A Cooperative and Hybrid Network Intrusion Detection Framework in Cloud Computing Based on Snort and Optimized Back Propagation Neural Network

被引:27
|
作者
Chiba, Z. [1 ]
Abghour, N. [1 ]
Moussaid, K. [1 ]
El Omri, A. [1 ]
Rida, M. [1 ]
机构
[1] Hassan II Univ Casablanca, Team Modeling & Optimizat Mobile Serv, Fac Sci, Casablanca 20100, Morocco
来源
7TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2016) / THE 6TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2016) / AFFILIATED WORKSHOPS | 2016年 / 83卷
关键词
Cloud computing; Network intrusion detection; Back-propagation neural network; Snort; Optimization algorithm;
D O I
10.1016/j.procs.2016.04.249
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing provides a framework for supporting end users easily attaching powerful services and applications through Internet. To give secure and reliable services in cloud computing environment is an important issue. Providing security requires more than user authentication with passwords or digital certificates and confidentiality in data transmission, because it is vulnerable and prone to network intrusions that affect confidentiality, availability and integrity of Cloud resources and offered services. To detect DoS attack and other network level malicious activities in Cloud, use of only traditional firewall is not an efficient solution. In this paper, we propose a cooperative and hybrid network intrusion detection system (CH-NIDS) to detect network attacks in the Cloud environment by monitoring network traffic, while maintaining performance and service quality. In our NIDS framework, we use Snort as a signature based detection to detect known attacks, while for detecting network anomaly, we use Back-Propagation Neural network (BPN). By applying snort prior to the BPN classifier, BPN has to detect only unknown attacks. So, detection time is reduced. To solve the problem of slow convergence of BPN and being easy to fall into local optimum, we propose to optimize the parameters of it by using an optimization algorithm in order to ensure high detection rate, high accuracy, low false positives and low false negatives with affordable computational cost. In addition, in this framework, the IDSs operate in cooperative way to oppose the DoS and DDoS attacks by sharing alerts stored in central log. In this way, unknown attacks that were detected by any IDS can easily be detected by others IDSs. This also helps to reduce computational cost for detecting intrusions at others IDS, and improve detection rate in overall the Cloud environment. (C) 2016 The Authors. Published by Elsevier B.V.
引用
收藏
页码:1200 / 1206
页数:7
相关论文
共 50 条
  • [41] Neural Network based Cloud computing Platform for Bioinformatics
    Ikram, Ataul Aziz
    Ibrahim, Salma
    Sardaraz, Muhammad
    Tahir, Muhammad
    Bajwa, Hassan
    Bach, Christian
    2013 NINTH ANNUAL CONFERENCE ON LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY (LISAT 2013), 2013,
  • [42] Fingerprint Verification Based on Back Propagation Neural Network
    Balti, Ala
    Sayadi, Mounir
    Fnaiech, Farhat
    CONTROL ENGINEERING AND APPLIED INFORMATICS, 2013, 15 (03): : 53 - 60
  • [43] Cycle-consistent generative adversarial network optimized with water strider optimization algorithm fostered intrusion detection framework for securing cloud computing environment
    Preethi, B. C.
    Sugitha, G.
    Kavitha, G.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (05):
  • [44] Brain Image Segmentation Based on the Hybrid of Back Propagation Neural Network and AdaBoost System
    Zhen Chao
    Hee-Joung Kim
    Journal of Signal Processing Systems, 2020, 92 : 289 - 298
  • [45] Brain Image Segmentation Based on the Hybrid of Back Propagation Neural Network and AdaBoost System
    Chao, Zhen
    Kim, Hee-Joung
    JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2020, 92 (03): : 289 - 298
  • [46] Network optimization using defender system in cloud computing security based intrusion detection system withgame theory deep neural network (IDSGT-DNN)
    Balamurugan, E.
    Mehbodniya, Abolfazl
    Kariri, Elham
    Yadav, Kusum
    Kumar, Anil
    Haq, Mohd Anul
    PATTERN RECOGNITION LETTERS, 2022, 156 : 142 - 151
  • [47] ResACAG: A graph neural network based intrusion detection
    Zhang, Anqin
    Zhao, Yan
    Zhou, Chenhao
    Zhang, Ting
    COMPUTERS & ELECTRICAL ENGINEERING, 2025, 122
  • [48] An intrusion detection system based on convolution neural network
    Mo, Yanmeng
    Li, Huige
    Wang, Dongsheng
    Liu, Gaqiong
    PEERJ COMPUTER SCIENCE, 2024, 10
  • [49] A novel architecture combined with optimal parameters for back propagation neural networks applied to anomaly network intrusion detection
    Chiba, Zouhair
    Abghour, Noureddine
    Moussaid, Khalid
    El Omri, Amina
    Rida, Mohamed
    COMPUTERS & SECURITY, 2018, 75 : 36 - 58
  • [50] A New Back-Propagation Neural Network Optimized with Cuckoo Search Algorithm
    Nawi, Nazri Mohd
    Khan, Abdullah
    Rehman, Mohammad Zubair
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS, PT I, 2013, 7971 : 413 - 426