Efficacious Novel Intrusion Detection System for Cloud Computing Environment

被引:0
|
作者
Rana, Pooja [1 ]
Batra, Isha [1 ]
Malik, Arun [1 ]
Ra, In-Ho [2 ]
Lee, Oh-Sung [3 ]
Hosen, A. S. M. Sanwar [4 ]
机构
[1] Lovely Profess Univ, Sch Comp Sci & Engn, Phagwara 144401, Punjab, India
[2] Kunsan Natl Univ, Sch Comp Informat & Commun Engn, Gunsan 54150, South Korea
[3] Kunsan Natl Univ, Sch Elect & Informat Engn, Gusan 54150, South Korea
[4] Woosong Univ, Dept Artificial Intelligence & Big Data, Daejeon 34606, South Korea
来源
IEEE ACCESS | 2024年 / 12卷
基金
新加坡国家研究基金会;
关键词
Cloud computing; Intrusion detection; Feature extraction; Neural networks; Classification algorithms; Monitoring; Telecommunication traffic; Decision trees; Genetic algorithms; Nearest neighbor methods; Particle swarm optimization; Support vector machines; Random forests; Decision Tree; Firefly Algorithm; Fitness Function; Feature Selection; Genetic Algorithm; Intrusion Detection System; K-nearest Neighbor; Particle Swarm Optimization; Support Vector Machine; Neural Network; Random Forest; FEATURE-SELECTION; NETWORK; CLASSIFICATION; MODELS;
D O I
10.1109/ACCESS.2024.3424528
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Rife acceptance of Cloud Computing has made it bull's eye for the hackers. Intrusion detection System (IDS) plays a vibrant role for it. Researchers have done marvelous works on the development of a competence IDS. But there are many challenges still exists with IDS. One of the biggest concerns is that the computational complexity and false alarms of the IDS escalates with the increase in the number of features or attributes of the dataset. Hence, the concept of Feature Selection (FS) contributes an all-important role for the buildout of an efficacious IDS. New FS algorithm is put forward which is the modified Firefly Algorithm in which Decision Tree (DT) classifier is used as the classification function. We have used the hybrid classifier which is the combination of neural network and DT. We have used CSE CIC IDS 2018 dataset and simulated dataset for performance assessment. Our examination pragmatic that the performance of proposed architecture is better than the state-of-the-art algorithms.
引用
收藏
页码:99223 / 99239
页数:17
相关论文
共 50 条
  • [31] Intrusion Detection for Grid and Cloud Computing
    Vieira, Kleber
    Schulter, Alexandre
    Westphall, Carlos Becker
    Westphall, Carla Merkle
    IT PROFESSIONAL, 2010, 12 (04) : 38 - 43
  • [32] A Novel Hybrid-Network Intrusion Detection System (H-NIDS) in Cloud Computing
    Modi, Chirag N.
    Patel, Dhiren
    2013 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE IN CYBER SECURITY (CICS), 2013, : 23 - 30
  • [33] Intrusion Detection in Cloud Computing Implementation of (SAAS & IAAS) Using Grid Environment
    Moorthy, S. Manthira
    Masillamani, M. Roberts
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON INTERNET COMPUTING AND INFORMATION COMMUNICATIONS (ICICIC GLOBAL 2012), 2014, 216 : 53 - 64
  • [34] Network Intrusion Detection Method Combining CNN and BiLSTM in Cloud Computing Environment
    Gao, Jing
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [35] A Fingerprinting System Calls Approach for Intrusion Detection in a Cloud Environment
    Gupta, Sanchika
    Sardana, Anjali
    Kumar, Padam
    Abraham, Ajith
    2012 FOURTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL ASPECTS OF SOCIAL NETWORKS (CASON), 2012, : 309 - 314
  • [36] An Improved Intrusion Detection System to Preserve Security in Cloud Environment
    Ghosh, Partha
    Biswas, Sumit
    Shakti, Shivam
    Phadikar, Santanu
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2020, 14 (01) : 67 - 80
  • [37] Cloud Security: LKM and Optimal Fuzzy System for Intrusion Detection in Cloud Environment
    Shyla, S. Immaculate
    Sujatha, S. S.
    JOURNAL OF INTELLIGENT SYSTEMS, 2020, 29 (01) : 1626 - 1642
  • [38] Design of the Network Security Intrusion Detection System Based on the Cloud Computing
    Di, Meng
    CYBER SECURITY INTELLIGENCE AND ANALYTICS, 2020, 928 : 68 - 73
  • [39] Intrusion Detection System (IDS) Server Placement Analysis in Cloud Computing
    Aryachandra, A. A.
    Arif, Fazmah Y.
    Anggis, Novian S.
    2016 4TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2016,
  • [40] An Online Intrusion Detection System to Cloud Computing Based on Neucube Algorithms
    Almomani, Ammar
    Alauthman, Mohammad
    Albalas, Firas
    Dorgham, O.
    Obeidat, Atef
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2018, 8 (02) : 96 - 112