Skip to main content
Erschienen in: Cognitive Computation 5/2023

16.05.2023 | Original Article

Enhanced Quantum-Secure Ensemble Intrusion Detection Techniques for Cloud Based on Deep Learning

verfasst von: Dilli Babu Salvakkam, Vijayalakshmi Saravanan, Praphula Kumar Jain, Rajendra Pamula

Erschienen in: Cognitive Computation | Ausgabe 5/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The increasing popularity of cloud computing systems has drawn significant attention from academics and businesses for several decades. However, cloud computing systems are plagued with several concerns, such as privacy, confidentiality, and availability, which can be detrimental to their performance. Intrusion detection has emerged as a critical issue, particularly in detecting new types of intrusions that can compromise the security of cloud systems. Preventive risk models have been developed to check the cloud for potential threats, and the rise of quantum computing attacks necessitates the deployment of an intrusion detection system (IDS) for cloud security risk assessment. This research proposes a unique method for detecting cloud computing intrusions by utilizing the KDDcup 1999, UNSW-NB15, and NSL-KDD datasets to address these concerns. This proposed system is designed to achieve two objectives. Firstly, it analyzes the disadvantages of existing IDS, and secondly, it presents an accuracy enhancement model of IDS. The proposed Ensemble Intrusion Detection Model for Cloud Computing Using Deep Learning (EICDL) is designed to detect intrusions effectively. The performance of the proposed model is compared to modern machine learning methods and existing IDS, and the experimental findings indicate that the EICDL ensemble technique improves detection and can identify subsequent attacks/intrusions with a recall rate of 92.14%. The proposed method EICDL ensemble technique significantly improves the accuracy and efficiency of intrusion detection in cloud systems.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Patcha A, Park J-M. An overview of anomaly detection models: existing solutions and latest technological trends. Comput Netw. 2007;51(12):3448–70.CrossRef Patcha A, Park J-M. An overview of anomaly detection models: existing solutions and latest technological trends. Comput Netw. 2007;51(12):3448–70.CrossRef
2.
3.
Zurück zum Zitat Buczak AL, Guven E. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications surveys & tutorials, 18(2):1153–1176, 2015. Buczak AL, Guven E. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications surveys & tutorials, 18(2):1153–1176, 2015.
4.
Zurück zum Zitat Agarap AFM. A neural network architecture combining gated recurrent unit (gru) and support vector machine (svm) for intrusion detection in network traffic data. In Proceedings of the 2018 10th International Conference on Machine Learning and Computing, pages 26–30, 2018. Agarap AFM. A neural network architecture combining gated recurrent unit (gru) and support vector machine (svm) for intrusion detection in network traffic data. In Proceedings of the 2018 10th International Conference on Machine Learning and Computing, pages 26–30, 2018.
5.
Zurück zum Zitat Alom MZ, Bontupalli V, Taha TM. Intrusion detection using deep belief networks. In 2015 National Aerospace and Electronics Conference (NAECON). IEEE, 2015;339–344. Alom MZ, Bontupalli V, Taha TM. Intrusion detection using deep belief networks. In 2015 National Aerospace and Electronics Conference (NAECON). IEEE, 2015;339–344.
6.
Zurück zum Zitat Alrawashdeh K, Purdy C. Toward an online anomaly intrusion detection Model based on deep learning. In 2016 15th IEEE international conference on machine learning and applications (ICMLA). IEEE, 2016;195–200. Alrawashdeh K, Purdy C. Toward an online anomaly intrusion detection Model based on deep learning. In 2016 15th IEEE international conference on machine learning and applications (ICMLA). IEEE, 2016;195–200.
7.
Zurück zum Zitat Ammar A, et al. A decision tree classifier for intrusion detection priority tagging. J Comput Commun. 2015;3(04):52.CrossRef Ammar A, et al. A decision tree classifier for intrusion detection priority tagging. J Comput Commun. 2015;3(04):52.CrossRef
8.
Zurück zum Zitat Chandrasekhar AM, Raghuveer K. Confederation of fcm clustering, ann and svm models to implement hybrid nids using corrected kdd cup 99 dataset. 2014 Int Conf Commun Signal Proc. IEEE, 2014;672–676. Chandrasekhar AM, Raghuveer K. Confederation of fcm clustering, ann and svm models to implement hybrid nids using corrected kdd cup 99 dataset. 2014 Int Conf Commun Signal Proc. IEEE, 2014;672–676.
9.
Zurück zum Zitat Dada EG. A hybridized svm-knn-pdapso approach to intrusion detection model. Proc Fac Seminar Ser. 2017;14–21. Dada EG. A hybridized svm-knn-pdapso approach to intrusion detection model. Proc Fac Seminar Ser. 2017;14–21.
10.
Zurück zum Zitat LeCun Y, Bengio Y, Hinton G. Deep learning. nature 521 (7553), 436–444. Google Scholar Google Scholar Cross Ref Cross Ref.2015. LeCun Y, Bengio Y, Hinton G. Deep learning. nature 521 (7553), 436–444. Google Scholar Google Scholar Cross Ref Cross Ref.2015.
11.
Zurück zum Zitat Abadi M, Chu A, Goodfellow I, McMahan HB, Mironov I, Talwar K, Zhang L. Deep learning with differential privacy. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pages 308–318, 2016. Abadi M, Chu A, Goodfellow I, McMahan HB, Mironov I, Talwar K, Zhang L. Deep learning with differential privacy. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pages 308–318, 2016.
12.
Zurück zum Zitat Sun G, Xie Y, Liao D, Hongfang Yu, Chang V. User-defined privacy location-sharing model in mobile online social networks. J Netw Comput Appl. 2017;86:34–45.CrossRef Sun G, Xie Y, Liao D, Hongfang Yu, Chang V. User-defined privacy location-sharing model in mobile online social networks. J Netw Comput Appl. 2017;86:34–45.CrossRef
13.
Zurück zum Zitat Azad C, Jha VK. Genetic algorithm to solve the problem of small disjunct in the decision tree based intrusion detection Model. Int J Comput Netw Inf Secur. 2015;7(8):56–71. Azad C, Jha VK. Genetic algorithm to solve the problem of small disjunct in the decision tree based intrusion detection Model. Int J Comput Netw Inf Secur. 2015;7(8):56–71.
14.
Zurück zum Zitat Vishwakarma S, Sharma V, Tiwari A. An intrusion detection model using knn-aco algorithm. Int J Comput Appl. 2017;171(10):18–23. Vishwakarma S, Sharma V, Tiwari A. An intrusion detection model using knn-aco algorithm. Int J Comput Appl. 2017;171(10):18–23.
15.
Zurück zum Zitat Gao N, Gao L, Gao Q, Wang H. An intrusion detection model based on deep belief networks. 2014 Second Int Conf Adv Cloud Big Data 2014 Nov 20 (pp. 247-252). IEEE. Gao N, Gao L, Gao Q, Wang H. An intrusion detection model based on deep belief networks. 2014 Second Int Conf Adv Cloud Big Data 2014 Nov 20 (pp. 247-252). IEEE.
16.
Zurück zum Zitat Zhao G, Zhang C, Zheng L. Intrusion detection using deep belief network and probabilistic neural network. In 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), volume 1, pages 639–642. IEEE, 2017. Zhao G, Zhang C, Zheng L. Intrusion detection using deep belief network and probabilistic neural network. In 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), volume 1, pages 639–642. IEEE, 2017.
17.
Zurück zum Zitat Tan QS, Huang W, Li Q. An intrusion detection method based on dbn in ad hoc networks. In Wireless Communication and Sensor Network: Proceedings of the International Conference on Wireless Communication and Sensor Network (WCSN 2015), pages 477–485. World Scientific, 2016. Tan QS, Huang W, Li Q. An intrusion detection method based on dbn in ad hoc networks. In Wireless Communication and Sensor Network: Proceedings of the International Conference on Wireless Communication and Sensor Network (WCSN 2015), pages 477–485. World Scientific, 2016.
18.
Zurück zum Zitat Kim J, Kim H, et al. An effective intrusion detection classifier using long short-term memory with gradient descent optimization. In 2017 International Conference on Platform Technology and Service (PlatCon), pages 1–6. IEEE, 2017. Kim J, Kim H, et al. An effective intrusion detection classifier using long short-term memory with gradient descent optimization. In 2017 International Conference on Platform Technology and Service (PlatCon), pages 1–6. IEEE, 2017.
19.
Zurück zum Zitat Nadeem M, Marshall O, Singh S, Fang X, Yuan X. Semi-supervised deep neural network for network intrusion detection. 2016. Nadeem M, Marshall O, Singh S, Fang X, Yuan X. Semi-supervised deep neural network for network intrusion detection. 2016.
20.
Zurück zum Zitat Kolosnjaji B, Zarras A, Webster G, Eckert C. Deep learning for classification of malware model call sequences. In Australasian Joint Conference on Artificial Intelligence, pages 137–149. Springer, 2016. Kolosnjaji B, Zarras A, Webster G, Eckert C. Deep learning for classification of malware model call sequences. In Australasian Joint Conference on Artificial Intelligence, pages 137–149. Springer, 2016.
21.
Zurück zum Zitat Wei J, Long C, Li J, Zhao J. An intrusion detection algorithm based on bag representation with ensemble support vector machine in cloud computing. Concurr Comput. 2020;32(24): e5922.CrossRef Wei J, Long C, Li J, Zhao J. An intrusion detection algorithm based on bag representation with ensemble support vector machine in cloud computing. Concurr Comput. 2020;32(24): e5922.CrossRef
22.
Zurück zum Zitat Singh P, Ranga V. Attack and intrusion detection in cloud computing using an ensemble learning approach. Int J Inf Technol. 2021;13(2):565–71. Singh P, Ranga V. Attack and intrusion detection in cloud computing using an ensemble learning approach. Int J Inf Technol. 2021;13(2):565–71.
23.
Zurück zum Zitat Ganaie MA, Hu M, Malik AK, Tanveer M, Suganthan PN. Ensemble deep learning: a review. Eng Appl Artif Intell. 2022;115: 105151.CrossRef Ganaie MA, Hu M, Malik AK, Tanveer M, Suganthan PN. Ensemble deep learning: a review. Eng Appl Artif Intell. 2022;115: 105151.CrossRef
24.
Zurück zum Zitat Pervez MS, Farid DM. Feature selection and intrusion classification in nsl-kdd cup 99 dataset employing svms. In The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014), pages 1–6. IEEE, 2014. Pervez MS, Farid DM. Feature selection and intrusion classification in nsl-kdd cup 99 dataset employing svms. In The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014), pages 1–6. IEEE, 2014.
25.
Zurück zum Zitat Sharifi AM, Amirgholipour SK, Pourebrahimi A. Intrusion detection based on joint of k-means and knn. J Converg Inf Technol. 10(5):42, 2015. Sharifi AM, Amirgholipour SK, Pourebrahimi A. Intrusion detection based on joint of k-means and knn. J Converg Inf Technol. 10(5):42, 2015.
26.
Zurück zum Zitat Salvakkam DB, Pamula R. MESSB–LWE: multi-extractable somewhere statistically binding and learning with error-based integrity and authentication for cloud storage. J Supercomput. (2022):1–30. Salvakkam DB, Pamula R. MESSB–LWE: multi-extractable somewhere statistically binding and learning with error-based integrity and authentication for cloud storage. J Supercomput. (2022):1–30.
27.
Zurück zum Zitat Salvakkam DB, Pamula R. Design of fully homomorphic multikey encryption scheme for secured cloud access and storage environment. J Intell Inf Syst (2022):1–23. Salvakkam DB, Pamula R. Design of fully homomorphic multikey encryption scheme for secured cloud access and storage environment. J Intell Inf Syst (2022):1–23.
28.
Zurück zum Zitat Babu SD, Pamula R. An effective block-chain based authentication technique for cloud based IoT. Int Conf Adv Comput Data Sci. Springer, Singapore, 2020. Babu SD, Pamula R. An effective block-chain based authentication technique for cloud based IoT. Int Conf Adv Comput Data Sci. Springer, Singapore, 2020.
29.
Zurück zum Zitat Saxena H, Richariya V. Intrusion detection in kdd99 dataset using svm-pso and feature reduction with information gain. Int J Comput Appl. 98(6): 2014. Saxena H, Richariya V. Intrusion detection in kdd99 dataset using svm-pso and feature reduction with information gain. Int J Comput Appl. 98(6): 2014.
30.
Zurück zum Zitat Staudemeyer RC. Applying long short-term memory recurrent neural networks to intrusion detection. S Afr Comput J. 56(1):136–154, 2015. Staudemeyer RC. Applying long short-term memory recurrent neural networks to intrusion detection. S Afr Comput J. 56(1):136–154, 2015.
31.
Zurück zum Zitat Yu Y, Long J, Cai Z. Network intrusion detection through stacking dilated convolutional autoencoders. S Commun Netw. 2017. Yu Y, Long J, Cai Z. Network intrusion detection through stacking dilated convolutional autoencoders. S Commun Netw. 2017.
32.
Zurück zum Zitat Ding Y, Chen S, Xu J. Application of deep belief networks for opcode-based malware detection. In 2016 International Joint Conference on Neural Networks (IJCNN), pages 3901–3908. IEEE, 2016. Ding Y, Chen S, Xu J. Application of deep belief networks for opcode-based malware detection. In 2016 International Joint Conference on Neural Networks (IJCNN), pages 3901–3908. IEEE, 2016.
33.
Zurück zum Zitat Kim G, Yi H, Lee J, Paek Y, Yoon S. Lstm-based Model-call language modeling and robust ensemble method for designing host-based intrusion detection Models. arXiv preprint arXiv:1611.01726, 2016. Kim G, Yi H, Lee J, Paek Y, Yoon S. Lstm-based Model-call language modeling and robust ensemble method for designing host-based intrusion detection Models. arXiv preprint arXiv:​1611.​01726, 2016.
34.
Zurück zum Zitat Ingre B, Yadav A, Soni AK. Decision tree based intrusion detection model for nslkdd dataset. In International conference on information and communication technology for intelligent Models, pages 207–218. Springer, 2017. Ingre B, Yadav A, Soni AK. Decision tree based intrusion detection model for nslkdd dataset. In International conference on information and communication technology for intelligent Models, pages 207–218. Springer, 2017.
35.
Zurück zum Zitat Balogun AO, Jimoh RG. Anomaly intrusion detection using an hybrid of decision tree and k-nearest neighbor. 2015. Balogun AO, Jimoh RG. Anomaly intrusion detection using an hybrid of decision tree and k-nearest neighbor. 2015.
36.
Zurück zum Zitat Kokila RT, Selvi ST, Govindarajan K. Ddos detection and analysis in sdn-based environment using support vector machine classifier. In 2014 Sixth International Conference on Advanced Computing (ICoAC), pages 205–210. IEEE, 2014. Kokila RT, Selvi ST, Govindarajan K. Ddos detection and analysis in sdn-based environment using support vector machine classifier. In 2014 Sixth International Conference on Advanced Computing (ICoAC), pages 205–210. IEEE, 2014.
37.
Zurück zum Zitat Kotpalliwar MV, Wajgi R. Classification of attacks using support vector machine (svm) on kddcup’ 99 ids database. In 2015 Fifth International Conference on Communication Models and Network Technologies, pages 987–990. IEEE, 2015. Kotpalliwar MV, Wajgi R. Classification of attacks using support vector machine (svm) on kddcup’ 99 ids database. In 2015 Fifth International Conference on Communication Models and Network Technologies, pages 987–990. IEEE, 2015.
38.
Zurück zum Zitat Krishnan RB, Raajan NR. An intellectual intrusion detection model for attacks classification using rnn. Int J Pharm Technol. 8(4):23157–23164, 2016. Krishnan RB, Raajan NR. An intellectual intrusion detection model for attacks classification using rnn. Int J Pharm Technol. 8(4):23157–23164, 2016.
39.
Zurück zum Zitat Malik AJ, Khan FA. A hybrid model using binary particle swarm optimization and decision tree pruning for network intrusion detection. Clust Comput. 2018;21(1):667–80. Malik AJ, Khan FA. A hybrid model using binary particle swarm optimization and decision tree pruning for network intrusion detection. Clust Comput. 2018;21(1):667–80.
40.
Zurück zum Zitat Meng W, Li W, Kwok L-F. Design of intelligent knn-based alarm filter using knowledge based alert verification in intrusion detection. Secur Commun Netw. 2015;8(18):3883–95.CrossRef Meng W, Li W, Kwok L-F. Design of intelligent knn-based alarm filter using knowledge based alert verification in intrusion detection. Secur Commun Netw. 2015;8(18):3883–95.CrossRef
41.
Zurück zum Zitat Modinat M, Abimbola A, Abdullateef B, Opeyemi A. Gain ratio and decision tree classifier for intrusion detection. Int J Comput Appl. 2015;126(1):56–9. Modinat M, Abimbola A, Abdullateef B, Opeyemi A. Gain ratio and decision tree classifier for intrusion detection. Int J Comput Appl. 2015;126(1):56–9.
42.
Zurück zum Zitat Moon D, Im H, Kim I, Park JH. Dtb-ids: an intrusion detection model based on a decision tree using behavior analysis for preventing apt attacks. J Supercomput. 73(7):2881– 2895, 2017. Moon D, Im H, Kim I, Park JH. Dtb-ids: an intrusion detection model based on a decision tree using behavior analysis for preventing apt attacks. J Supercomput. 73(7):2881– 2895, 2017.
43.
Zurück zum Zitat Rao BB, Swathi K. Fast knn classifiers for network intrusion detection model. Indian J Sci Technol. 10(14):1–10, 2017. Rao BB, Swathi K. Fast knn classifiers for network intrusion detection model. Indian J Sci Technol. 10(14):1–10, 2017.
44.
Zurück zum Zitat Relan NG, Patil DR. Implementation of network intrusion detection model using variant of decision tree algorithm. In 2015 International Conference on Nascent Technologies in the Engineering Field (ICNTE), pages 1–5. IEEE, 2015. Relan NG, Patil DR. Implementation of network intrusion detection model using variant of decision tree algorithm. In 2015 International Conference on Nascent Technologies in the Engineering Field (ICNTE), pages 1–5. IEEE, 2015.
45.
Zurück zum Zitat Saxe J, Berlin K. eXpose: a character-level convolutional neural network with embeddings for detecting malicious urls, file paths and registry keys. arXiv preprint arXiv:1702.08568, 2017. Saxe J, Berlin K. eXpose: a character-level convolutional neural network with embeddings for detecting malicious urls, file paths and registry keys. arXiv preprint arXiv:​1702.​08568, 2017.
46.
Zurück zum Zitat Shapoorifard H, Shamsinejad P. Intrusion detection using a novel hybrid method incorporating an improved knn. Int J Comput Appl. 2017;173(1):5–9. Shapoorifard H, Shamsinejad P. Intrusion detection using a novel hybrid method incorporating an improved knn. Int J Comput Appl. 2017;173(1):5–9.
47.
Zurück zum Zitat Wang W, Zhu M, Wang J, Zeng X, Yang Z. End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In 2017 IEEE International Conference on Intelligence and Security Informatics (ISI), pages 43–48. IEEE, 2017. Wang W, Zhu M, Wang J, Zeng X, Yang Z. End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In 2017 IEEE International Conference on Intelligence and Security Informatics (ISI), pages 43–48. IEEE, 2017.
48.
Zurück zum Zitat Wang W, Zhu M, Zeng X, Ye X, Sheng Y. Malware traffic classification using convolutional neural network for representation learning. In 2017 International Conference on Information Networking (ICOIN), pages 712–717. IEEE, 2017. Wang W, Zhu M, Zeng X, Ye X, Sheng Y. Malware traffic classification using convolutional neural network for representation learning. In 2017 International Conference on Information Networking (ICOIN), pages 712–717. IEEE, 2017.
49.
Zurück zum Zitat Yan M, Liu Z.A new method of transductive svm-based network intrusion detection. In International Conference on Computer and Computing Technologies in Agriculture, pages 87–95. Springer, 2010. Yan M, Liu Z.A new method of transductive svm-based network intrusion detection. In International Conference on Computer and Computing Technologies in Agriculture, pages 87–95. Springer, 2010.
50.
Zurück zum Zitat Yin C, Zhu Y, Fei J, He X. A deep learning approach for intrusion detection using recurrent neural networks. Ieee Access. 2017;5:21954–61.CrossRef Yin C, Zhu Y, Fei J, He X. A deep learning approach for intrusion detection using recurrent neural networks. Ieee Access. 2017;5:21954–61.CrossRef
Metadaten
Titel
Enhanced Quantum-Secure Ensemble Intrusion Detection Techniques for Cloud Based on Deep Learning
verfasst von
Dilli Babu Salvakkam
Vijayalakshmi Saravanan
Praphula Kumar Jain
Rajendra Pamula
Publikationsdatum
16.05.2023
Verlag
Springer US
Erschienen in
Cognitive Computation / Ausgabe 5/2023
Print ISSN: 1866-9956
Elektronische ISSN: 1866-9964
DOI
https://doi.org/10.1007/s12559-023-10139-2

Weitere Artikel der Ausgabe 5/2023

Cognitive Computation 5/2023 Zur Ausgabe

Premium Partner