Skip to main content

Research on Intrusion Detection Algorithm in Cloud Computing

  • Conference paper
  • First Online:
Frontier Computing (FC 2018)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 542))

Included in the following conference series:

  • 71 Accesses

Abstract

The traditional intrusion detection as one of the network security defense technology, plays an important role in the field of network security. But in a cloud environment application there response speed, data size, and many other restrictions, unable to meet the demand of real time validity, etc. Therefore, to build an intrusion detection system in cloud computing environment is an important subject. This paper aims at the design requirements of intrusion detection in cloud environment, through the research of the intrusion detection algorithm, proposed the use of Extreme Learning Machine (ELM) algorithm as an intrusion detection classification algorithm and the rationality verification using extreme learning machine algorithm. At the same time for massive high-dimensional intrusion detection data redundancy and noise influences the efficiency of detection by principal component analysis PCA algorithm for feature extraction, dimensionality reduction to improve the detection efficiency, reduces the detection time. Experiment results show that the algorithm is effective.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Helman, P., Liepins, G., Richards, W.: Foundations of intrusion detection. In: Proceedings of the Fifth Computer Security Foundations Workshop, pp. 114–120 (1992)

    Google Scholar 

  2. Jiang, J., Ma, H.: Summary of network security intrusion detection research. J. Softw. 11, 1460–1466 (2012)

    Google Scholar 

  3. Anderson, J.P.: Computer security threat monitoring and surveillance. Fort Washington: Pennsylvania 11(2), 65–68 (1980)

    Google Scholar 

  4. Helman, P., Liepins, G., Richards, W.: Foundations of intrusion detection. In: Proceedings of the Fifth Computer Security Foundations Workshop, pp. 114–120 (2002)

    Google Scholar 

  5. Huang, G.B., Zhu, Y.Q., Siew, C.K.: Extreme learning machine: a new learning scheme of feedforward neural networks. Proc. IJCNN 2, 985–990 (2004)

    Google Scholar 

  6. Huang, G.B., Chen, L.: Convex incremental extreme learning machine. Neuro Comput. 70, 3056–3062 (2007)

    Google Scholar 

  7. Huang, G.B., Chen, Y.Q., Babri, H.A.: Classification ability of single hidden layer feedforward neural networks. IEEE Trans. Neural Netw. 11(3), 799–801 (2014)

    Article  Google Scholar 

  8. Mao, Y., Zhou, X.: Overview of feature selection algorithms. Pattern Recognit. AI 20(2), 211–218 (2007)

    Google Scholar 

  9. Jolliffe, I.T.: Principal Component Analysis. Springer, Berlin (2002)

    MATH  Google Scholar 

  10. KDD Cup 1999 Data: Information and Computer Science. University of California, Irivine. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yupeng Sang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sang, Y. (2019). Research on Intrusion Detection Algorithm in Cloud Computing. In: Hung, J., Yen, N., Hui, L. (eds) Frontier Computing. FC 2018. Lecture Notes in Electrical Engineering, vol 542. Springer, Singapore. https://doi.org/10.1007/978-981-13-3648-5_205

Download citation

Publish with us

Policies and ethics