Abstract

In this modern era, due to demand for cloud environments in business, the size, complexity, and chance of attacks to virtual cloud network (VCN) are increased. The protection of VCN is required to maintain the faith of the cloud users. Intrusion detection is essential to secure any network. The existing approaches that use the conventional neural network cannot utilize all information for identifying the intrusions. In this paper, the anomaly-based NIDS for VCN is proposed. For feature selection, grey wolf optimization (GWO) is hybridized with a bald eagle search (BES) algorithm. For classification, a deep learning approach - deep sparse auto-encoder (DSAE) is employed. In this way, this paper proposes a NIDS model for VCN named - GWO-DES-DSAE. The proposed system is simulated in the python programming environment. The proposed NIDS model's performance is compared with other recent approaches for both binary and multi-class classification on the considered datasets - NSL-KDD, UNSW-NB15, and CICIDS 2017 and found better than other methods.

Highlights

  • Cyberspace refers to a complex environment that runs with the support of Information Communication Technology (ICT) devices and networks where several interactions are carried out among people, software, and services

  • The proposed grey wolf optimization (GWO)-bald eagle search (BES)-deep sparse auto-encoder (DSAE) IDS model for virtual cloud network (VCN) has been evaluated on NSL-KDD, UNSWNB15, and CICIDS-2017 datasets

  • It provides a better selection of relevant feasible features, and the irrelevant features are ignored

Read more

Summary

Introduction

Cyberspace refers to a complex environment that runs with the support of Information Communication Technology (ICT) devices and networks where several interactions are carried out among people, software, and services. A wide variety of attacks or incidents may occur intentionally or accidentally, natural or mandate. Cybersecurity in the various networked environments has become one of the prime anxieties in this advanced technical environment like a cloud computing environment. The Cloud computing environment utilizes virtualization, integrated tools, and techniques to run the services via standard Internet protocols. Many vulnerabilities are involved in the cloud computing environment, attracting intruders to explore and exploit different attacks. Already existing cloud computing attacks are Address Resolution Protocol (ARP poisoning), IP spoofing, IP Flooding, Domain Name Service (DNS) poisoning, Routing Information Protocol (RIP) attack, Denial of Service (DoS) attack, and Distributed Denial of Service (DDoS) attack. The Firewall provides security from outside attacks, but it fails to provide security against insider attacks

Methods
Results
Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.