An Improved Intrusion Detection System to Preserve Security in Cloud Environment

Cloud computing, also known as on-demand computing, provides different kinds of services for the users. As the name suggests, its increasing demand makes it prone to various intruders affecting the privacy and integrity of the data stored in the cloud. To cope with this situation, intrusion detection systems (IDS) are implemented in the cloud. An effective IDS constitutes of less time-consuming algorithm with less space complexity and higher accuracy. To do so, the number of features are reduced while maintaining minimal loss of information. In this paper, the authors have proposed a model by which the features are selected on the basis of mutual information gain among correlated features. To achieve this, they first group the features according to the correlativity. Then from each group, the features with the highest mutual information gain in their respective groups are selected. This led them to a reduced feature set which provides quick learning and thus produces a better IDS that would secure the data in the cloud.

[1]  Norbik Bashah Idris,et al.  A brief introduction to intrusion detection system , 2012, ICRA 2012.

[2]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[3]  Fatos Xhafa,et al.  Inter-cooperative Collective Intelligence: Techniques and Applications , 2013 .

[4]  Arputharaj Kannan,et al.  Intelligent feature selection and classification techniques for intrusion detection in networks: a survey , 2013, EURASIP Journal on Wireless Communications and Networking.

[5]  Jiankun Hu,et al.  Host-Based Anomaly Intrusion Detection , 2010, Handbook of Information and Communication Security.

[6]  Vimal Kumar Dubey,et al.  A cluster-filter feature selection approach , 2016, 2016 International Conference on ICT in Business Industry & Government (ICTBIG).

[7]  A. Damodaram,et al.  Algorithm for Clustering with Intrusion Detection Using Modified and Hashed K – Means Algorithms , 2012 .

[8]  Salvatore J. Stolfo,et al.  A framework for constructing features and models for intrusion detection systems , 2000, TSEC.

[9]  Fabrizio Baiardi,et al.  CIDS: A Framework for Intrusion Detection in Cloud Systems , 2012, 2012 Ninth International Conference on Information Technology - New Generations.

[10]  Roberto Di Pietro,et al.  Secure virtualization for cloud computing , 2011, J. Netw. Comput. Appl..

[11]  Dunja Mladenic,et al.  Feature Selection for Dimensionality Reduction , 2005, SLSFS.

[12]  Gulshan Kumar,et al.  Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN , 2018, Int. J. Inf. Secur. Priv..

[13]  Sijia Liu,et al.  DifFUZZY: a fuzzy clustering algorithm for complex datasets , 2010, CI 2010.

[14]  Zahia Guessoum,et al.  False Alarm Reduction Using Adaptive Agent-Based Profiling , 2013, Int. J. Inf. Secur. Priv..

[15]  Bernd Grobauer,et al.  Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.

[16]  Marzena Kryszkiewicz,et al.  Faster Clustering with DBSCAN , 2005, Intelligent Information Systems.

[17]  Mohammad Shoyaib,et al.  Feature Selection and Discretization based on Mutual Information , 2017, 2017 IEEE International Conference on Imaging, Vision & Pattern Recognition (icIVPR).

[18]  Fuhui Long,et al.  Feature selection based on mutual information criteria of max-dependency, max-relevance, and min-redundancy , 2003, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[19]  Stephan Dreiseitl,et al.  Feature Selection Based on Pairwise Classification Performance , 2009, EUROCAST.

[20]  Archana Singh,et al.  Network intrusion detection system using various data mining techniques , 2016, 2016 International Conference on Research Advances in Integrated Navigation Systems (RAINS).

[21]  M. Hemalatha,et al.  An evaluation of clustering technique over intrusion detection system , 2012, ICACCI '12.

[22]  Ken Barker,et al.  Data preprocessing for distance-based unsupervised Intrusion Detection , 2011, 2011 Ninth Annual International Conference on Privacy, Security and Trust.

[23]  Partha Ghosh,et al.  An Efficient Hybrid Multilevel Intrusion Detection System in Cloud Environment , 2014 .

[24]  Bhavani M. Thuraisingham,et al.  Security Issues for Cloud Computing , 2010, Int. J. Inf. Secur. Priv..

[25]  Yanjie Zhao Network intrusion detection system model based on data mining , 2016, 2016 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD).

[26]  Todd L. Heberlein,et al.  Network intrusion detection , 1994, IEEE Network.

[27]  Swarnpreet Singh,et al.  Cost breakdown of Public Cloud Computing and Private Cloud Computing and Security Issues , 2012 .