready to act in cyber warfare. If we could predict risky behavior, network administrators or security-enhancing software could intervene before harm was done. Incoming intrusion detection messages should be viewed as a sequence. The fundamental function of an intrusion detection system (IDS) is to distinguish between regular and abnormal network traffic. As a result, robust intrusion detection systems (IDS) using deep learning model are required to find such cyber risk in form of threats and anomalies on cloud based infrastructure.","PeriodicalId":13981,"journal":{"name":"International Journal of Engineering and Advanced Technology","volume":"31 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Engineering and Advanced Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.35940/ijeat.b3916.0212323","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Today's world is becoming more interconnected due to the current global internet, communication, or ways of doing business that have recently shifted to cloud computing platforms in order to increase their speed and productivity. But such can also be affected by cyber attacks on cloud infrastructure services to be executed on various cloud platforms, increasing the number of attacks on such systems to neutralize any harm caused by a cyber attack on such cloud-based infrastructure. Although network administrators utilize intrusion detection systems (IDS) to detect threats and anomalies, they frequently only make available post-attack ready to act in cyber warfare. If we could predict risky behavior, network administrators or security-enhancing software could intervene before harm was done. Incoming intrusion detection messages should be viewed as a sequence. The fundamental function of an intrusion detection system (IDS) is to distinguish between regular and abnormal network traffic. As a result, robust intrusion detection systems (IDS) using deep learning model are required to find such cyber risk in form of threats and anomalies on cloud based infrastructure.