Abstract
Cloud computing (CC) offers various types of services for the users and it is also termed on-demand computing. Because of its increasing popularity, it is vulnerable to a variety of intruders who could compromise the integrity and privacy of data stored in the cloud. Due to its distributed nature, security is the most challenging one in the cloud solution. Privacy and security are the major problems in its victory of the on-demand service, but it is simply vulnerable to intruders for any kind of attack. To solve this problem, IDSs (intrusion detection systems) play a major task in identifying the threats on cloud infrastructure. This paper develops an efficient cloud IDS using the sandpiper-based feature selection and extended equilibrium deep transfer learning (EEDTL) classification to improve the overall security of a cloud-based computing environment. The number of features is reduced from the given intrusion dataset based on the sandpiper optimization algorithm (SOA) while maintaining the minimal loss of information. Finally, the EEDTL model is used for the classification of different attacks based on their selected optimal features. For fine-tuning the attributes in convolution layers, transfer learning uses a pre-trained network called AlexNet. Also, the extended equilibrium optimizer (EEO) is used to update the network weights. The proposed cloud IDS effectively classify whether the network traffic behavior is normal or attack. The proposed system is executed in python using the UNSW-NB15 dataset, and NSL-KDD dataset. The various evaluation metrics are used to show the efficiency of the proposed method and compared to the existing works. The simulation results show that the proposed method can able to detect intrusions with a high detection rate and a low false alarm rate (FAR) than other approaches.







Similar content being viewed by others
Data availability
No data availability.
References
Rani, K.S.: Enhancement of security by implementation of aes based intrusion detection system in cloud environment. Journal of Natural Remedies 21(2), 22–28 (2020)
Sandosh, S., Govindasamy, V., Akila, G.: Enhanced intrusion detection system via agent clustering and classification based on outlier detection. Peer-to-Peer networking and Applications 13(3), 1038–1045 (2020)
Kadam, D., Patil, R. and Modi, C.: An enhanced approach for intrusion detection in virtual network of cloud computing. In 2018 Tenth International Conference on Advanced Computing (ICoAC) IEEE 80–87 (2018, December).
Balakrishnan, N., Rajendran, A., Pelusi, D., Ponnusamy, V.: Deep Belief Network enhanced intrusion detection system to prevent security breach in the Internet of Things. Internet of things 14, 100112 (2019)
Besharati, E., Naderan, M., Namjoo, E.: LR-HIDS: logistic regression host-based intrusion detection system for cloud environments. J. Ambient. Intell. Humaniz. Comput. 10(9), 3669–3692 (2019)
Ma, X., Fu, X., Luo, B., Du, X and Guizani, M.: A design of firewall based on feedback of intrusion detection system in cloud environment. In 2019 IEEE Global Communications Conference (GLOBECOM) IEEE 1–6 (2019, December).
Lin, P., Ye, K and Xu, C.Z. (2019) Dynamic network anomaly detection system by using deep learning techniques In International conference on cloud computing, Springer Cham 161–176
Toumi, H., Fagroud, F.Z., Zakouni, A., Talea, M.: Implementing Hy-IDS, mobiles agents and virtual firewall to enhance the security in Iaas cloud. Procedia Computer Science 160, 819–824 (2019)
Meng, W., Wang, Y., Li, W., Liu, Z., Li, J and Probst, C.W (2018) Enhancing intelligent alarm reduction for distributed intrusion detection systems via edge computing. In Australasian Conference on Information Security and Privacy, Springer Cham 759–767
Mayuranathan, M., Murugan, M., Dhanakoti, V.: Best features based intrusion detection system by RBM model for detecting DDoS in cloud environment. J. Ambient. Intell. Humaniz. Comput. 12(3), 3609–3619 (2021)
Kumar, R and Sharma, D.: Signature-Anomaly Based Intrusion Detection Algorithm. In 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA), IEEE 836–841 (2018).
Meryem, A., Ouahidi, B.E.: Hybrid intrusion detection system using machine learning. Netw. Secur. 2020(5), 8–19 (2020)
Chaithanya, P.S., Raman, M.G., Nivethitha, S., Seshan, K.S and Sriram, V.S. (2020) An efficient intrusion detection approach using enhanced random forest and moth-flame optimization technique In Computational Intelligence in Pattern Recognition Springer Singapore 877–884
Ravji, S and Ali, M.(2018) Integrated Intrusion Detection and Prevention System with Honeypot in Cloud Computing. In 2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE) IEEE 95–100
Abusitta, A., Bellaiche, M., Dagenais, M., Halabi, T.: A deep learning approach for proactive multi-cloud cooperative intrusion detection system. Futur. Gener. Comput. Syst. 98, 308–318 (2019)
Alkadi, O., Moustafa, N and Turnbull, B.(2020) A collaborative intrusion detection system using deep blockchain framework for securing cloud networks. In Proceedings of SAI Intelligent Systems Conference, Springer, Cham 553–565
Patil, R., Dudeja, H., Modi, C.: Designing an efficient security framework for detecting intrusions in virtual network of cloud computing. Comput. Secur. 85, 402–422 (2019)
Dwivedi, S., Vardhan, M and Tripathi, S. (2021) Building an efficient intrusion detection system using grasshopper optimization algorithm for anomaly detection. Cluster Computing, 1–20
Garg, S., Kaur, K., Batra, S., Aujla, G.S., Morgan, G., Kumar, N., Zomaya, A.Y., Ranjan, R.: En-ABC An ensemble artificial bee colony based anomaly detection scheme for cloud environment. Journal of Parallel and Distributed Computing 135, 219–233 (2020)
Chiba, Z., Abghour, N., Moussaid, K., Rida, M.: Intelligent approach to build a Deep Neural Network based IDS for cloud environment using combination of machine learning algorithms. Comput. Secur. 86, 291–317 (2019)
Krishnaveni, S., Sivamohan, S., Sridhar, S.S and Prabakaran, S.: Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing. Cluster Computing, 1–19 (2021).
Keserwani, P.K., Govil, M.C and S. Pilli, E.: An Optimal Intrusion Detection System using GWO-CSA-DSAE Model. Cyber-Physical Systems, 1–24 (2020).
Leghris, C., Elaeraj, O. and Renault, E.: Improved security intrusion detection using intelligent techniques. In 2019 International Conference on Wireless Networks and Mobile Communications (WINCOM), IEEE 1–5 (2019).
Wang, W., Ren, L., Chen, L., Ding, Y.: Intrusion detection and security calculation in industrial cloud storage based on an improved dynamic immune algorithm. Inf. Sci. 501, 543–557 (2019)
Ghosh, P., Biswas, S., Shakti, S., Phadikar, S.: An improved intrusion detection system to preserve security in cloud environment. International Journal of Information Security and Privacy (IJISP) 14(1), 67–80 (2020)
Sakr, M.M., Tawfeeq, M.A., El-Sisi, A.B.: Network intrusion detection system based PSO-SVM for cloud computing. International Journal of Computer Network and Information Security 10(3), 22 (2019)
Samriya, J.K and Kumar, N.: A novel intrusion detection system using hybrid clustering-optimization approach in cloud computing. Materials Today: Proceedings (2020).
Zhou, Y., Cheng, G., Jiang, S., Dai, M.: Building an efficient intrusion detection system based on feature selection and ensemble classifier. Comput. Netw. 174, 107247 (2020)
Safara, F., Souri, A., Serrizadeh, M.: Improved intrusion detection method for communication networks using association rule mining and artificial neural networks. IET Commun. 14(7), 1192–1197 (2020)
Deep transfer learning for IoT attack detection: Vu, L., Nguyen, Q.U., Nguyen, D.N., Hoang, D.T and Dutkiewicz, E. IEEE Access 8, 107335–107344 (2020)
Li, X., Hu, Z., Xu, M., Wang, Y., Ma, J.: Transfer learning-based intrusion detection scheme for Internet of vehicles. Inf. Sci. 547, 119–135 (2021)
Xu, M., Li, X., Wang, Y., Luo, B., Guo, J.: Privacy-preserving multisource transfer learning in intrusion detection system. Transac. on Emerging Telecommun. Technol. 32(5), e3957 (2021)
Kaur, A., Jain, S., Goel, S.: Sandpiper optimization algorithm: a novel approach for solving real-life engineering problems. Appl. Intell. 50(2), 582–619 (2020)
Faramarzi, A., Heidarinejad, M., Stephens, B., Mirjalili, S.: Equilibrium optimizer: A novel optimization algorithm. Knowl.-Based Syst. 191, 105190 (2020)
Nawir, M., Amir, A., Lynn, O.B., Yaakob, N., Ahmad, R.B.: Performances of machine learning algorithms for binary classification of network anomaly detection system. In Journal of Physics: Conference Series, IOP Publishing 1018(1), 012015 (2018)
Dhanabal, L., Shantharajah, S.P.: A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. International Journal of Advanced Research in Computer and Communication Engineering 4(6), 446–452 (2015)
Bhamare, D., Salman, T., Samaka, M., Erbad, A and Jain, R.: Feasibility of supervised machine learning for cloud security. In 2016 International Conference on Information Science and Security (ICISS) IEEE 1–5 (2016)
Funding
No funding is provided for the preparation of manuscript.
Author information
Authors and Affiliations
Contributions
All authors are equal contributions in this work.
Corresponding author
Ethics declarations
Conflict of interest
All authors declared that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Consent to participate
Three authors have equal contributions.
Consent to publish
Reviewer and Editors can publish this work.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Sreelatha, G., Babu, A.V. & Midhunchakkaravarthy, D. Improved security in cloud using sandpiper and extended equilibrium deep transfer learning based intrusion detection. Cluster Comput 25, 3129–3144 (2022). https://doi.org/10.1007/s10586-021-03516-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-021-03516-9