Skip to main content
Log in

Cloud-based intrusion detection using kernel fuzzy clustering and optimal type-2 fuzzy neural network

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Nowadays, digital data is an important asset for every organization. With the advent of cloud computing, cloud service providers (CSPs) offer the required infrastructure to end-users for storage and provide flexibility in accessing data. Since the users access the data from the cloud through the Internet, the data stored in the cloud are exposed to various intrusions. Intrusion detection is considered to be a significant issue in the cloud. The existing techniques are capable to detect well-known attacks but fall short in detecting low frequent attacks. To address this issue, we propose a novel intrusion detection system (IDS) in the cloud using a combination of kernel fuzzy c-means clustering (KFCM) and an optimal type-2 fuzzy neural network (OT2FNN). To achieve this, we optimally select the parameters of T2FNN using the lion optimization algorithm (LOA) for weight optimization. The proposed IDS detects the intrusion and allow only normal data to be stored in the cloud. Simulation results on the NSL-KDD dataset show that the proposed IDS system gives better results than the existing IDS systems in terms of precision, recall, and F-measure.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Vieira, K., Schulter, A., Westphall, C., Westphall, C.: Intrusion detection techniques in grid and cloud computing environment. IEEE IT Prof. Mag. 2010, 38–43 (2010)

    Article  Google Scholar 

  2. Hai, J., Guofu, X., Deqing, Z.: AVMM-based intrusion prevention system in cloud computing environment. J. Supercomput. 66(3), 1133–1151 (2013)

    Article  Google Scholar 

  3. Oktay, U., Sahingoz, O.K.: Attack types and intrusion detection systems in cloud computing. In: Proceedings of 6th International Information Security & Cryptology Conference, pp. 71–76 (2013)

  4. Raja, S., Ramaiah, S.: An efficient fuzzy-based hybrid system to cloud intrusion detection. Int. J. Fuzzy Syst. 19(1), 62–77 (2017)

    Article  Google Scholar 

  5. Work, W.T.: Intrusion Detection Systems (IDS). National Institute of Standers and Technology (2003)

  6. Kumbhare, A., Chaudhari, M.: IDS: survey on intrusion detection system in cloud computing. IJCSMC 3(4), 497–502 (2014)

    Google Scholar 

  7. Roschke, S., Cheng, F., Meinel, C.: Intrusion Detection in the Cloud. In: Eighth IEEE international conference on dependable, autonomic and secure computing (2009).

  8. Balamurugan, V., Saravanan, R.: Enhanced intrusion detection and prevention system on cloud environment using hybrid classification and OTS generation. Clust. Comput. 22(6), 13027–13039 (2019)

    Article  Google Scholar 

  9. Krishnaveni, S., Sivamohan, S., Sridhar, S.S., Prabakaran, S.: Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing. Clust. Comput. 181, 1–19 (2021)

    Google Scholar 

  10. Manickam, M., Rajagopalan, S.P.: A hybrid multi-layer intrusion detection system in cloud. Clust. Comput. 22(2), 3961–3969 (2019)

    Article  Google Scholar 

  11. Jaber, A.N., Rehman, S.U.: FCM–SVM based intrusion detection system for cloud computing environment. Clust. Comput. 23, 1–11 (2020)

    Article  Google Scholar 

  12. Velliangiri, S., Premalatha, J.: Intrusion detection of distributed denial of service attack in cloud. Clust. Comput. 22(5), 10615–10623 (2019)

    Article  Google Scholar 

  13. Raman, M.G., Somu, N., Jagarapu, S., Manghnani, T., Selvam, T., Krithivasan, K., Sriram, V.S.: An efficient intrusion detection technique based on support vector machine and improved binary gravitational search algorithm. Artif. Intell. Rev. 53, 1–32 (2019)

    Google Scholar 

  14. Gao, Y., Liu, Y., Jin, Y., Chen, J., Wu, H.: A novel semi-supervised learning approach for network intrusion detection on cloud-based robotic system. IEEE Access 6, 50927–50938 (2018)

    Article  Google Scholar 

  15. Devi, R.R., Chamundeeswari, V.V.: Triple DES: privacy preserving in big data healthcare. Int. J. Parallel Prog. 48(3), 515–533 (2020)

    Article  Google Scholar 

  16. Abd EL-Latif, A.A., Abd-El-Atty, B., Venegas-Andraca, S.E., Mazurczyk, W.: Efficient quantum-based security protocols for information sharing and data protection in 5G networks. Fut. Gener. Comput. Syst. 100, 893–906 (2019)

    Article  Google Scholar 

  17. AbdEl-Latif, A.A., Abd-El-Atty, B., Hossain, M.S., Elmougy, S., Ghoneim, A.: Secure quantum steganography protocol for fog cloud Internet of Things. IEEE Access 6, 10332–10340 (2018)

    Article  Google Scholar 

  18. Hajimirzaei, B., Navimipour, N.J.: Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm. ICT Express 5(1), 56–59 (2019)

    Article  Google Scholar 

  19. Mahmood, Z., Agrawal, C.: Intrusion detection in cloud computing environment using neural network. Int. J. Res. Comput. Eng. Electron. 1, 1 (2014)

    Google Scholar 

  20. Moradi, M., Zulkernine, M.: A neural network based system for intrusion detection and classification of attacks. IEEE International Conference on Advances in Intelligent System (2004)

  21. Manickam, M., Ramaraj, N., Chellappan, C.: A combined PFCM and recurrent neural network based IDS for cloud environment. Int. J. Bus. Intell. Data Mining 1, 1 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Doddi Srilatha.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Srilatha, D., Shyam, G.K. Cloud-based intrusion detection using kernel fuzzy clustering and optimal type-2 fuzzy neural network. Cluster Comput 24, 2657–2672 (2021). https://doi.org/10.1007/s10586-021-03281-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-021-03281-9

Keywords

Navigation