A Cloud Intrusion Detection Systems Based on DNN Using Backpropagation and PSO on the CSE-CIC-IDS2018 Dataset

被引:47
作者
Alzughaibi, Saud [1 ]
El Khediri, Salim [1 ]
机构
[1] Qassim Univ, Coll Comp, Dept Informat Technol, Buraydah 52571, Saudi Arabia
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 04期
关键词
cloud computing; artificial neural networks; deep learning; intrusion detection system; particle swarm optimization; backpropagation; multi-layer perceptron; CSE-CIC-IDS2018; NEURAL-NETWORK;
D O I
10.3390/app13042276
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Cloud computing (CC) is becoming an essential technology worldwide. This approach represents a revolution in data storage and collaborative services. Nevertheless, security issues have grown with the move to CC, including intrusion detection systems (IDSs). Intruders have developed advanced tools that trick the traditional IDS. This study attempts to contribute toward solving this problem and reducing its harmful effects by boosting IDS performance and efficiency in a cloud environment. We build two models based on deep neural networks (DNNs) for this study: the first model is built on a multi-layer perceptron (MLP) with backpropagation (BP), and the other is trained by MLP with particle swarm optimization (PSO). We use these models to deal with binary and multi-class classification on the updated cybersecurity CSE-CIC-IDS2018 dataset. This study aims to improve the accuracy of detecting intrusion attacks for IDSs in a cloud environment and to enhance other performance metrics. In this study, we document all aspects of our experiments in depth. The results show that the best accuracy obtained for binary classification was 98.97% and that for multi-class classification was 98.41%. Furthermore, the results are compared with those from the related literature.
引用
收藏
页数:21
相关论文
共 46 条
[1]   Basic concepts of artificial neural network (ANN) modeling and its application in pharmaceutical research [J].
Agatonovic-Kustrin, S ;
Beresford, R .
JOURNAL OF PHARMACEUTICAL AND BIOMEDICAL ANALYSIS, 2000, 22 (05) :717-727
[2]  
Aggarwal C.C., 2018, Neural networks and deep learning, V10, P978, DOI [DOI 10.1007/978-3-319-94463-03, 10.1007/978-3-319-94463-0]
[3]   length Cyber threat intelligence using PCA-DNN model to detect abnormal network behavior [J].
Al-Fawa'reh, Mohammad ;
Al-Fayoumi, Mustafa ;
Nashwan, Shadi ;
Fraihat, Salam .
EGYPTIAN INFORMATICS JOURNAL, 2022, 23 (02) :173-185
[4]  
Alam S, 2008, 2008 IEEE SWARM INTELLIGENCE SYMPOSIUM, P124
[5]  
[Anonymous], TENSORFLOW DISTRIBUT
[6]  
[Anonymous], CSE CIC IDS2018 AWS
[7]  
Canadian Institute for Cybersecurity, 1785, US
[8]  
Carvalho M., 2006, Ninth Brazilian Symposium on Neural Networks, P6
[9]   A new hybrid approach for intrusion detection using machine learning methods [J].
Cavusoglu, Unal .
APPLIED INTELLIGENCE, 2019, 49 (07) :2735-2761
[10]  
Ceron R., 2019, IBM IT INFRASTRUCTUR