Reviewing a New Optimized an ANFIS-Based Framework for Detecting Intrusion Detection System with Machine Learning Algorithms (Deep Learning Algorithm)
Khushbu Rai1, Megha Kamble2

1Khushbu Rai, Department of Computer Science and Engineering, LNCT University, Bhopal (M.P), India.
2Dr. Megha Kamble, Department of Computer Science and Engineering, LNCT University, Bhopal (M.P), India.
Manuscript received on 14 November 2022 | Revised Manuscript received on 06 December 2022 | Manuscript Accepted on 15 December 2022 | Manuscript published on 28 February 2023 | PP: 35-42 | Volume-12 Issue-3, February 2023 | Retrieval Number: 100.1/ijeat.B39161212222 | DOI: 10.35940/ijeat.B3916.0212323

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Today’s world is becoming more interconnected due to the current global internet, communication, or ways of doing business that have recently shifted to cloud computing platforms in order to increase their speed and productivity. But such can also be affected by cyber attacks on cloud infrastructure services to be executed on various cloud platforms, increasing the number of attacks on such systems to neutralize any harm caused by a cyber attack on such cloud-based infrastructure. Although network administrators utilize intrusion detection systems (IDS) to detect threats and anomalies, they frequently only make available post-attack ready to act in cyber warfare. If we could predict risky behavior, network administrators or security-enhancing software could intervene before harm was done. Incoming intrusion detection messages should be viewed as a sequence. The fundamental function of an intrusion detection system (IDS) is to distinguish between regular and abnormal network traffic. As a result, robust intrusion detection systems (IDS) using deep learning model are required to find such cyber risk in form of threats and anomalies on cloud based infrastructure.
Keywords: Intrusion Detection Systems (IDS), Artificial Neural Networks (ANN), DDoS attacks, Crow Search Algorithm (CSA), ANFIS, Machine learning (ML), Deep Learning (DL).
Scope of the Article: Deep Learning