Skip to main content
Log in

Improved security in cloud using sandpiper and extended equilibrium deep transfer learning based intrusion detection

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Cloud computing (CC) offers various types of services for the users and it is also termed on-demand computing. Because of its increasing popularity, it is vulnerable to a variety of intruders who could compromise the integrity and privacy of data stored in the cloud. Due to its distributed nature, security is the most challenging one in the cloud solution. Privacy and security are the major problems in its victory of the on-demand service, but it is simply vulnerable to intruders for any kind of attack. To solve this problem, IDSs (intrusion detection systems) play a major task in identifying the threats on cloud infrastructure. This paper develops an efficient cloud IDS using the sandpiper-based feature selection and extended equilibrium deep transfer learning (EEDTL) classification to improve the overall security of a cloud-based computing environment. The number of features is reduced from the given intrusion dataset based on the sandpiper optimization algorithm (SOA) while maintaining the minimal loss of information. Finally, the EEDTL model is used for the classification of different attacks based on their selected optimal features. For fine-tuning the attributes in convolution layers, transfer learning uses a pre-trained network called AlexNet. Also, the extended equilibrium optimizer (EEO) is used to update the network weights. The proposed cloud IDS effectively classify whether the network traffic behavior is normal or attack. The proposed system is executed in python using the UNSW-NB15 dataset, and NSL-KDD dataset. The various evaluation metrics are used to show the efficiency of the proposed method and compared to the existing works. The simulation results show that the proposed method can able to detect intrusions with a high detection rate and a low false alarm rate (FAR) than other approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Data availability

No data availability.

References

  1. Rani, K.S.: Enhancement of security by implementation of aes based intrusion detection system in cloud environment. Journal of Natural Remedies 21(2), 22–28 (2020)

    MathSciNet  Google Scholar 

  2. Sandosh, S., Govindasamy, V., Akila, G.: Enhanced intrusion detection system via agent clustering and classification based on outlier detection. Peer-to-Peer networking and Applications 13(3), 1038–1045 (2020)

    Article  Google Scholar 

  3. Kadam, D., Patil, R. and Modi, C.: An enhanced approach for intrusion detection in virtual network of cloud computing. In 2018 Tenth International Conference on Advanced Computing (ICoAC) IEEE 80–87 (2018, December).

  4. Balakrishnan, N., Rajendran, A., Pelusi, D., Ponnusamy, V.: Deep Belief Network enhanced intrusion detection system to prevent security breach in the Internet of Things. Internet of things 14, 100112 (2019)

    Article  Google Scholar 

  5. Besharati, E., Naderan, M., Namjoo, E.: LR-HIDS: logistic regression host-based intrusion detection system for cloud environments. J. Ambient. Intell. Humaniz. Comput. 10(9), 3669–3692 (2019)

    Article  Google Scholar 

  6. Ma, X., Fu, X., Luo, B., Du, X and Guizani, M.: A design of firewall based on feedback of intrusion detection system in cloud environment. In 2019 IEEE Global Communications Conference (GLOBECOM) IEEE 1–6 (2019, December).

  7. Lin, P., Ye, K and Xu, C.Z. (2019) Dynamic network anomaly detection system by using deep learning techniques In International conference on cloud computing, Springer Cham 161–176

  8. Toumi, H., Fagroud, F.Z., Zakouni, A., Talea, M.: Implementing Hy-IDS, mobiles agents and virtual firewall to enhance the security in Iaas cloud. Procedia Computer Science 160, 819–824 (2019)

    Article  Google Scholar 

  9. Meng, W., Wang, Y., Li, W., Liu, Z., Li, J and Probst, C.W (2018) Enhancing intelligent alarm reduction for distributed intrusion detection systems via edge computing. In Australasian Conference on Information Security and Privacy, Springer Cham 759–767

  10. Mayuranathan, M., Murugan, M., Dhanakoti, V.: Best features based intrusion detection system by RBM model for detecting DDoS in cloud environment. J. Ambient. Intell. Humaniz. Comput. 12(3), 3609–3619 (2021)

    Article  Google Scholar 

  11. Kumar, R and Sharma, D.: Signature-Anomaly Based Intrusion Detection Algorithm. In 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA), IEEE 836–841 (2018).

  12. Meryem, A., Ouahidi, B.E.: Hybrid intrusion detection system using machine learning. Netw. Secur. 2020(5), 8–19 (2020)

    Article  Google Scholar 

  13. Chaithanya, P.S., Raman, M.G., Nivethitha, S., Seshan, K.S and Sriram, V.S. (2020) An efficient intrusion detection approach using enhanced random forest and moth-flame optimization technique In Computational Intelligence in Pattern Recognition Springer Singapore 877–884

  14. Ravji, S and Ali, M.(2018) Integrated Intrusion Detection and Prevention System with Honeypot in Cloud Computing. In 2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE) IEEE 95–100

  15. Abusitta, A., Bellaiche, M., Dagenais, M., Halabi, T.: A deep learning approach for proactive multi-cloud cooperative intrusion detection system. Futur. Gener. Comput. Syst. 98, 308–318 (2019)

    Article  Google Scholar 

  16. Alkadi, O., Moustafa, N and Turnbull, B.(2020) A collaborative intrusion detection system using deep blockchain framework for securing cloud networks. In Proceedings of SAI Intelligent Systems Conference, Springer, Cham 553–565

  17. Patil, R., Dudeja, H., Modi, C.: Designing an efficient security framework for detecting intrusions in virtual network of cloud computing. Comput. Secur. 85, 402–422 (2019)

    Article  Google Scholar 

  18. Dwivedi, S., Vardhan, M and Tripathi, S. (2021) Building an efficient intrusion detection system using grasshopper optimization algorithm for anomaly detection. Cluster Computing, 1–20

  19. Garg, S., Kaur, K., Batra, S., Aujla, G.S., Morgan, G., Kumar, N., Zomaya, A.Y., Ranjan, R.: En-ABC An ensemble artificial bee colony based anomaly detection scheme for cloud environment. Journal of Parallel and Distributed Computing 135, 219–233 (2020)

    Article  Google Scholar 

  20. Chiba, Z., Abghour, N., Moussaid, K., Rida, M.: Intelligent approach to build a Deep Neural Network based IDS for cloud environment using combination of machine learning algorithms. Comput. Secur. 86, 291–317 (2019)

    Article  Google Scholar 

  21. Krishnaveni, S., Sivamohan, S., Sridhar, S.S and Prabakaran, S.: Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing. Cluster Computing, 1–19 (2021).

  22. Keserwani, P.K., Govil, M.C and S. Pilli, E.: An Optimal Intrusion Detection System using GWO-CSA-DSAE Model. Cyber-Physical Systems, 1–24 (2020).

  23. Leghris, C., Elaeraj, O. and Renault, E.: Improved security intrusion detection using intelligent techniques. In 2019 International Conference on Wireless Networks and Mobile Communications (WINCOM), IEEE 1–5 (2019).

  24. Wang, W., Ren, L., Chen, L., Ding, Y.: Intrusion detection and security calculation in industrial cloud storage based on an improved dynamic immune algorithm. Inf. Sci. 501, 543–557 (2019)

    Article  Google Scholar 

  25. Ghosh, P., Biswas, S., Shakti, S., Phadikar, S.: An improved intrusion detection system to preserve security in cloud environment. International Journal of Information Security and Privacy (IJISP) 14(1), 67–80 (2020)

    Article  Google Scholar 

  26. Sakr, M.M., Tawfeeq, M.A., El-Sisi, A.B.: Network intrusion detection system based PSO-SVM for cloud computing. International Journal of Computer Network and Information Security 10(3), 22 (2019)

    Article  Google Scholar 

  27. Samriya, J.K and Kumar, N.: A novel intrusion detection system using hybrid clustering-optimization approach in cloud computing. Materials Today: Proceedings (2020).

  28. Zhou, Y., Cheng, G., Jiang, S., Dai, M.: Building an efficient intrusion detection system based on feature selection and ensemble classifier. Comput. Netw. 174, 107247 (2020)

    Article  Google Scholar 

  29. Safara, F., Souri, A., Serrizadeh, M.: Improved intrusion detection method for communication networks using association rule mining and artificial neural networks. IET Commun. 14(7), 1192–1197 (2020)

    Article  Google Scholar 

  30. Deep transfer learning for IoT attack detection: Vu, L., Nguyen, Q.U., Nguyen, D.N., Hoang, D.T and Dutkiewicz, E. IEEE Access 8, 107335–107344 (2020)

    Article  Google Scholar 

  31. Li, X., Hu, Z., Xu, M., Wang, Y., Ma, J.: Transfer learning-based intrusion detection scheme for Internet of vehicles. Inf. Sci. 547, 119–135 (2021)

    Article  Google Scholar 

  32. Xu, M., Li, X., Wang, Y., Luo, B., Guo, J.: Privacy-preserving multisource transfer learning in intrusion detection system. Transac. on Emerging Telecommun. Technol. 32(5), e3957 (2021)

    Google Scholar 

  33. Kaur, A., Jain, S., Goel, S.: Sandpiper optimization algorithm: a novel approach for solving real-life engineering problems. Appl. Intell. 50(2), 582–619 (2020)

    Article  Google Scholar 

  34. Faramarzi, A., Heidarinejad, M., Stephens, B., Mirjalili, S.: Equilibrium optimizer: A novel optimization algorithm. Knowl.-Based Syst. 191, 105190 (2020)

    Article  Google Scholar 

  35. Nawir, M., Amir, A., Lynn, O.B., Yaakob, N., Ahmad, R.B.: Performances of machine learning algorithms for binary classification of network anomaly detection system. In Journal of Physics: Conference Series, IOP Publishing 1018(1), 012015 (2018)

    Google Scholar 

  36. Dhanabal, L., Shantharajah, S.P.: A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. International Journal of Advanced Research in Computer and Communication Engineering 4(6), 446–452 (2015)

    Google Scholar 

  37. Bhamare, D., Salman, T., Samaka, M., Erbad, A and Jain, R.: Feasibility of supervised machine learning for cloud security. In 2016 International Conference on Information Science and Security (ICISS) IEEE 1–5 (2016)

Download references

Funding

No funding is provided for the preparation of manuscript.

Author information

Authors and Affiliations

Authors

Contributions

All authors are equal contributions in this work.

Corresponding author

Correspondence to Gavini Sreelatha.

Ethics declarations

Conflict of interest

All authors declared that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Consent to participate

Three authors have equal contributions.

Consent to publish

Reviewer and Editors can publish this work.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sreelatha, G., Babu, A.V. & Midhunchakkaravarthy, D. Improved security in cloud using sandpiper and extended equilibrium deep transfer learning based intrusion detection. Cluster Comput 25, 3129–3144 (2022). https://doi.org/10.1007/s10586-021-03516-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-021-03516-9

Keywords

Navigation