Deep Learning Inspired Intelligent Framework to Ensure Effective Intrution Detection in Cloud

Authors

  • Vadetay Saraswathi Bai Research Scholar, Dept. of CSE, School of Engineering and Technology, Sri Padmavati Mahila Visvavidyalayam
  • T. Sudha Dept. of Computer Science, Sri Padmavati Mahila Visvavidyalayam

Keywords:

Cloud Forensics, Data Generation, Cloud Computing, Artificial Intelligence (AI), Principal Component Analysis (PCA), Singular Value Decomposition (SVD)

Abstract

In the context of cloud forensics, the exponential growth in data generation due to the widespread use of cloud computing has created substantial issues for protecting the safety and privacy of cloud-based infrastructure. Many security solutions, such as intrusion detection systems (IDS), based on artificial intelligence (AI) have been created to deal with these threats. Intrusion detection systems (IDS) are a paradigm for assessing the safety of network traffic in the cloud. This research uses principle component analysis (PCA) and singular value decomposition (SVD) to minimize the dimensionality of the feature space, which in turn improves the accuracy of IDS in cloud forensics. In order to evaluate the efficacy of these techniques, they are applied to the UNSW-NB15 data set, which serves as a standard for IDS testing in cloud forensics. Our results show that Classifier, an algorithm based on deep learning, is superior to other approaches when it comes to detecting fraudulent data streams in cloud-based networks. This provides support for the hypothesis that integrating PCA, SVD, and deep learning techniques into cloud forensics analysis might provide fruitful results. To guard against cyber threats and guarantee the dependability and security of cloud-based systems, this work adds to the continuing efforts to enhance the accuracy and efficiency of IDS systems in cloud forensics.

Downloads

Download data is not yet available.

References

John Goodall et al.,” The Work of Intrusion Detection: Rethinking the Role of Security Analysts” Proceedings of the Tenth Americas Conference on Information Systems, New York, New York, August 2004.

P. Garcı´a-Teodoro et al.,” Anomaly-based network intrusion detection: Techniques, systems and challenges” computers & security 28 (2009) 18–28.

Salima Omar et al.,” Machine Learning Techniques for Anomaly Detection: An Overview” International Journal of Computer Applications (0975 – 8887), Volume 79 – No.2, October 2013.

M. Ferrag et al., “Deep Learning for Cyber Security Intrusion Detection: Approaches, Datasets, and Comparative Study,” Journal of Information Security and Applications, vol. 50, 2020.

Mohammad Sazzadul Hoque et al.,” AN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM” International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.2, March 2012.

P. Garcı´a-Teodoro et al.,” Anomaly-based network intrusion detection: Techniques, systems and challenges” computers & security 28 (2009) 18–28.

JAN J. GERBRANDS “ON THE RELATIONSHIPS BETWEEN SVD, KLT AND PCA” Department of Electrical Engineering, Delft University of Technology, Pattern Recoflnifion Vol. 14, Nos. I 6, pp. 375 381, 1981. Printed in Great Britain.

P. Wu and H. Guo, "LuNet: A Deep Neural Network for Network Intrusion Detection," arXiv:1909.10031v2 [cs.AI] 6 Oct 2019.

M. Azizjon et al., “1D CNN Based Network Intrusion Detection with Normalization on Imbalanced Data,” International Conference on Artificial Intelligence in Information and Communication (ICAIIC), Fukuoka, Japan, 19-21 February 2020.

L. Ashiku and C. Dagli, "Network Intrusion Detection System using Deep Learning," Complex Adaptive Systems Conference Theme: Big Data, IoT, and AI for a Smarter Future Malvern, Pennsylvania, vol. 185, pp. 239–247, June 16-18, 2021.

M. Hooshmand and D. Hosahalli, “Network Anomaly Detection Using Deep Learning Techniques,” CAAI Transactions on Intelligence Technology, vol. 7, pp. 228–243, 2022.

J. Gao, “Network Intrusion Detection Method Combining CNN and Bilstm in Cloud Computing Environment,” Hindawi, Computational Intelligence and Neuroscience, 2022.

X. Yang et al., “An Enhanced Intrusion Detection System for IoT Networks Based on Deep Learning and Knowledge Graph,” Hindawi, Security and Communication Networks, 2022.

Selvakumar K, Sairamesh L, Kannan A. Wise intrusion detection system using fuzzy rough setbased feature extraction and classification algorithms. International Journal of Operational Research. 2019;35(1):87-107.

R. Khan et al., “An Improved Convolutional Neural Network Model for Intrusion Detection in Networks,” Cybersecurity and Cyber forensics Conference (CCC), 2019.

A. Oprea, “The Use of Principal Component Analysis (PCA) in Building Yield Curve Scenarios and Identifying Relative-Value Trading Opportunities on the Romanian Government Bond Market,” Journal of Risk and Financial Management, vol. 15, no. 247, 2022.

F. Sultana et al., “Advancements in Image Classification Using Convolutional Neural Network,” in Proceedings of the 2018 4th International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN), pp. 122–129, IEEE, Kolkata, India, November 2018.

Iqbal Muhammad et al.,” SUPERVISED MACHINE LEARNING APPROACHES: A SURVEY” , ICTACT JOURNAL ON SOFT COMPUTING, APRIL 2015, VOLUME: 05, ISSUE: 03.

Sumit Das et al.,” Applications of Artificial Intelligence in Machine Learning: Review and Prospect”, International Journal of Computer Applications (0975 – 8887)Volume 115 – No. 9, April 2015.

Shiliang Sun, Changshui Zhang and Guoqiang Yu, “A Bayesian Network Approach to Traffic Flow Forecasting”,IEEE Transactions on Intelligent Transportation Systems, Vol. 7, No. 1, pp. 124-132, 2006.

Hamid Parvin et al., “A Modification on K-Nearest Neighbor Classifier”, Global Journal of Computer Science and Technology ,Vol. 10 Issue 14 (Ver. 1.0) November 2010 P a g e | 38.

Aleksandar et al.,” INTRUSION DETECTION: A SURVEY”, Computer Science Department, University of Minnesota.

S. Brunton and J. Kutz, “Singular Value Decomposition (SVD),” Data-Driven Science and Engineering (pp.3-46), 2019.

K Rajasekaran and Dr. K Nirmala,” Classification and Importance of Intrusion Detection System”, (IJCSIS) International Journal of Computer Science and Information Security, Vol. 10, No. 8, August 2012.

Qiang Guo et al.” An Efficient SVD-Based Method for Image Denoising”, IEEE transactions on circuits and systems for video technology, vol. 26, no. 5, may 2016.

Sadiq Hussain et al.,” Prediction Model on Student Performance based on Internal Assessment using Deep Learning”, Paper—Prediction Model on Student Performance based on Internal Assessment using Deep Learning, iJET ‒ Vol. 14, No. 8, 2019.

Mathieu Lepot et al.,” Interpolation in Time Series: An Introductive Overview of Existing Methods, Their Performance Criteria and Uncertainty Assessment”,Water, 9, 796; doi:10.3390/w9100796 www.mdpi.com/journal/water, 2017.

Downloads

Published

02.02.2024

How to Cite

Saraswathi Bai, V. ., & Sudha, T. . (2024). Deep Learning Inspired Intelligent Framework to Ensure Effective Intrution Detection in Cloud. International Journal of Intelligent Systems and Applications in Engineering, 12(14s), 441–456. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4680

Issue

Section

Research Article