Skip to main content
Log in

FCM–SVM based intrusion detection system for cloud computing environment

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Cloud computing offer various services over the Internet based on pay-per-use concept. Therefore, many organizations have already adopted this system to attract the users with its desirable features. However, due to its design, makes it vulnerable to malicious attacks. This demands an Intrusion Detection System that can detect such attacks with high detection accuracy in cloud environment. This paper proposes a novel intrusion detection system that combines a fuzzy c means clustering (FCM) algorithm with support vector machine (SVM) to improve the accuracy of the detection system in cloud computing environment. The proposed system is implemented and compared with existing mechanisms. The NSL-KDD dataset is used for experiments. Based on performance evaluation and comparative analysis, the results obtained using this new hybrid mechanism (FCM–SVM) show that the proposed system can detect the anomalies with high detection accuracy and low false alarm rates over the existing techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Velte, A., Velte, T.: Cloud Computing: A Practical Approach. McGraw-Hill, Ney York (2019)

    MATH  Google Scholar 

  2. Prakash, S.: Role of virtualization techniques in cloud computing environment. In: Bhatia, S.K., Tiwari, S., Mishra, K.K., Trivedi, M.C. (eds.) Advances in Computer Communication and Computational Sciences, pp. 439–450. Springer, Singapore (2019)

    Google Scholar 

  3. Bawa, P., Rehman, S., Manickam, S.: Enhanced mechanism to detect and mitigate economic denial of sustainability (EDoS) attack in cloud computing environments. Int. J. Adv. Comput. Sci. Appl. 8(9), 51–58 (2017)

    Google Scholar 

  4. Singh, P., Manickam, S., & Rehman, S.: A survey of mitigation techniques against Economic Denial of Sustainability (EDoS) attack on cloud computing architecture. In: Proceedings of 3rd International Conference on Reliability, Infocom Technologies and Optimization. IEEE pp. 1–4, (2014)

  5. Osanaiye, O., Choo, K.K., Dlodlo, M.: Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework. J. Netw. Comput. Appl. 67(1), 147–165 (2016)

    Article  Google Scholar 

  6. Kuang, F., Xu, W., Zhang, S.: A novel hybrid KPCA and SVM with GA model for intrusion detection. Appl. Soft Comput. 18(1), 178–184 (2014)

    Article  Google Scholar 

  7. Nkikabahizi, C., Cheruiyot, W., Kibe, A.: Classification and analysis of techniques applied in intrusion detection systems. Int. J. Sci. Eng. Technol. 6(7), 216–219 (2017)

    Google Scholar 

  8. Ghamisi, P., Benediktsson, J.: Feature selection based on hybridization of genetic algorithm and particle swarm optimization. IEEE Geosci. Remote Sens. Lett. 12(2), 309–313 (2014)

    Article  Google Scholar 

  9. Saljoughi, A., Mehrvarz, M., Mirvaziri, H.: Attacks and intrusion detection in cloud computing using neural networks and particle swarm optimization algorithms. Emerg. Sci. J. 1(4), 179–191 (2017)

    Google Scholar 

  10. Costa, K., Pereira, C., Nakamura, R., Pereira, L., Papa, J.: Boosting Optimum-Path Forest clustering through harmony Search and its applications for intrusion detection in computer networks. In: 2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN), pp.181-185 (2012)

  11. Aljawarneh, S., Aldwairi, M., Yassein, M.: Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J. Comput. Sci. 25(1), 152–160 (2018)

    Article  Google Scholar 

  12. Raja, S., Ramaiah, S.: Performance comparison of neuro-fuzzy cloud intrusion detection systems. Int. Arab J. Inf. Technol. 13(1A), 142–149 (2016)

    Google Scholar 

  13. Akoglu, L., Tong, H., Koutra, D.: Graph based anomaly detection and description: a survey. Data Min. Knowl. Discov. 29(3), 626–688 (2015)

    Article  MathSciNet  Google Scholar 

  14. AL-Utrakchi, E., AL-Mousa, M.: Analyzing network traffic to enhance the IDS accuracy using intrusion blacklist. Int. J. Comput. Sci. Inform. Secur. 15(1), 46–47 (2017)

    Google Scholar 

  15. Kenkre, P., Pai, A., Colaco, L.: Real time intrusion detection and prevention system. In: Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA), pp. 405–411 (2015)

  16. Saied, A., Overill, R., Radzik, T.: Detection of known and unknown DDoS attacks using Artificial Neural Networks. Neurocomputing 172(1), 385–393 (2016)

    Article  Google Scholar 

  17. Freedman, A. T., Pye, I. G., Ellis, D. P., Applegate, I.: Network monitoring, detection, and analysis system. U.S. Patent 9,942,253, issued April 10 (2018)

  18. Rosli, A., Taib, A., Ali, W.: Utilizing the enhanced risk assessment equation to determine the apparent risk due to user datagram protocol (UDP) flooding attack. Sains Hum. 9(1), 1–4 (2017)

    Google Scholar 

  19. Kaur, G., Saxena, V., Gupta, J.: Detection of TCP targeted high bandwidth attacks using self-similarity. J. King Saud Univ.-Comput. Inform. Sci. 49, 105–110 (2017)

    Google Scholar 

  20. Kumar, D.: DDoS attacks and their types. In: Network security attacks and countermeasures. IGI, Global (2016). https://doi.org/10.4018/978-1-4666-8761-5.ch007

  21. Suhasaria, P., Garg, A., Agarwal, A., Selvakumar, K.: Distributed denial of service attacks: a survey. Imp. J. Interdiscip. Res. 3(2), 71–80 (2017)

    Google Scholar 

  22. Bhushan, K., Gupta, B.: Security challenges in cloud computing: state-of-art. Int. J. Big Data Intell. 4(2), 81–107 (2017)

    Article  Google Scholar 

  23. Hota, H.S., Shrivas, A.K.: Data mining approach for developing various models based on types of attack and feature selection as intrusion detection systems (IDS). In: Mohapatra, D., Patnaik, S. (eds.) Intelligent computing, networking, and informatics. Advances in intelligent systems and computing, vol. 243. Springer, New Delhi (2014). https://doi.org/10.1007/978-81-322-1665-0_85

  24. Pervez, M., Farid, D.: Feature selection and intrusion classification in NSL-KDD cup 99 dataset employing SVMs. In: 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA). IEEE, pp. 1–6 (2014)

  25. Enache, A.C., Patriciu, V.: Intrusions detection based on support vector machine optimized with swarm intelligence. In: 9th international symposium on applied computational intelligence and informatics (SACI). IEEE, pp. 153–58 (2014)

  26. Eid, H., Darwish, A., Hassanien, A., Kim, T.H.: Intelligent hybrid anomaly network intrusion detection system. In: International Conference on Future Generation Communication and Networking, pp. 209–218 (2011)

  27. De la Hoz, E., De La Hoz, E., Ortiz, A., Ortega, J., Martínez-Álvarez, A.: Feature selection by multi-objective optimisation: application to network anomaly detection by hierarchical self-organizing maps. Knowl.-Based Syst. 71, 322–338 (2014)

    Article  Google Scholar 

  28. Rastegari, S., Hingston, P., Lam, C.P.: Evolving statistical rulesets for network intrusion detection. Appl. Soft Comput. 33, 348–359 (2015)

    Article  Google Scholar 

  29. Kanakarajan, N., Muniasamy, K.: Improving the accuracy of intrusion detection using GAR-Forest with feature selection. In: Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA), pp. 539–547 (2016)

  30. Hassanien, A., Kim, T.H., Kacprzyk, J., Awad, A.: Bio-inspiring cyber security and cloud services: trends and innovations. Springer, New York (2014)

    Book  Google Scholar 

  31. Pajouh, H., Dastghaibyfard, G., Hashemi, S.: Two-tier network anomaly detection model: a machine learning approach. Jo. Intell. Inform. Syst. 48(1), 61–74 (2017)

    Article  Google Scholar 

  32. Pandeeswari, N., Kumar, G.: Anomaly detection system in cloud environment using fuzzy clustering-based ANN. Mob. Netw. Appl. 21(3), 494–505 (2016)

    Article  Google Scholar 

  33. Ingre, B., & Yadav, A.: Performance analysis of NSL-KDD dataset using ANN. In: International Conference on Signal Processing and Communication Engineering Systems, pp. 92–96 (2015)

  34. Bamakan, S., Wang, H., Yingjie, T., Shi, Y.: An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization. Neurocomputing 199, 90–102 (2016)

    Article  Google Scholar 

  35. Raman, M., Somu, N., Kirthivasan, K., Sriram, V.: A hypergraph and arithmetic residue-based probabilistic neural network for classification in intrusion detection systems. Neural Netw. 92, 89–97 (2017)

    Article  Google Scholar 

  36. Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.: A detailed analysis of the KDD CUP 99 data set. In: 2009 Symposium on Computational Intelligence for Security and Defense Applications. IEEE, pp. 1–6 (2009)

  37. Revathi, S., Malathi, A.: A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection. Int. J. Eng. Res. Technol. (IJERT) 2(12), 1848–1853 (2013)

    Google Scholar 

  38. Zadeh, L.: Fuzzy logic: a personal perspective. Fuzzy Sets Syst. 281, 4–20 (2015)

    Article  MathSciNet  MATH  Google Scholar 

  39. Weka Simulation: Weka 3 Machine Learning Software in Java. University of Waikato. https://www.cs.waikato.ac.nz/ml/weka/ (2019). Accessed 16 Mar 2019

Download references

Acknowledgements

This work was supported by the Faculty of Computer Systems and Software Engineering (FSKKP), Univer-siti Malaysia Pahang (UMP), Malaysia. In collaboration with ST Engineering Electronics-SUTD Cyber Security Laboratory, Singapore University of Technology and Design (SUTD), Singapore.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shafiq Ul Rehman.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jaber, A.N., Rehman, S.U. FCM–SVM based intrusion detection system for cloud computing environment. Cluster Comput 23, 3221–3231 (2020). https://doi.org/10.1007/s10586-020-03082-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-020-03082-6

Keywords

Navigation