WLI Fuzzy Clustering and Adaptive Lion Neural Network (ALNN) for Cloud Intrusion Detection

WLI Fuzzy Clustering and Adaptive Lion Neural Network (ALNN) for Cloud Intrusion Detection

Pinki Sharma, Jyotsna Sengupta, P. K. Suri
Copyright: © 2019 |Pages: 17
DOI: 10.4018/IJDAI.2019010101
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Cloud computing is the internet-based technique where the users utilize the online resources for computing services. The attacks or intrusion into the cloud service is the major issue in the cloud environment since it degrades performance. In this article, we propose an adaptive lion-based neural network (ALNN) to detect the intrusion behaviour. Initially, the cloud network has generated the clusters using a WLI fuzzy clustering mechanism. This mechanism obtains the different numbers of clusters in which the data objects are grouped together. Then, the clustered data is fed into the newly designed adaptive lion-based neural network. The proposed method is developed by the combination of Levenberg-Marquardt algorithm of neural network and adaptive lion algorithm where female lions are used to update the weight adaptively using lion optimization algorithm. Then, the proposed method is used to detect the malicious activity through training process. Thus, the different clustered data is given to the proposed ALNN model. Once the data is trained, then it needs to be aggregated. Subsequently, the aggregated data is fed into the proposed ALNN method where the intrusion behaviour is detected. Finally, the simulation results of the proposed method and performance is analysed through accuracy, false positive rate, and true positive rate. Thus, the proposed ALNN algorithm attains 96.46% accuracy which ensures better detection performance.
Article Preview
Top

Introduction

Recently, the cloud computing is defined as the novel paradigm where the services are either to be hosted or delivered over the Internet world, hence, it is also termed as the Internet computing. In other words, the term cloud computing is the process of computing service over the Internet world. In cloud computing, it poses the resource provider where the user utilizes the resources anywhere, anytime and also anything (Rajendran, Muthukumar, & Nagarajan, 2015). The rapid development of cloud computing is caused by the location independent of information processing. Furthermore, the trust or security is considered as the main aspect among the cloud users in the cloud computing services. Hence, Cloud security becomes the challenging task for the users utilize the cloud resources and also successfully exploitation of its respective services (Deshpande, Sharma, Peddoju, & Junaid, 2014). There are three services provided in the cloud computing, which are software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS). The intrusion or malicious activity or attacks are the major drawbacks of the cloud services. Thus, require to enhancing the security and trusting management through intrusion detection system. Some of the common available attacks in the cloud computing are DNS poisoning, port scanning, man-in-the-middle attack, IP spoofing, etc. (Modi, Dhiren R. Patel, Avi Patel, and Rajarajan 2012). The attacks in the cloud computing are categorized into two ways, insider attack and outsider attack.

The attacker’s attacks the network from the external source of origin is termed as external attack. On the contrary in insider attacks, unauthorized internal users are involved in the cloud services to abuse the access privileges. In order to detect the attack or malicious node in the network, an intrusion detection system (IDS) is employed. This system is used to detect the intrusions assist by computerizing the intrusion detection scheme. In other words, the intrusion detection is the process of monitoring computers or networks to detect an unauthorized entry, file and activity modification (Patel, Taghavi, Bakhtiyari, & Junior, 2013). The basic concept of intrusion detection system is to collect the network traffic, analyzes the traffic, and makes response or alerts the network when an intrusion detects in the network. Therefore, the aim of the IDS is to alert or notify the system if some malicious activities take place by such intruders (Krishnan & Chatterjee, 2012). Some of the key factors of intrusion detection systems are fast, critical to fraudulent users, ease of configuration, self-monitored, available without interruption, fault tolerant and free from false errors leads to possibility of minimum overhead. Then, the information system is evaluated which has the tendency to detect the activities of malicious node or any intruder in the network. Thus, the security level should be enhanced by performing the intrusion detection system (Raja & Ramaiah, 2016).

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 14: 2 Issues (2022)
Volume 13: 2 Issues (2021)
Volume 12: 2 Issues (2020)
Volume 11: 2 Issues (2019)
Volume 10: 2 Issues (2018)
View Complete Journal Contents Listing