Abstract

Cloud computing services offered a resource pool with a wide range of storage for large amounts of data. Cloud services are generally used as a demand-driven private or open data forum, and the increase in use has led to security concerns. Therefore, it is necessary to design an accurate Intrusion Detection System (IDS) to identify the suspected node in the cloud computing environment. This is possible by monitoring network traffic so that the quality of service and performance of the system can be maintained. Several researchers have worked on designing valid IDS with the help of a machine learning approach. A single classification algorithm seems to be impossible to detect intruders with high accuracy. Therefore, a hybrid approach is presented. This approach is a combination of Cuckoo Search. CS as an optimization algorithm and Feed Forward Back Propagation Neural Network (FFBPNN) as a multi-class classification approach. The user's request to access cloud data is collected and essential features are selected using CS as an optimization approach. The selected features are used to train FFBPNN with reduced training time and complexity. The experimental analysis has been performed in terms of precision, recall, F-measure, and accuracy. The evaluated value for parameters i.e., precision (85.5%), recall (86.4%), F-measure (85.9%), and accuracy (86.22%) are observed. At last, the parameters are also compared with the existing approach.

Highlights

  • In this modern era, cloud computing has transformed the IT world with rapidly evolving and extensively accepted computing-based systems

  • Cloud computing is used as a shared pool of resources that provides fast computing and aims to give convenient and, at the same time, required network access with minimal effort

  • The machine learning approach has offered the advantage of being interested in computing needs, and there is a suggestion for optimizing the unstructured data using the Cuckoo Search (CS) algorithm has been presented

Read more

Summary

INTRODUCTION

Cloud computing has transformed the IT world with rapidly evolving and extensively accepted computing-based systems. There are already many businesses that use cloud computing services with their attractive features such as on-demand services, extensive network access, fast flexibility, and, measurable services Such features will allow users to focus on business processes while managing computing resources through a cloud service provider (CSP). The organization, as well as the security of these cloud models, needs to be improved so that the stored data by many cloud users remain safe This is possible through the utilization of the Intrusion Detection System (IDS). HIDS will operate based on information collected using a personal computer system It monitors all incoming and outgoing packets on the computer system and notifies users or the administrator if it is observed that there is a suspicious activity. The researcher focused on the two types of attacks detection that are DDoS and Benign

Contribution of the Work
RELATED WORK
Cuckoo Search
FFBPNN
Dataset
Upload Data
PROPOSED WORK
Pre-processing
Experimental Setup
Experimental Result
Findings
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call