Skip to main content
Erschienen in: Cluster Computing 2/2019

27.03.2018

RETRACTED ARTICLE: A hybrid multi-layer intrusion detection system in cloud

verfasst von: M. Manickam, S. P. Rajagopalan

Erschienen in: Cluster Computing | Sonderheft 2/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing being the representation of the technology makes use of the infrastructure for computing in an efficient manner. This type of a computing offers a large amount of potential in improving the productivity which reduces the costs and also ensures that this can handle the risks. The intrusion detection systems (IDS) are all widely used for malicious detection in the network of communication and also its host. The IDS system used currently has one set of rules with several patterns of attach which get stored inside the various databases and the whole traffic of network will be duly matched against this for the purpose of avoiding any other illegal or also unauthorized activities. Therefore, in this work, this structure has optimized multi-layer artificial neural network is based on the IDS in case of the cloud which has been presented. This hybrid glow swarm optimization (GSO)–tabu search (TS) is called the GSO–TS has been used for the optimization of the structure and also for the purpose of reduction of convergence time and for solving old problems, trapping of local optima and their premature convergence. The results have proved to have better performance.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Carlin, A., Hammoudeh, M., Aldabbas, O.: Defence for distributed denial of service attacks in cloud computing. Procedia Comput. Sci. 73, 490–497 (2015)CrossRef Carlin, A., Hammoudeh, M., Aldabbas, O.: Defence for distributed denial of service attacks in cloud computing. Procedia Comput. Sci. 73, 490–497 (2015)CrossRef
2.
Zurück zum Zitat Goyal, S.: Public vs private vs hybrid vs community-cloud computing: a critical review. Int. J. Comput. Netw. Inf. Secur. 6(3), 20 (2014) Goyal, S.: Public vs private vs hybrid vs community-cloud computing: a critical review. Int. J. Comput. Netw. Inf. Secur. 6(3), 20 (2014)
3.
Zurück zum Zitat Shelke, M.P.K., Sontakke, M.S., Gawande, A.D.: Intrusion detection system for cloud computing. Int. J. Sci. Technol. Res. 1(4), 67–71 (2012) Shelke, M.P.K., Sontakke, M.S., Gawande, A.D.: Intrusion detection system for cloud computing. Int. J. Sci. Technol. Res. 1(4), 67–71 (2012)
4.
Zurück zum Zitat Mohod, A.G., Alaspurkar, S.J.: Analysis of IDS for cloud computing. Int. J. Appl. Innov. Eng. Manag. (IJAIEM) 2, 344–349 (2013) Mohod, A.G., Alaspurkar, S.J.: Analysis of IDS for cloud computing. Int. J. Appl. Innov. Eng. Manag. (IJAIEM) 2, 344–349 (2013)
5.
Zurück zum Zitat Narwane, S.V., Vaikol, S.L.: Intrusion detection system in cloud computing environment. In: International Conference on Advances in Communication and Computing Technologies (ICACACT) (2012) Narwane, S.V., Vaikol, S.L.: Intrusion detection system in cloud computing environment. In: International Conference on Advances in Communication and Computing Technologies (ICACACT) (2012)
6.
Zurück zum Zitat Kumbhare, M.A., Chaudhari, M.M.: IDS: survey on intrusion detection system in cloud computing. Int. J. Comput. Sci. Mob. Comput. 3(4), 497–502 (2014) Kumbhare, M.A., Chaudhari, M.M.: IDS: survey on intrusion detection system in cloud computing. Int. J. Comput. Sci. Mob. Comput. 3(4), 497–502 (2014)
7.
Zurück zum Zitat Mehmood, Y., Habiba, U., Shibli, M.A., Masood, R.: Intrusion detection system in cloud computing: challenges and opportunities. In: Proceedings of Information Assurance (NCIA), 2013 2nd National Conference on IEEE, pp. 59–66 (2013) Mehmood, Y., Habiba, U., Shibli, M.A., Masood, R.: Intrusion detection system in cloud computing: challenges and opportunities. In: Proceedings of Information Assurance (NCIA), 2013 2nd National Conference on IEEE, pp. 59–66 (2013)
8.
Zurück zum Zitat Kene, S.G., Theng, D.P.: A review on intrusion detection techniques for cloud computing and security challenges. In: Proceedings of Electronics and Communication Systems (ICECS), 2015 2nd International Conference on IEEE, pp. 227–232 (2015) Kene, S.G., Theng, D.P.: A review on intrusion detection techniques for cloud computing and security challenges. In: Proceedings of Electronics and Communication Systems (ICECS), 2015 2nd International Conference on IEEE, pp. 227–232 (2015)
9.
Zurück zum Zitat Subba, B., Biswas, S., Karmakar, S. A neural network based system for intrusion detection and attack classification. In: Proceedings of Communication (NCC), 2016 Twenty Second National Conference on IEEE, pp. 1–6 (2016) Subba, B., Biswas, S., Karmakar, S. A neural network based system for intrusion detection and attack classification. In: Proceedings of Communication (NCC), 2016 Twenty Second National Conference on IEEE, pp. 1–6 (2016)
10.
Zurück zum Zitat Zhou, Y., Zhou, G., Zhang, J.: A hybrid glowworm swarm optimization algorithm for constrained engineering design problems. Appl. Math. Inf. Sci 7(1), 379–388 (2013)CrossRef Zhou, Y., Zhou, G., Zhang, J.: A hybrid glowworm swarm optimization algorithm for constrained engineering design problems. Appl. Math. Inf. Sci 7(1), 379–388 (2013)CrossRef
11.
Zurück zum Zitat Ghosh, P., Mandal, A. K., Kumar, R.: An efficient cloud network intrusion detection system. In: Proceedings of Information Systems Design and Intelligent Applications, pp. 91–99. Springer, New york (2015) Ghosh, P., Mandal, A. K., Kumar, R.: An efficient cloud network intrusion detection system. In: Proceedings of Information Systems Design and Intelligent Applications, pp. 91–99. Springer, New york (2015)
12.
Zurück zum Zitat Pandeeswari, N., Kumar, G.: Anomaly detection system in cloud environment using fuzzy clustering based ANN. Mob. Netw. Appl. 21(3), 494–505 (2016)CrossRef Pandeeswari, N., Kumar, G.: Anomaly detection system in cloud environment using fuzzy clustering based ANN. Mob. Netw. Appl. 21(3), 494–505 (2016)CrossRef
13.
Zurück zum Zitat Baig, M.M., Awais, M.M., El-Alfy, E.S.M.: A multiclass cascade of artificial neural network for network intrusion detection. J. Intell. Fuzzy Syst. 32(4), 2875–2883 (2017)CrossRef Baig, M.M., Awais, M.M., El-Alfy, E.S.M.: A multiclass cascade of artificial neural network for network intrusion detection. J. Intell. Fuzzy Syst. 32(4), 2875–2883 (2017)CrossRef
15.
Zurück zum Zitat Masdari, M., Salehi, F., Jalali, M., Bidaki, M.: A survey of PSO-based scheduling algorithms in cloud computing. J. Netw. Syst. Manag. 25, 1–37 (2016) Masdari, M., Salehi, F., Jalali, M., Bidaki, M.: A survey of PSO-based scheduling algorithms in cloud computing. J. Netw. Syst. Manag. 25, 1–37 (2016)
16.
Zurück zum Zitat Cao, J., Cui, H., Shi, H., Jiao, L.: Big data: a parallel particle swarm optimization-back-propagation neural network algorithm based on mapreduce. PLoS ONE 11(6), e0157551 (2016)CrossRef Cao, J., Cui, H., Shi, H., Jiao, L.: Big data: a parallel particle swarm optimization-back-propagation neural network algorithm based on mapreduce. PLoS ONE 11(6), e0157551 (2016)CrossRef
17.
Zurück zum Zitat Kumari, K.R., Sengottuvelan, P., Shanthini, J.: A hybrid approach of genetic algorithm and multi Objective PSO task scheduling in cloud computing. Asian J. Res. Soc. Sci. Humanit. 7(3), 1260–1271 (2017) Kumari, K.R., Sengottuvelan, P., Shanthini, J.: A hybrid approach of genetic algorithm and multi Objective PSO task scheduling in cloud computing. Asian J. Res. Soc. Sci. Humanit. 7(3), 1260–1271 (2017)
18.
Zurück zum Zitat Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. 36(1), 42–57 (2013)CrossRef Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. 36(1), 42–57 (2013)CrossRef
19.
Zurück zum Zitat Devikrishna, K.S., Ramakrishna, B.B.: An artificial neural network based intrusion detection system and classification of attacks. International Journal of Engineering Research and Applications (IJERA) 3(4), 1959–1964 (2013) Devikrishna, K.S., Ramakrishna, B.B.: An artificial neural network based intrusion detection system and classification of attacks. International Journal of Engineering Research and Applications (IJERA) 3(4), 1959–1964 (2013)
20.
Zurück zum Zitat Minal, Z., Pooja, D., Snehal, P., Poonam, P., Priyanka, P.: Intrusion detection system using artificial neural network. Int. J. Emerg. Eng. Res. Technol. 2(6), 146–149 (2014) Minal, Z., Pooja, D., Snehal, P., Poonam, P., Priyanka, P.: Intrusion detection system using artificial neural network. Int. J. Emerg. Eng. Res. Technol. 2(6), 146–149 (2014)
21.
Zurück zum Zitat Dogra, R., Gupta, N.: Glowworm swarm optimization technique for optimal power flow. Adv. Electron. Electr. Eng. 4(2), 155–160 (2014) Dogra, R., Gupta, N.: Glowworm swarm optimization technique for optimal power flow. Adv. Electron. Electr. Eng. 4(2), 155–160 (2014)
22.
Zurück zum Zitat Liu, J., Zhou, Y., Huang, K., Ouyang, Z., Wang, Y.: A glowworm swarm optimization algorithm based on definite updating search domains. J. Comput. Inf. Syst. 7(10), 3698–3705 (2011) Liu, J., Zhou, Y., Huang, K., Ouyang, Z., Wang, Y.: A glowworm swarm optimization algorithm based on definite updating search domains. J. Comput. Inf. Syst. 7(10), 3698–3705 (2011)
23.
Zurück zum Zitat Zhou, Y., Luo, Q., Liu, J.: Glowworm swarm optimization for dispatching system of public transit vehicles. Neural Process. Lett. 40(1), 25–33 (2014)CrossRef Zhou, Y., Luo, Q., Liu, J.: Glowworm swarm optimization for dispatching system of public transit vehicles. Neural Process. Lett. 40(1), 25–33 (2014)CrossRef
24.
Zurück zum Zitat Lee, C.W., Lin, B.Y.: Application of hybrid quantum tabu search with support vector regression (SVR) for load forecasting. energies 9(11), 873 (2016)CrossRef Lee, C.W., Lin, B.Y.: Application of hybrid quantum tabu search with support vector regression (SVR) for load forecasting. energies 9(11), 873 (2016)CrossRef
25.
Zurück zum Zitat Zainal, N., Zain, A.M., Radzi, N.H.M., Othman, M.R.: Glowworm swarm optimization (GSO) for optimization of machining parameters. J. Intell. Manuf. 27(4), 797–804 (2016)CrossRef Zainal, N., Zain, A.M., Radzi, N.H.M., Othman, M.R.: Glowworm swarm optimization (GSO) for optimization of machining parameters. J. Intell. Manuf. 27(4), 797–804 (2016)CrossRef
Metadaten
Titel
RETRACTED ARTICLE: A hybrid multi-layer intrusion detection system in cloud
verfasst von
M. Manickam
S. P. Rajagopalan
Publikationsdatum
27.03.2018
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe Sonderheft 2/2019
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-018-2557-5

Weitere Artikel der Sonderheft 2/2019

Cluster Computing 2/2019 Zur Ausgabe