Intelligent approach to build a Deep Neural Network based IDS for cloud environment using combination of machine learning algorithms

被引:103
作者
Chiba, Zouhair [1 ]
Abghour, Noreddine [1 ]
Moussaid, Khalid [1 ]
El Omri, Amina [1 ]
Rida, Mohamed [1 ]
机构
[1] Hassan II Univ Casablanca, Fac Sci Ain Chock, LIMSAD Labs, Casablanca 20100, Morocco
关键词
Cloud computing; Network intrusion detection system; Deep Neural Network; Genetic algorithm; Simulated Annealing Algorithm; CICIDS dataset 2017; NSL-KDD dataset; CIDDS-001; dataset; INTRUSION DETECTION SYSTEM;
D O I
10.1016/j.cose.2019.06.013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The appealing features of Cloud Computing continue to fuel its adoption and its integration in many sectors such industry, governments, education and entertainment. Nevertheless, uploading sensitive data to public cloud storage services poses security risks such as integrity, availability and confidentiality to organizations. Moreover, the open and distributed (decentralized) structure of the cloud has resulted this class of computing, prone to cyber attackers and intruders. Thereby, it is imperative to develop an anomaly network intrusion system to detect and prevent both inside and outside assaults in cloud environment with high detection precision and low false warnings. In this work, we propose an intelligent approach to build automatically an efficient and effective Deep Neural Network (DNN) based anomaly Network IDS using a hybrid optimization framework (IGASAA) based on Improved Genetic Algorithm (IGA) and Simulated Annealing Algorithm (SAA). The IDS resulted is called "MLIDS" (Machine Learning based Intrusion Detection System). Genetic Algorithm (GA) is improved through optimization strategies, namely Parallel Processing and Fitness Value Hashing, which reduce execution time, convergence time and save processing power. Moreover, SAA was incorporated to IGA with the aim to optimize its heuristic search. Our approach consists of using IGASAA in order to search the optimal or near-optimal combination of most relevant values of the parameters included in construction of DNN based IDS or impacting its performance, like feature selection, data normalization, architecture of DNN, activation function, learning rate and Momentum term, which ensure high detection rate, high accuracy and low false alarm rate. For simulation and validation of the proposed method, CloudSim 4.0 simulator platform and three benchmark IDS datasets were used, namely CICIDS2017, NSL-KDD version 2015 and CIDDS-001. The implementation results of our model demonstrate its ability to detect intrusions with high detection accuracy and low false alarm rate, and indicate its superiority in comparison with state-of-the-art methods. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页码:291 / 317
页数:27
相关论文
共 77 条
[1]  
Abolhasanzadeh B, 2015, IRAN CONF ELECTR ENG, P674, DOI 10.1109/IranianCEE.2015.7146299
[2]  
Achbarou Omar, 2018, International Journal of Communication Networks and Information Security, V10, P526
[3]   Another Fuzzy Anomaly Detection System Based on Ant Clustering Algorithm [J].
Aminanto, Muhamad Erza ;
Kim, HakJu ;
Kim, Kyung-Min ;
Kim, Kwangjo .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (01) :176-183
[4]   A Neural Network Ensemble Classifier for Effective Intrusion Detection Using Fuzzy Clustering and Radial Basis Function Networks [J].
Amini, Mohammad ;
Rezaeenour, Jalal ;
Hadavandi, Esmaeil .
INTERNATIONAL JOURNAL ON ARTIFICIAL INTELLIGENCE TOOLS, 2016, 25 (02)
[5]  
[Anonymous], GENERIC MATH MODEL D
[6]  
[Anonymous], GSE 132 GLOBAL DIREC
[7]  
[Anonymous], 2017, RES BRIEFS INFORM CO
[8]  
[Anonymous], P 2018 1 INT C SEC C
[9]  
[Anonymous], 2011, P 1 WORKSH BUILD AN, DOI DOI 10.1145/1978672.1978676
[10]  
[Anonymous], ARXIV14012651