Skip to main content
Log in

RETRACTED ARTICLE: A hybrid multi-layer intrusion detection system in cloud

  • Published:
Cluster Computing Aims and scope Submit manuscript

This article was retracted on 01 December 2022

This article has been updated

Abstract

Cloud computing being the representation of the technology makes use of the infrastructure for computing in an efficient manner. This type of a computing offers a large amount of potential in improving the productivity which reduces the costs and also ensures that this can handle the risks. The intrusion detection systems (IDS) are all widely used for malicious detection in the network of communication and also its host. The IDS system used currently has one set of rules with several patterns of attach which get stored inside the various databases and the whole traffic of network will be duly matched against this for the purpose of avoiding any other illegal or also unauthorized activities. Therefore, in this work, this structure has optimized multi-layer artificial neural network is based on the IDS in case of the cloud which has been presented. This hybrid glow swarm optimization (GSO)–tabu search (TS) is called the GSO–TS has been used for the optimization of the structure and also for the purpose of reduction of convergence time and for solving old problems, trapping of local optima and their premature convergence. The results have proved to have better performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Change history

References

  1. Carlin, A., Hammoudeh, M., Aldabbas, O.: Defence for distributed denial of service attacks in cloud computing. Procedia Comput. Sci. 73, 490–497 (2015)

    Article  Google Scholar 

  2. Goyal, S.: Public vs private vs hybrid vs community-cloud computing: a critical review. Int. J. Comput. Netw. Inf. Secur. 6(3), 20 (2014)

    Google Scholar 

  3. Shelke, M.P.K., Sontakke, M.S., Gawande, A.D.: Intrusion detection system for cloud computing. Int. J. Sci. Technol. Res. 1(4), 67–71 (2012)

    Google Scholar 

  4. Mohod, A.G., Alaspurkar, S.J.: Analysis of IDS for cloud computing. Int. J. Appl. Innov. Eng. Manag. (IJAIEM) 2, 344–349 (2013)

    Google Scholar 

  5. Narwane, S.V., Vaikol, S.L.: Intrusion detection system in cloud computing environment. In: International Conference on Advances in Communication and Computing Technologies (ICACACT) (2012)

  6. Kumbhare, M.A., Chaudhari, M.M.: IDS: survey on intrusion detection system in cloud computing. Int. J. Comput. Sci. Mob. Comput. 3(4), 497–502 (2014)

    Google Scholar 

  7. Mehmood, Y., Habiba, U., Shibli, M.A., Masood, R.: Intrusion detection system in cloud computing: challenges and opportunities. In: Proceedings of Information Assurance (NCIA), 2013 2nd National Conference on IEEE, pp. 59–66 (2013)

  8. Kene, S.G., Theng, D.P.: A review on intrusion detection techniques for cloud computing and security challenges. In: Proceedings of Electronics and Communication Systems (ICECS), 2015 2nd International Conference on IEEE, pp. 227–232 (2015)

  9. Subba, B., Biswas, S., Karmakar, S. A neural network based system for intrusion detection and attack classification. In: Proceedings of Communication (NCC), 2016 Twenty Second National Conference on IEEE, pp. 1–6 (2016)

  10. Zhou, Y., Zhou, G., Zhang, J.: A hybrid glowworm swarm optimization algorithm for constrained engineering design problems. Appl. Math. Inf. Sci 7(1), 379–388 (2013)

    Article  Google Scholar 

  11. Ghosh, P., Mandal, A. K., Kumar, R.: An efficient cloud network intrusion detection system. In: Proceedings of Information Systems Design and Intelligent Applications, pp. 91–99. Springer, New york (2015)

  12. Pandeeswari, N., Kumar, G.: Anomaly detection system in cloud environment using fuzzy clustering based ANN. Mob. Netw. Appl. 21(3), 494–505 (2016)

    Article  Google Scholar 

  13. Baig, M.M., Awais, M.M., El-Alfy, E.S.M.: A multiclass cascade of artificial neural network for network intrusion detection. J. Intell. Fuzzy Syst. 32(4), 2875–2883 (2017)

    Article  Google Scholar 

  14. Rajendran, P.K.: Hybrid intrusion detection algorithm for private cloud. Indian J. Sci. Technol. (2015). https://doi.org/10.17485/ijst/2015/v8i35/80167

    Article  Google Scholar 

  15. Masdari, M., Salehi, F., Jalali, M., Bidaki, M.: A survey of PSO-based scheduling algorithms in cloud computing. J. Netw. Syst. Manag. 25, 1–37 (2016)

    Google Scholar 

  16. Cao, J., Cui, H., Shi, H., Jiao, L.: Big data: a parallel particle swarm optimization-back-propagation neural network algorithm based on mapreduce. PLoS ONE 11(6), e0157551 (2016)

    Article  Google Scholar 

  17. Kumari, K.R., Sengottuvelan, P., Shanthini, J.: A hybrid approach of genetic algorithm and multi Objective PSO task scheduling in cloud computing. Asian J. Res. Soc. Sci. Humanit. 7(3), 1260–1271 (2017)

    Google Scholar 

  18. Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. 36(1), 42–57 (2013)

    Article  Google Scholar 

  19. Devikrishna, K.S., Ramakrishna, B.B.: An artificial neural network based intrusion detection system and classification of attacks. International Journal of Engineering Research and Applications (IJERA) 3(4), 1959–1964 (2013)

    Google Scholar 

  20. Minal, Z., Pooja, D., Snehal, P., Poonam, P., Priyanka, P.: Intrusion detection system using artificial neural network. Int. J. Emerg. Eng. Res. Technol. 2(6), 146–149 (2014)

    Google Scholar 

  21. Dogra, R., Gupta, N.: Glowworm swarm optimization technique for optimal power flow. Adv. Electron. Electr. Eng. 4(2), 155–160 (2014)

    Google Scholar 

  22. Liu, J., Zhou, Y., Huang, K., Ouyang, Z., Wang, Y.: A glowworm swarm optimization algorithm based on definite updating search domains. J. Comput. Inf. Syst. 7(10), 3698–3705 (2011)

    Google Scholar 

  23. Zhou, Y., Luo, Q., Liu, J.: Glowworm swarm optimization for dispatching system of public transit vehicles. Neural Process. Lett. 40(1), 25–33 (2014)

    Article  Google Scholar 

  24. Lee, C.W., Lin, B.Y.: Application of hybrid quantum tabu search with support vector regression (SVR) for load forecasting. energies 9(11), 873 (2016)

    Article  Google Scholar 

  25. Zainal, N., Zain, A.M., Radzi, N.H.M., Othman, M.R.: Glowworm swarm optimization (GSO) for optimization of machining parameters. J. Intell. Manuf. 27(4), 797–804 (2016)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Manickam.

Additional information

This article has been retracted. Please see the retraction notice for more detail: https://doi.org/10.1007/s10586-022-03833-7

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Manickam, M., Rajagopalan, S.P. RETRACTED ARTICLE: A hybrid multi-layer intrusion detection system in cloud. Cluster Comput 22 (Suppl 2), 3961–3969 (2019). https://doi.org/10.1007/s10586-018-2557-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-018-2557-5

Keywords

Navigation