A Novel Cloud Intrusion Detection System Using Feature Selection and Classification

A Novel Cloud Intrusion Detection System Using Feature Selection and Classification

Anand Kannan (Department of ICT, KTH University, Stockholm, Sweden), Karthik Gururajan Venkatesan (Department of ICT, KTH University, Stockholm, Sweden), Alexandra Stagkopoulou (Department of ICT, KTH University, Stockholm, Sweden), Sheng Li (Department of ICT, KTH University, Stockholm, Sweden), Sathyavakeeswaran Krishnan (Department of IT, Uppsala University, Uppsala, Sweden) and Arifur Rahman (Department of WNE, Linköping University, Linköping, Sweden)
Copyright: © 2015 |Pages: 15
DOI: 10.4018/IJIIT.2015100101
OnDemand PDF Download:
No Current Special Offers


This paper proposes a new cloud intrusion detection system for detecting the intruders in a traditional hybrid virtualized, cloud environment. The paper introduces an effective feature selection algorithm called Temporal Constraint based on Feature Selection algorithm and also proposes a classification algorithm called hybrid decision tree. This hybrid decision tree has been developed by extending the Enhanced C4.5 algorithm an existing decision tree based classifier. Furthermore, the experiments conducted on the sample Cloud Intrusion Detection Datasets (CIDD) show that the proposed cloud intrusion detection system provides better detection accuracy than the existing work and reduces the false positive rate.
Article Preview

1. Introduction

Infrastructure as a Service (IaaS) is a cloud service provisioning model aimed at providing the users access to cloud resources, such as storage and computing freely from various digital devices through the Internet. The benefits of deploying applications in the cloud are manifold including better economics through use of shared computing resources, much lower upfront infrastructure costs, and on-demand elastic provisioning of computing nodes to fit transient requirements (Kholidy & Baiardi, 2012).

Thus, for the applications that have a high degree of variable demand for resources, the cloud based infrastructure model offers an efficient and cost-effective method to provide the resources used, while minimizing the overall cost. Virtualization within data-centers had been a key enabler for dynamic provisioning model of computing resources in cloud. However, virtualization benefits are limited by the security challenges it brings along and newer types of attacks. Recently, service oriented attackers are increasing in the Internet. Different kind of attacks such as Denial of Service (DoS) attacks and Distributed Denial of Service (DDoS) attacks are growing in the Internet. These attacks reduce the system performance drastically. Since Cloud computing is to a large extent dependent on internet, a good security mechanism is necessary to support the cloud applications. Recently, Cloud Intrusion Detection System (CIDS) has been proposed by many researchers for improving the cloud services. CIDS identifies anomaly behavior by monitoring and analyzing the user traffic. It provides security to distributed cloud applications from the attackers (Oktay & Sahingoz, 2013; Anand, 2012). Such a system can be developed by using effective feature selection and classification algorithms which can primarily identify the attackers and normal users accurately. In addition, the attack types and the attack patterns can also be identified using proper use of feature selection techniques with intelligent classification algorithms.

Complete Article List

Search this Journal:
Open Access Articles: Forthcoming
Volume 18: 4 Issues (2022): Forthcoming, Available for Pre-Order
Volume 17: 4 Issues (2021): 3 Released, 1 Forthcoming
Volume 16: 4 Issues (2020)
Volume 15: 4 Issues (2019)
Volume 14: 4 Issues (2018)
Volume 13: 4 Issues (2017)
Volume 12: 4 Issues (2016)
Volume 11: 4 Issues (2015)
Volume 10: 4 Issues (2014)
Volume 9: 4 Issues (2013)
Volume 8: 4 Issues (2012)
Volume 7: 4 Issues (2011)
Volume 6: 4 Issues (2010)
Volume 5: 4 Issues (2009)
Volume 4: 4 Issues (2008)
Volume 3: 4 Issues (2007)
Volume 2: 4 Issues (2006)
Volume 1: 4 Issues (2005)
View Complete Journal Contents Listing