A Cloud Based Network Intrusion Detection System

被引:6
作者
You, Li [1 ]
Wang, Zhanyong [2 ]
机构
[1] Hebei Vocat Univ Ind & Technol, Informat Ctr, Shijiazhuang, Hebei, Peoples R China
[2] Hebei Vocat Univ Ind & Technol, Admiss & Career Guidance Ctr, Shijiazhuang, Hebei, Peoples R China
来源
TEHNICKI VJESNIK-TECHNICAL GAZETTE | 2022年 / 29卷 / 03期
关键词
cloud computing; feasibility; network intrusion detection system;
D O I
10.17559/TV-20211130024245
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Along with the development of intrusion detection systems so far, remarkable results have been achieved in aspects of dynamic monitoring and network defense. However, regarding the ever-increasing volume of network detection data, the limited data processing capacity of intrusion detection systems impedes its pace of development and meanwhile restrains the effectiveness and timeliness of detection of the system. However, the application of cloud computing with its powerful computing capacity in intrusion detection systems can solve this bottleneck problem. Therefore, on the basis of cloud computing, this paper conducts design analysis of the network intrusion detection system and carries out empirical study with reference to the 10% training datasets of KDDCup99 of Lincoln Laboratory. Results show that the cloud computing based network intrusion detection system can effectively detect four types of mainstream attacks, namely Probe, DoS, U2R and R2L, with detection rates all above 94%, the highest false alarm rate being only 4.32% and the longest detection duration being only 50 s, which verifies the feasibility of system detection.
引用
收藏
页码:987 / 992
页数:6
相关论文
共 22 条
[1]   Network intrusion detection system: A systematic study of machine learning and deep learning approaches [J].
Ahmad, Zeeshan ;
Shahid Khan, Adnan ;
Wai Shiang, Cheah ;
Abdullah, Johari ;
Ahmad, Farhan .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (01)
[2]  
Avinash K., 2019, RECENT ADV COMPUTER, V13, DOI [10.2174/2213275912666181127123431, DOI 10.2174/2213275912666181127123431]
[3]   RETRACTED: A novel optimized Bat Extreme Learning intrusion detection system for smart Internet of Things networks (Retracted article. See vol. 35, 2022) [J].
Balasundaram, Jothi ;
Pushpalatha, M. .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (07)
[4]   Cloud Computing Adoption for Healthcare: An Empirical Study Using SEM Approach [J].
Baral, Manish Mohan ;
Verma, Amitabh .
FIIB BUSINESS REVIEW, 2021, 10 (03) :255-275
[5]   A Design Of An Integrated Cloud-based Intrusion Detection System With Third Party Cloud Service [J].
Elmasry, Wisam ;
Akbulut, Akhan ;
Zaim, Abdul Halim .
OPEN COMPUTER SCIENCE, 2021, 11 (01) :365-379
[6]   Remote patient monitoring and classifying using the internet of things platform combined with cloud computing [J].
Iranpak, Somayeh ;
Shahbahrami, Asadollah ;
Shakeri, Hassan .
JOURNAL OF BIG DATA, 2021, 8 (01)
[7]   Artificial Intelligence outflanks all other machine learning classifiers in Network Intrusion Detection System on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing [J].
Kanimozhi, V ;
Jacob, T. Prem .
ICT EXPRESS, 2021, 7 (03) :366-370
[8]   Toward Developing Efficient Conv-AE-Based Intrusion Detection System Using Heterogeneous Dataset [J].
Khan, Muhammad Ashfaq ;
Kim, Juntae .
ELECTRONICS, 2020, 9 (11) :1-17
[9]   Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing [J].
Krishnaveni, S. ;
Sivamohan, S. ;
Sridhar, S. S. ;
Prabakaran, S. .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (03) :1761-1779
[10]  
Latah Majd, 2020, CCF Transactions on Networking, V3, P261, DOI 10.1007/s42045-020-00040-z