Cloud Security: LKM and Optimal Fuzzy System for Intrusion Detection in Cloud Environment

被引:17
|
作者
Shyla, S. Immaculate [1 ,2 ]
Sujatha, S. S. [2 ,3 ]
机构
[1] ST Hindu Coll, Dept Comp Sci, Nagercoil, India
[2] Manonmaniam Sundaranar Univ, Tirunelveli, India
[3] ST Hindu Coll, Dept Comp Sci & Applicat, Nagercoil, India
关键词
Intrusion detection system; cloud computing; cloud security; greywolf optimization; leader-based k-means clustering; fuzzy logic system; KDD Cup 99;
D O I
10.1515/jisys-2018-0479
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In cloud security, intrusion detection system (IDS) is one of the challenging research areas. In a cloud environment, security incidents such as denial of service, scanning, malware code injection, virus, worm, and password cracking are getting usual. These attacks surely affect the company and may develop a financial loss if not distinguished in time. Therefore, securing the cloud from these types of attack is very much needed. To discover the problem, this paper suggests a novel IDS established on a combination of a leader-based k-means clustering (LKM), optimal fuzzy logic system. Here, at first, the input dataset is grouped into clusters with the use of LKM. Then, cluster data are afforded to the fuzzy logic system (FLS). Here, normal and abnormal data are inquired by the FLS, while FLS training is done by the grey wolf optimization algorithm through maximizing the rules. The clouds simulator and NSL-Knowledge Discovery and DataBase (KDD) Cup 99 dataset are applied to inquire about the suggested method. Precision, recall, and F-measure are conceived as evaluation criteria. The obtained results have denoted the superiority of the suggested method in comparison with other methods.
引用
收藏
页码:1626 / 1642
页数:17
相关论文
共 50 条
  • [41] Framework for Cloud Intrusion Detection System Service
    Aljurayban, Nouf Saleh
    Emam, Ahmed
    [J]. 2015 2ND WORLD SYMPOSIUM ON WEB APPLICATIONS AND NETWORKING (WSWAN), 2015,
  • [42] Research on Automatic Intrusion Detection Method of Software-Defined Security Services in Cloud Environment
    Huang, Xingjie
    Li, Jing
    Zhao, Jinmeng
    Su, Beibei
    Dong, Zixian
    Zhang, Jing
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (04) : 37 - 43
  • [43] Intrusion Detection and Prevention using Honeypot Network for Cloud Security
    Negi, Poorvika Singh
    Garg, Aditya
    Lal, Roshan
    [J]. PROCEEDINGS OF THE CONFLUENCE 2020: 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING, 2020, : 129 - 132
  • [44] On cloud security attacks: A taxonomy and intrusion detection and prevention as a service
    Iqbal, Salman
    Kiah, Laiha Mat
    Dhaghighi, Babak
    Hussain, Muzammil
    Khan, Suleman
    Khan, Muhammad Khurram
    Choo, Kim-Kwang Raymond
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 74 : 98 - 120
  • [45] A Review on Intrusion Detection Techniques for Cloud Computing and Security Challenges
    Kene, Snehal G.
    Theng, Deepti P.
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, : 227 - 232
  • [46] Training fuzzy deep neural network with honey badger algorithm for intrusion detection in cloud environment
    Jain, Deepak Kumar
    Ding, Weiping
    Kotecha, Ketan
    [J]. INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2023, 14 (06) : 2221 - 2237
  • [47] Training fuzzy deep neural network with honey badger algorithm for intrusion detection in cloud environment
    Deepak Kumar Jain
    Weiping Ding
    Ketan Kotecha
    [J]. International Journal of Machine Learning and Cybernetics, 2023, 14 : 2221 - 2237
  • [48] An intelligent multiclass deep classifier-based intrusion detection system for cloud environment
    Bingu, Rajesh
    Jothilakshmi, S.
    Srinivasu, N.
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (26):
  • [49] Design of Hypervisor-based Integrated Intrusion Detection System in Cloud Computing Environment
    Wang, Chih-Hung
    Chen, Xuan-Liang
    [J]. INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 972 - 981
  • [50] Virtual Machine-based Intrusion Detection System Framework in Cloud Computing Environment
    Wang, Huaibin
    Zhou, Haiyun
    Wang, Chundong
    [J]. JOURNAL OF COMPUTERS, 2012, 7 (10) : 2397 - 2403