Attacks and Intrusion Detection in Cloud Computing Using Neural Networks and Particle Swarm Optimization Algorithms

Ahmad Shokuh Saljoughi, Mehrdad Mehrvarz, Hamid Mirvaziri

Abstract


Today, cloud computing has become popular among users in organizations and companies. Security and efficiency are the two major issues facing cloud service providers and their customers. Since cloud computing is a virtual pool of resources provided in an open environment (Internet), cloud-based services entail security risks. Detection of intrusions and attacks through unauthorized users is one of the biggest challenges for both cloud service providers and cloud users. In the present study, artificial intelligence techniques, e.g. MLP Neural Network sand particle swarm optimization algorithm, were used to detect intrusion and attacks. The methods were tested for NSL-KDD, KDD-CUP datasets. The results showed improved accuracy in detecting attacks and intrusions by unauthorized users.


Keywords


Cloud Security; Intrusion Detection; Neural Networks; Particle Swarm Optimization.

References


S. J. Stolfo ,M.B. Salem ,A.D. Keromytis, “Fog computing: Mitigating insider data theft attacks in the cloud,”, IEEE Symposium on Security and Privacy Workshops (SPW), vol. 00, no. 1, pp. 125-128, 2012.

C. Wang, , Q. Wang, K. Ren, W. Lou, ” Privacy-preserving public auditing for data storage security in cloud computing,”, Proceedings IEEE INFOCOM, pp. 1–9, 2010.

B.R. Kandukuri, R.V. Paturi, A. Rakshit, “Cloud security issues,”, IEEE International Conference on Services Computing, Bangalore, pp. 21–25, September 2009.

http://www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/Getting-Secure-in-the-Cloud.pdf

L. Zhe, S. Weiqing, W. Lingfeng, “A NEURAL NETWORK BASED DISTRIBUTED INTRUSION DETECTION SYSTEM ON CLOUD PLATFORM”, International Conference (CCIS),vol. 2, 2012.

K. Anand,Q. Gerald, Jr. Maguire, S. Ayush, P. Schoo, “Genetic Algorithm based Feature Selection Algorithm for Effective Intrusion Detection in Cloud Networks,”, International Conference on Data Mining Workshop, vol. 12, 2012.

P. Ganeshkumar, N. Pandeeswari, “Adaptive Nauru-Fuzzy-Based Anomaly Detection System in Cloud”, Int. J. Fuzzy Syst, vol. 18 , pp. 367–378, 2015.

S. Raman,K. Harish,R. K. Singlac, “An intrusion detection system using network traffic profiling and online sequential extreme learning machine,”, Expert Systems With Applications, vol.42, pp. 8609-8624, 2015.

D. Tirtharaj, “A study on intrusion detection using neural networks trained with evolutionary algorithms,”, journal of soft computing, vol. 20, pp. 1-14, 2015.

S. Shalki, G. Anshul, A. Sanjay, ”An Intrusion Detection System for Detecting Denial-of-Service Attack in Cloud Using Artificial Bee Colony,”, Proceedings of the International Congress on Information and Communication Technology: Advances in Intelligent Systems and Computing, vol. 438, 2016.

L. B. Dalmazo, P. V. Joao, S. Paulo, C. Marilia, “Expedite Feature Extraction for Enhanced Cloud Anomaly Detection,”, DISSECT, vol. 2, 2016.

V. K. Asari,“Training of a Feed forward Multiple-valued Neural Networks by Error Back-propagation with a Multilevel Threshold Function,”, IEEE Transactions on Neural Networks, vol. 12(6), pp. 1512-1521, 2011.

Z .Liu,X. Wang “A PSO-Based Algorithm for Load Balancing in Virtual Machines of Cloud Computing Environment,”, Advances in Swarm Intelligence, pp. 142-147, 2012.

Dataset of kddcup99. 2007: http://kdd.ics.uci.edu/databases/kddcup99/corrected.gz [Accessed 16-May-2000].

Dataset of NSL-KDD University of new Brunswick. Available from: http://www.unb.ca/research/iscx/dataset/iscx-NSL-KDD-dataset.html [Accessed September 2016].

K. Subrahmanyam, N. S. Sankar, S. P. Baggam, R. S. Raghavendra ,” A Modified KS-test for Feature Selection,”, IOSR Journal of Computer Engineering (IOSR-JCE), 73-79, 2013.

K. M. Ali, W. Venus , M. S. Al Rababaa , “ The Affect of Fuzzification on Neural Networks Intrusion Detection Systems,”, IEEE Conference on Industrial Electronics and Application(ICIEA),vol. 4, pp. 25-27, 2009.


Full Text: PDF

DOI: 10.28991/ijse-01120

Refbacks

  • There are currently no refbacks.


Copyright (c) 2018 Ahmad Shokuhsaljooghi, Hamid Mirvaziri