Cloud Intrusion Detection Model Based on Deep Belief Network and Grasshopper Optimization

Cloud Intrusion Detection Model Based on Deep Belief Network and Grasshopper Optimization

Vivek Parganiha, Soorya Prakash Shukla, Lokesh Kumar Sharma
Copyright: © 2022 |Pages: 24
DOI: 10.4018/IJACI.293123
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Cloud computing is a vast area which uses the resources cost-effectively. The performance aspects and security are the main issues in cloud computing. Besides, the selection of optimal features and high false alarm rate to maintain the highest accuracy of the testing are also the foremost challenges focused. To solve these issues and to increase the accuracy, an effective cloud IDS using Grasshopper optimization Algorithm (GOA) and Deep belief network (DBN) is proposed in this paper. GOA is used to choose the ideal features from the set of features. Finally, DBN is developed for classification according to their selected feasible features. The introduced IDS is simulated on the Python platform and the performance of the suggested model of deep learning is assessed based on statistical measures named as Precision, detection accuracy, f-measure and Recall. The NSL_KDD, and UNSW_NB15 are the two datasets used for the simulation, and the results showed that the proposed scheme achieved maximum classification accuracy and detection rate.
Article Preview
Top

1. Introduction

The design of cloud computing is for allowing the on-demand, appropriate, universal network contact to a common configurable computing property that can quickly release and provisioned with service provider interaction or minimal management effort (Nagar, U., (2017), Nagarajan, N and Thirunavukarasu, R. (2020)). Security is an important concern in cloud computing for the recent applications of virtual machine monitor (VMM) because of several susceptibilities (Jin, H., (2013)). The cloud computing environment is under threat from various types of cyber-attacks. Malicious users can inject malicious code into user's websites and gain unauthorized access to user's confidential information stored in the cloud (Dhote, P.M., (2018)), and hackers are continuing to develop new techniques to exploit and steal user credentials without the user's knowledge (Dhote, H and Bhavsar, M.D. (2018, April)). Nowadays, different IDS software and methods are developed specifically for the cloud environment to discover attacks. An efficient IDS method should detect various challenging attacks such as Probe, R2L, U2R, and Denial-of-Service (DoS). But R2L attack is a more challenging one due to its relations with both host and network-level features. Moreover, the U2R attack involves semantic information and therefore the detection is difficult near the beginning (Le, T-T-H., (2019)). In addition, the conventional IDS reduced the recognition accuracy and increased the false alarm rate with weak adaptableness. Hence, there is a requirement for an alternative and efficient IDS system. Detecting many attacks and reducing the false alarm rate is the recent popular research topic on IDS (Ouffoué, G., (2016, June), Bharati, M and Tamane, S. (2017, October)).

Nowadays, Decision tree, random forest, Support vector machine (SVM), Naïve bayes system and other machine learning approaches such as Artificial neural network (ANN) have been utilized in the domain of intrusion detection systems (Nathiya, T., and G. Suseendran. (2018), Negandhi, P., (2019)). But every approach holds certain own benefits and limitations. They do not provide good performance on all types of attacks. Hence, IDS has been changed by taking the advantages of deep learning approaches because these approaches use different transforms to excerpt high-dimensional hierarchical structured features (Ahmed, H.I., (2021)). Some of the existing deep learning-based intrusion detection approaches are Deep neural network, Recurrent Neural Network (RNN) and Deep Autoencoder (DAE) (Yin, C., (2017), Wang, W., (2017)). The existing machine learning approaches are not performing well because of the absence of representative feature extraction ability and the necessity of additional timing to train. Alternatively, deep learning methods derive high-dimensional features and it leads to dimensionality issues. To tackle this issue, the input patterns should reduce their dimensionality. Similarly, the present deep learning-based intrusion detection systems focused only on global accuracy, however they failed to detect intrusion while using small-scale data. Thus, a smaller proportion of data is considered in this research to prove the detection efficiency.

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024)
Volume 14: 1 Issue (2023)
Volume 13: 6 Issues (2022): 1 Released, 5 Forthcoming
Volume 12: 4 Issues (2021)
Volume 11: 4 Issues (2020)
Volume 10: 4 Issues (2019)
Volume 9: 4 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 2 Issues (2016)
Volume 6: 2 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing