CS-PSO based Intrusion Detection System in Cloud Environment

被引:30
|
作者
Ghosh, Partha [1 ]
Karmakar, Arnab [1 ]
Sharma, Joy [1 ]
Phadikar, Santanu [2 ]
机构
[1] Netaji Subhash Engn Coll, Kolkata 700152, India
[2] Maulana Abul Kalam Azad Univ Technol, Kolkata 700064, India
关键词
Cloud computing; Intrusion detection system (IDS); Host intrusion detection system (HIDS); Network intrusion detection system (NIDS); Cuckoo search (CS); Particle swarm optimization (PSO); NSL-KDD dataset;
D O I
10.1007/978-981-13-1951-8_24
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud Computing is a provider of different types of services to the user in the Internet to make it cost-effective, time-effective and contributes an effort-less environment. For all these reasons it attracts huge number of users and makes it vulnerable to security threats. Cloud deals with huge number of data and to prohibit intrusion with huge dataset is quite hectic, so to overcome these security issues Intrusion Detection System (IDS) are deployed. To predict all the intrusions instantly and accurately an appropriate training is required for the IDS. Existence of trivial feature set in the training data enhances the memory space and training time. In this paper the authors have implemented a novel CS-PSO-based IDS to classify attacks rapidly and easily. Here NSL-KDD dataset have been chosen to demonstrate the proficiency of the IDS.
引用
收藏
页码:261 / 269
页数:9
相关论文
共 50 条
  • [1] Optimal Reactive Power Dispatch based on the CS-PSO algorithm
    Ding, Jinjin
    Zhang, Qian
    Ma, Yuan
    PROCEEDINGS OF THE 2018 13TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA 2018), 2018, : 1172 - 1176
  • [2] Optimization of BPN parameters using PSO for intrusion detection in cloud environment
    Nagarajan, G.
    Sajith, P. J.
    SOFT COMPUTING, 2023,
  • [3] HIDS: A host based intrusion detection system for cloud computing environment
    Deshpande P.
    Sharma S.C.
    Peddoju S.K.
    Junaid S.
    Deshpande, Prachi (deprachi3@gmail.com), 2018, Springer (09) : 567 - 576
  • [4] Securing Cloud Environment using a String based Intrusion Detection System
    Raj, R. Sundar
    Bhaskaran, V. Murali
    2017 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2017,
  • [5] FCM–SVM based intrusion detection system for cloud computing environment
    Aws Naser Jaber
    Shafiq Ul Rehman
    Cluster Computing, 2020, 23 : 3221 - 3231
  • [6] A Design of Firewall Based on Feedback of Intrusion Detection System in Cloud Environment
    Ma, Xiaoyu
    Fu, Xiao
    Luo, Bin
    Du, Xiaojiang
    Guizani, Mohsen
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [7] The Research of Intrusion Detection System in Cloud Computing Environment
    Wang, Huaibin
    Zhou, Haiyun
    ADVANCES IN MULTIMEDIA, SOFTWARE ENGINEERING AND COMPUTING, VOL 1, 2011, 128 : 45 - 49
  • [8] Intelligent Intrusion Detection System for Private Cloud Environment
    Muthukumar, B.
    Rajendran, Praveen Kumar
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 54 - 65
  • [9] FCM-SVM based intrusion detection system for cloud computing environment
    Jaber, Aws Naser
    Ul Rehman, Shafiq
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (04): : 3221 - 3231
  • [10] IHIDS: Introspection-Based Hybrid Intrusion Detection System in Cloud Environment
    Kashyap, Amita
    Kumar, G. Sravan
    Jangir, Sunita
    Pilli, Emmanuel S.
    Mishra, Preeti
    2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2017, : 687 - 693