LR-HIDS: logistic regression host-based intrusion detection system for cloud environments

被引:88
作者
Besharati, Elham [1 ]
Naderan, Marjan [1 ]
Namjoo, Ehsan [2 ]
机构
[1] Shahid Chamran Univ Ahvaz, Dept Comp Engn, Fac Engn, Ahvaz, Iran
[2] Shahid Chamran Univ Ahvaz, Dept Elect Engn, Fac Engn, Ahvaz, Iran
关键词
Cloud computing; Intrusion detection; Host-based; Logistic regression; Feature selection; FEATURE-SELECTION;
D O I
10.1007/s12652-018-1093-8
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing is an Internet based computing environment, where storage and computing resources are assigned dynamically among users according to their needs, using the virtualization technology. Virtualization is an underlying infrastructure of cloud computing, and has led to certain security problems during the development of cloud computing. One essential but formidable task in cloud computing is to detect malicious attacks and their types. Due to increasing incidents of cyber-attacks, design and implementation of effective intrusion detection systems to protect the security of information systems is crucial. In this paper, a host-based intrusion detection system (H-IDS) for protecting virtual machines in the cloud environment is proposed. To this end, first, important features of each class are selected using logistic regression and next, these values are improved using the regularization technique. Then, various attacks are classified using a combination of three different classifiers: neural network, decision tree and linear discriminate analysis with the bagging algorithm for each class. The proposed model has been trained and tested using the NSL-KDD data set with an implementation in the Cloudsim software. Simulation results compared to other methods shows acceptable accuracy of about 97.51 for detecting attacks against normal states.
引用
收藏
页码:3669 / 3692
页数:24
相关论文
共 39 条
[1]   An Intelligent Intrusion Detection System for Cloud Computing (SIDSCC) [J].
Alqahtani, Saeed M. ;
Al Balushi, Maqbool ;
John, Robert .
2014 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), VOL 2, 2014, :135-141
[2]  
Amor S., 2004, ACM Symp. Appl. Comput, P420, DOI DOI 10.1145/967900.967989
[3]  
[Anonymous], 2004, Introduction to machine learning
[4]  
[Anonymous], 2015, NSL KDD DATASET
[5]  
[Anonymous], 2013, THESIS
[6]  
[Anonymous], 2015, CLOUDSIM SIMULATOR
[7]  
[Anonymous], 2005, Fisher linear discriminant analysis
[8]  
[Anonymous], 2013, INT J APPL INNOVATIO
[9]  
[Anonymous], 2012, MACHINE LEARNING PRO
[10]  
Aygun R. C., 2017, 2017 IEEE 4 INT C CY, P193, DOI [10.1109/CSCloud.2017.39, DOI 10.1109/CSCLOUD.2017.39]