HybGBS: A hybrid neural network and grey wolf optimizer for intrusion detection in a cloud computing environment

被引:3
作者
Sumathi, S. [1 ]
Rajesh, R. [2 ]
机构
[1] Univ VOC Coll Engn, Dept Comp Sci & Engn, Thoothukudi, India
[2] Indian Inst Technol Madras, Dept Engn Design, Chennai 600036, India
关键词
back propagation network; distributed denial of service; grey wolf optimizer; intrusion detection system; self organizing map; ARCHITECTURE; ALGORITHMS; KDD99; MODEL;
D O I
10.1002/cpe.8264
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The cloud computing environment is subject to unprecedented cyber-attacks as its infrastructure and protocols may contain vulnerabilities and bugs. Among these, Distributed Denial of Service (DDoS) is chosen by most cyber extortionists, creating unusual traffic that drains cloud resources, making them inaccessible to customers and end users. Hence, security solutions to combat this attack are in high demand. The existing DDoS detection techniques in literature have many drawbacks, such as overfitting, delay in detection, low detection accuracy for attacks that target multiple victims, and high False Positive Rate (FPR). In this proposed study, an Artificial Neural Network (ANN) based hybrid GBS (Grey Wolf Optimizer (GWO) + Back Propagation Network (BPN) + Self Organizing Map (SOM)) Intrusion Detection System (IDS) is proposed for intrusion detection in the cloud computing environment. The base classifier, BPN, was chosen for our research after evaluating the performance of a comprehensive set of neural network algorithms on the standard benchmark UNSW-NS 15 dataset. BPN intrusion detection performance is further enhanced by combining it with SOM and GWO. Hybrid Feature Selection (FS) is made using a correlation-based approach and Stratified 10-fold cross-validation (STCV) ranking based on Weight matrix value (W). These selected features are further fine-tuned using metaheuristic GWO hyperparameter tuning based on a fitness function. The proposed IDS technique is validated using the standard benchmark UNSW-NS 15 dataset, which consists of 1,75,341 and 82,332 attack cases in the training and testing datasets. This study's findings demonstrate that the proposed ANN-based hybrid GBS IDS model outperforms other existing IDS models with a higher intrusion detection accuracy of 99.40%, fewer false alarms (0.00389), less error rate (0.001), and faster prediction time (0.29 ns).
引用
收藏
页数:23
相关论文
共 46 条
  • [11] SmcHD1, containing a structural-maintenance-of-chromosomes hinge domain, has a critical role in X inactivation
    Blewitt, Marnie E.
    Gendrel, Anne-Valerie
    Pang, Zhenyi
    Sparrow, Duncan B.
    Whitelaw, Nadia
    Craig, Jeffrey M.
    Apedaile, Anwyn
    Hilton, Douglas J.
    Dunwoodie, Sally L.
    Brockdorff, Neil
    Kay, Graham F.
    Whitelaw, Emma
    [J]. NATURE GENETICS, 2008, 40 (05) : 663 - 669
  • [12] A novel architecture combined with optimal parameters for back propagation neural networks applied to anomaly network intrusion detection
    Chiba, Zouhair
    Abghour, Noureddine
    Moussaid, Khalid
    El Omri, Amina
    Rida, Mohamed
    [J]. COMPUTERS & SECURITY, 2018, 75 : 36 - 58
  • [13] Binary grey wolf optimization approaches for feature selection
    Emary, E.
    Zawba, Hossam M.
    Hassanien, Aboul Ella
    [J]. NEUROCOMPUTING, 2016, 172 : 371 - 381
  • [14] Eunice AD., 2021, NETWORK ANOMALY DETE
  • [15] Intrusion Detection Using Big Data and Deep Learning Techniques
    Faker, Osama
    Dogdu, Erdogan
    [J]. PROCEEDINGS OF THE 2019 ANNUAL ACM SOUTHEAST CONFERENCE (ACMSE 2019), 2019, : 86 - 93
  • [16] Hammad M., 2020, INT C INN INT INF CO, P16
  • [17] Optimization of extreme learning machine model with biological heuristic algorithms to estimate daily reference evapotranspiration in Hetao Irrigation District of China
    He, Huaijie
    Liu, Ling
    Zhu, Xiuqun
    [J]. ENGINEERING APPLICATIONS OF COMPUTATIONAL FLUID MECHANICS, 2022, 16 (01) : 1939 - 1956
  • [18] Hota H., 2014, INTELLIGENT COMPUTIN, P845, DOI DOI 10.1007/978-81-322-1665-0
  • [19] Normalization Techniques in Training DNNs: Methodology, Analysis and Application
    Huang, Lei
    Qin, Jie
    Zhou, Yi
    Zhu, Fan
    Liu, Li
    Shao, Ling
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 45 (08) : 10173 - 10196
  • [20] MACHINE LEARNING FOR UNDERWATER ACOUSTIC COMMUNICATIONS
    Huang, Lihuan
    Wang, Yue
    Zhang, Qunfei
    Han, Jing
    Tan, Weijie
    Tian, Zhi
    [J]. IEEE WIRELESS COMMUNICATIONS, 2022, 29 (03) : 102 - 108