Advertisement

Novel Network IDS in Cloud Computing Based on Optimized Back Propagation Neural Network Using a Self-adaptive Genetic Algorithm

  • Zouhair ChibaEmail author
  • Noreddine Abghour
  • Khalid Moussaid
  • Amina El omri
  • Mohamed Rida
Conference paper
Part of the Lecture Notes in Intelligent Transportation and Infrastructure book series (LNITI)

Abstract

Nowadays, Cloud Computing (CC) had become an integral part of IT industry. It represents the maturing of technology and is a pliable, cost-effective platform which provides business/IT services over the Internet. Although there are several benefits of adopting this paradigm, there are some significant hurdles to it and one of them is security. In fact, due to the distributed and open nature of the cloud, resources, applications and data are vulnerable and prone to intrusions that affect confidentiality, availability and integrity of Cloud resources and offered services. Network Intrusion Detection System (NIDS) has become the most commonly used component of computer system security and compliance practices that defends network accessible Cloud resources and services from various kinds of threats and attacks, while maintaining performance and service quality. In this work, in order to detect intrusions in CC environment, we propose a novel anomaly NIDS based on Back Propagation Neural Network (BPNN) classifier optimized using a Self-Adaptive Genetic Algorithm (SAGA). SAGA consists of a standard Genetic Algorithm improved by means of an Adaptive Genetic Algorithm, namely Adaptive Mutation Algorithm. Since, Learning rate and Momentum term are among the most relevant parameters that affect the performance of BPNN classifier, we have employed SAGA to find the optimal values of these two critical parameters, which ensure high detection rate, high accuracy and low false alarm rate. Our novel NIDS is called “ANIDS BPNN-SAGA” (Anomaly NIDS optimized by using Self-Adaptive Genetic Algorithm). The CloudSim simulator and KDD CUP’ 99 dataset are used to verify the proposed system. The obtained experimental results have demonstrated the superiority of the proposed approach in comparison with state-of-the-art methods.

Keywords

Cloud computing Anomaly detection Network intrusion detection system Back propagation neural network Optimization Genetic algorithm Adaptive genetic algorithm Adaptive mutation algorithm Learning rate Momentum term 

References

  1. 1.
    Mehibs, S.M., Hashim, S.H.: Proposed network intrusion detection system based on fuzzy c mean algorithm in cloud computing environment. J. Univ. Babylon 26(2), 27–35 (2018)CrossRefGoogle Scholar
  2. 2.
    Mehibs, S.M., Hashim, S.H.: Proposed network intrusion detection system in cloud environment based on back propagation neural network. J. Univ. Babylon Pure Appl. Sci. 26(1), 29–40 (2018)CrossRefGoogle Scholar
  3. 3.
    Wu, S.X., Banzhaf, W.: The use of computational intelligence in intrusion detection systems: a review. Appl. Soft Comput. 10(1), 1–35 (2010)CrossRefGoogle Scholar
  4. 4.
    Shah, B., Trivedi, B.H.: Artificial neural network based intrusion detection system: A survey. Int. J. Comput. Appl. 39(6), 13–18 (2012)Google Scholar
  5. 5.
    Lo, C.C., Huang, C.C., Ku, J.: A cooperative intrusion detection system framework for cloud computing networks. In: 39th IEEE International Conference on Parallel Processing Workshops (ICPPW), pp. 280–284. IEEE, San Diego (2010).  https://doi.org/10.1109/icppw.2010.46
  6. 6.
    Modi, C.N., Patel, D.R., Patel, A., Rajarajan, M.: Integrating signature apriori based network intrusion detection system (NIDS) in cloud computing. Procedia Technology, 6, 905–912CrossRefGoogle Scholar
  7. 7.
    Hajimirzaei, B., Navimipour, N. J.: Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm. ICT Express. 2018. In press.  https://doi.org/10.1016/j.icte.2018.01.014
  8. 8.
    Sharma, P., Sengupta, J., Suri, P.K.: WLI-FCM and artificial neural network based cloud intrusion detection system. Int. J. Adv. Netw. Appl. 10(1), 3698–3703 (2018)Google Scholar
  9. 9.
    Ghosh, P., Jha, S., Dutta, R., Phadikar, S.: Intrusion detection system based on BCS-GA in cloud environment. In: Shetty, N., Patnaik, L., Prasad, N., Nalini, N. (eds.) Emerging Research in Computing, Information, Communication and Applications (ERCICA 2016), pp. 393–403. Springer, Singapore (2018).  https://doi.org/10.1007/978-981-10-4741-1_35Google Scholar
  10. 10.
    Chiba, Z., Abghour, N., Moussaid, K., El Omri, A., Rida, M.: A novel architecture combined with optimal parameters for back propagation neural networks applied to anomaly network intrusion detection. Comput. Secur. 75, 36–58 (2018)CrossRefGoogle Scholar
  11. 11.
    Qian, Q., Cai, J., Zhang, R.: Intrusion detection based on neural networks and Artificial Bee Colony algorithm. In: 2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS), pp. 257–262. IEEE, Taiyuan (2014)Google Scholar
  12. 12.
  13. 13.
    Uppalaiah, B., Anand, K., Narsimha, B., Swaraj, S., Bharat, T.: Genetic algorithm approach to intrusion detection system. IJCST 3(1), 156–160 (2012)Google Scholar
  14. 14.
    Jacobson, L., Kanbe, B.: Genetic Algorithms in Java basics, pp. 143–144. Apress, New York (2015).  https://doi.org/10.1007/978-1-4842-0328-6CrossRefGoogle Scholar
  15. 15.
    Aslahi-Shahri, B.M., Rahmani, R., Chizari, M., Maralani, A., Eslami, M., Golkar, M.J., Ebrahimi, A.: A hybrid method consisting of GA and SVM for intrusion detection system. Neural Comput. Appl. 27(6), 1669–1676 (2016)CrossRefGoogle Scholar
  16. 16.
    Hamamoto, A.H., Carvalho, L.F., Sampaio, L.D.H., Abrão, T., Proença Jr., M.L.: Network anomaly detection system using genetic algorithm and fuzzy logic. Expert Syst. Appl. 92, 390–402 (2018).  https://doi.org/10.1016/j.eswa.2017.09.013CrossRefGoogle Scholar
  17. 17.
    Sharma, R., Chaurasia, S.: An enhanced approach to fuzzy c-means clustering for anomaly detection. In: Somani, A., Srivastava, S., Mundra, A., Rawat, S. (eds.) Proceedings of First International Conference on Smart System, Innovations and Computing. Smart Innovation, Systems and Technologies, vol. 79, pp. 623–636. Springer, Singapore (2018)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Zouhair Chiba
    • 1
    Email author
  • Noreddine Abghour
    • 1
  • Khalid Moussaid
    • 1
  • Amina El omri
    • 1
  • Mohamed Rida
    • 1
  1. 1.LIMSAD Labs, Faculty of SciencesHassan II University of CasablancaCasablancaMorocco

Personalised recommendations