Skip to main content

Novel Network IDS in Cloud Computing Based on Optimized Back Propagation Neural Network Using a Self-adaptive Genetic Algorithm

  • Conference paper
  • First Online:
Innovations in Smart Cities Applications Edition 2 (SCA 2018)

Abstract

Nowadays, Cloud Computing (CC) had become an integral part of IT industry. It represents the maturing of technology and is a pliable, cost-effective platform which provides business/IT services over the Internet. Although there are several benefits of adopting this paradigm, there are some significant hurdles to it and one of them is security. In fact, due to the distributed and open nature of the cloud, resources, applications and data are vulnerable and prone to intrusions that affect confidentiality, availability and integrity of Cloud resources and offered services. Network Intrusion Detection System (NIDS) has become the most commonly used component of computer system security and compliance practices that defends network accessible Cloud resources and services from various kinds of threats and attacks, while maintaining performance and service quality. In this work, in order to detect intrusions in CC environment, we propose a novel anomaly NIDS based on Back Propagation Neural Network (BPNN) classifier optimized using a Self-Adaptive Genetic Algorithm (SAGA). SAGA consists of a standard Genetic Algorithm improved by means of an Adaptive Genetic Algorithm, namely Adaptive Mutation Algorithm. Since, Learning rate and Momentum term are among the most relevant parameters that affect the performance of BPNN classifier, we have employed SAGA to find the optimal values of these two critical parameters, which ensure high detection rate, high accuracy and low false alarm rate. Our novel NIDS is called “ANIDS BPNN-SAGA” (Anomaly NIDS optimized by using Self-Adaptive Genetic Algorithm). The CloudSim simulator and KDD CUP’ 99 dataset are used to verify the proposed system. The obtained experimental results have demonstrated the superiority of the proposed approach in comparison with state-of-the-art methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mehibs, S.M., Hashim, S.H.: Proposed network intrusion detection system based on fuzzy c mean algorithm in cloud computing environment. J. Univ. Babylon 26(2), 27–35 (2018)

    Article  Google Scholar 

  2. Mehibs, S.M., Hashim, S.H.: Proposed network intrusion detection system in cloud environment based on back propagation neural network. J. Univ. Babylon Pure Appl. Sci. 26(1), 29–40 (2018)

    Article  Google Scholar 

  3. Wu, S.X., Banzhaf, W.: The use of computational intelligence in intrusion detection systems: a review. Appl. Soft Comput. 10(1), 1–35 (2010)

    Article  Google Scholar 

  4. Shah, B., Trivedi, B.H.: Artificial neural network based intrusion detection system: A survey. Int. J. Comput. Appl. 39(6), 13–18 (2012)

    Google Scholar 

  5. Lo, C.C., Huang, C.C., Ku, J.: A cooperative intrusion detection system framework for cloud computing networks. In: 39th IEEE International Conference on Parallel Processing Workshops (ICPPW), pp. 280–284. IEEE, San Diego (2010). https://doi.org/10.1109/icppw.2010.46

  6. Modi, C.N., Patel, D.R., Patel, A., Rajarajan, M.: Integrating signature apriori based network intrusion detection system (NIDS) in cloud computing. Procedia Technology, 6, 905–912

    Article  Google Scholar 

  7. Hajimirzaei, B., Navimipour, N. J.: Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm. ICT Express. 2018. In press. https://doi.org/10.1016/j.icte.2018.01.014

  8. Sharma, P., Sengupta, J., Suri, P.K.: WLI-FCM and artificial neural network based cloud intrusion detection system. Int. J. Adv. Netw. Appl. 10(1), 3698–3703 (2018)

    Google Scholar 

  9. Ghosh, P., Jha, S., Dutta, R., Phadikar, S.: Intrusion detection system based on BCS-GA in cloud environment. In: Shetty, N., Patnaik, L., Prasad, N., Nalini, N. (eds.) Emerging Research in Computing, Information, Communication and Applications (ERCICA 2016), pp. 393–403. Springer, Singapore (2018). https://doi.org/10.1007/978-981-10-4741-1_35

    Google Scholar 

  10. Chiba, Z., Abghour, N., Moussaid, K., El Omri, A., Rida, M.: A novel architecture combined with optimal parameters for back propagation neural networks applied to anomaly network intrusion detection. Comput. Secur. 75, 36–58 (2018)

    Article  Google Scholar 

  11. Qian, Q., Cai, J., Zhang, R.: Intrusion detection based on neural networks and Artificial Bee Colony algorithm. In: 2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS), pp. 257–262. IEEE, Taiyuan (2014)

    Google Scholar 

  12. Multi-Layer Perceptron. http://www.cse.unsw.edu.au/~cs9417ml/MLP2

  13. Uppalaiah, B., Anand, K., Narsimha, B., Swaraj, S., Bharat, T.: Genetic algorithm approach to intrusion detection system. IJCST 3(1), 156–160 (2012)

    Google Scholar 

  14. Jacobson, L., Kanbe, B.: Genetic Algorithms in Java basics, pp. 143–144. Apress, New York (2015). https://doi.org/10.1007/978-1-4842-0328-6

    Book  Google Scholar 

  15. Aslahi-Shahri, B.M., Rahmani, R., Chizari, M., Maralani, A., Eslami, M., Golkar, M.J., Ebrahimi, A.: A hybrid method consisting of GA and SVM for intrusion detection system. Neural Comput. Appl. 27(6), 1669–1676 (2016)

    Article  Google Scholar 

  16. Hamamoto, A.H., Carvalho, L.F., Sampaio, L.D.H., Abrão, T., Proença Jr., M.L.: Network anomaly detection system using genetic algorithm and fuzzy logic. Expert Syst. Appl. 92, 390–402 (2018). https://doi.org/10.1016/j.eswa.2017.09.013

    Article  Google Scholar 

  17. Sharma, R., Chaurasia, S.: An enhanced approach to fuzzy c-means clustering for anomaly detection. In: Somani, A., Srivastava, S., Mundra, A., Rawat, S. (eds.) Proceedings of First International Conference on Smart System, Innovations and Computing. Smart Innovation, Systems and Technologies, vol. 79, pp. 623–636. Springer, Singapore (2018)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zouhair Chiba .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chiba, Z., Abghour, N., Moussaid, K., El omri, A., Rida, M. (2019). Novel Network IDS in Cloud Computing Based on Optimized Back Propagation Neural Network Using a Self-adaptive Genetic Algorithm. In: Ben Ahmed, M., Boudhir, A., Younes, A. (eds) Innovations in Smart Cities Applications Edition 2. SCA 2018. Lecture Notes in Intelligent Transportation and Infrastructure. Springer, Cham. https://doi.org/10.1007/978-3-030-11196-0_49

Download citation

Publish with us

Policies and ethics