Enhanced Chimp Optimization-Based Feature Selection with Fuzzy Logic-Based Intrusion Detection System in Cloud Environment

: Cloud computing (CC) refers to an Internet-based computing technology in which shared resources, such as storage, software, information, and platform, are offered to users on demand. CC is a technology through which virtualized and dynamically scalable resources are presented to users on the Internet. Security is highly signiﬁcant in this on-demand CC. Therefore, this paper presents improved metaheuristics with a fuzzy logic-based intrusion detection system for the cloud security (IMFL-IDSCS) technique. The IMFL-IDSCS technique can identify intrusions in the distributed CC platform and secure it from probable threats. An individual sample of IDS is deployed for every client, and it utilizes an individual controller for data management. In addition, the IMFL-IDSCS technique uses an enhanced chimp optimization algorithm-based feature selection (ECOA-FS) method for choosing optimal features, followed by an adaptive neuro-fuzzy inference system (ANFIS) model enforced to recognize intrusions. Finally, the hybrid jaya shark smell optimization (JSSO) algorithm is used to optimize the membership functions (MFs). A widespread simulation analysis is performed to examine the enhanced outcomes of the IMFL-IDSCS technique. The extensive comparison study reported the enhanced outcomes of the IMFL-IDSCS model with maximum detection efﬁciency with accuracy of 99.31%, precision of 92.03%, recall of 78.25%, and F-score of 81.80%.


Introduction
Cloud computing (CC) is familiar and is obtaining attention from individual users and organizations. However, the transition to the cloud platform could be more direct, and there are many operational and security difficulties [1]. Guaranteeing the security of information outsourcing to the cloud is significant because of the trend of storing more data in the cloud. Virtual machines (VMs) and hypervisor technologies are also a security threat, as these VM and hypervisor technologies are prone to VM-level attacks [2,3]. Such a mechanism has some on-site computer institutions with more software and hardware systems [4,5]. Susceptibilities in the VM structure are used by invaders for exfiltrating data or conducting assaults, such as distributed denial of service (DDoS). This occurs because of the inherent weaknesses in the internet protocol stack. Moreover, numerous novel assaults have recently

•
An intelligent IMFL-IDSCS technique comprising ECOA-FS, ANFIS classification, and JSSO-based parameter optimization is presented for intrusion detection. To the best of our knowledge, the presented IMFL-IDSCS technique does not exist in the literature. • A new ECOA-FS technique is designed for the selection of the optimal subset of features to accomplish enhanced classification performance. • JSSO is employed with the ANFIS model for the classification of intrusions into different class labels. • The performance of the proposed model is validated on the benchmark NSL-KDD dataset.
The rest of the paper is organized as follows. Section 2 provides the related works, and Section 3 introduces the proposed model. Later, Section 4 offers experimental validation and Section 5 draws the conclusions.

Related Works
A DNN with game theory for cloud security (GT-CSDNN) was modeled in [16]. The proposed method includes defender and attacker techniques when utilizing the game theory method. Moreover, the deep neural network (DNN) network leverages the devised game theory method to categorize regular data and attacks. The GT-performance CSDNNs are evaluated by using the CICIDS-2017 data. The collected data can be normalized, and the improved whale algorithm (IWA) was employed to evaluate the attack's optimal points and normal data. Shyla and Sujatha [17] suggested an innovative IDS recognized on an integration of a leader-oriented k-means clustering (LKM), an optimal fuzzy logic (FL) system. Initially, input data were assembled into clusters by using the LKM. Afterwards, cluster datasets were afforded to the FL system (FLS). In this study, abnormal and normal data were examined by the FLS, and FLS training can be performed through grey wolf optimizer (GWO) by maximizing the rules.
Mishra et al. [18] devised a VM Introspection (VMI) related security structure model for fine granular monitoring of VMs for identifying renowned assaults and their variants. VMGuard enforces the software breakpoint injection approach, which is agnostic and is employed for trapping the accomplishment of programs. Inspired by text mining methods, VMGuard provides a 'Bag of n-grams (BonG)' method compiled with the term frequencyinverse document frequency (TF-IDF) approach for selecting and extracting attack features and normal traces. After implementing the random forest (RF) method for generating generic conduct for distinct groups of intrusion of the monitored VM, Aoudni et al. [19] introduced HMM_TDL, a DL method for preventing and detecting assault in the cloud environment. The devised approach can be performed in three states, incorporating a hidden Markov model (HMM) for attack detection. The HMM method sends hyper-alerts to the database for assault prevention.
In Ref. [20], an anomaly-related network IDS (NIDS) was modeled, analyzing and monitoring the network traffic flow that targeted a cloud platform. A network administrator must be informed regarding the nature of such traffic to block and drop any intrusive network connection. The binary-related particle swarm optimization (BPSO) was implemented to select the most related network features, whereas the standard-based PSO (SPSO) was enforced for tuning support vector machine (SVM) control parameters. Velliangiri and Premalatha [21] evaluated and presented a radial basis function neural network (RBF-NN) detector for detecting DDoS assaults. The resultant network can be frequently insufficient or needlessly intricate, and a suitable network structure is configured merely by the trial-and-error technique. This study devises the bat algorithm (BA) for configuring RBF-NN mechanically.
Sathiyadhas and Soosai Antony [22] presented an effectual dragonfly-improved invasive weed optimizer-based Shepard CNN (DIIWO-based ShCNN) for detecting the intruder and for mitigating the attack from the cloud paradigm and it can further detect the intruder with ShCNN. In [23], an effectual IDS was suggested by the presented sail fish dolphin optimizer-based Deep RNN (SFDO-based Deep RNN) that was employed for identifying an anomaly from the cloud framework. The established SFDO was formed by combining sail fish optimizer (SFO) and the dolphin echolocation (DE) technique. Virtual machine (VM) migration and cloud data management can be obtained utilizing ChicWhale technique.
Geetha and Deepa [24] examined a Fisher kernel-based PCA dimensional reduction technique and GWO-based weight dropped Bi-LSTM technique (FKPCA-GWO WDBiL-STM) for IDS. Primarily, combined with the data record for PCA, the Fisher kernel with Fisher score was offered as input for achieving linearly separable dimensionality reduction. Secondarily, the WDBiLSTM network was utilized for retaining the long-term dependency but removing the feature from forward and backward directions. A novel DL approach dependent upon CNNs and RNNs for IDS was established for cloud security in [25]. With our DL technique, some detected and not accepted traffic was prevented in obtaining the server from the cloud.

The Proposed Model
In this study, a novel IMFL-IDSCS method was derived to detect intrusions in the distributed CC platform and secure it from probable threats. Figure 1 represents the workflow of the IMFL-IDSCS approach. IDS was deployed in the CC platform. There is an individual IDS controller for the cloud service provider (CSP). It is noticeable that if there exists a single IDS in the whole network, the load on it rises as the number of hosts rises. Besides that, it can be challenging to monitor dissimilar types of intrusions or assaults that act on every host presented in the network. To resolve these limitations, the study presents a framework, where the mini-IDS instance is deployed between every user of the cloud and the CSP. Consequently, the load on every IDS sample would be lower than that of an individual IDS; thus, smaller IDS instances would be capable of conducting their work in a special way. The number of packets dropped would be decreased because of the decreased load that individual IDS instances would have. The IDS controllers would give all those IDS instances. If the client wants to access any services granted by CSP, IDS controllers must give IDS instances to that client. That instance would monitor all user activity, and once the client ends the session, a log of that session would be transmitted by the IDS instance to the IDS controller, which would be saved in cloud logs. Knowledge Base was saved in cloud logs and has data regarding the paradigm of user activity based on the data saved in the cloud. Whenever an IDS instance was granted to a specific user, IDS controllers from Knowledge Base would query data regarding the last activity. These activity patterns detect intrusion from the user's working pattern. Additionally, it uses various rules for multiple users such that each feature of IDS does not need to be positioned if specific users need only a few. The abovementioned IDS instance should be positioned on the application, system, and platform layers.
flow of the IMFL-IDSCS approach. IDS was deployed in the CC platform. There is an individual IDS controller for the cloud service provider (CSP). It is noticeable that if there exists a single IDS in the whole network, the load on it rises as the number of hosts rises. Besides that, it can be challenging to monitor dissimilar types of intrusions or assaults that act on every host presented in the network. To resolve these limitations, the study presents a framework, where the mini-IDS instance is deployed between every user of the cloud and the CSP. Consequently, the load on every IDS sample would be lower than that of an individual IDS; thus, smaller IDS instances would be capable of conducting their work in a special way. The number of packets dropped would be decreased because of the decreased load that individual IDS instances would have. The IDS controllers would give all those IDS instances. If the client wants to access any services granted by CSP, IDS controllers must give IDS instances to that client. That instance would monitor all user activity, and once the client ends the session, a log of that session would be transmitted by the IDS instance to the IDS controller, which would be saved in cloud logs. Knowledge Base was saved in cloud logs and has data regarding the paradigm of user activity based on the data saved in the cloud. Whenever an IDS instance was granted to a specific user, IDS controllers from Knowledge Base would query data regarding the last activity. These activity patterns detect intrusion from the user's working pattern. Additionally, it uses various rules for multiple users such that each feature of IDS does not need to be positioned if specific users need only a few. The abovementioned IDS instance should be positioned on the application, system, and platform layers.

Process Involved in ECOA-FS Technique
Initially, the IMFL-IDSCS technique used the ECOA-FS approach for choosing optimal features. COA is a mathematical model that can be reliant on intelligent diversity [26]. Chase, drive, attack, and block are the distinct strategies of chimps that can realize obstacles, the attacker, the driver, and the chaser. These hunting behaviors are concluded in two stages. Exploration and exploitation are the two stages of COA. The initial stage comprises chasing, driving, and blocking the prey. The next phase has attacked the prey. At the same time, the driving and chasing behaviors are illustrated in Equations (1) and (2): Now, X prey stands for the vector of prey location, x chimp indicates the vector of chimp place, t represents the number of current iterations, and a, c, and m imply the coefficient vector. This is accomplished in Equations (3)-(5): Whereas f c indicates the non-linear decrease in 2.5 to 0, r 1 and r 2 indicate arbitrary value ranges from zero to one, and m denotes chaotic vector. The dynamic coefficient f c prefers dissimilar curves and slopes. Hence, the chimps used different abilities to search for prey. They upgraded the location dependent upon other chimps, and the mathematical modeling can be given in Equations (6)-(8): In ECOA, the extremely disruptive polynomial mutation was a revised edition of the polynomial mutation method. It resolves the constraint that the polynomial mutation method fell as the local optima when the parameter was near the boundary, as shown in Equations (9) and (12): Whereas ub and lb determine the upper and lower limits of search spaces, r indicates the arbitrary value ranges within [0, 1] and η m indicates the distribution exponential that can be a non-negative number.
Unlike the traditional ECOA, the solution update occurs in the search region in the direction of the continual value position. However, in BECOA, the search region is determined as the n dimension Boolean lattice. Moreover, the solution is upgraded through the corner of the hypercube. In addition, for choosing features, 1 characterizes the feature selection, or 0. Furthermore, the BECOA derives a fitness function from determining solutions for retaining tradeoffs amongst a pair of objectives, as defined in Equation (13): ∆ R (D) shows the classifier's error, |Y| indicates the subset size, and |T| represents the overall features present in the data. In addition, α shows a parameter ∈ [0, 1] associated with the weight of the classifier error level, and β = 1 − α indicates the importance of the reduction feature.

ANFIS-Based Intrusion Detection Model
In this phase, the ANFIS model is applied to recognize intrusions. ANFIS, developed by Jang, integrates the benefits of neural networks (NNs) and fuzzy systems [27]. It employs an NN learning algorithm to automatically extract the input and rules of the sample dataset automatically, thus forming an ANFIS that includes five layers. Figure 2 demonstrates the infrastructure of ANFIS. ANFIS is a kind of artificial intelligence (AI) method which integrates the strength of fuzzy logic or artificial neural network (ANN) techniques. ANFIS is a hybrid method which utilizes a fuzzy inference system (FIS) embedding in an NN structure. The FIS module of ANFIS was utilized for representing the linguistic rules which describe the connections amongst inputs and outputs in a provided system. The NN module was utilized for adjusting the parameter of the FIS, namely the rule weights and the membership function parameters, based on the input-output training dataset. This enables the ANFIS to "learn" the relation between inputs and outputs, and to make prediction regarding new input value. ANFIS is used for a large number of tasks, involving time series prediction, control, and function approximation. It is an advanced type of fuzzy logic system that is able to learn and adapt by utilizing a learning mechanism. The learning method adjusts the parameter of the fuzzy system to enhance the performance based on the training dataset. The adaptive components of ANFIS make it especially pertinent for the application where the fundamental system is subjected to changes over time, viz., in modeling the dynamic system.

Whereas
and determine the upper and lower limits of search spaces, indicates the arbitrary value ranges within [0, 1] and indicates the distribution exponential that can be a non-negative number.
Unlike the traditional ECOA, the solution update occurs in the search region in the direction of the continual value position. However, in BECOA, the search region is determined as the dimension Boolean lattice. Moreover, the solution is upgraded through the corner of the hypercube. In addition, for choosing features, 1 characterizes the feature selection, or 0. Furthermore, the BECOA derives a fitness function from determining solutions for retaining tradeoffs amongst a pair of objectives, as defined in Equation (13): ∆ ( ) shows the classifier's error, | | indicates the subset size, and | | represents the overall features present in the data. In addition, shows a parameter ∈ [0, 1] associated with the weight of the classifier error level, and = 1 − indicates the importance of the reduction feature.

ANFIS-Based Intrusion Detection Model
In this phase, the ANFIS model is applied to recognize intrusions. ANFIS, developed by Jang, integrates the benefits of neural networks (NNs) and fuzzy systems [27]. It employs an NN learning algorithm to automatically extract the input and rules of the sample dataset automatically, thus forming an ANFIS that includes five layers. Figure 2 demonstrates the infrastructure of ANFIS. ANFIS is a kind of artificial intelligence (AI) method which integrates the strength of fuzzy logic or artificial neural network (ANN) techniques. ANFIS is a hybrid method which utilizes a fuzzy inference system (FIS) embedding in an NN structure. The FIS module of ANFIS was utilized for representing the linguistic rules which describe the connections amongst inputs and outputs in a provided system. The NN module was utilized for adjusting the parameter of the FIS, namely the rule weights and the membership function parameters, based on the input-output training dataset. This enables the ANFIS to "learn" the relation between inputs and outputs, and to make prediction regarding new input value. ANFIS is used for a large number of tasks, involving time series prediction, control, and function approximation. It is an advanced type of fuzzy logic system that is able to learn and adapt by utilizing a learning mechanism. The learning method adjusts the parameter of the fuzzy system to enhance the performance based on the training dataset. The adaptive components of ANFIS make it especially pertinent for the application where the fundamental system is subjected to changes over time, viz., in modeling the dynamic system.  It is an extension of the conventional fuzzy system and has an analogous structure that comprises the fuzzy inference, input and output layers. Briefly, the ANFIS integrates the capability to characterize vague or uncertain knowledge of the FIS with the capability to learn from information of the NNs. Therefore, it leverages the knowledge of human expertise and data from the environments to increase performance. Layer 1: Each node is an adaptive node. The output of layer 1 is the fuzzy membership grade of inputs, as shown in Equations (14) and (15): where µ A i (x), µ B i−2 (y) adopts the fuzzy membership function. Layer 2: The nodes are fixed. They are labeled with M, specifying that they play simple multipliers as given in Equation (16): Layer 3: The nodes are fixed nodes. They are labeled with N, representing that they execute the normalization to the firing strength from the preceding layer as defined in Equation (17): Layer 4: The node is adaptive. The output of all nodes is the product of the normalized firing strength and the first-order polynomial (first-order Sugeno model), as given in Equation (18): Layer 5: There is one fixed node labeled with S. This node is played as a summation of each incoming signal: The final output of ANFIS is defined in Equation (20):

Parameter Tuning Using JSSO Algorithm
Finally, the JSSO algorithm is used to optimize the MFs. The traditional SSO technique is found to be effective in resolving real-time optimization challenges. The presented method gives the productive means of changing parameters [28]. It gives the best exploration capability for the primary searching method. However, it has the limitation that it suffers from lower convergence speed and requires higher convergence time. This challenge minimizes the population range to escape from the local optima. The abovementioned problems are considered to develop the new method with the integration of JA. The traditional jaya algorithm (JA) has different features; it can be simple for the developer, and only one phase has fewer variables. The traditional JA is exploited for multi-objective optimized problems. It is capable of finding the optimal value in a lesser period. This feature is taken into account to perform the new technique named J-SSO. Rather than rotational movement, JA updating is used. In this work, the new equation is expressed for the gradient of the main function of SSO represented by ∇(o f ), as provided in Equation (21): The term o f gbet represents a better solution's fitness function, and the existing solution's fitness function is denoted as 0. Therefore, if the attained solution reaches the values of ∇(o f ) < 0.5, then the location updating can be performed by SSO forward movement. Otherwise, the location updating can be performed using J A. The pseudocode of J-SSO is demonstrated in Algorithm 1. The hybrid optimized technique is stimulated by integrating The JSSO technique derives a fitness function to attain improved classification performance. It determines a positive integer to represent the better performance of the candidate solutions. In this study, the minimization of the classification error rate is considered the fitness function, as given in Equation (22)

Results and Discussion
The proposed model is simulated using Python 3.6.5 tool on PC i5-8600k, GeForce 1050Ti 4GB, 16GB RAM, 250GB SSD, and 1TB HDD. The parameter settings are given as follows: learning rate, 0.01; dropout, 0.5; batch size, 5; epoch count, 50; and activation, ReLU. In this section, the intrusion classification performance of the IMFL-IDSCS model is inspected on the NSL-KDD dataset. Table 1 defines the detailed description of the dataset.

Result Analysis
The confusion matrices of the IMFL-IDSCS model on intrusion classification are demonstrated in Figure 3. The outcomes exhibit that the IMFL-IDSCS approach properly categorized all intrusions and normal samples. demonstrated in Figure 3. The outcomes exhibit that the IMFL-IDSCS approach properly categorized all intrusions and normal samples. With 80% of the training (TR) set, the IMFL-IDSCS model identified 36,302 into DoS, 549 into R2l, 8768 into Probe, 2 into U2R, and 53,414 into normal. Eventually, with 20% of testing (TS) set, the IMFL-IDSCS approach identified 9130 into DoS, 127 into R2l, 2324 into Probe, 3 into U2R, and 13,177 into normal. Meanwhile, with 70% of TR set, the IMFL-IDSCS technique identified 31,838 into DoS, 479 into R2l, 8007 into Probe, 0 into U2R, and 46,461 into normal. Finally, with 30% of the TS set, the IMFL-IDSCS method identified 13,581 into DoS, 212 into R2l, 3407 into Probe, 0 into U2R, and 20,004 into normal.     Figure 4 provide the comprehensive intrusion recognition results of the IMFL-IDSCS method on 80% of TR and 20% of TS databases.
The figure demonstrates that the IMFL-IDSCS model showed maximum outcome under all classes. For sample, on 80% of the TR database, the IMFL-IDSCS approach provided an average accu y of 99.31%, prec n of 77.90%, reca l of 73.26%, F score of 73.86%, and Mathew correlation coefficient (MCC) of 74.03%. Moreover, on 20% of the TS database, the IMFL-IDSCS approach rendered an average accu y of 99.31%, prec n of 92.03%, reca l of 78.25%, F score of 81.80%, and MCC of 82.83%. Table 3 and Figure 5 provide the overall intrusion recognition outcomes of the IMFL-IDSCS model on 70% of TR and 30% of TS databases. The outcomes exhibit that the IMFL-IDSCS method showed maximum outcome under all classes. For the sample, on 70% of the TR database, the IMFL-IDSCS approach presented an average accu y of 99.37%, prec n of 75.14%, reca l of 73.09%, F score of 74%, and MCC of 73.56%. On 30% of the TS database, the IMFL-IDSCS technique offered an average accu y of 99.38%, prec n of 74.26%, reca l of 72.77%, F score of 73.45%, and MCC of 73%.
The training accuracy (TACC) and validation accuracy (VACC) of the IMFL-IDSCS technique are inspected on ID performance in Figure 6. The figure displays that the IMFL-IDSCS approach showed improved performance with increased values of TACC and VACC. It is seen that the IMFL-IDSCS algorithm reached maximum TACC outcomes.        The training accuracy (TACC) and validation accuracy (VACC) of the IMFL-IDSCS technique are inspected on ID performance in Figure 6. The figure displays that the IMFL-IDSCS approach showed improved performance with increased values of TACC and VACC. It is seen that the IMFL-IDSCS algorithm reached maximum TACC outcomes.  The training accuracy (TACC) and validation accuracy (VACC) of the IMFL-IDSCS technique are inspected on ID performance in Figure 6. The figure displays that the IMFL-IDSCS approach showed improved performance with increased values of TACC and VACC. It is seen that the IMFL-IDSCS algorithm reached maximum TACC outcomes.  The training loss (TLS) and validation loss (VLS) of the IMFL-IDSCS methodology are tested on ID performance in Figure 7. The figure displays that the IMFL-IDSCS algorithm revealed better performance with the least values of TLS and VLS. It is seen that the IMFL-IDSCS technique reduced the VLS outcomes.
A clear precision-recall examination of the IMFL-IDSCS method in the test database is portrayed in Figure 8. The results specified that the IMFL-IDSCS methodology had enhanced precision-recall values in class labels.
The detailed ROC study of the IMFL-IDSCS method under the test database is given in Figure 9. The outcomes denoted by the IMFL-IDSCS approach showed its ability to classify different classes under the test database.

Discussion
A widespread comparative analysis of the IMFL-IDSCS approach with other CAD techniques is presented in Table 4 [17]. In Figure 10, a close inspection of the IMFL-IDSCS model with other models, such as LKM with optimal FLS, K-means-OFLS, fuzzy c-means with OFLS (FCM-OFLS), multilayer perceptron (MLP), and principal component analysis with NN (PCA-NN) in terms of accu y and F score , is given. The results imply the enhanced outcome of the IMFL-IDSCS model. For instance, based on accu y , the IMFL-IDSCS model provided a maximum accu y of 99.31%, whereas the LKM-OFLS, K-means-OFLS, FCM-OFLS, MLP, and PCA-NN models gained reduced performance with accu y of 89.34%, 91.43%, 93.38%, 91.46%, and 90.08%, respectively. Additionally, based on F score , the IMFL-IDSCS approach presented a maximum F score of 81.80%, whereas the LKM-OFLS, K-means-OFLS, FCM-OFLS, MLP, and PCA-NN approaches gained reduced performance with F score of 78.26%, 78.33%, 75.68%, 74.99%, and 77.54%, correspondingly. The training loss (TLS) and validation loss (VLS) of the IMFL-IDSCS methodology are tested on ID performance in Figure 7. The figure displays that the IMFL-IDSCS algorithm revealed better performance with the least values of TLS and VLS. It is seen that the IMFL-IDSCS technique reduced the VLS outcomes. A clear precision-recall examination of the IMFL-IDSCS method in the test database is portrayed in Figure 8. The results specified that the IMFL-IDSCS methodology had enhanced precision-recall values in class labels. The detailed ROC study of the IMFL-IDSCS method under the test database is given in Figure 9. The outcomes denoted by the IMFL-IDSCS approach showed its ability to The training loss (TLS) and validation loss (VLS) of the IMFL-IDSCS methodology are tested on ID performance in Figure 7. The figure displays that the IMFL-IDSCS algorithm revealed better performance with the least values of TLS and VLS. It is seen that the IMFL-IDSCS technique reduced the VLS outcomes. A clear precision-recall examination of the IMFL-IDSCS method in the test database is portrayed in Figure 8. The results specified that the IMFL-IDSCS methodology had enhanced precision-recall values in class labels. The detailed ROC study of the IMFL-IDSCS method under the test database is given in Figure 9. The outcomes denoted by the IMFL-IDSCS approach showed its ability to classify different classes under the test database.

Discussion
A widespread comparative analysis of the IMFL-IDSCS approach with other CAD techniques is presented in Table 4 [17]. In Figure 10     In Figure 11, a close inspection of the IMFL-IDSCS method with other ML methods in terms of and is given.  In Figure 11, a close inspection of the IMFL-IDSCS method with other ML methods in terms of prec n and reca l is given. The outcomes exhibit the enhanced outcome of the IMFL-IDSCS approach. For instance, based on prec n , the IMFL-IDSCS methodology presented maximum prec n of 92.03%, whereas the LKM-OFLS, K-means-OFLS, FCM-OFLS, MLP, and PCA-NN methods obtained reduced performance with prec n of 84.64%, 85.74%, 82.74%, 86.61%, and 84.56%, correspondingly. Similarly, based on reca l , the IMFL-IDSCS approach rendered maximum reca l of 78.25%. In contrast, the LKM-OFLS, K-means-OFLS, FCM-OFLS, MLP, and PCA-NN techniques achieved reduced performance with reca l of 74.68%, 75.51%, 74.43%, 76.76%, and 76.06% correspondingly. These results highlight the superior outcomes of the IMFL-IDSCS model. The enhanced performance of the proposed model is due to the inclusion of the ECOA-FS model, which decreases the computational burden and increases the classification rate. In addition, the design of the JSSO algorithm for the ANFIS model helps in attaining maximum detection performance.
In Figure 11, a close inspection of the IMFL-IDSCS method with other ML methods in terms of and is given. The outcomes exhibit the enhanced outcome of the IMFL-IDSCS approach. For instance, based on , the IMFL-IDSCS methodology presented maximum of 92.03%, whereas the LKM-OFLS, K-means-OFLS, FCM-OFLS, MLP, and PCA-NN methods obtained reduced performance with of 84.64%, 85.74%, 82.74%, 86.61%, and 84.56%, correspondingly. Similarly, based on , the IMFL-IDSCS approach rendered maximum of 78.25%. In contrast, the LKM-OFLS, K-means-OFLS, FCM-OFLS, MLP, and PCA-NN techniques achieved reduced performance with of 74.68%, 75.51%, 74.43%, 76.76%, and 76.06% correspondingly. These results highlight the superior outcomes of the IMFL-IDSCS model. The enhanced performance of the proposed model is due to the inclusion of the ECOA-FS model, which decreases the computational burden and increases the classification rate. In addition, the design of the JSSO algorithm for the ANFIS model helps in attaining maximum detection performance. Figure 11. and analysis of IMFL-IDSCS system with other approaches. Figure 11. Prec n and reca l analysis of IMFL-IDSCS system with other approaches.

Conclusions
In this study, a new IMFL-IDSCS method was derived to detect intrusions in the distributed CC platform and secure it from probable threats. An individual sample of IDS was deployed for every client, and an individual controller was utilized for data management. In addition, the IMFL-IDSCS technique used the ECOA-FS method for choosing the best features. This was followed by the ANFIS model, which was applied to recognize intrusions. Finally, the JSSO algorithm was used to optimize the MFs. A widespread simulation analysis was performed to examine the enhanced outcomes of the IMFL-IDSCS technique. The extensive comparison study reported the enhanced outcomes of the IMFL-IDSCS model with maximum detection efficiency with accuracy of 99.31%, precision of 92.03%, recall of 78.25%, and F-score of 81.80%. In the future, the performance of the IMFL-IDSCS technique can be improvised by outlier removal approaches. In addition, the proposed model can be extended to the detection of malware, ransomware, and other kinds of attacks in the Android environment.

Conflicts of Interest:
The authors declare that they have no conflict of interest to report regarding the present study.