Skip to main content
Erschienen in: Wireless Personal Communications 3/2023

26.09.2022

An Optimal Cluster Based Intrusion Detection System for Defence Against Attack in Web and Cloud Computing Environments

verfasst von: K. G. Maheswari, C. Siva, G. Nalini Priya

Erschienen in: Wireless Personal Communications | Ausgabe 3/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In recent years, the rapid growth of information technology organizations causes ability to meet their demands such as scalability, mobility and flexibility. The security and privacy is a major issue of those organizations that’s why they move the data to the cloud. Meanwhile, the security in cloud has become an important issue in the growing demand of cloud computing, Due to the nature characteristics of cloud, those confidential data are vulnerable to attacks/malicious or intruders. Several Intrusion Detection System (IDS) have been proposed for cloud environment to enhance the security problem but they are not possible to solve those issues with better accuracy, due to the recent real-time intruders. However, those IDSs are possible to solve and resist limited and known attacks. In this paper, we propose Optimal Cluster based Intrusion Detection System for defence against attacks in web and cloud computing environments (OC-IDS). We use hybrid optimization algorithm i.e. Multi-verse is combined with Chaotic Atom search optimization (MCA) algorithm for pre-processing which removes the unwanted/repeated data in dataset. We introduce a Chaotic Manta-ray Foraging Optimization (CMFO) based clustering technique which segment the data in different groups. Then, we develop hybrid machine learning technique i.e. Modified Teacher Learning based Deep Neural Network (MTL-DNN) which categorize the attack in cloud environment as a novelty of this study. Finally, the proposed OC-IDS technique can evaluate through standard open source datasets are KDD cup’99 and MSL-KDD, the performance of proposed and existing techniques are compared with different metrics such as accuracy, precision, recall and F-measure. Our proposed OC IDS MTL-DNN attains 95.01% accuracy in KDD cup’99 dataset.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Fenanir, S., Semchedine, F., & Baadache, A. (2019). A machine learning-based lightweight intrusion detection system for the internet of things. Rev. d’Intelligence Artif., 33(3), 203–211.CrossRef Fenanir, S., Semchedine, F., & Baadache, A. (2019). A machine learning-based lightweight intrusion detection system for the internet of things. Rev. d’Intelligence Artif., 33(3), 203–211.CrossRef
2.
Zurück zum Zitat Chiba, Z., Abghour, N., Moussaid, K., & Rida, M. (2019). Intelligent approach to build a Deep Neural Network based IDS for cloud environment using combination of machine learning algorithms. Computers Security., 86, 291–317.CrossRef Chiba, Z., Abghour, N., Moussaid, K., & Rida, M. (2019). Intelligent approach to build a Deep Neural Network based IDS for cloud environment using combination of machine learning algorithms. Computers Security., 86, 291–317.CrossRef
3.
Zurück zum Zitat Chowdhury, R., Sen, S., Roy, A., & Saha, B. (2022). An optimal feature based network intrusion detection system using bagging ensemble method for real-time traffic analysis. Multimedia Tools and Applications. 1–23. Chowdhury, R., Sen, S., Roy, A., & Saha, B. (2022). An optimal feature based network intrusion detection system using bagging ensemble method for real-time traffic analysis. Multimedia Tools and Applications. 1–23.
4.
Zurück zum Zitat Khraisat, A., Gondal, I., Vamplew, P., & Kamruzzaman, J. (2019). Survey of intrusion detection systems: Techniques, datasets and challenges. Cybersecurity, 2(1), 1–22.CrossRef Khraisat, A., Gondal, I., Vamplew, P., & Kamruzzaman, J. (2019). Survey of intrusion detection systems: Techniques, datasets and challenges. Cybersecurity, 2(1), 1–22.CrossRef
5.
Zurück zum Zitat Avritzer, A., Ferme, V., Janes, A., Russo, B., van Hoorn, A., Schulz, H., Menasché, D., & Rufino, V. (2020). Scalability assessment of microservice architecture deployment configurations: A domain-based approach leveraging operational profiles and load tests. Journal of Systems and Software., 165, 110564.CrossRef Avritzer, A., Ferme, V., Janes, A., Russo, B., van Hoorn, A., Schulz, H., Menasché, D., & Rufino, V. (2020). Scalability assessment of microservice architecture deployment configurations: A domain-based approach leveraging operational profiles and load tests. Journal of Systems and Software., 165, 110564.CrossRef
6.
Zurück zum Zitat Deng, L., Li, D., Yao, X., & Wang, H. (2019). Retracted article: Mobile network intrusion detection for IoT system based on transfer learning algorithm. Cluster Computing, 22(4), 9889–9904.CrossRef Deng, L., Li, D., Yao, X., & Wang, H. (2019). Retracted article: Mobile network intrusion detection for IoT system based on transfer learning algorithm. Cluster Computing, 22(4), 9889–9904.CrossRef
7.
Zurück zum Zitat Tabrizchi, H., & Kuchaki, R. M. (2020). A survey on security challenges in cloud computing: Issues, threats, and solutions. The Journal of Supercomputing., 76(12), 9493–9532.CrossRef Tabrizchi, H., & Kuchaki, R. M. (2020). A survey on security challenges in cloud computing: Issues, threats, and solutions. The Journal of Supercomputing., 76(12), 9493–9532.CrossRef
8.
Zurück zum Zitat El Sibai, R., Gemayel, N., Bou Abdo, J., & Demerjian, J. (2020). A survey on access control mechanisms for cloud computing. Transactions on Emerging Telecommunications Technologies., 31(2), 3720.CrossRef El Sibai, R., Gemayel, N., Bou Abdo, J., & Demerjian, J. (2020). A survey on access control mechanisms for cloud computing. Transactions on Emerging Telecommunications Technologies., 31(2), 3720.CrossRef
9.
Zurück zum Zitat Rashid, A., & Chaturvedi, A. (2019). Virtualization and its role in cloud computing environment. International Journal of Computer Sciences and Engineering, 7(4), 1131–1136.CrossRef Rashid, A., & Chaturvedi, A. (2019). Virtualization and its role in cloud computing environment. International Journal of Computer Sciences and Engineering, 7(4), 1131–1136.CrossRef
10.
Zurück zum Zitat Kumari, P., & Kaur, P. (2021). A survey of fault tolerance in cloud computing. Journal of King Saud University-Computer and Information Sciences, 33(10), 1159–1176.CrossRef Kumari, P., & Kaur, P. (2021). A survey of fault tolerance in cloud computing. Journal of King Saud University-Computer and Information Sciences, 33(10), 1159–1176.CrossRef
11.
Zurück zum Zitat Sun, L., Jiang, X., Ren, H., & Guo, Yi. (2020). Edge-cloud computing and artificial intelligence in internet of medical things: Architecture, technology and application. IEEE Access, 8, 101079–101092.CrossRef Sun, L., Jiang, X., Ren, H., & Guo, Yi. (2020). Edge-cloud computing and artificial intelligence in internet of medical things: Architecture, technology and application. IEEE Access, 8, 101079–101092.CrossRef
12.
Zurück zum Zitat Zhou, Y., Ling Liu, Lu., Wang, N. H., Cui, X., Jie, Wu., Peng, Y., Qi, Y., & Xing, C. (2020). Service-aware 6G: An intelligent and open network based on the convergence of communication, computing and caching. Digital Communications and Networks, 6(3), 253–260.CrossRef Zhou, Y., Ling Liu, Lu., Wang, N. H., Cui, X., Jie, Wu., Peng, Y., Qi, Y., & Xing, C. (2020). Service-aware 6G: An intelligent and open network based on the convergence of communication, computing and caching. Digital Communications and Networks, 6(3), 253–260.CrossRef
13.
Zurück zum Zitat Pourghaffari, A., Barari, M., & Sedighian, K. S. (2019). An efficient method for allocating resources in a cloud computing environment with a load balancing approach. Concurrency and Computation: Practice and Experience., 31(17), e5285.CrossRef Pourghaffari, A., Barari, M., & Sedighian, K. S. (2019). An efficient method for allocating resources in a cloud computing environment with a load balancing approach. Concurrency and Computation: Practice and Experience., 31(17), e5285.CrossRef
14.
Zurück zum Zitat Tarahomi, M., Izadi, M., & Ghobaei-Arani, M. (2021). An efficient power-aware VM allocation mechanism in cloud data centers: A micro genetic-based approach. Cluster Computing, 24(2), 919–934.CrossRef Tarahomi, M., Izadi, M., & Ghobaei-Arani, M. (2021). An efficient power-aware VM allocation mechanism in cloud data centers: A micro genetic-based approach. Cluster Computing, 24(2), 919–934.CrossRef
15.
Zurück zum Zitat Dhaya, R., Kanthavel, R., & Venusamy, K. (2021). Dynamic secure and automated infrastructure for private cloud data center. Annals of Operations Research, 1–21. Dhaya, R., Kanthavel, R., & Venusamy, K. (2021). Dynamic secure and automated infrastructure for private cloud data center. Annals of Operations Research, 1–21.
16.
Zurück zum Zitat Kumar, M., & Singh, A. K. (2020). Distributed intrusion detection system using blockchain and cloud computing infrastructure. In 2020 4th international conference on trends in electronics and informatics (ICOEI)(48184) (pp. 248–252). IEEE. Kumar, M., & Singh, A. K. (2020). Distributed intrusion detection system using blockchain and cloud computing infrastructure. In 2020 4th international conference on trends in electronics and informatics (ICOEI)(48184) (pp. 248–252). IEEE.
17.
Zurück zum Zitat Abusitta, A., Bellaiche, M., Dagenais, M., & Halabi, T. (2019). A deep learning approach for proactive multi-cloud cooperative intrusion detection system. Future Generation Computer Systems, 98, 308–318.CrossRef Abusitta, A., Bellaiche, M., Dagenais, M., & Halabi, T. (2019). A deep learning approach for proactive multi-cloud cooperative intrusion detection system. Future Generation Computer Systems, 98, 308–318.CrossRef
18.
Zurück zum Zitat Moualla, S., Khorzom, K., & Jafar, A. (2021). Improving the performance of machine learning-based network intrusion detection systems on the UNSW-NB15 dataset. Computational Intelligence and Neuroscience. 2021. Moualla, S., Khorzom, K., & Jafar, A. (2021). Improving the performance of machine learning-based network intrusion detection systems on the UNSW-NB15 dataset. Computational Intelligence and Neuroscience. 2021.
19.
Zurück zum Zitat Attaran, M., & Woods, J. (2019). Cloud computing technology: Improving small business performance using the Internet. Journal of Small Business & Entrepreneurship, 31(6), 495–519.CrossRef Attaran, M., & Woods, J. (2019). Cloud computing technology: Improving small business performance using the Internet. Journal of Small Business & Entrepreneurship, 31(6), 495–519.CrossRef
20.
Zurück zum Zitat Chen, M., Wang, N., Zhou, H., & Chen, Y. (2018). FCM technique for efficient intrusion detection system for wireless networks in cloud environment. Computers & Electrical Engineering, 71, 978–987.CrossRef Chen, M., Wang, N., Zhou, H., & Chen, Y. (2018). FCM technique for efficient intrusion detection system for wireless networks in cloud environment. Computers & Electrical Engineering, 71, 978–987.CrossRef
21.
Zurück zum Zitat Dey, S., Ye, Q., & Sampalli, S. (2019). A machine learning based intrusion detection scheme for data fusion in mobile clouds involving heterogeneous client networks. Information Fusion, 49, 205–215.CrossRef Dey, S., Ye, Q., & Sampalli, S. (2019). A machine learning based intrusion detection scheme for data fusion in mobile clouds involving heterogeneous client networks. Information Fusion, 49, 205–215.CrossRef
22.
Zurück zum Zitat Aldwyan, Y., & Sinnott, R. O. (2019). Latency-aware failover strategies for containerized web applications in distributed clouds. Future Generation Computer Systems, 101, 1081–1095.CrossRef Aldwyan, Y., & Sinnott, R. O. (2019). Latency-aware failover strategies for containerized web applications in distributed clouds. Future Generation Computer Systems, 101, 1081–1095.CrossRef
23.
Zurück zum Zitat Yaghoubi, M., & Maroosi, A. (2020). Simulation and modeling of an improved multi-verse optimization algorithm for QoS-aware web service composition with service level agreements in the cloud environments. Simulation Modelling Practice and Theory, 103, 102090.CrossRef Yaghoubi, M., & Maroosi, A. (2020). Simulation and modeling of an improved multi-verse optimization algorithm for QoS-aware web service composition with service level agreements in the cloud environments. Simulation Modelling Practice and Theory, 103, 102090.CrossRef
24.
Zurück zum Zitat Sanaj, M. S., & Prathap, P. J. (2020). An efficient approach to the map-reduce framework and genetic algorithm based whale optimization algorithm for task scheduling in cloud computing environment. Materials Today: Proceedings. Sanaj, M. S., & Prathap, P. J. (2020). An efficient approach to the map-reduce framework and genetic algorithm based whale optimization algorithm for task scheduling in cloud computing environment. Materials Today: Proceedings.
25.
Zurück zum Zitat Sharma, A. K., Upreti, K., & Vargis, B. (2020). Experimental performance analysis of load balancing of tasks using honey bee inspired algorithm for resource allocation in cloud environment. Materials Today: Proceedings. Sharma, A. K., Upreti, K., & Vargis, B. (2020). Experimental performance analysis of load balancing of tasks using honey bee inspired algorithm for resource allocation in cloud environment. Materials Today: Proceedings.
26.
Zurück zum Zitat Wangfi, S., Wang, W., & Tan, Y. (2020). Internet cross-border service model based on 5G environment and cloud computing data platform. Microprocessors and Microsystems, p. 103520. Wangfi, S., Wang, W., & Tan, Y. (2020). Internet cross-border service model based on 5G environment and cloud computing data platform. Microprocessors and Microsystems, p. 103520.
27.
Zurück zum Zitat Shamshirband, S., Fathi, M., Chronopoulos, A. T., Montieri, A., Palumbo, F., & Pescapè, A. (2020). Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues. Journal of Information Security and Applications, 55, 102582.CrossRef Shamshirband, S., Fathi, M., Chronopoulos, A. T., Montieri, A., Palumbo, F., & Pescapè, A. (2020). Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues. Journal of Information Security and Applications, 55, 102582.CrossRef
28.
Zurück zum Zitat Ibrahim, G. J., Rashid, T. A., & Akinsolu, M. O. (2020). An energy efficient service composition mechanism using a hybrid meta-heuristic algorithm in a mobile cloud environment. Journal of Parallel and Distributed Computing, 143, 77–87.CrossRef Ibrahim, G. J., Rashid, T. A., & Akinsolu, M. O. (2020). An energy efficient service composition mechanism using a hybrid meta-heuristic algorithm in a mobile cloud environment. Journal of Parallel and Distributed Computing, 143, 77–87.CrossRef
29.
Zurück zum Zitat Samriya, J. K., & Kumar, N. (2020). A novel intrusion detection system using hybrid clustering-optimization approach in cloud computing. Materials Today: Proceedings. Samriya, J. K., & Kumar, N. (2020). A novel intrusion detection system using hybrid clustering-optimization approach in cloud computing. Materials Today: Proceedings.
30.
Zurück zum Zitat SaiSindhuTheja, R., & Shyam, G. K. (2021). An efficient metaheuristic algorithm based feature selection and recurrent neural network for DoS attack detection in cloud computing environment. Applied Soft Computing, 100, 106997.CrossRef SaiSindhuTheja, R., & Shyam, G. K. (2021). An efficient metaheuristic algorithm based feature selection and recurrent neural network for DoS attack detection in cloud computing environment. Applied Soft Computing, 100, 106997.CrossRef
31.
Zurück zum Zitat Jaber, A. N., & Rehman, S. U. (2020). FCM–SVM based intrusion detection system for cloud computing environment. Cluster Computing., 23(4), 3221–3231.CrossRef Jaber, A. N., & Rehman, S. U. (2020). FCM–SVM based intrusion detection system for cloud computing environment. Cluster Computing., 23(4), 3221–3231.CrossRef
32.
Zurück zum Zitat Mayuranathan, M., Murugan, M., & Dhanakoti, V. (2021). Best features based intrusion detection system by RBM model for detecting DDoS in cloud environment. Journal of Ambient Intelligence and Humanized Computing, 12(3), 3609–3619.CrossRef Mayuranathan, M., Murugan, M., & Dhanakoti, V. (2021). Best features based intrusion detection system by RBM model for detecting DDoS in cloud environment. Journal of Ambient Intelligence and Humanized Computing, 12(3), 3609–3619.CrossRef
33.
Zurück zum Zitat Velliangiri, S., & Premalatha, J. (2019). Intrusion detection of distributed denial of service attack in cloud. Cluster Computing, 22(5), 10615–10623.CrossRef Velliangiri, S., & Premalatha, J. (2019). Intrusion detection of distributed denial of service attack in cloud. Cluster Computing, 22(5), 10615–10623.CrossRef
34.
Zurück zum Zitat Aldallal, A., & Alisa, F. (2021). Effective intrusion detection system to secure data in cloud using machine learning. Symmetry, 13(12), 2306.CrossRef Aldallal, A., & Alisa, F. (2021). Effective intrusion detection system to secure data in cloud using machine learning. Symmetry, 13(12), 2306.CrossRef
35.
Zurück zum Zitat Wen, L. (2021). Cloud computing intrusion detection technology based on BP-NN. Wireless Personal Communications, 1–18. Wen, L. (2021). Cloud computing intrusion detection technology based on BP-NN. Wireless Personal Communications, 1–18.
36.
Zurück zum Zitat Thilagam, T., & Aruna, R. (2021). Intrusion detection for network based cloud computing by custom RC-NN and optimization. ICT Express, 7(4), 512–520.CrossRef Thilagam, T., & Aruna, R. (2021). Intrusion detection for network based cloud computing by custom RC-NN and optimization. ICT Express, 7(4), 512–520.CrossRef
37.
Zurück zum Zitat Srilatha, D., & Shyam, G. K. (2021). Cloud-based intrusion detection using kernel fuzzy clustering and optimal type-2 fuzzy neural network. Cluster Computing, 24(3), 2657–2672.CrossRef Srilatha, D., & Shyam, G. K. (2021). Cloud-based intrusion detection using kernel fuzzy clustering and optimal type-2 fuzzy neural network. Cluster Computing, 24(3), 2657–2672.CrossRef
38.
Zurück zum Zitat Sandosh, S., Govindasamy, V., & Akila, G. (2020). Enhanced intrusion detection system via agent clustering and classification based on outlier detection. Peer-to-Peer Networking and Applications, 13(3), 1038–1045.CrossRef Sandosh, S., Govindasamy, V., & Akila, G. (2020). Enhanced intrusion detection system via agent clustering and classification based on outlier detection. Peer-to-Peer Networking and Applications, 13(3), 1038–1045.CrossRef
Metadaten
Titel
An Optimal Cluster Based Intrusion Detection System for Defence Against Attack in Web and Cloud Computing Environments
verfasst von
K. G. Maheswari
C. Siva
G. Nalini Priya
Publikationsdatum
26.09.2022
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2023
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-022-10030-7

Weitere Artikel der Ausgabe 3/2023

Wireless Personal Communications 3/2023 Zur Ausgabe

Neuer Inhalt