Skip to main content

Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing

  • Conference paper
  • First Online:
Intelligent Computing & Optimization (ICO 2018)

Abstract

Cloud computing is a rapidly developing Internet technology for facilitating various services to consumers. This technology suggests a considerable potential to the public or to large companies, such as Amazon, Google, Microsoft and IBM. This technology is aimed at providing a flexible IT architecture which is accessible through the Internet for lightweight portability. However, many issues must be resolved before cloud computing can be accepted as a viable option to business computing. Cloud computing undergoes several challenges in security because it is prone to numerous attacks, such as flooding attacks which are the major problems in cloud computing and one of the serious threat to cloud computing originates came from denial of service. This research is aimed at exploring the mechanisms or models that can detect attacks. Intrusion detection system is a detection model for these attacks and is divided into two-type H-IDS and N-IDS. We focus on the N-IDS in Eucalyptus cloud computing to detect DDoS attacks, such as UDP and TCP, to evaluate the output dataset in MATLAB. Therefore, all technology reviews will be solely based on network traffic data. Furthermore, the H-IDS is disregarded in this work.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rittinghouse, J.W., Ransome, J.F.: Cloud Computing: Implementation, Management, and Security. CRC press, Boca Raton (2016)

    Google Scholar 

  2. Ahmed, A.A., Jantan, A., Ali, G.A.: A potent model for unwanted traffic detection in QoS network domain. JDCTA 4, 122–130 (2010)

    Article  Google Scholar 

  3. Kaul, S., Sood, K., Jain, A.: Cloud computing and its emerging need: advantages and issues. Int. J. Adv. Res. Comput. Sci. 8(3) (2017)

    Google Scholar 

  4. Sultan, N.: Cloud computing for education: a new dawn? Int. J. Inf. Manag. 30(2), 109–116 (2010)

    Article  Google Scholar 

  5. Mirkovic, J., Reiher, P.: A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Comput. Commun. Rev. 34(2), 39–53 (2004)

    Article  Google Scholar 

  6. Elejla, O.E., Jantan, A.B., Ahmed, A.A.: Three layers approach for network scanning detection. J. Theor. Appl. Inf. Technol. 70(2) (2014)

    Google Scholar 

  7. Ahmed, A.A.: Investigation model for DDoS attack detection in real-time. Int. J. Softw. Eng. Comput. Sci. (IJSECS) 1, 93–105 (2015)

    Google Scholar 

  8. Ahmed, A.A., Jantan, A., Wan, T.-C.: Filtration model for the detection of malicious traffic in large-scale networks. Comput. Commun. 82, 59–70 (2016)

    Article  Google Scholar 

  9. Rowland, C.H., Rhodes, A.L.: Method and system for reducing the false alarm rate of network intrusion detection systems. ed: Google Patents (2011)

    Google Scholar 

  10. Nanavati, M., Colp, P., Aiello, B., Warfield, A.: Cloud security: a gathering storm. Commun. ACM 57(5), 70–79 (2014)

    Article  Google Scholar 

  11. Ahmed, A.A., Sadiq, A.S., Zolkipli, M.F.: Traceback model for identifying sources of distributed attacks in real time. Secur. Commun. Netw. 9(13), 2173–2185 (2016)

    Google Scholar 

  12. Mirjalili, S., Lewis, A.: The whale optimization algorithm. Adv. Eng. Softw. 95(Supplement C), 51–67 (2016)

    Article  Google Scholar 

  13. Mirjalili, S., Lewis, A.: The whale optimization algorithm. Adv. Eng. Softw. 95, 51–67 (2016)

    Article  Google Scholar 

  14. Aljarah, I., Faris, H., Mirjalili, S.: Optimizing connection weights in neural networks using the whale optimization algorithm. Soft Comput. 22(1), 1–15 (2018)

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported by the Faculty of Computer System and Software Engineering, Universiti Malaysia Pahang under FRGS Grant No. RDU160106 and RDU Grant No. RDU160365.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ahmed Mohammed Fahad .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Fahad, A.M., Ahmed, A.A., Kahar, M.N.M. (2019). Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing. In: Vasant, P., Zelinka, I., Weber, GW. (eds) Intelligent Computing & Optimization. ICO 2018. Advances in Intelligent Systems and Computing, vol 866. Springer, Cham. https://doi.org/10.1007/978-3-030-00979-3_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00979-3_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00978-6

  • Online ISBN: 978-3-030-00979-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics