Intrusion Detection Techniques Based on Improved Intuitionistic Fuzzy Neural Networks

At present, the issue of intrusion detection must be a hot point to all over the computer security area. In this paper, two novel intrusion detection techniques have been proposed. First, unlike the current existent detection methods, this paper combines the theories of both intuitionistic fuzzy sets (IFS) and artificial neural networks (ANN) together, which lead to much fewer iteration numbers, higher detection rates and sufficient stability. Experimental results show that the first method proposed in this paper is promising and has obvious superiorities over other current typical ones. Then we address another novel technique based on non-subsampled Shearlet transform (NSST) domain artificial neural networks (ANN) to solve those problems, including employing multi-scale geometry analysis (MGA) of NSST and the train characteristics of ANN together. Experimental results indicate that, compared with other existing conventional intrusion detection tools, the second proposed method is superior to other current popular ones in both aspects of iteration numbers and convergence rates. Therefore, the anomaly detection process is performed through processing the signals representing the metrics. Experimental results indicate that the third proposed technique is effective and promising.

[1]  W. Kong,et al.  Technique for image fusion between gray-scale visual light and infrared images based on NSST and improved RF , 2013 .

[2]  W. Kong,et al.  Technique for image fusion based on NSST domain INMF , 2014 .

[3]  Farookh Khadeer Hussain,et al.  A hybrid approach for the personalisation of cloud-based e-governance services , 2013, Int. J. High Perform. Comput. Netw..

[4]  Pascal Bouvry,et al.  A multi-objective approach for high quality tree-based backbones in mobile ad hoc networks , 2012, Int. J. Space Based Situated Comput..

[5]  Gopinath Ganapathy,et al.  A multilevel thrust filtration defending mechanism against DDoS attacks in cloud computing environment , 2014, Int. J. Grid Util. Comput..

[6]  Klaus Zaerens,et al.  Gaining the profits of cloud computing in a public authority environment , 2012, Int. J. Comput. Sci. Eng..

[7]  Yang Lei,et al.  Fusion technique for multi-focus images based on NSCT–ISCM , 2015 .

[8]  Yanpei Chen,et al.  What's New About Cloud Computing Security? , 2010 .

[9]  Bo Hong,et al.  Task scheduling in budget-constrained cloud computing systems to maximise throughput , 2012, Int. J. Comput. Sci. Eng..

[10]  Dhiya Al-Jumeily,et al.  Using adaptive neural networks to provide self-healing autonomic software , 2015, Int. J. Space Based Situated Comput..

[11]  Hui Li,et al.  Privacy-preserving logistic regression outsourcing in cloud computing , 2013, Int. J. Grid Util. Comput..

[12]  Mark Ryan,et al.  Cloud computing security: The scientific challenge, and a survey of solutions , 2013, J. Syst. Softw..

[13]  Massimo Ficco Security event correlation approach for cloud computing , 2013, Int. J. High Perform. Comput. Netw..

[14]  Wei Ren,et al.  A lightweight possession proof scheme for outsourced files in mobile cloud computing based on chameleon hash function , 2014, Int. J. Comput. Sci. Eng..

[15]  Xinfeng Ye,et al.  Fine-grained access control for cloud computing , 2013, Int. J. Grid Util. Comput..

[16]  Ning Han,et al.  A novel power-conscious scheduling algorithm for data-intensive precedence-constrained applications in cloud environments , 2014, Int. J. High Perform. Comput. Netw..

[17]  Jing Ma,et al.  Virtual machine resource scheduling algorithm for cloud computing based on auction mechanism , 2016 .

[18]  Christoph Sorge,et al.  A privacy-friendly architecture for future cloud computing , 2013, Int. J. Grid Util. Comput..

[19]  Nigel Thomas,et al.  A Case Study in Inspecting the Cost of Security in Cloud Computing , 2015, UKPEW.

[20]  Young-Sik Jeong,et al.  Efficient Server Virtualization using Grid Service Infrastructure , 2010, J. Inf. Process. Syst..