Enhanced Chimp Optimization-Based Feature Selection with Fuzzy Logic-Based Intrusion Detection System in Cloud Environment
Abstract
:1. Introduction
- An intelligent IMFL-IDSCS technique comprising ECOA-FS, ANFIS classification, and JSSO-based parameter optimization is presented for intrusion detection. To the best of our knowledge, the presented IMFL-IDSCS technique does not exist in the literature.
- A new ECOA-FS technique is designed for the selection of the optimal subset of features to accomplish enhanced classification performance.
- JSSO is employed with the ANFIS model for the classification of intrusions into different class labels.
- The performance of the proposed model is validated on the benchmark NSL-KDD dataset.
2. Related Works
3. The Proposed Model
3.1. Process Involved in ECOA-FS Technique
3.2. ANFIS-Based Intrusion Detection Model
3.3. Parameter Tuning Using JSSO Algorithm
Algorithm 1:-SSO |
Initialization of the shark population Set the determined user variables Initialization phase counter as i = 1 for i = 1:i_max if ∇(of) < 0.5 Upgrade velocity vector following SSO Upgrade location following SSO Else Upgrade solution following JA end if end for i Set i = i + 1 Selection of the better location of sharl at a final phase that has the maximum value End |
4. Results and Discussion
4.1. Result Analysis
4.2. Discussion
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Negi, P.S.; Garg, A.; Lal, R. Intrusion detection and prevention using honeypot network for cloud security. In Proceedings of the 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida, India, 29–31 January 2020; pp. 129–132. [Google Scholar]
- Meryem, A.; Ouahidi, B.E. Hybrid intrusion detection system using machine learning. Netw. Secur. 2020, 2020, 8–19. [Google Scholar] [CrossRef]
- Achbarou, O.; El Kiram, M.A.; Bourkoukou, O.; Elbouanani, S. A new distributed intrusion detection system based on multi-agent system for cloud environment. Int. J. Commun. Netw. Inf. Secur. 2018, 10, 526. [Google Scholar] [CrossRef]
- Singh, D.A.A.G.; Priyadharshini, R.; Leavline, E.J. Cuckoo optimisation based intrusion detection system for cloud computing. Int. J. Comput. Netw. Inf. Secur. 2018, 11, 42–49. [Google Scholar]
- Hatef, M.A.; Shaker, V.; Jabbarpour, M.R.; Jung, J.; Zarrabi, H. HIDCC: A hybrid intrusion detection approach in cloud computing. Concurr. Comput. Pract. Exp. 2018, 30, e4171. [Google Scholar] [CrossRef]
- Ma, X.; Fu, X.; Luo, B.; Du, X.; Guizani, M. A design of firewall based on feedback of intrusion detection system in cloud environment. In Proceedings of the IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 9–13 December 2019; pp. 1–6. [Google Scholar]
- Fontaine, J.; Kappler, C.; Shahid, A.; Poorter, E.D. Log-based intrusion detection for cloud web applications using machine learning. In Advances on P2P, Parallel, Grid, Cloud and Internet Computing, Proceedings of the 14th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC-2019), Antwerp, Belgium, 7–9 November 2019; Barolli, L., Hellinckx, P., Natwichaivol, J., Eds.; Springer: Cham, Switzerland, 2019; pp. 197–210. [Google Scholar]
- Chang, V.; Golightly, L.; Modesti, P.; Xu, Q.A.; Doan, L.M.T.; Hall, K.; Boddu, S.; Kobusińska, A. A survey on intrusion detection systems for fog and cloud computing. Future Internet 2022, 14, 89. [Google Scholar] [CrossRef]
- Luo, G.; Chen, Z.; Mohammed, B.O. A systematic literature review of intrusion detection systems in the cloud-based IoT environments. Concurr. Comput. Pract. Exp. 2022, 34, e6822. [Google Scholar] [CrossRef]
- Krishnaveni, S.; Sivamohan, S.; Sridhar, S.; Prabhakaran, S. Network intrusion detection based on ensemble classification and feature selection method for cloud computing. Concurr. Comput. Pract. Exp. 2022, 34, e6838. [Google Scholar] [CrossRef]
- Kannadhasan, S.; Nagarajan, R.; Thenappan, S. Intrusion detection techniques based secured data sharing system for cloud computing using msvm. In Proceedings of the 9th International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 23–25 March 2022; pp. 50–56. [Google Scholar]
- Guezzaz, A.; Asimi, A.; Asimi, Y.; Azrour, M.; Benkirane, S. A.; Asimi, A.; Asimi, Y.; Azrour, M.; Benkirane, S. A distributed intrusion detection approach based on machine leaning techniques for a cloud security. In Intelligent Systems in Big Data, Semantic Web and Machine Learning; Gherabi, N., Kacprzyk, J., Eds.; Springer: Cham, Switzerland, 2021; Volume 1344, pp. 85–94. [Google Scholar]
- Elmasry, W.; Akbulut, A.; Zaim, A.H. A design of an integrated cloud-based intrusion detection system with third party cloud service. Open Comput. Sci. 2021, 11, 365–379. [Google Scholar] [CrossRef]
- Raj, M.G.; Pani, S.K. A meta-analytic review of intelligent intrusion detection techniques in cloud computing environment. Int. J. Adv. Comput. Sci. Appl. 2021, 12, 206–217. [Google Scholar] [CrossRef]
- Aldallal, A.; Alisa, F. Effective intrusion detection system to secure data in cloud using machine learning. Symmetry 2021, 13, 2306. [Google Scholar] [CrossRef]
- Varun, P.; Ashokkumar, K. Intrusion detection system in cloud security using deep convolutional network. Appl. Math. Inf. Sci. 2022, 16, 581–588. [Google Scholar]
- Shyla, S.I.; Sujatha, S.S. Cloud security: LKM and optimal fuzzy system for intrusion detection in cloud environment. J. Intell. Syst. 2020, 29, 1626–1642. [Google Scholar] [CrossRef]
- Mishra, P.; Varadharajan, V.; Pilli, E.S.; Tupakula, U. Vmguard: A vmi-based security architecture for intrusion detection in cloud environment. IEEE Trans. Cloud Comput. 2018, 8, 957–971. [Google Scholar] [CrossRef]
- Aoudni, Y.; Donald, C.; Farouk, A.; Sahay, K.B.; Babu, D.V.; Tripathi, V.; Dhabliya, D. Cloud security based attack detection using transductive learning integrated with Hidden Markov Model. Pattern Recognit. Lett. 2022, 157, 16–26. [Google Scholar] [CrossRef]
- Sakr, M.M.; Tawfeeq, M.A.; El-Sisi, A.B. Network intrusion detection system based PSO-SVM for cloud computing. Int. J. Comput. Netw. Inf. Secur. 2019, 11, 22–29. [Google Scholar] [CrossRef]
- Velliangiri, S.; Premalatha, J. Intrusion detection of distributed denial of service attack in cloud. Clust. Comput. 2019, 22, 10615–10623. [Google Scholar] [CrossRef]
- Sathiyadhas, S.S.; Soosai Antony, M.C.V. A network intrusion detection system in cloud computing environment using dragonfly improved invasive weed optimization integrated Shepard convolutional neural network. Int. J. Adapt. Control. Signal Process. 2022, 36, 1060–1076. [Google Scholar] [CrossRef]
- Srinivas, B.V.; Mandal, I.; Keshavarao, S. Virtual machine migration-based Intrusion Detection System in cloud environment using deep recurrent neural network. Cybern. Syst. 2022, 1–21. [Google Scholar] [CrossRef]
- Geetha, T.V.; Deepa, A.J. A FKPCA-GWO WDBILSTM classifier for intrusion detection system in cloud environments. Knowl.-Based Syst. 2022, 253, 109557. [Google Scholar]
- Hizal, S.; Çavuşoğlu, Ü.; Akgün, D. A new deep learning based Intrusion Detection System for Cloud Security. In Proceedings of the 2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), Istanbul, Turkey, 11–13 June 2021. [Google Scholar]
- Jia, H.; Sun, K.; Zhang, W.; Leng, X. An enhanced chimp optimization algorithm for continuous optimization domains. Complex Intell. Syst. 2022, 8, 65–82. [Google Scholar] [CrossRef]
- Iwendi, C.; Mahboob, K.; Khalid, Z.; Javed, A.R.; Rizwan, M.; Ghosh, U. Classification of COVID-19 individuals using adaptive neuro-fuzzy inference system. Multimed. Syst. 2022, 28, 1223–1237. [Google Scholar] [CrossRef] [PubMed]
- Ahamad, D.; Alam Hameed, S.; Akhtar, M. A multi-objective privacy preservation model for cloud security using hybrid Jaya-based shark smell optimization. J. King Saud Univ.-Comput. Inf. Sci. 2022, 34, 2343–2358. [Google Scholar] [CrossRef]
- Moradi, M.; Zulkernine, M. A neural network based system for intrusion detection and classification of attacks. In Proceedings of the IEEE International Conference on Advances in Intelligent Systems—Theory and Applications, Kirchberg, Luxembourg, 15–18 November 2004; pp. 15–18. [Google Scholar]
- Mahmood, Z.; Agrawal, C.; Hasan, S.S.; Zenab, S. Intrusion detection in cloud computing environment using neural network. Int. J. Res. Comput. Eng. Electron. 2012, 1, 1–4. [Google Scholar]
- Hajimirzaei, B.; Navimipour, N.J. Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm. J. ICT Exp. 2019, 5, 56–59. [Google Scholar] [CrossRef]
Class | No. of Samples |
---|---|
Denial of service attack (Dos) | 45,927 |
Unauthorized access from a remote host (R2l) | 995 |
Port monitoring or scanning (Probe) | 11,656 |
Unauthorized local super user privileged access (U2r) | 52 |
Not an Attack (Normal) | 67,343 |
Total number of samples | 125,973 |
Class | MCC | ||||
---|---|---|---|---|---|
Training Phase (80%) | |||||
Dos | 98.88 | 98.00 | 98.94 | 98.47 | 97.59 |
R2l | 99.49 | 67.53 | 68.71 | 68.11 | 67.86 |
Probe | 99.20 | 96.13 | 95.12 | 95.62 | 95.18 |
U2r | 99.95 | 28.57 | 04.65 | 08.00 | 11.51 |
Normal | 99.01 | 99.29 | 98.86 | 99.08 | 98.01 |
Average | 99.31 | 77.90 | 73.26 | 73.86 | 74.03 |
Testing Phase (20%) | |||||
Dos | 98.81 | 97.94 | 98.84 | 98.39 | 97.45 |
R2l | 99.47 | 66.49 | 64.80 | 65.63 | 65.37 |
Probe | 99.20 | 96.39 | 95.32 | 95.85 | 95.42 |
U2r | 99.98 | 100.00 | 33.33 | 50.00 | 57.73 |
Normal | 99.09 | 99.31 | 98.96 | 99.14 | 98.18 |
Average | 99.31 | 92.03 | 78.25 | 81.80 | 82.83 |
Class | MCC | ||||
---|---|---|---|---|---|
Training Phase (70%) | |||||
Dos | 98.80 | 97.88 | 98.85 | 98.36 | 97.42 |
R2l | 99.65 | 82.73 | 69.93 | 75.79 | 75.89 |
Probe | 99.39 | 95.57 | 97.99 | 96.77 | 96.44 |
U2r | 99.96 | 00.00 | 00.00 | 00.00 | 00.00 |
Normal | 99.03 | 99.49 | 98.69 | 99.09 | 98.06 |
Average | 99.37 | 75.14 | 73.09 | 74.00 | 73.56 |
Testing Phase (30%) | |||||
Dos | 98.88 | 97.93 | 98.99 | 98.46 | 97.58 |
R2l | 99.58 | 78.23 | 68.39 | 72.98 | 72.94 |
Probe | 99.37 | 95.54 | 97.76 | 96.64 | 96.30 |
U2r | 99.96 | 00.00 | 00.00 | 00.00 | −0.01 |
Normal | 99.10 | 99.59 | 98.72 | 99.15 | 98.19 |
Average | 99.38 | 74.26 | 72.77 | 73.45 | 73.00 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Alohali, M.A.; Elsadig, M.; Al-Wesabi, F.N.; Al Duhayyim, M.; Mustafa Hilal, A.; Motwakel, A. Enhanced Chimp Optimization-Based Feature Selection with Fuzzy Logic-Based Intrusion Detection System in Cloud Environment. Appl. Sci. 2023, 13, 2580. https://doi.org/10.3390/app13042580
Alohali MA, Elsadig M, Al-Wesabi FN, Al Duhayyim M, Mustafa Hilal A, Motwakel A. Enhanced Chimp Optimization-Based Feature Selection with Fuzzy Logic-Based Intrusion Detection System in Cloud Environment. Applied Sciences. 2023; 13(4):2580. https://doi.org/10.3390/app13042580
Chicago/Turabian StyleAlohali, Manal Abdullah, Muna Elsadig, Fahd N. Al-Wesabi, Mesfer Al Duhayyim, Anwer Mustafa Hilal, and Abdelwahed Motwakel. 2023. "Enhanced Chimp Optimization-Based Feature Selection with Fuzzy Logic-Based Intrusion Detection System in Cloud Environment" Applied Sciences 13, no. 4: 2580. https://doi.org/10.3390/app13042580
APA StyleAlohali, M. A., Elsadig, M., Al-Wesabi, F. N., Al Duhayyim, M., Mustafa Hilal, A., & Motwakel, A. (2023). Enhanced Chimp Optimization-Based Feature Selection with Fuzzy Logic-Based Intrusion Detection System in Cloud Environment. Applied Sciences, 13(4), 2580. https://doi.org/10.3390/app13042580