A neural network based distributed intrusion detection system on cloud platform

Intrusion detection system (IDS) is an important component to maintain network security. Also, as the cloud platform is quickly evolving and becoming more popular in our everyday life, it is useful and necessary to build an effective IDS for the cloud. However, existing intrusion detection techniques will be likely to face challenges when deployed on the cloud platform. The pre-determined IDS architecture may lead to overloading of a part of the cloud due to the extra detection overhead. This paper proposes a neural network based IDS which is a distributed system with an adaptive architecture so as to make full use of the available resources without overloading any single machine in the cloud. Moreover, with the machine learning ability from the neural network, the proposed IDS can detect new types of attacks with fairly accurate results. Evaluation of the proposed IDS with the KDD dataset on a physical cloud testbed shows that it is a promising approach to detecting attacks in the cloud infrastructure.

[1]  Gyanendra Kumar Goyal,et al.  Radial Basis (Exact Fit) Artificial Neural Network Technique for Estimating Shelf Life of Burfi , 2012, CSA 2012.

[2]  Dong Xiang,et al.  Information-theoretic measures for anomaly detection , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[3]  Michael Negnevitsky,et al.  Artificial Intelligence: A Guide to Intelligent Systems Third Edition , 2011 .

[4]  Hari Om,et al.  A hybrid system for reducing the false alarm rate of anomaly intrusion detection system , 2012, 2012 1st International Conference on Recent Advances in Information Technology (RAIT).

[5]  Madhumita Chatterjee,et al.  An Adaptive Distributed Intrusion Detection System for Cloud Computing Framework , 2012, SNDS.

[6]  Yinhui Li,et al.  An efficient intrusion detection system based on support vector machines and gradually feature removal method , 2012, Expert Syst. Appl..

[7]  Jeng-Shyang Pan,et al.  Statistical Based Waveform Classification for Cloud Intrusion Detection , 2012, 2012 International Conference on Computing, Measurement, Control and Sensor Network.

[8]  Michael Negnevitsky,et al.  Artificial Intelligence: A Guide to Intelligent Systems , 2001 .

[9]  Weiqing Sun,et al.  Collabra: A Xen Hypervisor Based Collaborative Intrusion Detection System , 2011, 2011 Eighth International Conference on Information Technology: New Generations.

[10]  Avinash Agarwal,et al.  Radial Basis Function Artificial Neural Network: Spread Selection , 2012 .

[11]  Muttukrishnan Rajarajan,et al.  Integrating Signature Apriori based Network Intrusion Detection System (NIDS) in Cloud Computing , 2012 .

[12]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[13]  Alok Aggarwal,et al.  Composing Signatures for Misuse Intrusion Detection System Using Genetic Algorithm in an Offline Environment , 2012, ACITY.

[14]  Sadok Ben Yahia,et al.  Towards a Multiagent-Based Distributed Intrusion Detection System Using Data Mining Approaches , 2011, ADMI.

[15]  Anup K. Ghosh,et al.  A Study in Using Neural Networks for Anomaly and Misuse Detection , 1999, USENIX Security Symposium.

[16]  Eui-nam Huh,et al.  A Collaborative Intrusion Detection System Framework for Cloud Computing , 2011, ICITCS.

[17]  Md. Abu Naser Bikas,et al.  An Implementation of Intrusion Detection System Using Genetic Algorithm , 2012, ArXiv.

[18]  Kang-Hyun Jo,et al.  An Efficient Method of Vehicle License Plate Recognition Based on Sliding Concentric Windows and Artificial Neural Network , 2012 .

[19]  Fabio A. González,et al.  An immunity-based technique to characterize intrusions in computer networks , 2002, IEEE Trans. Evol. Comput..

[20]  Anjali Sardana,et al.  A Hybrid Intrusion Detection Architecture for Defense against DDoS Attacks in Cloud Environment , 2012, IC3.

[21]  Shahram Sarkani,et al.  A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier , 2012, Expert Syst. Appl..

[22]  Yanpei Chen,et al.  What's New About Cloud Computing Security? , 2010 .

[23]  Andrew H. Sung,et al.  Intrusion detection using neural networks and support vector machines , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).

[24]  Rafael Timóteo de Sousa Júnior,et al.  Building Scalable Distributed Intrusion Detection Systems Based on the MapReduce Framework , 2011 .

[25]  Hassan Takabi,et al.  DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments , 2011, 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).

[26]  Yadong Gong,et al.  A Survey of Cloud Computing , 2013 .

[27]  Gao Wei,et al.  Application of Genetic Neural Network on Lifeless-Repairable Spares Consumption Forecasting , 2012, 2012 International Conference on Computer Science and Service System.

[28]  Shalini Bhatia,et al.  Traffic Flow Control using Neural Network , 2012 .

[29]  D. P. Gaikwad,et al.  Anomaly Based Intrusion Detection System Using Artificial Neural Network and Fuzzy Clustering , 2012 .

[30]  Balaraman Ravindran,et al.  Adaptive network intrusion detection system using a hybrid approach , 2012, 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012).

[31]  Xiaolin Li,et al.  Minimizing Distribution Cost of Distributed Neural Networks in Wireless Sensor Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[32]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[33]  Vipin Kumar,et al.  Introduction to Data Mining , 2022, Data Mining and Machine Learning Applications.

[34]  Yuan Jing,et al.  Prediction of coal calorific value based on the RBF neural network optimized by genetic algorithm , 2012, 2012 8th International Conference on Natural Computation.

[35]  Takuya Suzuki,et al.  Security Architectures for Cloud Computing , 2010 .

[36]  V. Kotov,et al.  A Survey of Modern Advances in Network Intrusion Detection , 2011 .

[37]  Yi-Mao Hsiao,et al.  High-throughput intrusion detection system with parallel pattern matching , 2012, IEICE Electron. Express.

[38]  Sugata Sanyal,et al.  A New Trusted and Collaborative Agent Based Approach for Ensuring Cloud Security , 2011, ArXiv.

[39]  S Ramgovind,et al.  The management of security in Cloud computing , 2010, 2010 Information Security for South Africa.

[40]  Jimin Yu,et al.  Rainfall time series forecasting based on Modular RBF Neural Network model coupled with SSA and PLS , 2012 .

[41]  Carla E. Brodley,et al.  Challenges and Opportunities in Applied Machine Learning , 2012, AI Mag..