Please use this identifier to cite or link to this item:
http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/28022
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Christopher, Haruna Atabo | - |
dc.contributor.author | Ojeniyi, Joseph Adebayo | - |
dc.contributor.author | Adepoju, Solomon Adelowo | - |
dc.contributor.author | Abisoye, Opeyemi Aderiike | - |
dc.date.accessioned | 2024-05-06T15:34:00Z | - |
dc.date.available | 2024-05-06T15:34:00Z | - |
dc.date.issued | 2023 | - |
dc.identifier.uri | http://repository.futminna.edu.ng:8080/jspui/handle/123456789/28022 | - |
dc.description.abstract | Cloud computing is an emerging technology that provides services and computing resources on demand to users with less management effort through the internet. Because of the increase in the number of internet user and the distributed nature of cloud, it has become a platform for criminal activities from within and outside of cloud environment. It is on this note that Cloud Intrusion Detection System (CIDS) is mostly deployed into cloud environment to identify and also prevent attacks in some instance. In this research work, a cloud intrusion detection system that identifies malicious activities inside cloud, utilizing Antlion Optimization (ALO) algorithm for feature selection and Support Vector Machine Classifier was developed. Experimental result shows 98.56% accuracy, 2.29% FPR, 96.32% (Recall, Precision and F-Measure), and 92.52% Kappa Statistics | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.subject | Ant Lion Optimization | en_US |
dc.subject | Support Vector Machine | en_US |
dc.subject | Feature Selection | en_US |
dc.subject | Cloud Computing | en_US |
dc.title | Cloud Intrusion Detection System Using Antlion Optimization Algorithm and Support Vector Machine (SVM) Techniques | en_US |
dc.type | Article | en_US |
Appears in Collections: | Computer Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Cloud intrusion detection.pdf | 678.14 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.