Optimization of BPN parameters using PSO for intrusion detection in cloud environment

被引:3
|
作者
Nagarajan, G. [1 ]
Sajith, P. J. [2 ]
机构
[1] Sathyabama Inst Sci & Technol, Dept Comp Sci & Engn, Chennai 600127, India
[2] Toc H Inst Sci & Technol, Dept Comp Sci & Engn, Ernakulam 682313, India
来源
关键词
Back propagation network; Intrusion detection system; Neural network; Particle swarm optimization; System calls; PARTICLE SWARM OPTIMIZATION; DEEP LEARNING APPROACH; DETECTION SYSTEM; NETWORK; DESIGN;
D O I
10.1007/s00500-023-08737-1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The usage of internet is getting increased in all aspect, like from building various models that are fully connect with internet to the usage of digital media for 24/7. As this is rising in a way, on the other side, the concern about 'data security' is raising, and everybody's information needs to be protected from any other attacks or can say there should not be no data leakage. So, for detecting these attacks, intrusion detection system is placed. But placing this traditional intrusion detection system (IDS) will increase the concerns of security even more, so to amp the process integration of latest technology such deep learning comes in action. Thereby, this paper proposes an IDS using back propagation network where intrusions are identified based on the system calls that we collected in the dataset KDD cup 99. Also, to increase the optimization of neural network, we used particle swarm optimization thereby increase the accurate detection of the system saying if that is normal or abnormal in behavior. We evaluate our proposed model with other methods such as ANFIS, F-GNP and FCM in which the proposed model gives 96.5% accurate detection.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] CS-PSO based Intrusion Detection System in Cloud Environment
    Ghosh, Partha
    Karmakar, Arnab
    Sharma, Joy
    Phadikar, Santanu
    [J]. EMERGING TECHNOLOGIES IN DATA MINING AND INFORMATION SECURITY, IEMIS 2018, VOL 1, 2019, 755 : 261 - 269
  • [2] Modelling of intrusion detection using sea horse optimization with machine learning model on cloud environment
    Jansi Sophia Mary C.
    Mahalakshmi K.
    [J]. International Journal of Information Technology, 2024, 16 (3) : 1981 - 1988
  • [3] Securing Cloud Environment using a String based Intrusion Detection System
    Raj, R. Sundar
    Bhaskaran, V. Murali
    [J]. 2017 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2017,
  • [4] Intrusion detection in Cloud Internet of Things Environment
    Rebbah, Mohammed
    Rebbah, Dhiaa El Hak
    Smail, Omar
    [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON MATHEMATICS AND INFORMATION TECHNOLOGY (ICMIT), 2017, : 65 - 70
  • [5] Efficient Approaches for Intrusion Detection in Cloud Environment
    Mishra, Preeti
    Pilli, Emmanuel S.
    Varadharajan, Vijay
    Tupakula, Udaya
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 1211 - 1216
  • [6] Intrusion detection techniques in cloud environment: A survey
    Mishra, Preeti
    Pilli, Emmanuel S.
    Varadharajan, Vijay
    Tupakula, Udaya
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 77 : 18 - 47
  • [7] Distributed Intrusion Detection System using Mobile Agents in Cloud Computing Environment
    Mehmood, Yasir
    Kanwal, Ayesha
    Shibli, Muhammad Awais
    Masood, Rahat
    [J]. 2015 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS), 2015, : 1 - 8
  • [8] An Intrusion Detection System Using Modified-Firefly Algorithm in Cloud Environment
    Ghosh, Partha
    Sarkar, Dipankar
    Sharma, Joy
    Phadikar, Santanu
    [J]. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2021, 13 (02) : 77 - 93
  • [9] Intrusion Detection in Cloud Computing Implementation of (SAAS & IAAS) Using Grid Environment
    Moorthy, S. Manthira
    Masillamani, M. Roberts
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON INTERNET COMPUTING AND INFORMATION COMMUNICATIONS (ICICIC GLOBAL 2012), 2014, 216 : 53 - 64
  • [10] Hierarchical Model for Intrusion Detection Systems in the Cloud Environment
    Abdulazeez, Muhammed
    Kowalski, Dariusz
    [J]. PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 2015, : 319 - 327