A novel cloud architecture approach to detect network intrusions using an enhanced artificial neural network

被引:0
作者
Lakhani P. [1 ]
Alankar B. [1 ]
Ashraf S.S. [1 ]
Parveen S. [1 ]
机构
[1] Department of Computer Science and Engineering, Jamia Hamdard, New Delhi
关键词
ANN; Cloud computing; Intrusion detection; Supervised machine learning approaches;
D O I
10.1007/s41870-024-01983-y
中图分类号
学科分类号
摘要
The recent technologies like artificial intelligence and cloud services are rapidly expanding, and virtualized data centers are gaining favor as a practical infrastructure for the telecommunications sector. End customers, including numerous private and public organizations, have widely adopted and used infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). Security remains the primary issue in cloud computing systems despite its widespread acceptance. Customers of cloud services live in constant worry of availability problems, information theft, security breaches, and data loss. With the development of machine learning (ML) tools, security applications are currently becoming more and more prominent in the literature. In this study, we investigate the applicability of enhanced artificial neural networks (ANN), a well-known ML method, to identify intrusions or unusual behavior in the cloud environment. We have designed machine learning (ML) models using an enhanced ANN approach and compared the results. The UNSW-NB-15 dataset was used to train and test the models. To reduce the complexity and training time of the ML model, we have also conducted feature engineering and parameter tuning to identify the best set of features with the highest level of accuracy. We see that the accuracy of anomaly detection achieved by an enhanced ANN approach with the right features set is 99.91%. This accuracy is greater than that seen in the literature and requires fewer features to train the model. © Bharati Vidyapeeth's Institute of Computer Applications and Management 2024.
引用
收藏
页码:3929 / 3939
页数:10
相关论文
共 31 条
  • [1] Jain K., Gupta M., Abraham A., A review on privacy and security assessment of cloud computing, J Inf Assur Secur, 16, pp. 161-168, (2021)
  • [2] Buyya R., Srirama S.N., Casale G., Calheiros R., Simmhan Y., Varghese B., Shen H., A manifesto for future generation cloud computing: research directions for the next decade, ACM comput surv (CSUR), 51, 5, pp. 1-38, (2018)
  • [3] Kantheti S.C., Manne R., Performance and evaluation of firewalls and security, An interdisciplinary approach to modern network security, pp. 69-87, (2022)
  • [4] Lahmar F., Mezni H., Security-aware multi-cloud service composition by exploiting rough sets and fuzzy FCA, Soft Comput, 25, 7, pp. 5173-5197, (2021)
  • [5] Singh S., Intrusion detection system (IDS) and intrusion prevention system (IPS) for network security: a critical analysis, Intl J Resin Eng Appl Sci, 3, 3, pp. 1-9, (2013)
  • [6] Hassan M.M., Gumaei A., Alsanad A., Alrubaian M., Fortino G., A hybrid deep learning model for efficient intrusion detection in big data environment, Inf Sci, 513, pp. 386-396, (2020)
  • [7] Chen S., Xue M., Fan L., Hao S., Xu L., Zhu H., Li B., Automated poisoning attacks and defenses in malware detection systems: an adversarial machine learning approach, Comput Secur, 73, pp. 326-344, (2018)
  • [8] Raghuvanshi K.K., Agarwal A., Jain K., Singh V.B., A time-variant fault detection software reliability model, SN Appl Sci, 3, pp. 1-10, (2021)
  • [9] Jain K., Singh A., Singh P., Yadav S., An improved supervised classification algorithm in healthcare diagnostics for predicting opioid habit disorder, Intl J Reliab Qual E-Healthc (IJRQEH), 11, 1, pp. 1-16, (2022)
  • [10] Jain K., Singh A., A two vector data-prediction model for energy-efficient data aggregation in wireless sensor network, Concurrency Comput: Pract Exp, 34, 11, (2022)