Efficacious Novel Intrusion Detection System for Cloud Computing Environment

被引:0
|
作者
Rana, Pooja [1 ]
Batra, Isha [1 ]
Malik, Arun [1 ]
Ra, In-Ho [2 ]
Lee, Oh-Sung [3 ]
Hosen, A. S. M. Sanwar [4 ]
机构
[1] Lovely Profess Univ, Sch Comp Sci & Engn, Phagwara 144401, Punjab, India
[2] Kunsan Natl Univ, Sch Comp Informat & Commun Engn, Gunsan 54150, South Korea
[3] Kunsan Natl Univ, Sch Elect & Informat Engn, Gusan 54150, South Korea
[4] Woosong Univ, Dept Artificial Intelligence & Big Data, Daejeon 34606, South Korea
来源
IEEE ACCESS | 2024年 / 12卷
基金
新加坡国家研究基金会;
关键词
Cloud computing; Intrusion detection; Feature extraction; Neural networks; Classification algorithms; Monitoring; Telecommunication traffic; Decision trees; Genetic algorithms; Nearest neighbor methods; Particle swarm optimization; Support vector machines; Random forests; Decision Tree; Firefly Algorithm; Fitness Function; Feature Selection; Genetic Algorithm; Intrusion Detection System; K-nearest Neighbor; Particle Swarm Optimization; Support Vector Machine; Neural Network; Random Forest; FEATURE-SELECTION; NETWORK; CLASSIFICATION; MODELS;
D O I
10.1109/ACCESS.2024.3424528
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Rife acceptance of Cloud Computing has made it bull's eye for the hackers. Intrusion detection System (IDS) plays a vibrant role for it. Researchers have done marvelous works on the development of a competence IDS. But there are many challenges still exists with IDS. One of the biggest concerns is that the computational complexity and false alarms of the IDS escalates with the increase in the number of features or attributes of the dataset. Hence, the concept of Feature Selection (FS) contributes an all-important role for the buildout of an efficacious IDS. New FS algorithm is put forward which is the modified Firefly Algorithm in which Decision Tree (DT) classifier is used as the classification function. We have used the hybrid classifier which is the combination of neural network and DT. We have used CSE CIC IDS 2018 dataset and simulated dataset for performance assessment. Our examination pragmatic that the performance of proposed architecture is better than the state-of-the-art algorithms.
引用
收藏
页码:99223 / 99239
页数:17
相关论文
共 50 条
  • [1] The Research of Intrusion Detection System in Cloud Computing Environment
    Wang, Huaibin
    Zhou, Haiyun
    ADVANCES IN MULTIMEDIA, SOFTWARE ENGINEERING AND COMPUTING, VOL 1, 2011, 128 : 45 - 49
  • [2] HIDS: A host based intrusion detection system for cloud computing environment
    Deshpande P.
    Sharma S.C.
    Peddoju S.K.
    Junaid S.
    Deshpande, Prachi (deprachi3@gmail.com), 2018, Springer (09) : 567 - 576
  • [3] FCM–SVM based intrusion detection system for cloud computing environment
    Aws Naser Jaber
    Shafiq Ul Rehman
    Cluster Computing, 2020, 23 : 3221 - 3231
  • [4] Collaborative Intrusion Detection as a Service in Cloud Computing Environment
    Liang, Hong
    Ge, Yufei
    Wang, Wenjiao
    Chen, Lin
    PROCEEDINGS OF 2015 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATCS AND COMPUTING (IEEE PIC), 2015, : 476 - 480
  • [5] A Survey of Intrusion Detection Systems for Cloud Computing Environment
    Chiba, Zouhair
    Abghour, Noureddine
    Moussaid, Khalid
    El Omri, Amina
    Rida, Mohamed
    2016 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2016,
  • [6] FCM-SVM based intrusion detection system for cloud computing environment
    Jaber, Aws Naser
    Ul Rehman, Shafiq
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (04): : 3221 - 3231
  • [7] Distributed Intrusion Detection System using Mobile Agents in Cloud Computing Environment
    Mehmood, Yasir
    Kanwal, Ayesha
    Shibli, Muhammad Awais
    Masood, Rahat
    2015 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS), 2015, : 1 - 8
  • [8] Design of Hypervisor-based Integrated Intrusion Detection System in Cloud Computing Environment
    Wang, Chih-Hung
    Chen, Xuan-Liang
    INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 972 - 981
  • [9] Virtual Machine-based Intrusion Detection System Framework in Cloud Computing Environment
    Wang, Huaibin
    Zhou, Haiyun
    Wang, Chundong
    JOURNAL OF COMPUTERS, 2012, 7 (10) : 2397 - 2403
  • [10] Critical Review of Intrusion Detection Systems In Cloud Computing Environment
    Aborujilah, Abdulaziz
    Musa, Shahrulniza
    2016 PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICICTM), 2016, : 251 - 255