Abstract
Cloud computing offer various services over the Internet based on pay-per-use concept. Therefore, many organizations have already adopted this system to attract the users with its desirable features. However, due to its design, makes it vulnerable to malicious attacks. This demands an Intrusion Detection System that can detect such attacks with high detection accuracy in cloud environment. This paper proposes a novel intrusion detection system that combines a fuzzy c means clustering (FCM) algorithm with support vector machine (SVM) to improve the accuracy of the detection system in cloud computing environment. The proposed system is implemented and compared with existing mechanisms. The NSL-KDD dataset is used for experiments. Based on performance evaluation and comparative analysis, the results obtained using this new hybrid mechanism (FCM–SVM) show that the proposed system can detect the anomalies with high detection accuracy and low false alarm rates over the existing techniques.
Similar content being viewed by others
References
Velte, A., Velte, T.: Cloud Computing: A Practical Approach. McGraw-Hill, Ney York (2019)
Prakash, S.: Role of virtualization techniques in cloud computing environment. In: Bhatia, S.K., Tiwari, S., Mishra, K.K., Trivedi, M.C. (eds.) Advances in Computer Communication and Computational Sciences, pp. 439–450. Springer, Singapore (2019)
Bawa, P., Rehman, S., Manickam, S.: Enhanced mechanism to detect and mitigate economic denial of sustainability (EDoS) attack in cloud computing environments. Int. J. Adv. Comput. Sci. Appl. 8(9), 51–58 (2017)
Singh, P., Manickam, S., & Rehman, S.: A survey of mitigation techniques against Economic Denial of Sustainability (EDoS) attack on cloud computing architecture. In: Proceedings of 3rd International Conference on Reliability, Infocom Technologies and Optimization. IEEE pp. 1–4, (2014)
Osanaiye, O., Choo, K.K., Dlodlo, M.: Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework. J. Netw. Comput. Appl. 67(1), 147–165 (2016)
Kuang, F., Xu, W., Zhang, S.: A novel hybrid KPCA and SVM with GA model for intrusion detection. Appl. Soft Comput. 18(1), 178–184 (2014)
Nkikabahizi, C., Cheruiyot, W., Kibe, A.: Classification and analysis of techniques applied in intrusion detection systems. Int. J. Sci. Eng. Technol. 6(7), 216–219 (2017)
Ghamisi, P., Benediktsson, J.: Feature selection based on hybridization of genetic algorithm and particle swarm optimization. IEEE Geosci. Remote Sens. Lett. 12(2), 309–313 (2014)
Saljoughi, A., Mehrvarz, M., Mirvaziri, H.: Attacks and intrusion detection in cloud computing using neural networks and particle swarm optimization algorithms. Emerg. Sci. J. 1(4), 179–191 (2017)
Costa, K., Pereira, C., Nakamura, R., Pereira, L., Papa, J.: Boosting Optimum-Path Forest clustering through harmony Search and its applications for intrusion detection in computer networks. In: 2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN), pp.181-185 (2012)
Aljawarneh, S., Aldwairi, M., Yassein, M.: Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J. Comput. Sci. 25(1), 152–160 (2018)
Raja, S., Ramaiah, S.: Performance comparison of neuro-fuzzy cloud intrusion detection systems. Int. Arab J. Inf. Technol. 13(1A), 142–149 (2016)
Akoglu, L., Tong, H., Koutra, D.: Graph based anomaly detection and description: a survey. Data Min. Knowl. Discov. 29(3), 626–688 (2015)
AL-Utrakchi, E., AL-Mousa, M.: Analyzing network traffic to enhance the IDS accuracy using intrusion blacklist. Int. J. Comput. Sci. Inform. Secur. 15(1), 46–47 (2017)
Kenkre, P., Pai, A., Colaco, L.: Real time intrusion detection and prevention system. In: Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA), pp. 405–411 (2015)
Saied, A., Overill, R., Radzik, T.: Detection of known and unknown DDoS attacks using Artificial Neural Networks. Neurocomputing 172(1), 385–393 (2016)
Freedman, A. T., Pye, I. G., Ellis, D. P., Applegate, I.: Network monitoring, detection, and analysis system. U.S. Patent 9,942,253, issued April 10 (2018)
Rosli, A., Taib, A., Ali, W.: Utilizing the enhanced risk assessment equation to determine the apparent risk due to user datagram protocol (UDP) flooding attack. Sains Hum. 9(1), 1–4 (2017)
Kaur, G., Saxena, V., Gupta, J.: Detection of TCP targeted high bandwidth attacks using self-similarity. J. King Saud Univ.-Comput. Inform. Sci. 49, 105–110 (2017)
Kumar, D.: DDoS attacks and their types. In: Network security attacks and countermeasures. IGI, Global (2016). https://doi.org/10.4018/978-1-4666-8761-5.ch007
Suhasaria, P., Garg, A., Agarwal, A., Selvakumar, K.: Distributed denial of service attacks: a survey. Imp. J. Interdiscip. Res. 3(2), 71–80 (2017)
Bhushan, K., Gupta, B.: Security challenges in cloud computing: state-of-art. Int. J. Big Data Intell. 4(2), 81–107 (2017)
Hota, H.S., Shrivas, A.K.: Data mining approach for developing various models based on types of attack and feature selection as intrusion detection systems (IDS). In: Mohapatra, D., Patnaik, S. (eds.) Intelligent computing, networking, and informatics. Advances in intelligent systems and computing, vol. 243. Springer, New Delhi (2014). https://doi.org/10.1007/978-81-322-1665-0_85
Pervez, M., Farid, D.: Feature selection and intrusion classification in NSL-KDD cup 99 dataset employing SVMs. In: 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA). IEEE, pp. 1–6 (2014)
Enache, A.C., Patriciu, V.: Intrusions detection based on support vector machine optimized with swarm intelligence. In: 9th international symposium on applied computational intelligence and informatics (SACI). IEEE, pp. 153–58 (2014)
Eid, H., Darwish, A., Hassanien, A., Kim, T.H.: Intelligent hybrid anomaly network intrusion detection system. In: International Conference on Future Generation Communication and Networking, pp. 209–218 (2011)
De la Hoz, E., De La Hoz, E., Ortiz, A., Ortega, J., Martínez-Álvarez, A.: Feature selection by multi-objective optimisation: application to network anomaly detection by hierarchical self-organizing maps. Knowl.-Based Syst. 71, 322–338 (2014)
Rastegari, S., Hingston, P., Lam, C.P.: Evolving statistical rulesets for network intrusion detection. Appl. Soft Comput. 33, 348–359 (2015)
Kanakarajan, N., Muniasamy, K.: Improving the accuracy of intrusion detection using GAR-Forest with feature selection. In: Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA), pp. 539–547 (2016)
Hassanien, A., Kim, T.H., Kacprzyk, J., Awad, A.: Bio-inspiring cyber security and cloud services: trends and innovations. Springer, New York (2014)
Pajouh, H., Dastghaibyfard, G., Hashemi, S.: Two-tier network anomaly detection model: a machine learning approach. Jo. Intell. Inform. Syst. 48(1), 61–74 (2017)
Pandeeswari, N., Kumar, G.: Anomaly detection system in cloud environment using fuzzy clustering-based ANN. Mob. Netw. Appl. 21(3), 494–505 (2016)
Ingre, B., & Yadav, A.: Performance analysis of NSL-KDD dataset using ANN. In: International Conference on Signal Processing and Communication Engineering Systems, pp. 92–96 (2015)
Bamakan, S., Wang, H., Yingjie, T., Shi, Y.: An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization. Neurocomputing 199, 90–102 (2016)
Raman, M., Somu, N., Kirthivasan, K., Sriram, V.: A hypergraph and arithmetic residue-based probabilistic neural network for classification in intrusion detection systems. Neural Netw. 92, 89–97 (2017)
Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.: A detailed analysis of the KDD CUP 99 data set. In: 2009 Symposium on Computational Intelligence for Security and Defense Applications. IEEE, pp. 1–6 (2009)
Revathi, S., Malathi, A.: A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection. Int. J. Eng. Res. Technol. (IJERT) 2(12), 1848–1853 (2013)
Zadeh, L.: Fuzzy logic: a personal perspective. Fuzzy Sets Syst. 281, 4–20 (2015)
Weka Simulation: Weka 3 Machine Learning Software in Java. University of Waikato. https://www.cs.waikato.ac.nz/ml/weka/ (2019). Accessed 16 Mar 2019
Acknowledgements
This work was supported by the Faculty of Computer Systems and Software Engineering (FSKKP), Univer-siti Malaysia Pahang (UMP), Malaysia. In collaboration with ST Engineering Electronics-SUTD Cyber Security Laboratory, Singapore University of Technology and Design (SUTD), Singapore.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Jaber, A.N., Rehman, S.U. FCM–SVM based intrusion detection system for cloud computing environment. Cluster Comput 23, 3221–3231 (2020). https://doi.org/10.1007/s10586-020-03082-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-020-03082-6