Efficacious Novel Intrusion Detection System for
Cloud Computing Environment
ABSTRACT
Rife acceptance of Cloud Computing has made it bull’s eye for the hackers. Intrusion
detection System (IDS) plays a vibrant role for it. Researchers have done marvelous
works on the development of a competence IDS. But there are many challenges still
exists with IDS. One of the biggest concerns is that the computational complexity
and false alarms of the IDS escalates with the increase in the number of features or
attributes of the dataset. Hence, the concept of Feature Selection (FS) contributes an
all-important role for the buildout of an efficacious IDS. New FS algorithm is put
forward which is the modified Firefly Algorithm in which Decision Tree (DT)
classifier is used as the classification function. We have used the hybrid classifier
which is the combination of neural network and DT.We have used CSE CIC IDS
2018 dataset and simulated dataset for performance assessment. Our examination
pragmatic that the performance of proposed architecture is better than the state-of-
the-art algorithms.
EXISTING SYSTEM
In [12], a model called Game Theory-based Cloud Security Deep Neural Network
(GT-CSDNN) was proposed. This model incorporates both defender and attacker
techniques using game theory principles. The main goal is to classify a network
administrator to be aware of the nature of such traffic in order to effectively block
and terminate any intrusive network connections. To achieve this, the Binary-Based
Particle Swarm Optimization (BPSO) technique was utilized to identify the most
relevant network features, while the Standard-Based Particle Swarm Optimization
(SPSO) was used to fine-tune the control parameters of the Support Vector Machine
(SVM).
In [17], authors evaluated and presented a detector based on Radial Basis Function
Neural Network (RBF-NN) for detecting DDoS attacks. However, the resulting
network structure can often be insufficient or unnecessarily complex, requiring
manual configuration through a trial-and-error approach. This study proposes the use
of the Bat Algorithm (BA) to automatically configure the RBF-NN network
structure. In [18], authors introduced a highly effective approach called the
Dragonfly-Improved Invasive Weed Optimizerbased Shepard CNN (DIIWO-based
ShCNN) for detecting intruders and mitigating attacks in the cloud paradigm. This
approach also enables the detection of intruders using ShCNN.
In another study [19], a powerful Intrusion Detection System (IDS) was proposed
using the Sailfish Dolphin Optimizer-based Deep RNN (SFDO-based Deep RNN) to
identify anomalies in the cloud framework. The SFDO algorithm combines the
Sailfish Optimizer (SFO) with the Dolphin Echolocation (DE) technique. The
ChicWhale technique can be utilized forVirtual Machine (VM) migration and cloud
data management.
In [20] conducted a study on an IDS (Intrusion Detection System) using a Fisher
Kernel-Based PCA dimensional reduction technique and a Grey Wolf Optimizer
(GWO)- based weight dropped Bi-LSTM technique (FKPCA-GWO WDBiLSTM).
Firstly, they combined the data record with PCA to achieve linearly separable
dimensionality reduction by using the fisher kernel with fisher score as input.
Secondly, they employed the WDBiLSTM network to retain long-term dependencies
while eliminating features from both forward and backward directions. In another
study [21], a novel Deep Learning (DL) approach incorporating CNNs Convolutional
Networks and Recurrent Neural Networks was developed for cloud security in IDS.
With this DL technique, technique, they were able to prevent some detected but
unauthorized traffic from accessing the server in the cloud.
Disadvantages
An existing system didn’t explore Implementation of Decentralized Identifiers.
An existing system didn't implement Token-Based Access Control.
Proposed System
FS is aiming at retaining the relevant features which are required for building a
strong model. For developing an IDS, it is vital to get rid of the irrelevant features so
that the accuracy of the IDS increases. The highlights of our contributions are as
follows:
• Discerned the various FS techniques and IDSs linked with the CC.
• Proposed a novel FS algorithm by modifying the Firefly Algorithm.
• Proposed a novel architecture for the detection of various attacks affecting CC.
• Latest intrusion detection dataset CSE-CIC-IDS 2018 and simulated dataset are
used for the experiment and evaluation.
Advantages
1. FFA is used in modified form for
2. FS.
3. Latest attacks are detected by proposed work. Latest dataset is used for validation
of dataset.
4. Simulated dataset is created for the checking the performance of the proposed
work.
5. Hybridization is done in FS module and classification module for the development
of an efficient IDS.
SYSTEM REQUIREMENTS
➢ H/W System Configuration:-
➢ Processor - Pentium –IV
➢ RAM - 4 GB (min)
➢ Hard Disk - 20 GB
➢ Key Board - Standard Windows Keyboard
➢ Mouse - Two or Three Button Mouse
➢ Monitor - SVGA
Software Requirements:
Operating System - Windows XP
Coding Language - Java/J2EE(JSP,Servlet)
Front End - J2EE
Back End - MySQL