Enhanced intrusion detection system via agent clustering and classification based on outlier detection

The rapid evolution of cloud computing technology has enabled seamless connection of devices on a broad spectrum. Also, it enables storage of massive quantity of data in the form of data centers. This suggests a shared pool of resources where users situated all over the world have access to the aforementioned data centers. Such a framework has cyber-security based challenges where it becomes vulnerable to external attacks. There arises a need for an Intrusion Detection System (IDS) to prevent the system from unwanted and malicious attacks. However, the existing IDS have not been able to efficiently combinehigh accuracy with low complexity and time efficiency. In order to overcome these challenges an Enhanced Intrusion Detection System via Agent Clustering and Classification based on Outlier Detection (EIDS-ACC-OD) is proposed. At first, preprocessing is performed to remove unwanted spaces using outlier detection. Then modified K-means clustering algorithm is developed for data segmentation. Further, K-Nearest Neighbor (KNN) is utilized for categorization of the attacks.

[1]  I. A. Hodashinsky,et al.  Algorithm for tuning fuzzy network attack classifiers based on invasive weed optimization , 2014, 2014 Dynamics of Systems, Mechanisms and Machines (Dynamics).

[2]  Yong Shi,et al.  Malicious Domain Name Detection Based on Extreme Machine Learning , 2017, Neural Processing Letters.

[3]  Shadi Aljawarneh,et al.  Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model , 2017, J. Comput. Sci..

[4]  Dharmender Kumar,et al.  A novel hybrid K-means and artificial bee colony algorithm approach for data clustering , 2018 .

[5]  Puja Padiya,et al.  Feature Selection Based Hybrid Anomaly Intrusion Detection System Using K Means and RBF Kernel Function , 2015 .

[6]  G. Nagarajan,et al.  Hybrid Intrusion Detection System for Private Cloud: A Systematic Approach☆ , 2015 .

[7]  John R. Williams,et al.  Data-Stream-Based Intrusion Detection System for Advanced Metering Infrastructure in Smart Grid: A Feasibility Study , 2015, IEEE Systems Journal.

[8]  D. G. Narayan,et al.  Detection of distributed denial of service attacks using machine learning algorithms in software defined networks , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[9]  T Shimna,et al.  Continuous Outlier Detection Based on Sliding window on Continuous Data Streams , 2016 .

[10]  B. Muthukumar,et al.  Intrusion Detection System (IDS): Anomaly Detection Using Outlier Detection Approach , 2015 .

[11]  Ganesh Kumar,et al.  Anomaly Detection System in Cloud Environment Using Fuzzy Clustering Based ANN , 2015, Mobile Networks and Applications.

[12]  Mansoor Alam,et al.  A Deep Learning Approach for Network Intrusion Detection System , 2016, EAI Endorsed Trans. Security Safety.

[13]  R. Hamsa Veni,et al.  Identifying Malicious Web Links and Their Attack Types in Social Networks , 2018 .

[14]  Abas Md Said,et al.  Hybrid machine learning technique for intrusion detection system , 2015 .

[15]  Kayhan Zrar Ghafoor,et al.  An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs , 2018, IEEE Access.

[16]  nbspAastha Puri,et al.  A NOVEL TECHNIQUE FOR INTRUSION DETECTION SYSTEM FOR NETWORK SECURITY USING HYBRID SVM-CART , 2017 .

[17]  Md. Nasir Sulaiman,et al.  K-Means Clustering and Naive Bayes Classification for Intrusion Detection , 2016 .

[18]  Ali Feizollah,et al.  Evaluation of machine learning classifiers for mobile malware detection , 2014, Soft Computing.

[19]  Junping Du,et al.  Anomaly Detection Using Local Kernel Density Estimation and Context-Based Regression , 2020, IEEE Transactions on Knowledge and Data Engineering.

[20]  Mia Hubert,et al.  Anomaly detection by robust statistics , 2017, WIREs Data Mining Knowl. Discov..

[21]  V VasilakosAthanasios,et al.  Security in cloud computing , 2015 .

[22]  Athanasios V. Vasilakos,et al.  Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..