An Optimal NIDS for VCN Using Feature Selection and Deep Learning Technique: IDS for VCN

In this modern era, due to demand for cloud environments in business, the size, complexity, and chance of attacks to virtual cloud network (VCN) are increased. The protection of VCN is required to maintain the faith of the cloud users. Intrusion detection is essential to secure any network. The existing approaches that use the conventional neural network cannot utilize all information for identifying the intrusions. In this paper, the anomaly-based NIDS for VCN is proposed. For feature selection, grey wolf optimization (GWO) is hybridized with a bald eagle search (BES) algorithm. For classification, a deep learning approach—deep sparse auto-encoder (DSAE)—is employed. In this way, this paper proposes a NIDS model for VCN named GWO-DES-DSAE. The proposed system is simulated in the python programming environment. The proposed NIDS model’s performance is compared with other recent approaches for both binary and multi-class classification on the considered datasets—NSLKDD, UNSW-NB15, and CICIDS 2017—and found better than other methods. KeywORDS Dataset, Deep Learning, Feature Selection, Intrusion Detection, Security

[1]  Benjamin Turnbull,et al.  Mixture Localization-Based Outliers Models for securing Data Migration in Cloud Centers , 2019, IEEE Access.

[2]  Jie Gu,et al.  A novel approach to intrusion detection using SVM ensemble with feature augmentation , 2019, Comput. Secur..

[3]  MengChu Zhou,et al.  An Efficient Cooperative Medium Access Control Protocol for Wireless IoT networks in Smart World System , 2019, J. Netw. Comput. Appl..

[4]  Muttukrishnan Rajarajan,et al.  A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..

[5]  Jiadong Ren,et al.  A Novel Multimodal-Sequential Approach Based on Multi-View Features for Network Intrusion Detection , 2019, IEEE Access.

[6]  Manu Vardhan,et al.  Implementation of adaptive scheme in evolutionary technique for anomaly-based intrusion detection , 2019, Evolutionary Intelligence.

[7]  Bayu Adhi Tama,et al.  TSE-IDS: A Two-Stage Classifier Ensemble for Intelligent Anomaly-Based Intrusion Detection System , 2019, IEEE Access.

[8]  Victor Valeriu Patriciu,et al.  Intrusions detection based on Support Vector Machine optimized with swarm intelligence , 2014, 2014 IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI).

[9]  A. A. Zaidan,et al.  Novel meta-heuristic bald eagle search optimisation algorithm , 2019, Artificial Intelligence Review.

[10]  Zulaiha Ali Othman,et al.  Bees algorithm for feature selection in network anomaly detection , 2012 .

[11]  Arafat Awajan,et al.  Experimental Evaluation of a Multi-layer Feed-Forward Artificial Neural Network Classifier for Network Intrusion Detection System , 2017, 2017 International Conference on New Trends in Computing Sciences (ICTCS).

[12]  Ditipriya Sinha,et al.  An integrated rule based intrusion detection system: analysis on UNSW-NB15 data set and the real time online dataset , 2019, Cluster Computing.

[13]  赵津,et al.  云环境下基于SOM神经网络的入侵检测方法研究 Research on Intrusion Detection Method Based on SOM Neural Network in Cloud Environment , 2016 .

[14]  Khan Muhammad,et al.  Five-category classification of pathological brain images based on deep stacked sparse autoencoder , 2017, Multimedia Tools and Applications.

[15]  Yuefei Zhu,et al.  A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.

[16]  Gholamhossein Dastghaibyfard,et al.  Two-tier network anomaly detection model: a machine learning approach , 2017, Journal of Intelligent Information Systems.

[17]  Giancarlo Fortino,et al.  Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs , 2019, Inf. Sci..

[18]  H. S. Hota,et al.  Data Mining Approach for Developing Various Models Based on Types of Attack and Feature Selection as Intrusion Detection Systems (IDS) , 2013, ICACNI.

[19]  Hossam Faris,et al.  Grey wolf optimizer: a review of recent variants and applications , 2017, Neural Computing and Applications.

[20]  Ahmad Faraahi,et al.  An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks , 2011 .

[21]  Ali A. Ghorbani,et al.  Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization , 2018, ICISSP.

[22]  Nour Moustafa,et al.  UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).

[23]  Partha Ghosh,et al.  CS-PSO based Intrusion Detection System in Cloud Environment , 2018, Advances in Intelligent Systems and Computing.

[24]  Irfan Gul,et al.  Distributed Cloud Intrusion Detection Model , 2011 .

[25]  Mohammed Anbar,et al.  Anomaly-based intrusion detection system using multi-objective grey wolf optimisation algorithm , 2019, Journal of Ambient Intelligence and Humanized Computing.

[26]  Shalini Batra,et al.  Fuzzified Cuckoo based Clustering Technique for Network Anomaly Detection , 2017, Comput. Electr. Eng..

[27]  Chirag Modi,et al.  Designing an efficient security framework for detecting intrusions in virtual network of cloud computing , 2019, Comput. Secur..

[28]  Xue Wang,et al.  Comparison deep learning method to traditional methods using for network intrusion detection , 2016, 2016 8th IEEE International Conference on Communication Software and Networks (ICCSN).

[29]  Ashraf Darwish,et al.  Intelligent Hybrid Anomaly Network Intrusion Detection System , 2011, FGIT-FGCN.

[30]  Jason J. Jung,et al.  HIDCC: A hybrid intrusion detection approach in cloud computing , 2018, Concurr. Comput. Pract. Exp..

[31]  S. P. Shantharajah,et al.  A Study on NSL-KDD Dataset for Intrusion Detection System Based on Classification Algorithms , 2015 .

[32]  Chase Qishi Wu,et al.  An Effective Deep Learning Based Scheme for Network Intrusion Detection , 2018, 2018 24th International Conference on Pattern Recognition (ICPR).

[33]  Shailesh Singh Panwar,et al.  Performance Analysis of NSL-KDD Dataset Using Classification Algorithms with Different Feature Selection Algorithms and Supervised Filter Discretization , 2020 .

[34]  Ramchandra S. Mangrulkar,et al.  Intrusion Detection System Using Random Forest on the NSL-KDD Dataset , 2019, Emerging Research in Computing, Information, Communication and Applications.

[35]  Georgia Sakellari,et al.  Cloud-Based Cyber-Physical Intrusion Detection for Vehicles Using Deep Learning , 2018, IEEE Access.