Abstract
Cloud computing provides services to the user through the Internet and is cost-efficient. It comprises of a wide range of users that makes the security of data a matter of concern. Intrusion Detection System (IDS) is a multipurpose security system either in hardware or software form applied to a network that detects abnormality in packets. Detecting intrusions involve observing any changes from normal behaviour. Cloud contains huge amount of data for which high storage space is required. To reduce the required space only relevant data is stored. This is done applying feature selection procedure. Hereby, we have proposed an IDS functioning on the concept of feature selection from NSL-KDD dataset . The efficient IDS is based on our proposed algorithm BCS-GA and gives better accuracy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Srinivas, J., Reddy, K.V.S., Qyser, A.M.: Cloud Computing Basics. Int. J. Adv. Research Comput. Commun. Engg. (IJARCCE) 1(5), 343–347 (2013)
Padhy, R.P., Patra, M.R., Satapathy, S.C.: Cloud Computing: Security Issues and Research challenges. Int. J. Comput. Sci. Info. Tech. Security (IJCSITS) 1(2), 136–146 (2011)
Ghosh, P., Mandal, A.K., Kumar, R.: An Efficient Cloud Network Intrusion Detection System. In: Information systems design and Intelligent Applications, Advances in Intelligent Systems and computing 339, Springer India, 91–99 (2015)
Zhang, Q., Cheng, L., Boutaba, R.: Cloud Computing: state-of-the-art and research challenges. J. Internet Serv. Appl. 1, 7–18 (2010)
Hashizume, K., Rosado, D.G., Medina, E.F., Fernandez, E.B.: An analysis of security issues for Cloud Computing. In: Journal of Internet Services and Applications, Springer, 1–13 (2013)
Boncheva, V.M.: A Short Survey Of Intrusion detection Systems. In: problems of Engineering Cybernetics and Robotics 58, 23–30 (2007)
Raghav, I., Chikara, S., Hasteer, N.: Intrusion Detection and prevention in Cloud Environment: A systematic Review. Int. J. Comput. Appl. (IJCA) 68(24), 7–11 (2013)
Ladha, L., Deepa, T.: Feature Selection Methods and Algorithms. Int. J. Comp. Sci. Engg. (IJCSE) 3(5), 1787–1797 (2011)
Fang, Z., Na, L., Jinhui, L.: Application Research of the Genetic Algorithm on the Intelligent Test Paper Composition of Examination Database. Springer (ICAIC) 4, 443–448 (2011)
Soneji, H., Sanghvi, R.C.: Towards the Improvement of Cuckoo Search Algorithm. In: Conference on World Congress on Information and Communication Technologies, IEEE, 878–883 (2012)
Shawish, A., Salama, M.: Cloud Computing: Paradigms and Technologies. Inter-cooperative Collective Intelligence: Techniques and Applications, Studies in Computational Intelligence 495, Springer, 39–67 (2014)
Kumar, B.S., Raju, T.C.S.P., Ratnakar, M., Baba, Sk.D., Sudhakar, N.: Intruson Detection System-Types and Prevention. Int. J. Comput. Sci. Info. Tech. (IJCSIT) 4(1), 77–82 (2013)
Tuba, M., Subotic, M., Stanarevic, N.: Performance of a Modified Cuckoo Search Algorithm for Unconstrained Optimization Problems. In: WSEAS Transactions on Systems 11(2), 62–74 (2012)
Li, X., Yin, M.: Modified Cuckoo search algorithm with self adaptive parameter method. In: Information Sciences, Elsevier 298, 80–97 (2015)
Naik, M., Nath, M.R., Wunnava, A., Sahany, S., Panda, R.: A New Adaptive Cuckoo Search Algorithm. In: 2nd International Conference on Recent Trends in Information Systems, IEEE, 1–5 (2015)
Zhonghua, H., Xiaoting, D., Xisheng, L.: Self-adaptive cuckoo search algorithm for hybrid flowshop makespan problem. In: The 5th Annual IEEE International Conference on cyber Technology in Automation, control and Intelligent Systems, 1539–1545 (2015)
Yan, X., Luo, W., Li, W., Chen, W., Zhang, C., Liu, H.: An Improved Genetic Algorithm and Its Applications in Classification. Int. J. Comput. Sci. (IJCSI) 10(1), 337–346 (2013)
Soto, R., Crawford, B., Olivares, R., Barraza, J., Johnson, F., Paredes, F.: A Binary Cuckoo Search Algorithm for Solving the Set Covering Problem. Springer (IWINSE) 2, 88–97 (2015)
Tabassum, M., Mathew, K.: A Genetic Algorithm Analysis Towards Optimazation solutions. Int. J. Digital Info. Wireless Comm. (IJDIWC) 4(1), 124–142 (2014)
Ghosh, P., Mitra, R.: Proposed GA-BFSS and Logistic Regression based Intrusion Detection System. IEEE, 1–6 (2015)
Yu, L., Liu, H. Feature Selection for High Dimentional Data: A Fast Correletion-Based Filter Solution. In: 20th International Conference on Machine Learning (ICML), 1–8 (2013)
Roy, S., Chaudhuri, S.S.: Cuckoo Search Algorithm using Levy Flight: A Review. I.J. Modern Education and Computer Science 12, 10–15 (2013)
Jamil, M., Zepernick, H., Yang, X.: Levy Flight Based Cuckoo Search Algorithm for Synthesizing Cross-Ambiguity Functions. In: IEEE Military Communications Conference, 823–828 (2013)
Padhy N.P., Simon S.P. Soft computing: With Matlab Programming. Oxford Publication Book, 1st edition (2015).
Yan, G., Xie, G., Chen, Z., Xie, K.: Knowledge-Based Genetic Algorithms. Springer (RSKT), 148–155 (2008)
Sheng, L., Gao-yun, L., Jia, S., Tian-ying, S.: Research on Optimization Efficiency of Genetic Algorithms. IEEE, 1–4 (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Ghosh, P., Jha, S., Dutta, R., Phadikar, S. (2018). Intrusion Detection System Based on BCS-GA in Cloud Environment. In: Shetty, N., Patnaik, L., Prasad, N., Nalini, N. (eds) Emerging Research in Computing, Information, Communication and Applications. ERCICA 2016. Springer, Singapore. https://doi.org/10.1007/978-981-10-4741-1_35
Download citation
DOI: https://doi.org/10.1007/978-981-10-4741-1_35
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-4740-4
Online ISBN: 978-981-10-4741-1
eBook Packages: EngineeringEngineering (R0)