Effective Intrusion Detection System to Secure Data in Cloud Using Machine Learning

被引:32
作者
Aldallal, Ammar [1 ]
Alisa, Faisal [1 ]
机构
[1] Ahlia Univ, Coll Engn, Telecommun Engn Dept, Manama 10878, Bahrain
来源
SYMMETRY-BASEL | 2021年 / 13卷 / 12期
关键词
intrusion detection system; genetic algorithm; support vector machine; machine learning; fitness function; ALGORITHM; GA;
D O I
10.3390/sym13122306
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
When adopting cloud computing, cybersecurity needs to be applied to detect and protect against malicious intruders to improve the organization's capability against cyberattacks. Having network intrusion detection with zero false alarm is a challenge. This is due to the asymmetry between informative features and irrelevant and redundant features of the dataset. In this work, a novel machine learning based hybrid intrusion detection system is proposed. It combined support vector machine (SVM) and genetic algorithm (GA) methodologies with an innovative fitness function developed to evaluate system accuracy. This system was examined using the CICIDS2017 dataset, which contains normal and most up-to-date common attacks. Both algorithms, GA and SVM, were executed in parallel to achieve two optimal objectives simultaneously: obtaining the best subset of features with maximum accuracy. In this scenario, an SVM was employed using different values of hyperparameters of the kernel function, gamma, and degree. The results were benchmarked with KDD CUP 99 and NSL-KDD. The results showed that the proposed model remarkably outperformed these benchmarks by up to 5.74%. This system will be effective in cloud computing, as it is expected to provide a high level of symmetry between information security and detection of attacks and malicious intrusion.
引用
收藏
页数:26
相关论文
共 48 条
[1]   Hybrid Approach for Detection of Anomaly Network Traffic using Data Mining Techniques [J].
Agarwal, Basant ;
Mittal, Namita .
2ND INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING & SECURITY [ICCCS-2012], 2012, 1 :996-1003
[2]  
Ahmadi SS, 2019, 2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), P1029, DOI 10.1109/UEMCON47517.2019.8992960
[3]   Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system [J].
Al-Yaseen, Wathiq Laftah ;
Othman, Zulaiha Ali ;
Nazri, Mohd Zakree Ahmad .
EXPERT SYSTEMS WITH APPLICATIONS, 2017, 67 :296-303
[4]   Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model [J].
Aljawarneh, Shadi ;
Aldwairi, Monther ;
Yassein, Muneer Bani .
JOURNAL OF COMPUTATIONAL SCIENCE, 2018, 25 :152-160
[5]   A Feature Selection Model for Network Intrusion Detection System Based on PSO, GWO, FFA and GA Algorithms [J].
Almomani, Omar .
SYMMETRY-BASEL, 2020, 12 (06) :1-20
[6]   Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm [J].
Ambusaidi, Mohammed A. ;
He, Xiangjian ;
Nanda, Priyadarsi ;
Tan, Zhiyuan .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) :2986-2998
[7]  
[Anonymous], 2021, MED DATA CROSSHAIRS
[8]  
[Anonymous], 2020, CICIDS2017 INTRUSION
[9]  
[Anonymous], 2010, J. Inf. Assurance Secur.
[10]  
[Anonymous], 2012, J. Emerg. Trends Comput. Inform. Sci.