A hybrid multi-layer intrusion detection system in cloud

Article

Abstract

Cloud computing being the representation of the technology makes use of the infrastructure for computing in an efficient manner. This type of a computing offers a large amount of potential in improving the productivity which reduces the costs and also ensures that this can handle the risks. The intrusion detection systems (IDS) are all widely used for malicious detection in the network of communication and also its host. The IDS system used currently has one set of rules with several patterns of attach which get stored inside the various databases and the whole traffic of network will be duly matched against this for the purpose of avoiding any other illegal or also unauthorized activities. Therefore, in this work, this structure has optimized multi-layer artificial neural network is based on the IDS in case of the cloud which has been presented. This hybrid glow swarm optimization (GSO)–tabu search (TS) is called the GSO–TS has been used for the optimization of the structure and also for the purpose of reduction of convergence time and for solving old problems, trapping of local optima and their premature convergence. The results have proved to have better performance.

Keywords

Intrusion detection systems (IDS) Cloud computing Artificial neural network (ANN) Glow swarm optimization (GSO) and tabu search (TS) 

References

  1. 1.
    Carlin, A., Hammoudeh, M., Aldabbas, O.: Defence for distributed denial of service attacks in cloud computing. Procedia Comput. Sci. 73, 490–497 (2015)CrossRefGoogle Scholar
  2. 2.
    Goyal, S.: Public vs private vs hybrid vs community-cloud computing: a critical review. Int. J. Comput. Netw. Inf. Secur. 6(3), 20 (2014)Google Scholar
  3. 3.
    Shelke, M.P.K., Sontakke, M.S., Gawande, A.D.: Intrusion detection system for cloud computing. Int. J. Sci. Technol. Res. 1(4), 67–71 (2012)Google Scholar
  4. 4.
    Mohod, A.G., Alaspurkar, S.J.: Analysis of IDS for cloud computing. Int. J. Appl. Innov. Eng. Manag. (IJAIEM) 2, 344–349 (2013)Google Scholar
  5. 5.
    Narwane, S.V., Vaikol, S.L.: Intrusion detection system in cloud computing environment. In: International Conference on Advances in Communication and Computing Technologies (ICACACT) (2012)Google Scholar
  6. 6.
    Kumbhare, M.A., Chaudhari, M.M.: IDS: survey on intrusion detection system in cloud computing. Int. J. Comput. Sci. Mob. Comput. 3(4), 497–502 (2014)Google Scholar
  7. 7.
    Mehmood, Y., Habiba, U., Shibli, M.A., Masood, R.: Intrusion detection system in cloud computing: challenges and opportunities. In: Proceedings of Information Assurance (NCIA), 2013 2nd National Conference on IEEE, pp. 59–66 (2013)Google Scholar
  8. 8.
    Kene, S.G., Theng, D.P.: A review on intrusion detection techniques for cloud computing and security challenges. In: Proceedings of Electronics and Communication Systems (ICECS), 2015 2nd International Conference on IEEE, pp. 227–232 (2015)Google Scholar
  9. 9.
    Subba, B., Biswas, S., Karmakar, S. A neural network based system for intrusion detection and attack classification. In: Proceedings of Communication (NCC), 2016 Twenty Second National Conference on IEEE, pp. 1–6 (2016)Google Scholar
  10. 10.
    Zhou, Y., Zhou, G., Zhang, J.: A hybrid glowworm swarm optimization algorithm for constrained engineering design problems. Appl. Math. Inf. Sci 7(1), 379–388 (2013)CrossRefGoogle Scholar
  11. 11.
    Ghosh, P., Mandal, A. K., Kumar, R.: An efficient cloud network intrusion detection system. In: Proceedings of Information Systems Design and Intelligent Applications, pp. 91–99. Springer, New york (2015)Google Scholar
  12. 12.
    Pandeeswari, N., Kumar, G.: Anomaly detection system in cloud environment using fuzzy clustering based ANN. Mob. Netw. Appl. 21(3), 494–505 (2016)CrossRefGoogle Scholar
  13. 13.
    Baig, M.M., Awais, M.M., El-Alfy, E.S.M.: A multiclass cascade of artificial neural network for network intrusion detection. J. Intell. Fuzzy Syst. 32(4), 2875–2883 (2017)CrossRefGoogle Scholar
  14. 14.
    Rajendran, P.K.: Hybrid intrusion detection algorithm for private cloud. Indian J. Sci. Technol. (2015).  https://doi.org/10.17485/ijst/2015/v8i35/80167 Google Scholar
  15. 15.
    Masdari, M., Salehi, F., Jalali, M., Bidaki, M.: A survey of PSO-based scheduling algorithms in cloud computing. J. Netw. Syst. Manag. 25, 1–37 (2016)Google Scholar
  16. 16.
    Cao, J., Cui, H., Shi, H., Jiao, L.: Big data: a parallel particle swarm optimization-back-propagation neural network algorithm based on mapreduce. PLoS ONE 11(6), e0157551 (2016)CrossRefGoogle Scholar
  17. 17.
    Kumari, K.R., Sengottuvelan, P., Shanthini, J.: A hybrid approach of genetic algorithm and multi Objective PSO task scheduling in cloud computing. Asian J. Res. Soc. Sci. Humanit. 7(3), 1260–1271 (2017)Google Scholar
  18. 18.
    Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. 36(1), 42–57 (2013)CrossRefGoogle Scholar
  19. 19.
    Devikrishna, K.S., Ramakrishna, B.B.: An artificial neural network based intrusion detection system and classification of attacks. International Journal of Engineering Research and Applications (IJERA) 3(4), 1959–1964 (2013)Google Scholar
  20. 20.
    Minal, Z., Pooja, D., Snehal, P., Poonam, P., Priyanka, P.: Intrusion detection system using artificial neural network. Int. J. Emerg. Eng. Res. Technol. 2(6), 146–149 (2014)Google Scholar
  21. 21.
    Dogra, R., Gupta, N.: Glowworm swarm optimization technique for optimal power flow. Adv. Electron. Electr. Eng. 4(2), 155–160 (2014)Google Scholar
  22. 22.
    Liu, J., Zhou, Y., Huang, K., Ouyang, Z., Wang, Y.: A glowworm swarm optimization algorithm based on definite updating search domains. J. Comput. Inf. Syst. 7(10), 3698–3705 (2011)Google Scholar
  23. 23.
    Zhou, Y., Luo, Q., Liu, J.: Glowworm swarm optimization for dispatching system of public transit vehicles. Neural Process. Lett. 40(1), 25–33 (2014)CrossRefGoogle Scholar
  24. 24.
    Lee, C.W., Lin, B.Y.: Application of hybrid quantum tabu search with support vector regression (SVR) for load forecasting. energies 9(11), 873 (2016)CrossRefGoogle Scholar
  25. 25.
    Zainal, N., Zain, A.M., Radzi, N.H.M., Othman, M.R.: Glowworm swarm optimization (GSO) for optimization of machining parameters. J. Intell. Manuf. 27(4), 797–804 (2016)CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.GKM College of Engineering and TechnologyChennaiIndia
  2. 2.Department of Computer Science and EngineeringGKM College of Engineering and TechnologyChennaiIndia

Personalised recommendations