Filter-Based Ensemble Feature Selection and Deep Learning Model for Intrusion Detection in Cloud Computing

被引:17
作者
Kavitha, C. [1 ]
Saravanan, M. [2 ]
Gadekallu, Thippa Reddy [3 ,4 ]
Nimala, K. [5 ]
Kavin, Balasubramanian Prabhu [6 ]
Lai, Wen-Cheng [7 ,8 ]
机构
[1] Sathyabama Inst Sci & Technol, Dept Comp Sci & Engn, Chennai 600083, Tamil Nadu, India
[2] SRM Inst Sci & Technol, Coll Engn & Technol, Dept Networking & Commun, Kattankulathur 603203, Tamil Nadu, India
[3] Vellore Inst Technol, Sch Informat Technol & Engn, Vellore 632014, Tamil Nadu, India
[4] Lebanese Amer Univ, Dept Elect & Comp Engn, Byblos 10150, Lebanon
[5] SRM Inst Sci & Technol, Sch Comp, Dept Networking & Commun, Kattankulathur 603203, Tamil Nadu, India
[6] SRM Inst Sci & Technol, Dept Data Sci & Business Syst, Kattankulathur 603203, Tamil Nadu, India
[7] Natl Yunlin Univ Sci & Technol, Bachelor Program Ind Projects, Touliu 640301, Taiwan
[8] Natl Yunlin Univ Sci & Technol, Dept Elect Engn, Touliu 640301, Taiwan
关键词
intrusion detection; recurrent neural network; deep learning model; filter-based ensemble feature selection; cloud computing; DETECTION SYSTEM; VIRTUAL NETWORK; ALGORITHM;
D O I
10.3390/electronics12030556
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, the high improvement in communication, Internet of Things (IoT) and cloud computing have begun complex questioning in security. Based on the development, cyberattacks can be increased since the present security techniques do not give optimal solutions. As a result, the authors of this paper created filter-based ensemble feature selection (FEFS) and employed a deep learning model (DLM) for cloud computing intrusion detection. Initially, the intrusion data were collected from the global datasets of KDDCup-99 and NSL-KDD. The data were utilized for validation of the proposed methodology. The collected database was utilized for feature selection to empower the intrusion prediction. The FEFS is a combination of three feature extraction processes: filter, wrapper and embedded algorithms. Based on the above feature extraction process, the essential features were selected for enabling the training process in the DLM. Finally, the classifier received the chosen features. The DLM is a combination of a recurrent neural network (RNN) and Tasmanian devil optimization (TDO). In the RNN, the optimal weighting parameter is selected with the assistance of the TDO. The proposed technique was implemented in MATLAB, and its effectiveness was assessed using performance metrics including sensitivity, F measure, precision, sensitivity, recall and accuracy. The proposed method was compared with the conventional techniques such as an RNN and deep neural network (DNN) and RNN-genetic algorithm (RNN-GA), respectively.
引用
收藏
页数:21
相关论文
共 32 条
[1]   A New Ensemble-Based Intrusion Detection System for Internet of Things [J].
Abbas, Adeel ;
Khan, Muazzam A. ;
Latif, Shahid ;
Ajaz, Maria ;
Shah, Awais Aziz ;
Ahmad, Jawad .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2022, 47 (02) :1805-1819
[2]   Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model [J].
Aljawarneh, Shadi ;
Aldwairi, Monther ;
Yassein, Muneer Bani .
JOURNAL OF COMPUTATIONAL SCIENCE, 2018, 25 :152-160
[3]  
[Anonymous], KDD ICS UCI EDU DATA
[4]  
[Anonymous], WWW UNB CA CIC DAT N
[5]  
Belouch M, 2017, INT J ADV COMPUT SC, V8, P389
[6]   LR-HIDS: logistic regression host-based intrusion detection system for cloud environments [J].
Besharati, Elham ;
Naderan, Marjan ;
Namjoo, Ehsan .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (09) :3669-3692
[7]   A new hybrid approach for intrusion detection using machine learning methods [J].
Cavusoglu, Unal .
APPLIED INTELLIGENCE, 2019, 49 (07) :2735-2761
[8]   Tasmanian Devil Optimization: A New Bio-Inspired Optimization Algorithm for Solving Optimization Algorithm [J].
Dehghani, Mohammad ;
Hubalovsky, Stepan ;
Trojovsky, Pavel .
IEEE ACCESS, 2022, 10 :19599-19620
[9]   Intrusion Detection System for Internet of Things Based on Temporal Convolution Neural Network and Efficient Feature Engineering [J].
Derhab, Abdelouahid ;
Aldweesh, Arwa ;
Emam, Ahmed Z. ;
Khan, Farrukh Aslam .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
[10]   HIDS: A host based intrusion detection system for cloud computing environment [J].
Deshpande P. ;
Sharma S.C. ;
Peddoju S.K. ;
Junaid S. .
International Journal of System Assurance Engineering and Management, 2018, 9 (03) :567-576