mLBOA-DML: modified butterfly optimized deep metric learning for enhancing accuracy in intrusion detection system

Springer Science and Business Media LLC - Tập 9 - Trang 333-347 - 2023
Varun Prabhakaran1,2, Ashokkumar Kulandasamy2
1Department of Computer Science and Engineering, St. Joseph’s College of Engineering, , Chennai, India
2Department of Computer Science and Engineering, Sathyabama Institute of Science and Technology, Chennai, India

Tóm tắt

Intrusion detection is a prominent factor in the cybersecurity domain that prevents the network from malicious attacks. Cloud security is not satisfactory for securing the user’s information because it is based on standard protocols. Hence, cloud users cannot fully trust the security offered by cloud service providers. The state-of-the-art techniques create clusters for classes and manually label the unknown classes to detect novel attacks. This notion binds the network traffic associated with each attack together and drifts the similarity between the same attacks. These techniques are often prone to errors and degrade performance. To overcome this drawback, various researchers have developed different intrusion detection system which relies on specific attack patterns to distinguish between normal and abnormal behavior. This paper presents a modified Lagrange interpolated Butterfly optimization algorithm-based deep metric learning (mLBOA-DML) architecture for intrusion detection to detect both host-based and network attacks. DML architecture parameters are optimized utilizing mLBOA algorithm via its global optimization capability for increasing the accuracy of attack prediction. DML algorithm does both feature extraction and classification processes. When evaluated using the UNSW-NB15 and NSL-KDD datasets, the proposed model offers improved accuracy near 99% for both datasets.

Tài liệu tham khảo

Alam S, Shuaib M, Samad A (2019) A collaborative study of intrusion detection and prevention techniques in cloud computing. International conference on innovative computing and communications. Springer, Singapore, pp 231–240 Alkadi O, Moustafa N, Turnbull B, Choo KKR (2020) A deep blockchain framework-enabled collaborative intrusion detection for protecting IoT and cloud networks. IEEE Internet Things J 8(12):9463–9472 Devi BT, Shitharth S, Jabbar MA (2020) An appraisal over intrusion detection systems in cloud computing security attacks. In: 2020 2nd international conference on innovative mechanisms for industry applications (ICIMIA). IEEE, pp 722–727 Singh S, Kubendiran M, Sangaiah AK (2019) A review on intrusion detection approaches in cloud security systems. Int J Grid Util Comput 10(4):361–374 Wang W, Ren L, Chen L, Ding Y (2019) Intrusion detection and security calculation in industrial cloud storage based on an improved dynamic immune algorithm. Inf Sci 501:543–557 Balamurugan V, Saravanan R (2019) Enhanced intrusion detection and prevention system on cloud environment using hybrid classification and OTS generation. Clust Comput 22(6):13027–13039 Ruth JA, Sirmathi H, Meenakshi A (2019) Secure data storage and intrusion detection in the cloud using MANN and dual encryption through various attacks. IET Inf Secur 13(4):321–329 Gifty R, Bharathi R, Krishnakumar P (2019) Privacy and security of big data in cyber physical systems using Weibull distribution-based intrusion detection. Neural Comput Appl 31(1):23–34 Mohanraj T, Santhosh R (2021) Security and privacy issue in multi-cloud accommodating Intrusion Detection System. In: Distributed and parallel databases, pp 1–19 Kilincer IF, Ertam F, Sengur A (2021) Machine learning methods for cyber security intrusion detection: datasets and comparative study. Comput Netw 188:107840 Ravikumar S, Kavitha D (2021) IoT based home monitoring system with secure data storage by Keccak-Chaotic sequence in cloud server. J Ambient Intell Humaniz Comput 12(7):7475–7487 Arunkumar M, Ashok Kumar K (2022) Malicious attack detection approach in cloud computing using machine learning techniques. Soft Comput 26(23):13097–13107 Varun P, Ashokkumar K (2022) Intrusion Detection System in Cloud Security using Deep Convolutional Network. Appl Math Inf Sci 16(4):581–588 Aslan Ö, Ozkan-Okay M, Gupta D (2021) Intelligent behavior-based malware detection system on cloud computing environment. IEEE Access 9:83252–83271 Prabhakaran V, Kulandasamy A (2021) Integration of recurrent convolutional neural network and optimal encryption scheme for intrusion detection with secure data storage in the cloud. Comput Intell 37(1):344–370 Sreelatha G, Babu AV, Midhunchakkaravarthy D (2022) Improved security in the cloud using sandpiper and extended equilibrium deep transfer learning-based intrusion detection. In: Cluster computing, pp 1–16 Kanimozhi P, Aruldoss Albert Victoire T (2022) Oppositional tunicate fuzzy C-means algorithm and logistic regression for intrusion detection on the cloud. Concurr Comput: Practice Exp 34(4):e6624 Wahab OA (2022) Intrusion detection in the IoT under data and concept drifts: online deep learning approach. IEEE Internet Things J Hajimirzaei B, Navimipour NJ (2019) Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm. Ict Express 5(1):56–59 Idhammad M, Afdel K, Belouch M (2018) Distributed intrusion detection system for cloud environments based on data mining techniques. Procedia Comput Sci 127:35–41 Du R, Li Y, Liang X, Tian J (2022) Support vector machine intrusion detection scheme based on cloud-fog collaboration. Mobile Networks Appl 27:431–440 Arora S, Singh S (2019) Butterfly optimization algorithm: a novel approach for global optimization. Soft Comput 23(3):715–734 Wang C, Xin C, Xu Z (2021) A novel deep metric learning model for imbalanced fault diagnosis and toward open-set classification. Knowl Based Syst 220:106925 Moustafa N, Slay J (2015). UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 military communications and information systems conference (MilCIS). IEEE, pp 1–6 Sharma S, Chakraborty S, Saha AK, Nama S, Sahoo SK (2022) mLBOA: a modified butterfly optimization algorithm with lagrange interpolation for global optimization. J Bionic Eng 1–16 Prabhakaran V, Kulandasamy A (2021) Hybrid semantic deep learning architecture and optimal advanced encryption standard key management scheme for secure cloud storage and intrusion detection. Neural Comput Appl 33(21):14459–14479 Bala R, Nagpal R (2019) A review on kdd cup99 and nsl nsl-kdd dataset. Int J Adv Res Comput Sci 10(2) Saporito G (2019) A deeper dive into the NSL-KDD data set. Medium. Retrieved September 16, 2022, from https://towardsdatascience.com/a-deeper-dive-into-the-nsl-kdd-data-set-15c753364657. Bex T (2021) Comprehensive Guide to Multiclass Classification Metrics. Towards Data Science