Skip to main content
Log in

An Optimal Cluster Based Intrusion Detection System for Defence Against Attack in Web and Cloud Computing Environments

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In recent years, the rapid growth of information technology organizations causes ability to meet their demands such as scalability, mobility and flexibility. The security and privacy is a major issue of those organizations that’s why they move the data to the cloud. Meanwhile, the security in cloud has become an important issue in the growing demand of cloud computing, Due to the nature characteristics of cloud, those confidential data are vulnerable to attacks/malicious or intruders. Several Intrusion Detection System (IDS) have been proposed for cloud environment to enhance the security problem but they are not possible to solve those issues with better accuracy, due to the recent real-time intruders. However, those IDSs are possible to solve and resist limited and known attacks. In this paper, we propose Optimal Cluster based Intrusion Detection System for defence against attacks in web and cloud computing environments (OC-IDS). We use hybrid optimization algorithm i.e. Multi-verse is combined with Chaotic Atom search optimization (MCA) algorithm for pre-processing which removes the unwanted/repeated data in dataset. We introduce a Chaotic Manta-ray Foraging Optimization (CMFO) based clustering technique which segment the data in different groups. Then, we develop hybrid machine learning technique i.e. Modified Teacher Learning based Deep Neural Network (MTL-DNN) which categorize the attack in cloud environment as a novelty of this study. Finally, the proposed OC-IDS technique can evaluate through standard open source datasets are KDD cup’99 and MSL-KDD, the performance of proposed and existing techniques are compared with different metrics such as accuracy, precision, recall and F-measure. Our proposed OC IDS MTL-DNN attains 95.01% accuracy in KDD cup’99 dataset.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Data Availability

The already existing algorithms data used to support the findings of this study have not been made available.

References

  1. Fenanir, S., Semchedine, F., & Baadache, A. (2019). A machine learning-based lightweight intrusion detection system for the internet of things. Rev. d’Intelligence Artif., 33(3), 203–211.

    Article  Google Scholar 

  2. Chiba, Z., Abghour, N., Moussaid, K., & Rida, M. (2019). Intelligent approach to build a Deep Neural Network based IDS for cloud environment using combination of machine learning algorithms. Computers Security., 86, 291–317.

    Article  Google Scholar 

  3. Chowdhury, R., Sen, S., Roy, A., & Saha, B. (2022). An optimal feature based network intrusion detection system using bagging ensemble method for real-time traffic analysis. Multimedia Tools and Applications. 1–23.

  4. Khraisat, A., Gondal, I., Vamplew, P., & Kamruzzaman, J. (2019). Survey of intrusion detection systems: Techniques, datasets and challenges. Cybersecurity, 2(1), 1–22.

    Article  Google Scholar 

  5. Avritzer, A., Ferme, V., Janes, A., Russo, B., van Hoorn, A., Schulz, H., Menasché, D., & Rufino, V. (2020). Scalability assessment of microservice architecture deployment configurations: A domain-based approach leveraging operational profiles and load tests. Journal of Systems and Software., 165, 110564.

    Article  Google Scholar 

  6. Deng, L., Li, D., Yao, X., & Wang, H. (2019). Retracted article: Mobile network intrusion detection for IoT system based on transfer learning algorithm. Cluster Computing, 22(4), 9889–9904.

    Article  Google Scholar 

  7. Tabrizchi, H., & Kuchaki, R. M. (2020). A survey on security challenges in cloud computing: Issues, threats, and solutions. The Journal of Supercomputing., 76(12), 9493–9532.

    Article  Google Scholar 

  8. El Sibai, R., Gemayel, N., Bou Abdo, J., & Demerjian, J. (2020). A survey on access control mechanisms for cloud computing. Transactions on Emerging Telecommunications Technologies., 31(2), 3720.

    Article  Google Scholar 

  9. Rashid, A., & Chaturvedi, A. (2019). Virtualization and its role in cloud computing environment. International Journal of Computer Sciences and Engineering, 7(4), 1131–1136.

    Article  Google Scholar 

  10. Kumari, P., & Kaur, P. (2021). A survey of fault tolerance in cloud computing. Journal of King Saud University-Computer and Information Sciences, 33(10), 1159–1176.

    Article  Google Scholar 

  11. Sun, L., Jiang, X., Ren, H., & Guo, Yi. (2020). Edge-cloud computing and artificial intelligence in internet of medical things: Architecture, technology and application. IEEE Access, 8, 101079–101092.

    Article  Google Scholar 

  12. Zhou, Y., Ling Liu, Lu., Wang, N. H., Cui, X., Jie, Wu., Peng, Y., Qi, Y., & Xing, C. (2020). Service-aware 6G: An intelligent and open network based on the convergence of communication, computing and caching. Digital Communications and Networks, 6(3), 253–260.

    Article  Google Scholar 

  13. Pourghaffari, A., Barari, M., & Sedighian, K. S. (2019). An efficient method for allocating resources in a cloud computing environment with a load balancing approach. Concurrency and Computation: Practice and Experience., 31(17), e5285.

    Article  Google Scholar 

  14. Tarahomi, M., Izadi, M., & Ghobaei-Arani, M. (2021). An efficient power-aware VM allocation mechanism in cloud data centers: A micro genetic-based approach. Cluster Computing, 24(2), 919–934.

    Article  Google Scholar 

  15. Dhaya, R., Kanthavel, R., & Venusamy, K. (2021). Dynamic secure and automated infrastructure for private cloud data center. Annals of Operations Research, 1–21.

  16. Kumar, M., & Singh, A. K. (2020). Distributed intrusion detection system using blockchain and cloud computing infrastructure. In 2020 4th international conference on trends in electronics and informatics (ICOEI)(48184) (pp. 248–252). IEEE.

  17. Abusitta, A., Bellaiche, M., Dagenais, M., & Halabi, T. (2019). A deep learning approach for proactive multi-cloud cooperative intrusion detection system. Future Generation Computer Systems, 98, 308–318.

    Article  Google Scholar 

  18. Moualla, S., Khorzom, K., & Jafar, A. (2021). Improving the performance of machine learning-based network intrusion detection systems on the UNSW-NB15 dataset. Computational Intelligence and Neuroscience. 2021.

  19. Attaran, M., & Woods, J. (2019). Cloud computing technology: Improving small business performance using the Internet. Journal of Small Business & Entrepreneurship, 31(6), 495–519.

    Article  Google Scholar 

  20. Chen, M., Wang, N., Zhou, H., & Chen, Y. (2018). FCM technique for efficient intrusion detection system for wireless networks in cloud environment. Computers & Electrical Engineering, 71, 978–987.

    Article  Google Scholar 

  21. Dey, S., Ye, Q., & Sampalli, S. (2019). A machine learning based intrusion detection scheme for data fusion in mobile clouds involving heterogeneous client networks. Information Fusion, 49, 205–215.

    Article  Google Scholar 

  22. Aldwyan, Y., & Sinnott, R. O. (2019). Latency-aware failover strategies for containerized web applications in distributed clouds. Future Generation Computer Systems, 101, 1081–1095.

    Article  Google Scholar 

  23. Yaghoubi, M., & Maroosi, A. (2020). Simulation and modeling of an improved multi-verse optimization algorithm for QoS-aware web service composition with service level agreements in the cloud environments. Simulation Modelling Practice and Theory, 103, 102090.

    Article  Google Scholar 

  24. Sanaj, M. S., & Prathap, P. J. (2020). An efficient approach to the map-reduce framework and genetic algorithm based whale optimization algorithm for task scheduling in cloud computing environment. Materials Today: Proceedings.

  25. Sharma, A. K., Upreti, K., & Vargis, B. (2020). Experimental performance analysis of load balancing of tasks using honey bee inspired algorithm for resource allocation in cloud environment. Materials Today: Proceedings.

  26. Wangfi, S., Wang, W., & Tan, Y. (2020). Internet cross-border service model based on 5G environment and cloud computing data platform. Microprocessors and Microsystems, p. 103520.

  27. Shamshirband, S., Fathi, M., Chronopoulos, A. T., Montieri, A., Palumbo, F., & Pescapè, A. (2020). Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues. Journal of Information Security and Applications, 55, 102582.

    Article  Google Scholar 

  28. Ibrahim, G. J., Rashid, T. A., & Akinsolu, M. O. (2020). An energy efficient service composition mechanism using a hybrid meta-heuristic algorithm in a mobile cloud environment. Journal of Parallel and Distributed Computing, 143, 77–87.

    Article  Google Scholar 

  29. Samriya, J. K., & Kumar, N. (2020). A novel intrusion detection system using hybrid clustering-optimization approach in cloud computing. Materials Today: Proceedings.

  30. SaiSindhuTheja, R., & Shyam, G. K. (2021). An efficient metaheuristic algorithm based feature selection and recurrent neural network for DoS attack detection in cloud computing environment. Applied Soft Computing, 100, 106997.

    Article  Google Scholar 

  31. Jaber, A. N., & Rehman, S. U. (2020). FCM–SVM based intrusion detection system for cloud computing environment. Cluster Computing., 23(4), 3221–3231.

    Article  Google Scholar 

  32. Mayuranathan, M., Murugan, M., & Dhanakoti, V. (2021). Best features based intrusion detection system by RBM model for detecting DDoS in cloud environment. Journal of Ambient Intelligence and Humanized Computing, 12(3), 3609–3619.

    Article  Google Scholar 

  33. Velliangiri, S., & Premalatha, J. (2019). Intrusion detection of distributed denial of service attack in cloud. Cluster Computing, 22(5), 10615–10623.

    Article  Google Scholar 

  34. Aldallal, A., & Alisa, F. (2021). Effective intrusion detection system to secure data in cloud using machine learning. Symmetry, 13(12), 2306.

    Article  Google Scholar 

  35. Wen, L. (2021). Cloud computing intrusion detection technology based on BP-NN. Wireless Personal Communications, 1–18.

  36. Thilagam, T., & Aruna, R. (2021). Intrusion detection for network based cloud computing by custom RC-NN and optimization. ICT Express, 7(4), 512–520.

    Article  Google Scholar 

  37. Srilatha, D., & Shyam, G. K. (2021). Cloud-based intrusion detection using kernel fuzzy clustering and optimal type-2 fuzzy neural network. Cluster Computing, 24(3), 2657–2672.

    Article  Google Scholar 

  38. Sandosh, S., Govindasamy, V., & Akila, G. (2020). Enhanced intrusion detection system via agent clustering and classification based on outlier detection. Peer-to-Peer Networking and Applications, 13(3), 1038–1045.

    Article  Google Scholar 

Download references

Funding

There is no funding from any Research or Funding Agency.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. G. Maheswari.

Ethics declarations

Conflict of interest

The authors declare that we have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Maheswari, K.G., Siva, C. & Priya, G.N. An Optimal Cluster Based Intrusion Detection System for Defence Against Attack in Web and Cloud Computing Environments. Wireless Pers Commun 128, 2011–2037 (2023). https://doi.org/10.1007/s11277-022-10030-7

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-022-10030-7

Keywords

Navigation