Intrusion detection system in distributed cloud computing: Hybrid clustering and classification methods

被引:5
|
作者
Samunnisa K. [1 ]
Kumar G.S.V. [2 ]
Madhavi K. [3 ]
机构
[1] Research Scholar, Department of Computer Science and Engineering, JNTUA, A.P, Anantapur
[2] Professor of CSE & Dean - CSE and Allied Departments, Lords Institute of Engineering & Technology, Telangana, Hyderabad
[3] Professor & HOD of CSE Department, JNTUA College of Engineering, A.P, Anantapur
来源
Measurement: Sensors | 2023年 / 25卷
关键词
Distributed cloud computing; Gaussian Mixture Model; Intrusion detection system; K-means clustering; NSL-KDD; Random Forest;
D O I
10.1016/j.measen.2022.100612
中图分类号
学科分类号
摘要
Cloud Computing is popular nowadays due to its storage and data access services. Security and privacy are prime concerns when network threats increase. Cloud computing offers organizations and enterprises a scalable, flexible, and cost-effective infrastructure to store data on the Web. An anomaly-based IDS implementation protects the integrity of the data in a database by identifying and quarantining records when something appears to have changed unexpectedly. Machine learning based clustering and classification methods are used for anomaly based IDS attack classification and scalability in advanced networking environments. Machine learning is a fast, efficient, and adaptable approach to develop intrusion detection models that can deal with emerging threats, i.e., known and unknown attacks (including zero-day attacks). This paper proposes an efficient Hybrid clustering and classification models for implementing an anomaly-based IDS for malicious attack type classifications such as normal (no intrusion), DoS, Probe, U2R, and R2L using threshold-based functions, and the results are tested with two different threshold values (e), 0.01 & 0.5. The experiments have been performed on two tested datasets, namely, NSL-KDD and KDDcup99. Detection rate, False alarm ratio, and accuracy have been used to study the performance of the proposed methodology. After applying the proposed approach, the K-means with random forest has been shown at two different threshold values to have a better classification accuracy, detection rate, and false alarm rate of 99.85%, 99.78% and 0.09% on the NSL-KDD dataset and 98.27%, 98.12% and 2.08% respectively on the KDDcup99 dataset. © 2022 The Authors
引用
收藏
相关论文
共 50 条
  • [1] An intelligent clustering scheme for distributed intrusion detection in vehicular cloud computing
    Neeraj Kumar
    Jaskaran Preet Singh
    Rasmeet S. Bali
    Sudip Misra
    Sana Ullah
    Cluster Computing, 2015, 18 : 1263 - 1283
  • [2] An intelligent clustering scheme for distributed intrusion detection in vehicular cloud computing
    Kumar, Neeraj
    Singh, Jaskaran Preet
    Bali, Rasmeet S.
    Misra, Sudip
    Ullah, Sana
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2015, 18 (03): : 1263 - 1283
  • [3] A Hybrid Intrusion Detection System for Cloud Computing Environments
    Jelidi, Mohamed
    Ghourabi, Abdallah
    Gasmi, Karim
    2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS), 2019, : 390 - 395
  • [4] A Distributed Intrusion Detection Scheme for Cloud Computing
    Ibrahim, Nurudeen Mahmud
    Zainal, Anazida
    INTERNATIONAL JOURNAL OF DISTRIBUTED SYSTEMS AND TECHNOLOGIES, 2020, 11 (01) : 68 - 82
  • [5] A Survey on Various Intrusion Detection System Tools and Methods in Cloud Computing
    Akshaya, Swathy M.
    Padmavathi, G.
    PROCEEDINGS OF THE 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2019, : 439 - 445
  • [6] A Model for Adaptive and Distributed Intrusion Detection for Cloud Computing
    Ibrahim, Nurudeen Mahmud
    Zainal, Anazida
    2018 SEVENTH ICT INTERNATIONAL STUDENT PROJECT CONFERENCE (ICT-ISPC), 2018, : 12 - +
  • [7] An Improved Distributed Intrusion Detection Architecture for Cloud Computing
    Ghorbani, Hamid Reza
    Hashemi, Mahmoud Reza
    COMPUTER NETWORKS AND DISTRIBUTED SYSTEMS, CNDS 2013, 2014, 428 : 105 - 116
  • [8] Distributed Intrusion Detection System using Mobile Agents in Cloud Computing Environment
    Mehmood, Yasir
    Kanwal, Ayesha
    Shibli, Muhammad Awais
    Masood, Rahat
    2015 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS), 2015, : 1 - 8
  • [9] Distributed Intrusion Detection Based on Cloud Computing in Cyber Physical Power System
    Shi, Congcong
    Li, Nige
    Cao, Wantian
    2015 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND INTELLIGENT CONTROL (ISIC 2015), 2015, : 588 - 593
  • [10] Distributed intrusion detection based on hybrid gene expression programming and cloud computing in a cyber physical power system
    Deng, Song
    Zhou, Ai-Hua
    Yue, Dong
    Hu, Bin
    Zhu, Li-Peng
    IET CONTROL THEORY AND APPLICATIONS, 2017, 11 (11): : 1822 - 1829