Skip to main content
Log in

Enhanced Quantum-Secure Ensemble Intrusion Detection Techniques for Cloud Based on Deep Learning

  • Original Article
  • Published:
Cognitive Computation Aims and scope Submit manuscript

Abstract

The increasing popularity of cloud computing systems has drawn significant attention from academics and businesses for several decades. However, cloud computing systems are plagued with several concerns, such as privacy, confidentiality, and availability, which can be detrimental to their performance. Intrusion detection has emerged as a critical issue, particularly in detecting new types of intrusions that can compromise the security of cloud systems. Preventive risk models have been developed to check the cloud for potential threats, and the rise of quantum computing attacks necessitates the deployment of an intrusion detection system (IDS) for cloud security risk assessment. This research proposes a unique method for detecting cloud computing intrusions by utilizing the KDDcup 1999, UNSW-NB15, and NSL-KDD datasets to address these concerns. This proposed system is designed to achieve two objectives. Firstly, it analyzes the disadvantages of existing IDS, and secondly, it presents an accuracy enhancement model of IDS. The proposed Ensemble Intrusion Detection Model for Cloud Computing Using Deep Learning (EICDL) is designed to detect intrusions effectively. The performance of the proposed model is compared to modern machine learning methods and existing IDS, and the experimental findings indicate that the EICDL ensemble technique improves detection and can identify subsequent attacks/intrusions with a recall rate of 92.14%. The proposed method EICDL ensemble technique significantly improves the accuracy and efficiency of intrusion detection in cloud systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Data Availability

Datasets used for experimental analysis in this study are publicly available.

References

  1. Patcha A, Park J-M. An overview of anomaly detection models: existing solutions and latest technological trends. Comput Netw. 2007;51(12):3448–70.

    Article  Google Scholar 

  2. Sahoo D, Liu C, Hoi SC. Malicious url detection using machine learning: A survey. arXiv preprint arXiv:1701.07179, 2017.

  3. Buczak AL, Guven E. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications surveys & tutorials, 18(2):1153–1176, 2015.

  4. Agarap AFM. A neural network architecture combining gated recurrent unit (gru) and support vector machine (svm) for intrusion detection in network traffic data. In Proceedings of the 2018 10th International Conference on Machine Learning and Computing, pages 26–30, 2018.

  5. Alom MZ, Bontupalli V, Taha TM. Intrusion detection using deep belief networks. In 2015 National Aerospace and Electronics Conference (NAECON). IEEE, 2015;339–344.

  6. Alrawashdeh K, Purdy C. Toward an online anomaly intrusion detection Model based on deep learning. In 2016 15th IEEE international conference on machine learning and applications (ICMLA). IEEE, 2016;195–200.

  7. Ammar A, et al. A decision tree classifier for intrusion detection priority tagging. J Comput Commun. 2015;3(04):52.

    Article  Google Scholar 

  8. Chandrasekhar AM, Raghuveer K. Confederation of fcm clustering, ann and svm models to implement hybrid nids using corrected kdd cup 99 dataset. 2014 Int Conf Commun Signal Proc. IEEE, 2014;672–676.

  9. Dada EG. A hybridized svm-knn-pdapso approach to intrusion detection model. Proc Fac Seminar Ser. 2017;14–21.

  10. LeCun Y, Bengio Y, Hinton G. Deep learning. nature 521 (7553), 436–444. Google Scholar Google Scholar Cross Ref Cross Ref.2015.

  11. Abadi M, Chu A, Goodfellow I, McMahan HB, Mironov I, Talwar K, Zhang L. Deep learning with differential privacy. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pages 308–318, 2016.

  12. Sun G, Xie Y, Liao D, Hongfang Yu, Chang V. User-defined privacy location-sharing model in mobile online social networks. J Netw Comput Appl. 2017;86:34–45.

    Article  Google Scholar 

  13. Azad C, Jha VK. Genetic algorithm to solve the problem of small disjunct in the decision tree based intrusion detection Model. Int J Comput Netw Inf Secur. 2015;7(8):56–71.

  14. Vishwakarma S, Sharma V, Tiwari A. An intrusion detection model using knn-aco algorithm. Int J Comput Appl. 2017;171(10):18–23.

    Google Scholar 

  15. Gao N, Gao L, Gao Q, Wang H. An intrusion detection model based on deep belief networks. 2014 Second Int Conf Adv Cloud Big Data 2014 Nov 20 (pp. 247-252). IEEE.

  16. Zhao G, Zhang C, Zheng L. Intrusion detection using deep belief network and probabilistic neural network. In 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), volume 1, pages 639–642. IEEE, 2017.

  17. Tan QS, Huang W, Li Q. An intrusion detection method based on dbn in ad hoc networks. In Wireless Communication and Sensor Network: Proceedings of the International Conference on Wireless Communication and Sensor Network (WCSN 2015), pages 477–485. World Scientific, 2016.

  18. Kim J, Kim H, et al. An effective intrusion detection classifier using long short-term memory with gradient descent optimization. In 2017 International Conference on Platform Technology and Service (PlatCon), pages 1–6. IEEE, 2017.

  19. Nadeem M, Marshall O, Singh S, Fang X, Yuan X. Semi-supervised deep neural network for network intrusion detection. 2016.

  20. Kolosnjaji B, Zarras A, Webster G, Eckert C. Deep learning for classification of malware model call sequences. In Australasian Joint Conference on Artificial Intelligence, pages 137–149. Springer, 2016.

  21. Wei J, Long C, Li J, Zhao J. An intrusion detection algorithm based on bag representation with ensemble support vector machine in cloud computing. Concurr Comput. 2020;32(24): e5922.

    Article  Google Scholar 

  22. Singh P, Ranga V. Attack and intrusion detection in cloud computing using an ensemble learning approach. Int J Inf Technol. 2021;13(2):565–71.

    Google Scholar 

  23. Ganaie MA, Hu M, Malik AK, Tanveer M, Suganthan PN. Ensemble deep learning: a review. Eng Appl Artif Intell. 2022;115: 105151.

    Article  Google Scholar 

  24. Pervez MS, Farid DM. Feature selection and intrusion classification in nsl-kdd cup 99 dataset employing svms. In The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014), pages 1–6. IEEE, 2014.

  25. Sharifi AM, Amirgholipour SK, Pourebrahimi A. Intrusion detection based on joint of k-means and knn. J Converg Inf Technol. 10(5):42, 2015.

  26. Salvakkam DB, Pamula R. MESSB–LWE: multi-extractable somewhere statistically binding and learning with error-based integrity and authentication for cloud storage. J Supercomput. (2022):1–30.

  27. Salvakkam DB, Pamula R. Design of fully homomorphic multikey encryption scheme for secured cloud access and storage environment. J Intell Inf Syst (2022):1–23.

  28. Babu SD, Pamula R. An effective block-chain based authentication technique for cloud based IoT. Int Conf Adv Comput Data Sci. Springer, Singapore, 2020.

  29. Saxena H, Richariya V. Intrusion detection in kdd99 dataset using svm-pso and feature reduction with information gain. Int J Comput Appl. 98(6): 2014.

  30. Staudemeyer RC. Applying long short-term memory recurrent neural networks to intrusion detection. S Afr Comput J. 56(1):136–154, 2015.

  31. Yu Y, Long J, Cai Z. Network intrusion detection through stacking dilated convolutional autoencoders. S Commun Netw. 2017.

  32. Ding Y, Chen S, Xu J. Application of deep belief networks for opcode-based malware detection. In 2016 International Joint Conference on Neural Networks (IJCNN), pages 3901–3908. IEEE, 2016.

  33. Kim G, Yi H, Lee J, Paek Y, Yoon S. Lstm-based Model-call language modeling and robust ensemble method for designing host-based intrusion detection Models. arXiv preprint arXiv:1611.01726, 2016.

  34. Ingre B, Yadav A, Soni AK. Decision tree based intrusion detection model for nslkdd dataset. In International conference on information and communication technology for intelligent Models, pages 207–218. Springer, 2017.

  35. Balogun AO, Jimoh RG. Anomaly intrusion detection using an hybrid of decision tree and k-nearest neighbor. 2015.

  36. Kokila RT, Selvi ST, Govindarajan K. Ddos detection and analysis in sdn-based environment using support vector machine classifier. In 2014 Sixth International Conference on Advanced Computing (ICoAC), pages 205–210. IEEE, 2014.

  37. Kotpalliwar MV, Wajgi R. Classification of attacks using support vector machine (svm) on kddcup’ 99 ids database. In 2015 Fifth International Conference on Communication Models and Network Technologies, pages 987–990. IEEE, 2015.

  38. Krishnan RB, Raajan NR. An intellectual intrusion detection model for attacks classification using rnn. Int J Pharm Technol. 8(4):23157–23164, 2016.

  39. Malik AJ, Khan FA. A hybrid model using binary particle swarm optimization and decision tree pruning for network intrusion detection. Clust Comput. 2018;21(1):667–80.

  40. Meng W, Li W, Kwok L-F. Design of intelligent knn-based alarm filter using knowledge based alert verification in intrusion detection. Secur Commun Netw. 2015;8(18):3883–95.

    Article  Google Scholar 

  41. Modinat M, Abimbola A, Abdullateef B, Opeyemi A. Gain ratio and decision tree classifier for intrusion detection. Int J Comput Appl. 2015;126(1):56–9.

    Google Scholar 

  42. Moon D, Im H, Kim I, Park JH. Dtb-ids: an intrusion detection model based on a decision tree using behavior analysis for preventing apt attacks. J Supercomput. 73(7):2881– 2895, 2017.

  43. Rao BB, Swathi K. Fast knn classifiers for network intrusion detection model. Indian J Sci Technol. 10(14):1–10, 2017.

  44. Relan NG, Patil DR. Implementation of network intrusion detection model using variant of decision tree algorithm. In 2015 International Conference on Nascent Technologies in the Engineering Field (ICNTE), pages 1–5. IEEE, 2015.

  45. Saxe J, Berlin K. eXpose: a character-level convolutional neural network with embeddings for detecting malicious urls, file paths and registry keys. arXiv preprint arXiv:1702.08568, 2017.

  46. Shapoorifard H, Shamsinejad P. Intrusion detection using a novel hybrid method incorporating an improved knn. Int J Comput Appl. 2017;173(1):5–9.

    Google Scholar 

  47. Wang W, Zhu M, Wang J, Zeng X, Yang Z. End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In 2017 IEEE International Conference on Intelligence and Security Informatics (ISI), pages 43–48. IEEE, 2017.

  48. Wang W, Zhu M, Zeng X, Ye X, Sheng Y. Malware traffic classification using convolutional neural network for representation learning. In 2017 International Conference on Information Networking (ICOIN), pages 712–717. IEEE, 2017.

  49. Yan M, Liu Z.A new method of transductive svm-based network intrusion detection. In International Conference on Computer and Computing Technologies in Agriculture, pages 87–95. Springer, 2010.

  50. Yin C, Zhu Y, Fei J, He X. A deep learning approach for intrusion detection using recurrent neural networks. Ieee Access. 2017;5:21954–61.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Contributions

Idea and implementation by Dilli Babu Salvakkam. Original manuscript preparation and results analysis by Praphula Kumar jain. Manuscript editing by Vijayalakshmi Saravanan. The entire manuscript has been made under the supervision of Rajendra Pamula.

Corresponding author

Correspondence to Vijayalakshmi Saravanan.

Ethics declarations

Conflict of Interest

The authors declare no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Salvakkam, D.B., Saravanan, V., Jain, P.K. et al. Enhanced Quantum-Secure Ensemble Intrusion Detection Techniques for Cloud Based on Deep Learning. Cogn Comput 15, 1593–1612 (2023). https://doi.org/10.1007/s12559-023-10139-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12559-023-10139-2

Keywords

Navigation