CS-PSO based Intrusion Detection System in Cloud Environment

被引:30
作者
Ghosh, Partha [1 ]
Karmakar, Arnab [1 ]
Sharma, Joy [1 ]
Phadikar, Santanu [2 ]
机构
[1] Netaji Subhash Engn Coll, Kolkata 700152, India
[2] Maulana Abul Kalam Azad Univ Technol, Kolkata 700064, India
来源
EMERGING TECHNOLOGIES IN DATA MINING AND INFORMATION SECURITY, IEMIS 2018, VOL 1 | 2019年 / 755卷
关键词
Cloud computing; Intrusion detection system (IDS); Host intrusion detection system (HIDS); Network intrusion detection system (NIDS); Cuckoo search (CS); Particle swarm optimization (PSO); NSL-KDD dataset;
D O I
10.1007/978-981-13-1951-8_24
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud Computing is a provider of different types of services to the user in the Internet to make it cost-effective, time-effective and contributes an effort-less environment. For all these reasons it attracts huge number of users and makes it vulnerable to security threats. Cloud deals with huge number of data and to prohibit intrusion with huge dataset is quite hectic, so to overcome these security issues Intrusion Detection System (IDS) are deployed. To predict all the intrusions instantly and accurately an appropriate training is required for the IDS. Existence of trivial feature set in the training data enhances the memory space and training time. In this paper the authors have implemented a novel CS-PSO-based IDS to classify attacks rapidly and easily. Here NSL-KDD dataset have been chosen to demonstrate the proficiency of the IDS.
引用
收藏
页码:261 / 269
页数:9
相关论文
共 15 条
  • [1] [Anonymous], 2010, INT J COMPUT SCI ENG
  • [2] [Anonymous], 2015, APPL COMPUTATION SEC, DOI DOI 10.1007/978-81-322-1985-9_2
  • [3] [Anonymous], 2014, Cuckoo Search and Firefly Algorithm: Theory and Applications, DOI DOI 10.1007/978-3-319-02141-6_
  • [4] Ghosh P., 2014, IOSR J COMPUT ENG, V16, P16, DOI [10.9790/0661-16471626, DOI 10.9790/0661-16471626]
  • [5] A Cloud Intrusion Detection System Using Novel PRFCM Clustering and KNN Based Dempster-Shafer Rule
    Ghosh, Partha
    Shakti, Shivam
    Phadikar, Santanu
    [J]. INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2016, 6 (04) : 18 - 35
  • [6] Penalty-Reward Based Instance Selection Method in Cloud Environment Using the Concept of Nearest Neighbor
    Ghosh, Partha
    Saha, Akash
    Phadikar, Santanu
    [J]. TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 : 82 - 89
  • [7] An Efficient Cloud Network Intrusion Detection System
    Ghosh, Partha
    Mandal, Abhay Kumar
    Kumar, Rupesh
    [J]. INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 1, 2015, 339 : 91 - 99
  • [8] An analysis of security issues for cloud computing
    Hashizume, Keiko
    Rosado, David G.
    Fernandez-Medina, Eduardo
    Fernandez, Eduardo B.
    [J]. JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2013, 4 (01) : 1 - 13
  • [9] Kene SG, 2015, 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), P227, DOI 10.1109/ECS.2015.7124898
  • [10] Kumar B.S., 2013, INT J COMPUT SCI INF, V4, P77