Skip to main content
Erschienen in: Cluster Computing 3/2021

28.04.2021

Cloud-based intrusion detection using kernel fuzzy clustering and optimal type-2 fuzzy neural network

verfasst von: Doddi Srilatha, Gopal K. Shyam

Erschienen in: Cluster Computing | Ausgabe 3/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Nowadays, digital data is an important asset for every organization. With the advent of cloud computing, cloud service providers (CSPs) offer the required infrastructure to end-users for storage and provide flexibility in accessing data. Since the users access the data from the cloud through the Internet, the data stored in the cloud are exposed to various intrusions. Intrusion detection is considered to be a significant issue in the cloud. The existing techniques are capable to detect well-known attacks but fall short in detecting low frequent attacks. To address this issue, we propose a novel intrusion detection system (IDS) in the cloud using a combination of kernel fuzzy c-means clustering (KFCM) and an optimal type-2 fuzzy neural network (OT2FNN). To achieve this, we optimally select the parameters of T2FNN using the lion optimization algorithm (LOA) for weight optimization. The proposed IDS detects the intrusion and allow only normal data to be stored in the cloud. Simulation results on the NSL-KDD dataset show that the proposed IDS system gives better results than the existing IDS systems in terms of precision, recall, and F-measure.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Vieira, K., Schulter, A., Westphall, C., Westphall, C.: Intrusion detection techniques in grid and cloud computing environment. IEEE IT Prof. Mag. 2010, 38–43 (2010)CrossRef Vieira, K., Schulter, A., Westphall, C., Westphall, C.: Intrusion detection techniques in grid and cloud computing environment. IEEE IT Prof. Mag. 2010, 38–43 (2010)CrossRef
2.
Zurück zum Zitat Hai, J., Guofu, X., Deqing, Z.: AVMM-based intrusion prevention system in cloud computing environment. J. Supercomput. 66(3), 1133–1151 (2013)CrossRef Hai, J., Guofu, X., Deqing, Z.: AVMM-based intrusion prevention system in cloud computing environment. J. Supercomput. 66(3), 1133–1151 (2013)CrossRef
3.
Zurück zum Zitat Oktay, U., Sahingoz, O.K.: Attack types and intrusion detection systems in cloud computing. In: Proceedings of 6th International Information Security & Cryptology Conference, pp. 71–76 (2013) Oktay, U., Sahingoz, O.K.: Attack types and intrusion detection systems in cloud computing. In: Proceedings of 6th International Information Security & Cryptology Conference, pp. 71–76 (2013)
4.
Zurück zum Zitat Raja, S., Ramaiah, S.: An efficient fuzzy-based hybrid system to cloud intrusion detection. Int. J. Fuzzy Syst. 19(1), 62–77 (2017)CrossRef Raja, S., Ramaiah, S.: An efficient fuzzy-based hybrid system to cloud intrusion detection. Int. J. Fuzzy Syst. 19(1), 62–77 (2017)CrossRef
5.
Zurück zum Zitat Work, W.T.: Intrusion Detection Systems (IDS). National Institute of Standers and Technology (2003) Work, W.T.: Intrusion Detection Systems (IDS). National Institute of Standers and Technology (2003)
6.
Zurück zum Zitat Kumbhare, A., Chaudhari, M.: IDS: survey on intrusion detection system in cloud computing. IJCSMC 3(4), 497–502 (2014) Kumbhare, A., Chaudhari, M.: IDS: survey on intrusion detection system in cloud computing. IJCSMC 3(4), 497–502 (2014)
7.
Zurück zum Zitat Roschke, S., Cheng, F., Meinel, C.: Intrusion Detection in the Cloud. In: Eighth IEEE international conference on dependable, autonomic and secure computing (2009). Roschke, S., Cheng, F., Meinel, C.: Intrusion Detection in the Cloud. In: Eighth IEEE international conference on dependable, autonomic and secure computing (2009).
8.
Zurück zum Zitat Balamurugan, V., Saravanan, R.: Enhanced intrusion detection and prevention system on cloud environment using hybrid classification and OTS generation. Clust. Comput. 22(6), 13027–13039 (2019)CrossRef Balamurugan, V., Saravanan, R.: Enhanced intrusion detection and prevention system on cloud environment using hybrid classification and OTS generation. Clust. Comput. 22(6), 13027–13039 (2019)CrossRef
9.
Zurück zum Zitat Krishnaveni, S., Sivamohan, S., Sridhar, S.S., Prabakaran, S.: Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing. Clust. Comput. 181, 1–19 (2021) Krishnaveni, S., Sivamohan, S., Sridhar, S.S., Prabakaran, S.: Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing. Clust. Comput. 181, 1–19 (2021)
10.
Zurück zum Zitat Manickam, M., Rajagopalan, S.P.: A hybrid multi-layer intrusion detection system in cloud. Clust. Comput. 22(2), 3961–3969 (2019)CrossRef Manickam, M., Rajagopalan, S.P.: A hybrid multi-layer intrusion detection system in cloud. Clust. Comput. 22(2), 3961–3969 (2019)CrossRef
11.
Zurück zum Zitat Jaber, A.N., Rehman, S.U.: FCM–SVM based intrusion detection system for cloud computing environment. Clust. Comput. 23, 1–11 (2020)CrossRef Jaber, A.N., Rehman, S.U.: FCM–SVM based intrusion detection system for cloud computing environment. Clust. Comput. 23, 1–11 (2020)CrossRef
12.
Zurück zum Zitat Velliangiri, S., Premalatha, J.: Intrusion detection of distributed denial of service attack in cloud. Clust. Comput. 22(5), 10615–10623 (2019)CrossRef Velliangiri, S., Premalatha, J.: Intrusion detection of distributed denial of service attack in cloud. Clust. Comput. 22(5), 10615–10623 (2019)CrossRef
13.
Zurück zum Zitat Raman, M.G., Somu, N., Jagarapu, S., Manghnani, T., Selvam, T., Krithivasan, K., Sriram, V.S.: An efficient intrusion detection technique based on support vector machine and improved binary gravitational search algorithm. Artif. Intell. Rev. 53, 1–32 (2019) Raman, M.G., Somu, N., Jagarapu, S., Manghnani, T., Selvam, T., Krithivasan, K., Sriram, V.S.: An efficient intrusion detection technique based on support vector machine and improved binary gravitational search algorithm. Artif. Intell. Rev. 53, 1–32 (2019)
14.
Zurück zum Zitat Gao, Y., Liu, Y., Jin, Y., Chen, J., Wu, H.: A novel semi-supervised learning approach for network intrusion detection on cloud-based robotic system. IEEE Access 6, 50927–50938 (2018)CrossRef Gao, Y., Liu, Y., Jin, Y., Chen, J., Wu, H.: A novel semi-supervised learning approach for network intrusion detection on cloud-based robotic system. IEEE Access 6, 50927–50938 (2018)CrossRef
15.
Zurück zum Zitat Devi, R.R., Chamundeeswari, V.V.: Triple DES: privacy preserving in big data healthcare. Int. J. Parallel Prog. 48(3), 515–533 (2020)CrossRef Devi, R.R., Chamundeeswari, V.V.: Triple DES: privacy preserving in big data healthcare. Int. J. Parallel Prog. 48(3), 515–533 (2020)CrossRef
16.
Zurück zum Zitat Abd EL-Latif, A.A., Abd-El-Atty, B., Venegas-Andraca, S.E., Mazurczyk, W.: Efficient quantum-based security protocols for information sharing and data protection in 5G networks. Fut. Gener. Comput. Syst. 100, 893–906 (2019)CrossRef Abd EL-Latif, A.A., Abd-El-Atty, B., Venegas-Andraca, S.E., Mazurczyk, W.: Efficient quantum-based security protocols for information sharing and data protection in 5G networks. Fut. Gener. Comput. Syst. 100, 893–906 (2019)CrossRef
17.
Zurück zum Zitat AbdEl-Latif, A.A., Abd-El-Atty, B., Hossain, M.S., Elmougy, S., Ghoneim, A.: Secure quantum steganography protocol for fog cloud Internet of Things. IEEE Access 6, 10332–10340 (2018)CrossRef AbdEl-Latif, A.A., Abd-El-Atty, B., Hossain, M.S., Elmougy, S., Ghoneim, A.: Secure quantum steganography protocol for fog cloud Internet of Things. IEEE Access 6, 10332–10340 (2018)CrossRef
18.
Zurück zum Zitat Hajimirzaei, B., Navimipour, N.J.: Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm. ICT Express 5(1), 56–59 (2019)CrossRef Hajimirzaei, B., Navimipour, N.J.: Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm. ICT Express 5(1), 56–59 (2019)CrossRef
19.
Zurück zum Zitat Mahmood, Z., Agrawal, C.: Intrusion detection in cloud computing environment using neural network. Int. J. Res. Comput. Eng. Electron. 1, 1 (2014) Mahmood, Z., Agrawal, C.: Intrusion detection in cloud computing environment using neural network. Int. J. Res. Comput. Eng. Electron. 1, 1 (2014)
20.
Zurück zum Zitat Moradi, M., Zulkernine, M.: A neural network based system for intrusion detection and classification of attacks. IEEE International Conference on Advances in Intelligent System (2004) Moradi, M., Zulkernine, M.: A neural network based system for intrusion detection and classification of attacks. IEEE International Conference on Advances in Intelligent System (2004)
21.
Zurück zum Zitat Manickam, M., Ramaraj, N., Chellappan, C.: A combined PFCM and recurrent neural network based IDS for cloud environment. Int. J. Bus. Intell. Data Mining 1, 1 (2017) Manickam, M., Ramaraj, N., Chellappan, C.: A combined PFCM and recurrent neural network based IDS for cloud environment. Int. J. Bus. Intell. Data Mining 1, 1 (2017)
Metadaten
Titel
Cloud-based intrusion detection using kernel fuzzy clustering and optimal type-2 fuzzy neural network
verfasst von
Doddi Srilatha
Gopal K. Shyam
Publikationsdatum
28.04.2021
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe 3/2021
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-021-03281-9

Weitere Artikel der Ausgabe 3/2021

Cluster Computing 3/2021 Zur Ausgabe

Premium Partner