Skip to main content

A Harmony Search-Based Feature Selection Technique for Cloud Intrusion Detection

  • Conference paper
  • First Online:
Emerging Trends in Intelligent Computing and Informatics (IRICT 2019)

Abstract

Recently cloud computing has enjoyed widespread patronage due to its economy of scale and flexibility. However Cloud computing is confronted with security challenges. Intrusion detection can be used to protect computer resources from unauthorized access. However the presence of insignificant features in Intrusion Detection dataset may have a negative effect on the accuracy of Intrusion Detection System (IDS). Feature selection is utilized to remove noisy and insignificant attribute to improve IDS performance. However, existing feature selection techniques proposed for cloud IDS cannot guarantee optimal performance. Therefore, this research article proposes a Harmony Search based feature selection technique to improve the performance of cloud IDS. The attributes selected were assessed using Random Forest classifier and experimental results of the Harmony Search based technique achieved an attack detection rate of 79% and a false alarm rate of 0.012%. In addition performance comparison shows that the proposed Harmony search outperforms existing feature selection technique proposed for cloud IDS.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mell, P., Grance, T.: The NIST definition of cloud computing. http://faculty.winthrop.edu/domanm/csci411/Handouts/NIST.pdf. Accessed Feb 2016

  2. Khorshed, M.T., Ali, A.S., Wasimi, S.A.: A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Gener. Comput. Syst. 28, 833–851 (2012)

    Article  Google Scholar 

  3. Scarfone, K., Mell, P.: Guide to intrusion detection and prevention systems (idps). NIST special publication 800-94 (2007)

    Google Scholar 

  4. Liao, H.-J., Lin, C.-H.R., Lin, Y.-C., Tung, K.-Y.: Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 36(1), 16–24 (2014)

    Article  Google Scholar 

  5. Aghdam, M.H., Kabiri, P.: Feature selection for intrusion detection system using ant colony optimization. Int. J. Netw. Secur. 18(3), 420–432 (2016)

    Google Scholar 

  6. Kannan, A., Maguire, G.Q., Sharma, A., Schoo, P.: Genetic algorithm based feature selection algorithm for effective intrusion detection in cloud networks. In: Proceedings of the 2012 IEEE 12th International Conference on Data Mining Workshops (ICDMW), Brussels, Belgium, 10 December 2012, pp. 416–423. IEEE (2012)

    Google Scholar 

  7. Kang, S.-H., Kim, K.J.: A feature selection approach to find optimal feature subsets for the network intrusion detection system. Cluster Comput., 1–9 (2016)

    Google Scholar 

  8. Hira, Z.M., Gillies, D.F.: A review of feature selection and feature extraction methods applied on microarray data. Advances in bioinformatics (2015). https://www.hindawi.com/journals/abi/2015/198363/abs/. Accessed January 2018

  9. Osanaiye, O., Cai, H., Choo, K.-K.R., Dehghantanha, A., Xu, Z., Dlodlo, M.: Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing. EURASIP J. Wirel. Commun. Netw. 1, 130 (2016)

    Article  Google Scholar 

  10. Chandrashekar, G., Sahin, F.: A survey on feature selection methods. Comput. Electr. Eng. 40(1), 16–28 (2014)

    Article  Google Scholar 

  11. Muthurajkumar, S., Kulothungan, K., Vijayalakshmi, M., Jaisankar, N., Kannan, A.: A rough set based feature selection algorithm for effective intrusion detection in cloud model. In: Proceedings of the International Conference on Advances in Communication, Network and Computing, pp. 8–13 (2013)

    Google Scholar 

  12. Zhou, L.-H., Liu, Y.-H., Chen, G.-L.: A feature selection algorithm to intrusion detection based on cloud model and multi-objective particle swarm optimization. In: Proceedings of the 2011 Fourth International Symposium on Computational Intelligence and Design (ISCID), Hangzhou, China, 28–30 October 2011, pp. 182–185. IEEE (2011)

    Google Scholar 

  13. Ibrahim, N.M., Zainal, A.: A feature selection technique for Cloud IDS using Ant Colony Optimization and Decision Tree. Adv. Sci. Lett. 23(9), 9163–9169 (2017)

    Article  Google Scholar 

  14. Jensen, R., Shen, Q.: Fuzzy-rough data reduction with ant colony optimization. Fuzzy Sets Syst. 149(1), 5–20 (2005)

    Article  MathSciNet  Google Scholar 

  15. Aljawarneh, S., Aldwairi, M., Yassein, M.B.: Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J. Comput. Sci. 25, 152–160 (2018)

    Article  Google Scholar 

  16. Pham, N.T., Foo, E., Suriadi, S., Jeffrey, H., Lahza, H.F.M.: Improving performance of intrusion detection system using ensemble methods and feature selection. In: Proceedings of the Australasian Computer Science Week Multiconference, Brisbane, Australia, 29 January–2 February 2018, p. 2. ACM (2018)

    Google Scholar 

  17. Geem, Z.W.: Novel derivative of harmony search algorithm for discrete design variables. Appl. Math. Comput. 199, 223–230 (2008)

    MathSciNet  MATH  Google Scholar 

  18. Hall, M.A., Smith, L.A.: Feature subset selection: a correlation based filter approach. In: Proceedings of the 1997 International Conference on Neural Information Processing and Intelligent Information Systems, pp. 855–858. Springer, Berlin (1997)

    Google Scholar 

  19. Singh, D., Patel, D., Borisaniya, B., Modi, C.: Collaborative ids framework for cloud. Int. J. Netw. Secur. 18(4), 699–709 (2016)

    Google Scholar 

  20. Breiman, L.: Random forests. Mach. Learn. 45(1), 5–32 (2001)

    Article  Google Scholar 

Download references

Acknowledgement

We would like to thank Malaysia’s Ministry of Higher Education (MOHE) and Universiti Teknologi Malaysia (UTM) for funding this work through research grant with vote number (0G73).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nurudeen Mahmud Ibrahim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Makki, W.M., Siraj, M.M., Ibrahim, N.M. (2020). A Harmony Search-Based Feature Selection Technique for Cloud Intrusion Detection. In: Saeed, F., Mohammed, F., Gazem, N. (eds) Emerging Trends in Intelligent Computing and Informatics. IRICT 2019. Advances in Intelligent Systems and Computing, vol 1073. Springer, Cham. https://doi.org/10.1007/978-3-030-33582-3_73

Download citation

Publish with us

Policies and ethics