Architectural Framework for Ant Lion Optimization-based Feature Selection Technique for Cloud Intrusion Detection System using Bayesian Classifier (Record no. 9722)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | a |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | OSt |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20191016101154.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 191016b xxu||||| |||| 00| 0 eng d |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | AIKTC-KRRC |
| Transcribing agency | AIKTC-KRRC |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| 9 (RLIN) | 9880 |
| Author | Christopher, Haruna Atabo |
| 245 ## - TITLE STATEMENT | |
| Title | Architectural Framework for Ant Lion Optimization-based Feature Selection Technique for Cloud Intrusion Detection System using Bayesian Classifier |
| 250 ## - EDITION STATEMENT | |
| Volume, Issue number | Vol.5(2), Jul-Dec |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Tamil Nadu |
| Name of publisher, distributor, etc. | i-manager's |
| Year | 2018 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Pagination | 36-44p. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | Cloud computing has become popular due to its numerous advantages, which include high scalability, flexibility, and low operational cost. It is a technology that gives access to shared pool of resources and services on pay per use and at minimum management effort over the internet. Because of its distributed nature, security has become a great concern to both cloud service provider and cloud users. That is why Cloud Intrusion Detection System (CIDS) has been widely used to the cloud computing setting, which detects and in some cases prevents intrusion. In this paper, the authors have proposed a conceptual framework that detects intrusion attacks within the cloud environment using Ant Lion Optimization (ALO) algorithm for feature selection and Bayesian Classifier. This framework is expected to detect cloud intrusion accurately at low computational cost and reduce false alert rate. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| 9 (RLIN) | 4622 |
| Topical term or geographic name entry element | Computer Engineering |
| 700 ## - ADDED ENTRY--PERSONAL NAME | |
| 9 (RLIN) | 9881 |
| Co-Author | Yakubu, Jimoh |
| 773 0# - HOST ITEM ENTRY | |
| Place, publisher, and date of publication | Nagercoil i-manager Publication |
| Title | i-manager's journal on cloud computing (JCC) |
| International Standard Serial Number | 2349-6835 |
| 856 ## - ELECTRONIC LOCATION AND ACCESS | |
| URL | https://www.imanagerpublications.com/article/15691/23 |
| Link text | Click here |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Koha item type | Articles Abstract Database |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Total Checkouts | Barcode | Date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | School of Engineering & Technology | School of Engineering & Technology | Archieval Section | 16/10/2019 | 2019883 | 16/10/2019 | 16/10/2019 | Articles Abstract Database |