mLBOA-DML: modified butterfly optimized deep metric learning for enhancing accuracy in intrusion detection system
Tóm tắt
Intrusion detection is a prominent factor in the cybersecurity domain that prevents the network from malicious attacks. Cloud security is not satisfactory for securing the user’s information because it is based on standard protocols. Hence, cloud users cannot fully trust the security offered by cloud service providers. The state-of-the-art techniques create clusters for classes and manually label the unknown classes to detect novel attacks. This notion binds the network traffic associated with each attack together and drifts the similarity between the same attacks. These techniques are often prone to errors and degrade performance. To overcome this drawback, various researchers have developed different intrusion detection system which relies on specific attack patterns to distinguish between normal and abnormal behavior. This paper presents a modified Lagrange interpolated Butterfly optimization algorithm-based deep metric learning (mLBOA-DML) architecture for intrusion detection to detect both host-based and network attacks. DML architecture parameters are optimized utilizing mLBOA algorithm via its global optimization capability for increasing the accuracy of attack prediction. DML algorithm does both feature extraction and classification processes. When evaluated using the UNSW-NB15 and NSL-KDD datasets, the proposed model offers improved accuracy near 99% for both datasets.
Tài liệu tham khảo
Alam S, Shuaib M, Samad A (2019) A collaborative study of intrusion detection and prevention techniques in cloud computing. International conference on innovative computing and communications. Springer, Singapore, pp 231–240
Alkadi O, Moustafa N, Turnbull B, Choo KKR (2020) A deep blockchain framework-enabled collaborative intrusion detection for protecting IoT and cloud networks. IEEE Internet Things J 8(12):9463–9472
Devi BT, Shitharth S, Jabbar MA (2020) An appraisal over intrusion detection systems in cloud computing security attacks. In: 2020 2nd international conference on innovative mechanisms for industry applications (ICIMIA). IEEE, pp 722–727
Singh S, Kubendiran M, Sangaiah AK (2019) A review on intrusion detection approaches in cloud security systems. Int J Grid Util Comput 10(4):361–374
Wang W, Ren L, Chen L, Ding Y (2019) Intrusion detection and security calculation in industrial cloud storage based on an improved dynamic immune algorithm. Inf Sci 501:543–557
Balamurugan V, Saravanan R (2019) Enhanced intrusion detection and prevention system on cloud environment using hybrid classification and OTS generation. Clust Comput 22(6):13027–13039
Ruth JA, Sirmathi H, Meenakshi A (2019) Secure data storage and intrusion detection in the cloud using MANN and dual encryption through various attacks. IET Inf Secur 13(4):321–329
Gifty R, Bharathi R, Krishnakumar P (2019) Privacy and security of big data in cyber physical systems using Weibull distribution-based intrusion detection. Neural Comput Appl 31(1):23–34
Mohanraj T, Santhosh R (2021) Security and privacy issue in multi-cloud accommodating Intrusion Detection System. In: Distributed and parallel databases, pp 1–19
Kilincer IF, Ertam F, Sengur A (2021) Machine learning methods for cyber security intrusion detection: datasets and comparative study. Comput Netw 188:107840
Ravikumar S, Kavitha D (2021) IoT based home monitoring system with secure data storage by Keccak-Chaotic sequence in cloud server. J Ambient Intell Humaniz Comput 12(7):7475–7487
Arunkumar M, Ashok Kumar K (2022) Malicious attack detection approach in cloud computing using machine learning techniques. Soft Comput 26(23):13097–13107
Varun P, Ashokkumar K (2022) Intrusion Detection System in Cloud Security using Deep Convolutional Network. Appl Math Inf Sci 16(4):581–588
Aslan Ö, Ozkan-Okay M, Gupta D (2021) Intelligent behavior-based malware detection system on cloud computing environment. IEEE Access 9:83252–83271
Prabhakaran V, Kulandasamy A (2021) Integration of recurrent convolutional neural network and optimal encryption scheme for intrusion detection with secure data storage in the cloud. Comput Intell 37(1):344–370
Sreelatha G, Babu AV, Midhunchakkaravarthy D (2022) Improved security in the cloud using sandpiper and extended equilibrium deep transfer learning-based intrusion detection. In: Cluster computing, pp 1–16
Kanimozhi P, Aruldoss Albert Victoire T (2022) Oppositional tunicate fuzzy C-means algorithm and logistic regression for intrusion detection on the cloud. Concurr Comput: Practice Exp 34(4):e6624
Wahab OA (2022) Intrusion detection in the IoT under data and concept drifts: online deep learning approach. IEEE Internet Things J
Hajimirzaei B, Navimipour NJ (2019) Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm. Ict Express 5(1):56–59
Idhammad M, Afdel K, Belouch M (2018) Distributed intrusion detection system for cloud environments based on data mining techniques. Procedia Comput Sci 127:35–41
Du R, Li Y, Liang X, Tian J (2022) Support vector machine intrusion detection scheme based on cloud-fog collaboration. Mobile Networks Appl 27:431–440
Arora S, Singh S (2019) Butterfly optimization algorithm: a novel approach for global optimization. Soft Comput 23(3):715–734
Wang C, Xin C, Xu Z (2021) A novel deep metric learning model for imbalanced fault diagnosis and toward open-set classification. Knowl Based Syst 220:106925
Moustafa N, Slay J (2015). UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 military communications and information systems conference (MilCIS). IEEE, pp 1–6
Sharma S, Chakraborty S, Saha AK, Nama S, Sahoo SK (2022) mLBOA: a modified butterfly optimization algorithm with lagrange interpolation for global optimization. J Bionic Eng 1–16
Prabhakaran V, Kulandasamy A (2021) Hybrid semantic deep learning architecture and optimal advanced encryption standard key management scheme for secure cloud storage and intrusion detection. Neural Comput Appl 33(21):14459–14479
Bala R, Nagpal R (2019) A review on kdd cup99 and nsl nsl-kdd dataset. Int J Adv Res Comput Sci 10(2)
Saporito G (2019) A deeper dive into the NSL-KDD data set. Medium. Retrieved September 16, 2022, from https://towardsdatascience.com/a-deeper-dive-into-the-nsl-kdd-data-set-15c753364657.
Bex T (2021) Comprehensive Guide to Multiclass Classification Metrics. Towards Data Science