{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T23:03:28Z","timestamp":1769814208674,"version":"3.49.0"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,2,5]],"date-time":"2016-02-05T00:00:00Z","timestamp":1454630400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Fuzzy Syst."],"published-print":{"date-parts":[[2017,2]]},"DOI":"10.1007\/s40815-016-0147-3","type":"journal-article","created":{"date-parts":[[2016,2,5]],"date-time":"2016-02-05T12:44:55Z","timestamp":1454676295000},"page":"62-77","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["An Efficient Fuzzy-Based Hybrid System to Cloud Intrusion Detection"],"prefix":"10.1007","volume":"19","author":[{"given":"Sivakami","family":"Raja","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Saravanan","family":"Ramaiah","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,2,5]]},"reference":[{"issue":"4","key":"147_CR1","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MITP.2009.89","volume":"12","author":"K Vieira","year":"2010","unstructured":"Vieira, K., et al.: Intrusion detection for grid and cloud computing. IT Prof. 12(4), 38\u201343 (2010)","journal-title":"IT Prof."},{"key":"147_CR2","doi-asserted-by":"crossref","unstructured":"Xin, W., Ting-lei, H., Xiao-yu, L.: Research on the Intrusion detection mechanism based on cloud computing. In: International conference on intelligent computing and integrated systems (ICISS), Guilin, pp. 125\u2013128 (2010)","DOI":"10.1109\/ICISS.2010.5656789"},{"key":"147_CR3","doi-asserted-by":"crossref","unstructured":"Tupakula, U., Varadharajan, V., Akku N.: Intrusion detection techniques for infrastructure as a service cloud. In: IEEE international conference on dependable, autonomic and secure computing, pp. 744\u2013751 (2011)","DOI":"10.1109\/DASC.2011.128"},{"key":"147_CR4","doi-asserted-by":"crossref","unstructured":"Dhage, S. et al: Intrusion detection system in cloud computing environment. In: International Conference and Workshop on Emerging Trends in Technology, New York, NY, USA, pp. 235\u2013239 (2011)","DOI":"10.1145\/1980022.1980076"},{"key":"147_CR5","doi-asserted-by":"crossref","unstructured":"Kholidy, H.A., Baiardi, F.: CIDD: A cloud intrusion detection dataset for cloud computing and Masquerade Attacks, Ninth international conference on information technology\u2014New Generations, Las Vegas, Nevada USA, ISBN. 978-0-7695-4654-4 (2012);","DOI":"10.1109\/ITNG.2012.97"},{"issue":"1","key":"147_CR6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S Subashini","year":"2011","unstructured":"Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1\u201311 (2011)","journal-title":"J. Netw. Comput. Appl."},{"key":"147_CR7","unstructured":"Jin, H. et al: A VMM-based intrusion prevention system in cloud computing environment. J. Supercomput., pp. 1\u201319 (2011)"},{"issue":"3","key":"147_CR8","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/0020-0255(75)90036-5","volume":"8","author":"LA Zadeh","year":"1975","unstructured":"Zadeh, L.A.: The concept of a linguistic variable and its application to approximate reasoning I. Inf. Sci. 8(3), 199\u2013249 (1975)","journal-title":"Inf. Sci."},{"key":"147_CR9","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1016\/S0020-0255(01)00069-X","volume":"132","author":"NN Karnik","year":"2001","unstructured":"Karnik, N.N., Mendel, J.M.: Centroid of a type-2 fuzzy set. Inf. Sci. 132, 195\u2013220 (2001)","journal-title":"Inf. Sci."},{"issue":"1","key":"147_CR10","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/TFUZZ.2008.2005938","volume":"17","author":"Faa-Jeng Lin","year":"2009","unstructured":"Lin, Faa-Jeng, Chou, Po-Huan, Shieh, Po-Huang, Chen, Syuan-Yi: Robust control of an LUSM-Based XY \u03b8 motion control stage using an adaptive interval Type-2 fuzzy neural network. IEEE Trans. Fuzzy Syst. 17(1), 24\u201338 (2009)","journal-title":"IEEE Trans. Fuzzy Syst."},{"issue":"6","key":"147_CR11","first-page":"56","volume":"2","author":"AH Bhat","year":"2013","unstructured":"Bhat, A.H., Patra, S., Jena, D.: Machine learning approach for intrusion detection on cloud virtual machines. Int. J. Appl. Innov. Eng. Manag. 2(6), 56\u201366 (2013)","journal-title":"Int. J. Appl. Innov. Eng. Manag."},{"issue":"1","key":"147_CR12","first-page":"33","volume":"4","author":"HM Shirazi","year":"2010","unstructured":"Shirazi, H.M., Kalaji, Y.: An intelligent intrusion detection system using genetic algorithms and features selection. Majlesi J. Electr. Eng. 4(1), 33\u201343 (2010)","journal-title":"Majlesi J. Electr. Eng."},{"key":"147_CR13","first-page":"233","volume":"4","author":"A Gonzalez","year":"1997","unstructured":"Gonzalez, A., Herrera, F.: Multi-stage genetic fuzzy systems based on the iterative rule learning approach. Mathw. Soft Comput. 4, 233\u2013249 (1997)","journal-title":"Mathw. Soft Comput."},{"issue":"5","key":"147_CR14","doi-asserted-by":"crossref","first-page":"756","DOI":"10.1109\/72.712150","volume":"9","author":"WA Farag","year":"1998","unstructured":"Farag, W.A., Quintana, V.H., Lambert-Torres, G.: A genetic-based neuro-fuzzy approach for modeling and control of dynamical systems. IEEE Trans. Neural Netw. 9(5), 756\u2013767 (1998)","journal-title":"IEEE Trans. Neural Netw."},{"key":"147_CR15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0020-7373(75)80002-2","volume":"7","author":"EH Mamdani","year":"1975","unstructured":"Mamdani, E.H., Assilian, S.: An experiment in linguistic synthesis with a fuzzy logic controller. Int. J. Man Mach. Stud. 7, 1\u201313 (1975)","journal-title":"Int. J. Man Mach. Stud."},{"issue":"1","key":"147_CR16","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1109\/91.755393","volume":"7","author":"Y Shi","year":"1999","unstructured":"Shi, Y., Eberhart, R., Chen, Y.: Implementation of evolutionary fuzzy systems. IEEE Trans. Fuzzy Syst. 7(1), 109\u2013119 (1999)","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"147_CR17","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-0450-1","volume-title":"Pattern Recognition with Fuzzy Objective Function Algorithms","author":"J Bezdek","year":"1981","unstructured":"Bezdek, J.: Pattern Recognition with Fuzzy Objective Function Algorithms. Plenum Press, New York (1981)"},{"key":"147_CR18","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-97966-8","volume-title":"Self-Organizing Maps","author":"T Kohonen","year":"1997","unstructured":"Kohonen, T.: Self-Organizing Maps. Springer, New York (1997)"},{"issue":"3","key":"147_CR19","doi-asserted-by":"crossref","first-page":"209","DOI":"10.3233\/IFS-1994-2301","volume":"2","author":"R Yager","year":"1994","unstructured":"Yager, R., Filev, D.: Generation of fuzzy rules by mountain clustering. J. Intell. Fuzzy Syst. 2(3), 209\u2013219 (1994)","journal-title":"J. Intell. Fuzzy Syst."},{"key":"147_CR20","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1109\/91.324806","volume":"2","author":"S Chiu","year":"1994","unstructured":"Chiu, S.: Fuzzy model identification based on cluster estimation. J. Intell. Fuzzy Syst. 2, 267\u2013278 (1994)","journal-title":"J. Intell. Fuzzy Syst."},{"issue":"7","key":"147_CR21","doi-asserted-by":"crossref","first-page":"881","DOI":"10.1109\/TPAMI.2002.1017616","volume":"24","author":"T Kanungo","year":"2002","unstructured":"Kanungo, T., et al.: An efficient k-means clustering algorithm: analysis and implementation. IEEE Trans. Pattern Anal. Mach. Intell 24(7), 881\u2013892 (2002)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell"},{"issue":"6","key":"147_CR22","doi-asserted-by":"crossref","first-page":"674","DOI":"10.1109\/34.927466","volume":"23","author":"M-C Su","year":"2001","unstructured":"Su, M.-C., Chou, C.-H.: A modified version of the K-means algorithm with a distance based on cluster symmetry. IEEE Trans. Pattern Anal. Mach. Intell. 23(6), 674\u2013680 (2001)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"147_CR23","first-page":"347","volume":"36","author":"ASA Aziz","year":"2012","unstructured":"Aziz, A.S.A., et al.: Artificial immune system inspired intrusion detection system using genetic algorithm. Informatica 36, 347\u2013357 (2012)","journal-title":"Informatica"},{"issue":"4","key":"147_CR24","doi-asserted-by":"crossref","first-page":"614","DOI":"10.1109\/91.649913","volume":"5","author":"Y Lin","year":"1997","unstructured":"Lin, Y., Cunningham, I.I.I.G.A., Coggeshall, S.V.: Using fuzzy partitions to create fuzzy systems from input-output data and set the initial weights in a fuzzy neural network. IEEE Trans. Fuzzy Syst. 5(4), 614\u2013621 (1997)","journal-title":"IEEE Trans. Fuzzy Syst."},{"issue":"6","key":"147_CR25","doi-asserted-by":"crossref","first-page":"686","DOI":"10.1109\/3477.809024","volume":"29","author":"C-C Wong","year":"1999","unstructured":"Wong, C.-C., Chen, C.-C.: A hybrid clustering and gradient descent approach for fuzzy modeling. IEEE Trans. Syst. Man Cybern. Part B 29(6), 686\u2013693 (1999)","journal-title":"IEEE Trans. Syst. Man Cybern. Part B"},{"issue":"4","key":"147_CR26","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1109\/3477.775268","volume":"29","author":"R Thawonmas","year":"1999","unstructured":"Thawonmas, R., Abe, S.: Function approximation based on fuzzy rules extracted from partitioned numerical data. IEEE Trans. Syst. Man Cybern. 29(4), 525\u2013534 (1999)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"issue":"1","key":"147_CR27","first-page":"1","volume":"32","author":"P Vivekanandan","year":"2013","unstructured":"Vivekanandan, P., Rajalakshmi, M., Nedunchezhian, R.: An intelligent genetic algorithm for mining classification rules in large datasets. Comput. Inform. 32(1), 1\u201322 (2013)","journal-title":"Comput. Inform."},{"issue":"6","key":"147_CR28","doi-asserted-by":"crossref","first-page":"755","DOI":"10.1109\/TFUZZ.2006.877361","volume":"14","author":"G Leng","year":"2006","unstructured":"Leng, G., McGinnity, T.M., Prasad, G.: Design for self-organizing fuzzy neural networks based on genetic algorithms. IEEE Trans. Fuzzy Syst. 14(6), 755\u2013766 (2006)","journal-title":"IEEE Trans. Fuzzy Syst."},{"issue":"1","key":"147_CR29","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1109\/TFUZZ.2006.889765","volume":"15","author":"Ozge Uncu","year":"2007","unstructured":"Uncu, O., Turksen, I.B.: Discrete interval type 2 fuzzy system models using uncertainty in learning parameters. IEEE Trans. Fuzzy Syst. 15(1), 90\u2013106 (2007)","journal-title":"IEEE Trans. Fuzzy Syst."},{"issue":"6","key":"147_CR30","doi-asserted-by":"crossref","first-page":"1411","DOI":"10.1109\/TFUZZ.2008.925907","volume":"16","author":"C-F Juang","year":"2008","unstructured":"Juang, C.-F., Tsao, Y.-W.: A self-evolving interval type-2 fuzzy neural network with online structure and parameter learning. IEEE Trans. Fuzzy Syst. 16(6), 1411\u20131424 (2008)","journal-title":"IEEE Trans. Fuzzy Syst."},{"issue":"13","key":"147_CR31","doi-asserted-by":"crossref","first-page":"2175","DOI":"10.1016\/j.ins.2008.10.016","volume":"179","author":"JR Castro","year":"2009","unstructured":"Castro, J.R., et al.: A hybrid learning algorithm for a class of interval type-2 fuzzy neural networks. Inf. Sci. 179(13), 2175\u20132193 (2009)","journal-title":"Inf. Sci."},{"key":"147_CR32","unstructured":"Eucalyptus. http:\/\/www.eucalyptus.com"},{"key":"147_CR33","doi-asserted-by":"crossref","unstructured":"Abraham A., Jain R.: Soft computing models for network intrusion detection systems. In: Classification and Clustering for Knowledge Discovery. Studies in Computational Intelligence, vol. 4, pp. 191\u2013207. Springer, Berlin (2005)","DOI":"10.1007\/11011620_13"},{"key":"147_CR34","unstructured":"Mostaque Md and Morshedur Hassan (2013); Network intrusion detection system using genetic algorithm and fuzzy logic. Int. J. Innov. Res. Comput. Commun. Eng. 1(7)"},{"key":"147_CR35","doi-asserted-by":"crossref","unstructured":"Mohammad Sazzadul Hoque, Md. Abdul Mukit and Md. Abu Naser Bikas: An implementation of intrusion detection system using genetic algorithm. Int. J. Netw. Secur. Appl., vol. 4, no. 2 (2012)","DOI":"10.5121\/ijnsa.2012.4208"},{"key":"147_CR36","doi-asserted-by":"crossref","unstructured":"Tsang, S. K., Wang, H.: Anomaly intrusion detection using multi-objective genetic fuzzy system and agent-based evolutionary computation framework. In: Proceedings of the Fifth IEEE international conference on data mining (2005)","DOI":"10.1109\/ICDM.2005.26"},{"key":"147_CR37","doi-asserted-by":"crossref","first-page":"12036","DOI":"10.1016\/j.eswa.2009.03.036","volume":"36","author":"K Shafi","year":"2009","unstructured":"Shafi, K., Abbass, H.A.: An adaptive genetic-based signature learning system for intrusion detection. Expert Syst. Appl. 36, 12036\u201312043 (2009)","journal-title":"Expert Syst. Appl."},{"key":"147_CR38","first-page":"239","volume":"23","author":"S Mukkamala","year":"2003","unstructured":"Mukkamala, S., Sung, A.H., Abraham, A.: Intrusion detection using ensemble of soft computing paradigms, advances in soft computing. Intell. Syst. Des. Appl. 23, 239\u2013248 (2003)","journal-title":"Intell. Syst. Des. Appl."},{"issue":"4","key":"147_CR39","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TDSC.2013.8","volume":"10","author":"C-J Chung","year":"2013","unstructured":"Chung, C.-J., Khatkar, P., Xing, T., Lee, J., Huang, D.: NICE: network intrusion detection and countermeasure selection in virtual network systems. IEEE Trans. Dependable Secure Comput. 10(4), 198\u2013211 (2013)","journal-title":"IEEE Trans. Dependable Secure Comput."}],"container-title":["International Journal of Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40815-016-0147-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s40815-016-0147-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40815-016-0147-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40815-016-0147-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T09:30:16Z","timestamp":1748770216000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s40815-016-0147-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2,5]]},"references-count":39,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,2]]}},"alternative-id":["147"],"URL":"https:\/\/doi.org\/10.1007\/s40815-016-0147-3","relation":{},"ISSN":["1562-2479","2199-3211"],"issn-type":[{"value":"1562-2479","type":"print"},{"value":"2199-3211","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,2,5]]}}}