Open Access
Subscription Access
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
Security and Performance aspects of cloud computing are the major issues which have to be tended to in Cloud Computing. Intrusion is one such basic and imperative security problem for Cloud Computing. Consequently, it is essential to create an Intrusion Detection System (IDS) to detect both inside and outside assaults with high detection precision in cloud environment. In this paper, cloud intrusion detection system at hypervisor layer is developed and assesses to detect the depraved activities in cloud computing environment. The cloud intrusion detection system uses a hybrid algorithm which is a fusion of WLI- FCM clustering algorithm and Back propagation artificial Neural Network to improve the detection accuracy of the cloud intrusion detection system. The proposed system is implemented and compared with K-means and classic FCM. The DARPA’s KDD cup dataset 1999 is used for simulation. From the detailed performance analysis, it is clear that the proposed system is able to detect the anomalies with high detection accuracy and low false alarm rate.
Keywords
Cloud Computing, Cloud Intrusion Detection System, Intrusion Detection System, IDS, Security.
User
Font Size
Information
- H. Jin, G, Xiang, D. Zou, S. Wu, F. Zhao, M. Li, And W. Zheng, AVMM-based intrusion prevention system in cloud computing environment, Journal of Supercomputing Springer, 66(3), 2011, 1133–1151.
- F. Gens, New IDC IT Cloud Service Survey: Top Benefits and Challenges Exchange, 2009, online; http://www.blogs.idc.com/ie/p=730S. (Accessed 12 may 2017).
- L. Martin, White Paper, 2010, online: http://www.Lockheedmartin.com/data/assets/isgs/documents/CloudComputingWhitePaper.pdf.
- C. Modi ,D. Patel, B. Borisaniya, H. Patel, A. Patel and M. Rajarajan, A survey of intrusion detection techniques in Cloud, Journal of Network and Computer Applications, 36(1), 2013, 42-57.
- K. Vieira, A. Schulter, C.B. Westphall, and C. M. Westphall, Intrusion detection techniques in grid and cloud computing environment. IEEE IT Professional Magazine , 2010, 38–43
- S.Raja and S. Ramaiah, An Efficient Fuzzy-Based Hybrid System to Cloud Intrusion Detection, International Journal of Fuzzy Systems, 19(1), 2016, 116.
- N. Pandeeswari and Ganesh Kumar, Anomaly Detection System in Cloud Environment Using Fuzzy Clustering Based ANN, Mobile Networks and Applications, 21(3), 2016, 494-505.
- C. N. Modi, D. R. Patel, A. Patel, and M. Rajarajan, Integrating Signature Apriori based Network Intrusion Detection system (NIDS) in Cloud Computing. In: Proceedings of 2nd International Conference on Communication, Computing & Security, Procedia Technology, 6:905–912. Doi: 10.1016/j.protcy.2012.10.110
- C. C. Lo, C. C. Huang, and J. Ku , A Cooperative Intrusion Detection System Framework for Cloud Computing Networks, 39th International Conference on Parallel Processing Workshops , 2010, 280-284.
- Z. Chiba, N. Abghour, K. Moussaid and M. Rida, A Cooperative and Hybrid Network Intrusion Detection Framework in Cloud Computing Based on Snory and Optimized back Propagation neural Network, International Workshop on Mobile Cloud Computing Systems, Management and Security, 83, 2016, 1200-1206.
- C. Wu, C. Ouyang, L. Chen, and L. Lu, A New Fuzzy Clustering Validity Index with a Median Factor for Centroid-based Clustering, IEEE Transactions on Fuzzy Systems, 23(3),2015, 701 – 718.
- KDD Cup 1999. Available online: http://www.kdd.ics.uci.edu/databases/kddcup99/kddcup99.html, October 2007.
- R. kulhare and D. Singh, Intrusion Detection System based on Fuzzy C Means Clustering and Probabilistic Neural Network, International Journal of Computer Applications, 74, 2013, 30-33.
- K. Nalavade and B. B. Mehsram, Evaluation of KMeans Clustering for Effective Intrusion Detection and Prevention in Massive Network Traffic Data, International Journal of Computer Applications, 96, 2014, 9-14.
Abstract Views: 245
PDF Views: 0