LR-HIDS: logistic regression host-based intrusion detection system for cloud environments

被引:89
作者
Besharati, Elham [1 ]
Naderan, Marjan [1 ]
Namjoo, Ehsan [2 ]
机构
[1] Shahid Chamran Univ Ahvaz, Dept Comp Engn, Fac Engn, Ahvaz, Iran
[2] Shahid Chamran Univ Ahvaz, Dept Elect Engn, Fac Engn, Ahvaz, Iran
关键词
Cloud computing; Intrusion detection; Host-based; Logistic regression; Feature selection; FEATURE-SELECTION;
D O I
10.1007/s12652-018-1093-8
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing is an Internet based computing environment, where storage and computing resources are assigned dynamically among users according to their needs, using the virtualization technology. Virtualization is an underlying infrastructure of cloud computing, and has led to certain security problems during the development of cloud computing. One essential but formidable task in cloud computing is to detect malicious attacks and their types. Due to increasing incidents of cyber-attacks, design and implementation of effective intrusion detection systems to protect the security of information systems is crucial. In this paper, a host-based intrusion detection system (H-IDS) for protecting virtual machines in the cloud environment is proposed. To this end, first, important features of each class are selected using logistic regression and next, these values are improved using the regularization technique. Then, various attacks are classified using a combination of three different classifiers: neural network, decision tree and linear discriminate analysis with the bagging algorithm for each class. The proposed model has been trained and tested using the NSL-KDD data set with an implementation in the Cloudsim software. Simulation results compared to other methods shows acceptable accuracy of about 97.51 for detecting attacks against normal states.
引用
收藏
页码:3669 / 3692
页数:24
相关论文
共 39 条
[21]   Cyberattack Detection in Mobile Cloud Computing: A Deep Learning Approach [J].
Khoi Khac Nguyen ;
Hoang, Dinh Thai ;
Niyato, Dusit ;
Wang, Ping ;
Nguyen, Diep ;
Dutkiewicz, Eryk .
2018 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2018,
[22]   Monitoring Insiders Activities in Cloud Computing Using Rule Based Learning [J].
Khorshed, Md Tanzim ;
Ali, A. B. M. Shawkat ;
Wasimi, Saleh A. .
TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, :757-764
[23]   Soft computing in intrusion detection: the state of the art [J].
Langin, Chet ;
Rahimi, Shahram .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2010, 1 (02) :133-145
[24]  
Li Z, 2012, INT CONF CLOUD COMPU, P75, DOI 10.1109/CCIS.2012.6664371
[25]  
Loog Marco., 1999, APPROXIMATE PAIRWISE
[26]   Cloud-Based Cyber-Physical Intrusion Detection for Vehicles Using Deep Learning [J].
Loukas, George ;
Tuan Vuong ;
Heartfield, Ryan ;
Sakellari, Georgia ;
Yoon, Yongpil ;
Gan, Diane .
IEEE ACCESS, 2018, 6 :3491-3508
[27]  
Mahmood Z., 2012, International Journal of Research in Computer Engineering and Electronics, V1, P1
[28]   Integrating Signature Apriori based Network Intrusion Detection System (NIDS) in Cloud Computing [J].
Modi, Chirag N. ;
Patel, Dhiren R. ;
Patel, Avi ;
Rajarajan, Muttukrishnan .
2ND INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING & SECURITY [ICCCS-2012], 2012, 1 :905-912
[29]  
Muche EW, 2016, THESIS
[30]  
MUTHURAJKUMAR S, 2015, AUST J BASIC APPL SC, V9, P38