{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T23:37:54Z","timestamp":1764977874616,"version":"3.46.0"},"reference-count":24,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T00:00:00Z","timestamp":1573776000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12,18]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>In cloud security, intrusion detection system (IDS) is one of the challenging research areas. In a cloud environment, security incidents such as denial of service, scanning, malware code injection, virus, worm, and password cracking are getting usual. These attacks surely affect the company and may develop a financial loss if not distinguished in time. Therefore, securing the cloud from these types of attack is very much needed. To discover the problem, this paper suggests a novel IDS established on a combination of a leader-based k-means clustering (LKM), optimal fuzzy logic system. Here, at first, the input dataset is grouped into clusters with the use of LKM. Then, cluster data are afforded to the fuzzy logic system (FLS). Here, normal and abnormal data are inquired by the FLS, while FLS training is done by the grey wolf optimization algorithm through maximizing the rules. The clouds simulator and NSL-Knowledge Discovery and DataBase (KDD) Cup 99 dataset are applied to inquire about the suggested method. Precision, recall, and F-measure are conceived as evaluation criteria. The obtained results have denoted the superiority of the suggested method in comparison with other methods.<\/jats:p>","DOI":"10.1515\/jisys-2018-0479","type":"journal-article","created":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T04:03:52Z","timestamp":1573790632000},"page":"1626-1642","source":"Crossref","is-referenced-by-count":19,"title":["Cloud Security: LKM and Optimal Fuzzy System for Intrusion Detection in Cloud Environment"],"prefix":"10.1515","volume":"29","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5390-3981","authenticated-orcid":false,"given":"S. Immaculate","family":"Shyla","sequence":"first","affiliation":[{"name":"Department of Computer Science , S.T. Hindu College , Nagercoil , India"},{"name":"Manonmaniam Sundaranar University , Tirunelveli , India"}]},{"given":"S.S.","family":"Sujatha","sequence":"additional","affiliation":[{"name":"Manonmaniam Sundaranar University , Tirunelveli , India"},{"name":"Department of Computer Science and Applications , S.T. Hindu College , Nagercoil , India"}]}],"member":"374","published-online":{"date-parts":[[2019,11,15]]},"reference":[{"key":"2025120523341672314_j_jisys-2018-0479_ref_001","doi-asserted-by":"crossref","unstructured":"S. Alam, M. Shuaib and A. Samad, A collaborative study of intrusion detection and prevention techniques in cloud computing, in: International Conference on Innovative Computing and Communications, pp. 231\u2013240, Springer, Singapore, 2019.","DOI":"10.1007\/978-981-13-2324-9_23"},{"key":"2025120523341672314_j_jisys-2018-0479_ref_002","doi-asserted-by":"crossref","unstructured":"M. Baykara and R. Das, A novel honeypot based security approach for real-time intrusion detection and prevention systems, J. Inform. Secur. Appl. 41 (2018), 103\u2013116.","DOI":"10.1016\/j.jisa.2018.06.004"},{"key":"2025120523341672314_j_jisys-2018-0479_ref_003","doi-asserted-by":"crossref","unstructured":"K. Bhushan and B. B. Gupta, Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment, J. Amb. Intel. Hum. Comput. 10 (2018) 1\u201313.","DOI":"10.1007\/s12652-018-0800-9"},{"key":"2025120523341672314_j_jisys-2018-0479_ref_004","doi-asserted-by":"crossref","unstructured":"S. Chavan, K. Shah, N. Dave, S. Mukherjee, A. Abraham and S. Sanyal, Adaptive neuro-fuzzy intrusion detection systems, in: International Conference on Information Technology: Coding and Computing, Proceedings, ITCC 2004, vol. 1, pp. 70\u201374, IEEE, Las Vegas, NV, USA, 2004.","DOI":"10.1109\/ITCC.2004.1286428"},{"key":"2025120523341672314_j_jisys-2018-0479_ref_005","doi-asserted-by":"crossref","unstructured":"F. Feng, X. Liu, B. Yong, R. Zhou and Q. Zhou, Anomaly detection in ad-hoc networks based on deep learning model: a plug and play device, J. Ad Hoc Netw. 84 (2019), 82\u201389.","DOI":"10.1016\/j.adhoc.2018.09.014"},{"key":"2025120523341672314_j_jisys-2018-0479_ref_006","doi-asserted-by":"crossref","unstructured":"P. Ghosh, A. Karmakar, J. Sharma and S. Phadikar, CS-PSO based intrusion detection system in cloud environment, in: Emerging Technologies in Data Mining and Information Security, pp. 261\u2013269, Springer, Singapore, 2019.","DOI":"10.1007\/978-981-13-1951-8_24"},{"key":"2025120523341672314_j_jisys-2018-0479_ref_007","doi-asserted-by":"crossref","unstructured":"A. Girma, M. Garuba and R. Goel, Advanced machine language approach to detect DDoS attack using DBSCAN clustering technology with entropy, in: Information Technology \u2013 New Generations, pp. 125\u2013131, Springer, Cham, 2018.","DOI":"10.1007\/978-3-319-54978-1_17"},{"key":"2025120523341672314_j_jisys-2018-0479_ref_008","doi-asserted-by":"crossref","unstructured":"B. Hajimirzaei and N. J. Navimipour, Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm, J. ICT Exp. 5 (2018), 56\u201359.","DOI":"10.1016\/j.icte.2018.01.014"},{"key":"2025120523341672314_j_jisys-2018-0479_ref_009","unstructured":"H. Hindy, D. Brosset, E. Bayne, A. Seeam, C. Tachtatzis, R. Atkinson and X. Bellekens, A taxonomy and survey of IDS design techniques, network threats and datasets, Assoc. Comput. Mach. 1 (2018), 1."},{"key":"2025120523341672314_j_jisys-2018-0479_ref_010","doi-asserted-by":"crossref","unstructured":"P. Kachurka and V. Golovko, Neural network approach to real time network intrusion detection and recognition, in: Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, Prague, pp. 15\u201317, September 2011.","DOI":"10.1109\/IDAACS.2011.6072781"},{"key":"2025120523341672314_j_jisys-2018-0479_ref_011","doi-asserted-by":"crossref","unstructured":"R. Kozik, M. Chora\u015b, M. Ficco and F. Palmieri, A scalable distributed machine learning approach for attack detection in edge computing environments, J. Parallel Distr. Comput. 119 (2018), 18\u201326.","DOI":"10.1016\/j.jpdc.2018.03.006"},{"key":"2025120523341672314_j_jisys-2018-0479_ref_012","unstructured":"Z. Mahmood, C. Agrawal, S. S. Hasan and S. Zenab, Intrusion detection in cloud computing environment using neural network, Int. J. Res. Comput. Eng. Electron. 1 (2014)."},{"key":"2025120523341672314_j_jisys-2018-0479_ref_013","doi-asserted-by":"crossref","unstructured":"M. Manickam, N. Ramaraj and C. Chellappan, A combined PFCM and recurrent neural network based IDS for cloud environment, Int. J. Bus. Intel. Data Min. 1 (2017), 504\u2013527.","DOI":"10.1504\/IJBIDM.2019.099963"},{"key":"2025120523341672314_j_jisys-2018-0479_ref_014","doi-asserted-by":"crossref","unstructured":"M. Mazini, B. Shirazi and I. Mahdavi, Anomaly network-based IDS using a reliable hybrid artificial bee colony and AdaBoost algorithms, J. King Saud Univ. Comput. Inform. Sci. 31 (2019), 541\u2013553.","DOI":"10.1016\/j.jksuci.2018.03.011"},{"key":"2025120523341672314_j_jisys-2018-0479_ref_015","unstructured":"P. Mell and T. Grance, Effectively and securely using the cloud computing paradigm, vol. 2, pp. 304\u2013311, NIST, Information Technology Laboratory, Gaithersburg, MD, USA, 2009."},{"key":"2025120523341672314_j_jisys-2018-0479_ref_016","doi-asserted-by":"crossref","unstructured":"S. Mirjalili, S. M. Mirjalili and A. Lewis, Grey wolf optimizer, J. Adv. Eng. Softw. 69 (2014), 46\u201361.","DOI":"10.1016\/j.advengsoft.2013.12.007"},{"key":"2025120523341672314_j_jisys-2018-0479_ref_017","unstructured":"M. Moradi and M. Zulkernine, A neural network based system for intrusion detection and classification of attacks, in: Proceedings of the IEEE International Conference on Advances in Intelligent Systems-Theory and Applications, pp. 15\u201318, Luxembourg-Kirchberg, Luxembourg, 2004."},{"key":"2025120523341672314_j_jisys-2018-0479_ref_018","unstructured":"S. Ramteke, R. Dongare and K. Ramteke, IDS for cloud network using FC-ANN algorithm, Int. J. Adv. Res. Comput. Commun. Eng. 2 (2013)."},{"key":"2025120523341672314_j_jisys-2018-0479_ref_019","doi-asserted-by":"crossref","unstructured":"T. H. Sarma, P. Viswanath and B. E. Reddy, A hybrid approach to speed-up the k-means clustering method, Int. J. Mach. Learn. Cyb. 4 (2013), 107\u2013117.","DOI":"10.1007\/s13042-012-0079-7"},{"key":"2025120523341672314_j_jisys-2018-0479_ref_020","doi-asserted-by":"crossref","unstructured":"A. S. Sohal, R. Sandhu, S. K. Sood and V. Chang, A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. Comput. Secur. 74 (2018), 340\u2013354.","DOI":"10.1016\/j.cose.2017.08.016"},{"key":"2025120523341672314_j_jisys-2018-0479_ref_021","doi-asserted-by":"crossref","unstructured":"F. Song, Z. Guo and D. Mei, Feature selection using principal component analysis, in: 2010 International Conference on System Science, Engineering Design and Manufacturing Informatization (ICSEM), vol. 1, no., pp. 27\u201330, Yichang, China, 12\u201314 Nov. 2010.","DOI":"10.1109\/ICSEM.2010.14"},{"key":"2025120523341672314_j_jisys-2018-0479_ref_022","doi-asserted-by":"crossref","unstructured":"A. N. Toosi and M. Kahani, A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers, J. Comput. Commun. 30 (2007), 2201\u20132212.","DOI":"10.1016\/j.comcom.2007.05.002"},{"key":"2025120523341672314_j_jisys-2018-0479_ref_023","unstructured":"A. T. Velte, T. J. Velte and R. C. Elsenpeter, Cloud computing: a practical approach, p. 44, McGraw-Hill, New York, 2010."},{"key":"2025120523341672314_j_jisys-2018-0479_ref_024","doi-asserted-by":"crossref","unstructured":"G. Wang, J. Hao, J. Ma and L. Huang, A new approach to intrusion detection using artificial neural networks and fuzzy clustering, J. Expert Syst. Appl. 37 (2010), 6225\u20136232.","DOI":"10.1016\/j.eswa.2010.02.102"}],"container-title":["Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyter.com\/view\/journals\/jisys\/29\/1\/article-p1626.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2018-0479\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2018-0479\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T23:34:59Z","timestamp":1764977699000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2018-0479\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,15]]},"references-count":24,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2019,9,20]]},"published-print":{"date-parts":[[2019,12,18]]}},"alternative-id":["10.1515\/jisys-2018-0479"],"URL":"https:\/\/doi.org\/10.1515\/jisys-2018-0479","relation":{},"ISSN":["2191-026X","0334-1860"],"issn-type":[{"type":"electronic","value":"2191-026X"},{"type":"print","value":"0334-1860"}],"subject":[],"published":{"date-parts":[[2019,11,15]]}}}