Abstract
With the advancement of network security, intrusion detection system (IDS) is increasingly used for network-connected environments. As the work of enterprises, governments, and other organizations has increasingly relied on computer network systems, protecting these systems from attacks has become a top priority. IDS has become an essential tool for safeguarding the systems with the increasing number of connected devices. To address the shortcomings of existing IDS, this research proposes an Enterprise Network for Intrusion Detection System (ENIDS) with a fast localization algorithm for cloud-based infrastructure. The proposed system detects and locates attacks by identifying abnormal domain values in the header of packets at the data link layer, network layer, and transport layer. ENIDS comprises three components: an event generator that serves as the source of event record flow, an analysis engine that checks if an attack has occurred based on the information sent by the event generator, and a reaction component that generates a response based on the results of the analysis engine. Additionally, this paper explains the fast localization model of intrusion detection for data of enterprises by explaining keyword selection methods. Experimental results show that the proposed method has a higher localization rate in comparison to direct localization, with a localization rate of 95.7% for the static targets and 92.7% for the dynamic targets. ENIDS has also been compared to existing systems using Support Vector Machine (SVM), Decision Tree (DT), and Random Forest (RF). The proposed method has the highest accuracy (96.25%), precision (95.57%), recall (92.24%), and F1-score (93.57%). The simulation results show that the model is effective and can detect and locate the data intrusion behavior quickly.
Similar content being viewed by others
Data availability
The data used to support the findings of this study are available from the corresponding author upon request.
References
Zhang Y, Lee W, Huang YA (2003) Intrusion detection techniques for mobile wireless networks. Wireless Netw 9:545–556
Dhage SN, Meshram BB (2012) Intrusion detection system in cloud computing environment. International Journal of Cloud Computing 1(2-3):261–282
Chon J, Cha H (2011) Lifemap: a smartphone-based context provider for location-based services. IEEE Pervasive Comput 10(2):58–67
Hsieh CH, Chen JY, Nien BH (2019) Deep learning-based indoor localization using received signal strength and channel state information. IEEE access 7:33256–33267
Ma X, Liu Y, Ouyang C (2022) Capturing semantic features to improve chinese event detection. CAAI Trans Intell Technol 7(2):219–227
Lei Y (2022) Research on microvideo character perception and recognition based on target detection technology. J Comput Cogn Eng 1(2):83–87
Kong H, Lu L, Yu J, Chen Y, Tang F (2020) Continuous authentication through finger gesture interaction for smart homes using WiFi. IEEE Trans Mob Comput 20(11):3148–3162
Teixeira T, Dublon G, Savvides A (2010) A survey of human-sensing: methods for detecting presence, count, location, track, and identity. ACM-CSUR 5(1):59–69
Jiang H, Wang M, Zhao P, Xiao Z, Dustdar S (2021) A utility-aware general framework with quantifiable privacy preservation for destination prediction in LBSs. IEEE/ACM Trans Networking 29(5):2228–2241
Kaltiokallio O, Bocca M, Patwari N (2012) "Follow @grandma: Long-term device-free localization for residential monitoring," 37th Annual IEEE Conference on Local Computer Networks - Workshops, Clearwater, FL, USA, pp 991–998. https://doi.org/10.1109/LCNW.2012.6424092
Shamshirband S, Fathi M, Chronopoulos AT, Montieri A, Palumbo F, Pescapè A (2020) Computational intelligence intrusion detection techniques in mobile cloud computing environments: review, taxonomy, and open research issues. J Inform Secur Appl 55:102582
Ribeiro J, Saghezchi FB, Mantas G, Rodriguez J, Shepherd SJ, Abd-Alhameed RA (2020) An autonomous host-based intrusion detection system for android mobile devices. Mob Networks Appl 25:164–172
Li B, Zhou X, Ning Z, Guan X, Yiu KC (2022) Dynamic event-triggered security control for networked control systems with cyber-attacks: a model predictive control approach. Inf Sci 612:384–398. https://doi.org/10.1016/j.ins.2022.08.093
Chen Z (2022) Research on internet security situation awareness prediction technology based on improved RBF neural network algorithm. J Comput Cogn Eng 1(3):103–108
Adib F, Katabi D (2016) August. Seeing through walls with wireless signals. SIGCOMM '13: Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, pp 75–86. https://doi.org/10.1117/2.1201601.006311
Lv J, Man D, Yang W, Du X, Yu M (2017) Robust WLAN-based indoor intrusion detection using PHY layer information. IEEE Access 6:30117–30127
Want R, Hopper A, Falcao V, Gibbons J (1992) The active badge location system. ACM Trans Inform Syst (TOIS) 10(1):91–102
Liu G (2021) Data collection in mi-assisted wireless powered underground sensor networks: directions, recent advances, and challenges. IEEE Commun Mag 59(4):132–138
Xiao Z, Shu J, Jiang H, Lui JCS, Min G, Liu J,... Dustdar S (2022) Multi-objective parallel task offloading and content caching in D2D-aided MEC Networks. IEEE Trans Mob Comput. https://doi.org/10.1109/TMC.2022.3199876
Lu S, Ban Y, Zhang X, Yang B, Liu S, Yin L, Zheng W (2022) Adaptive control of time delay teleoperation system with uncertain dynamics. Front Neurorobot 16:928863. https://doi.org/10.3389/fnbot.2022.928863
Sun Y, Ma P, Dai J, Li D (2022) A cloud Bayesian network approach to situation assessment of scouting underwater targets with fixed-wing patrol aircraft. Ecological Modelling, p 418
Ni LM, Liu Y, Lau YC, Patil AP (2003) Landmarc: Indoor location sensing using active RFID. Pervasive Computing and Communications, 2003. (PerCom 2003). In: Proceedings of the First IEEE International Conference on. IEEE
Chan YT, Hang HYC, Ching PC (2006) Exact and approximate maximum likelihood localization algorithms. IEEE Trans Veh Technol 55(1):10–16
Zhang D, Ma J, Chen Q, Ni LM (2007) March. "An RF-Based System for Tracking Transceiver-Free Objects". In: Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07), White Plains, NY, USA, 2007, pp 135–144. https://doi.org/10.1109/PERCOM.2007.8
Fernandes R, Matos JN, Varum T, Pinho P (2014) "Wi-Fi intruder detection," 2014 IEEE Conference on Wireless Sensors (ICWiSE), Subang, Malaysia, pp 96–99. https://doi.org/10.1109/ICWISE.2014.7042668
Wallbaum M, Diepolder S (2006) October. A motion detection scheme for wireless LAN stations. The 3rd international conference on mobile computing and ubiquitous networking, pp 2–9
Sun Z, Xu Y, Liang G, Zhou Z (2017) An intrusion detection model for wireless sensor networks with an improved V-detector algorithm. IEEE Sens J 18(5):1971–1984
Li B, Tan Y, Wu A, Duan G (2021) A distributionally robust optimization based method for stochastic model predictive control. IEEE Trans Autom Control 67(11):5762–5776. https://doi.org/10.1109/TAC.2021.3124750
Sudqi Khater B, Abdul Wahab AWB, Idris MYIB, Abdulla Hussain M, Ahmed Ibrahim A (2019) A lightweight perceptron-based intrusion detection system for fog computing. Appl Sci 9(1):178
Haseeb K, Islam N, Almogren A, Din IU (2019) Intrusion prevention framework for secure routing in WSN-based mobile internet of things. Ieee Access 7:185496–185505
Usman M, Jan MA, He X, Chen J (2019) A survey on representation learning efforts in cybersecurity domain. ACM Comput Surv (CSUR) 52(6):1–28
Khraisat A, Gondal I, Vamplew P, Kamruzzaman J (2019) Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2(1):1–22
Caminero G, Lopez-Martin M, Carro B (2019) Adversarial environment reinforcement learning algorithm for intrusion detection. Comput Netw 159:96–109
Li M, Tian Z, Du X, Yuan X, Shan C.,..., Guizani M (2023). Power normalized cepstral robust features of deep neural networks in a cloud computing data privacy protection scheme. Neurocomputing 518:165–173. https://doi.org/10.1016/j.neucom.2022.11.001
Liang J, Jing T, Niu H, Wang J (2020) Two-terminal fault location method of distribution network based on adaptive convolution neural network. IEEE Access 8:54035–54043
Yu J, Lu L, Chen Y, Zhu Y, Kong L (2021) An indirect eavesdropping attack of Keystrokes on Touch screen through Acoustic Sensing. IEEE Trans Mob Comput 20(2):337–351. https://doi.org/10.1109/TMC.2019.2947468
Dai X, Xiao Z, Jiang H, Alazab M, Lui JCS, Min G,..., Liu J (2023) Task offloading for cloud-assisted fog computing with dynamic service caching in enterprise management systems. IEEE Trans Ind Inform 19(1), 662–672. https://doi.org/10.1109/TII.2022.3186641
Acknowledgements
Natural Science Foundation of Hunan Province, China.
Research on Key Technologies of enterprise network security and protection system in cloud computing environment Grant NO. 2020JJ6062.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Wang, X. Fast Localization Model of Network Intrusion Detection System for Enterprises Using Cloud Computing Environment. Mobile Netw Appl (2023). https://doi.org/10.1007/s11036-023-02176-w
Accepted:
Published:
DOI: https://doi.org/10.1007/s11036-023-02176-w