Abstract
Cloud computing services offered a resource pool with a wide range of storage for large amounts of data. Cloud services are generally used as a demand-driven private or open data forum, and the increase in use has led to security concerns. Therefore, it is necessary to design an accurate Intrusion Detection System (IDS) to identify the suspected node in the cloud computing environment. This is possible by monitoring network traffic so that the quality of service and performance of the system can be maintained. Several researchers have worked on designing valid IDS with the help of a machine learning approach. A single classification algorithm seems to be impossible to detect intruders with high accuracy. Therefore, a hybrid approach is presented. This approach is a combination of Cuckoo Search. CS as an optimization algorithm and Feed Forward Back Propagation Neural Network (FFBPNN) as a multi-class classification approach. The user's request to access cloud data is collected and essential features are selected using CS as an optimization approach. The selected features are used to train FFBPNN with reduced training time and complexity. The experimental analysis has been performed in terms of precision, recall, F-measure, and accuracy. The evaluated value for parameters i.e., precision (85.5%), recall (86.4%), F-measure (85.9%), and accuracy (86.22%) are observed. At last, the parameters are also compared with the existing approach.
Highlights
In this modern era, cloud computing has transformed the IT world with rapidly evolving and extensively accepted computing-based systems
Cloud computing is used as a shared pool of resources that provides fast computing and aims to give convenient and, at the same time, required network access with minimal effort
The machine learning approach has offered the advantage of being interested in computing needs, and there is a suggestion for optimizing the unstructured data using the Cuckoo Search (CS) algorithm has been presented
Summary
Cloud computing has transformed the IT world with rapidly evolving and extensively accepted computing-based systems. There are already many businesses that use cloud computing services with their attractive features such as on-demand services, extensive network access, fast flexibility, and, measurable services Such features will allow users to focus on business processes while managing computing resources through a cloud service provider (CSP). The organization, as well as the security of these cloud models, needs to be improved so that the stored data by many cloud users remain safe This is possible through the utilization of the Intrusion Detection System (IDS). HIDS will operate based on information collected using a personal computer system It monitors all incoming and outgoing packets on the computer system and notifies users or the administrator if it is observed that there is a suspicious activity. The researcher focused on the two types of attacks detection that are DDoS and Benign
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have