Intrusion detection system in distributed cloud computing: Hybrid clustering and classification methods

被引:5
|
作者
Samunnisa K. [1 ]
Kumar G.S.V. [2 ]
Madhavi K. [3 ]
机构
[1] Research Scholar, Department of Computer Science and Engineering, JNTUA, A.P, Anantapur
[2] Professor of CSE & Dean - CSE and Allied Departments, Lords Institute of Engineering & Technology, Telangana, Hyderabad
[3] Professor & HOD of CSE Department, JNTUA College of Engineering, A.P, Anantapur
来源
Measurement: Sensors | 2023年 / 25卷
关键词
Distributed cloud computing; Gaussian Mixture Model; Intrusion detection system; K-means clustering; NSL-KDD; Random Forest;
D O I
10.1016/j.measen.2022.100612
中图分类号
学科分类号
摘要
Cloud Computing is popular nowadays due to its storage and data access services. Security and privacy are prime concerns when network threats increase. Cloud computing offers organizations and enterprises a scalable, flexible, and cost-effective infrastructure to store data on the Web. An anomaly-based IDS implementation protects the integrity of the data in a database by identifying and quarantining records when something appears to have changed unexpectedly. Machine learning based clustering and classification methods are used for anomaly based IDS attack classification and scalability in advanced networking environments. Machine learning is a fast, efficient, and adaptable approach to develop intrusion detection models that can deal with emerging threats, i.e., known and unknown attacks (including zero-day attacks). This paper proposes an efficient Hybrid clustering and classification models for implementing an anomaly-based IDS for malicious attack type classifications such as normal (no intrusion), DoS, Probe, U2R, and R2L using threshold-based functions, and the results are tested with two different threshold values (e), 0.01 & 0.5. The experiments have been performed on two tested datasets, namely, NSL-KDD and KDDcup99. Detection rate, False alarm ratio, and accuracy have been used to study the performance of the proposed methodology. After applying the proposed approach, the K-means with random forest has been shown at two different threshold values to have a better classification accuracy, detection rate, and false alarm rate of 99.85%, 99.78% and 0.09% on the NSL-KDD dataset and 98.27%, 98.12% and 2.08% respectively on the KDDcup99 dataset. © 2022 The Authors
引用
收藏
相关论文
共 50 条
  • [21] Intrusion Detection System in Cloud Computing: Challenges and Opportunities
    Mehmood, Yasir
    Shibli, Muhammad Awais
    Habiba, Umme
    Masood, Rahat
    2013 2ND NATIONAL CONFERENCE ON INFORMATION ASSURANCE (NCIA), 2013, : 59 - 66
  • [22] An Intelligent Intrusion Detection System for Cloud Computing (SIDSCC)
    Alqahtani, Saeed M.
    Al Balushi, Maqbool
    John, Robert
    2014 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), VOL 2, 2014, : 135 - 141
  • [23] The Research of Intrusion Detection System in Cloud Computing Environment
    Wang, Huaibin
    Zhou, Haiyun
    ADVANCES IN MULTIMEDIA, SOFTWARE ENGINEERING AND COMPUTING, VOL 1, 2011, 128 : 45 - 49
  • [24] Intrusion Detection in Cloud Computing
    Ficco, Massimo
    Tasquier, Luca
    Aversa, Rocco
    2013 EIGHTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC 2013), 2013, : 276 - 283
  • [25] Hybrid architecture for distributed intrusion detection system
    Khonde S.R.
    Venugopal U.
    Ingenierie des Systemes d'Information, 2019, 24 (01): : 19 - 28
  • [26] Distributed Denial of Service Defense on Cloud Computing Based on Network Intrusion Detection System: Survey
    Samkari, Esraa
    Alsuwat, Hatim
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (06): : 67 - 74
  • [27] A Novel Hybrid-Network Intrusion Detection System (H-NIDS) in Cloud Computing
    Modi, Chirag N.
    Patel, Dhiren
    2013 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE IN CYBER SECURITY (CICS), 2013, : 23 - 30
  • [28] The application of classification methods in intrusion detection system
    Chen Fen
    Wu Shunxiang
    ICCSE'2006: Proceedings of the First International Conference on Computer Science & Education: ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, 2006, : 586 - 588
  • [29] A Hybrid Efficient Distributed Clustering Algorithm Based Intrusion Detection System to Enhance Security in MANET
    Rathish, C. R.
    Karpagavadivu, K.
    Sindhuja, P.
    Kousalya, A.
    INFORMATION TECHNOLOGY AND CONTROL, 2021, 50 (01): : 45 - 54
  • [30] A hybrid soft computing technique for intrusion detection in web and cloud environment
    Maheswari, K. G.
    Siva, C.
    Nalinipriya, G.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (22):