Fuzzy Integrated Latent Dirichlet Allocation Algorithm for Intrusion Detection in Cloud Environments

Authors

  • Vinayak Kishan Nirmale Lecturer in Mathematics, Department of Polytechnic, MIT World Peace University, Paud Road, Kothrud, Pune, Maharashtra, India, Pincode: 411038
  • C. Madhusudhana Rao Professor and Head, Department of CSE, Institute of Aeronautical Engineering, Hyderabad. Telangana, India, Pincode: 500043
  • Mylapalli Ramesh Assistant Professor, Department of CSE, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur Dist., Andhra Pradesh, India, Pincode: 522302
  • M. Nirmala Professor, Department of Mathematics, Sathyabama Institute of Science and Technology, Chennai, Tamilnadu, India, Pincode: 600119
  • S. Girinath Assistant Professor, Department of Computer Applications, Mohan Babu University, A. Rangampeta, Tirupati, Andhra Pradesh, India, Pincode: 517 102
  • Nellore Manoj Kumar Department of Mathematics, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences (SIMATS), Thandalam, Chennai, Tamilnadu, India

Keywords:

Intrusion, Cloud, Fuzzy, Latent Dirichlet, NIDS, DoS, R2L, FI-LDA

Abstract

This research presents an in-depth exploration of the FI-LDA model, showcasing its efficacy in anticipating and preventing intrusions, thereby bolstering security measures within cloud environments. The study introduces a novel approach to intrusion prevention, fostering a robust predictive model that significantly enhances the system's capability to discern evolving attack patterns. Leveraging fuzzy modeling, the research demonstrates the utilization of vast amounts of unlabeled data, resulting in heightened accuracy and reliability of the system. The evaluation of diverse elements crucial for cybersecurity underscores the comprehensive approach adopted to achieve the research objectives. While the FI-LDA model exhibited a favorable trade-off, addressing a pervasive flaw, there remains a call for further refinement to detect assault patterns more effectively. The research concludes by highlighting the commendable effectiveness of the FI-LDA model in identifying and detecting malicious activities within the cloud environment, affirming its strong overall performance and contribution to advancing intrusion detection systems.

Downloads

Download data is not yet available.

References

Ajinkya Wankhade & Chandrasekaran, K 2016, ‘Distributed-intrusion detection system using combination of ant colony optimization (ACO) and support vector machine (SVM)’, International Conference on Micro- Electronics and Telecommunication Engineering, pp. 646-651,

Alampallam Ramaswamy Vasudevan & Subramanian Selvakumar 2016, ‘Local outlier factor and stronger one class classifier based hierarchical model for detection of attacks in network intrusion detection dataset’, Frontiers of Computer Science, vol. 10, no. 4, pp. 755-766.

Aman Bakshi & Yogesh, B 2010, ‘Securing cloud from DDOS attacks using intrusion detection system in virtual machine’, International Conference on Communication Software and Networks, pp. 260-264.

Amin Nezarat & Yaser Shams march 2017, ‘A game theoretic-based distributed detection method for VM-to-hypervisor attacks in cloud environment’, Journal on Super Computing, Springer, vol. 73, no. 10, pp. 4407-4427.

Amir Vahid Dastjerdi, Kamalrulnizam Abu Bakar & Sayed Gholam Hassan Tabatabaei 2009, ‘Distributed intrusion detection in clouds using mobile agents’, International Conference on Advanced Engineering Computing and Applications in Sciences, pp. 175-180.

Anandapriya, M & Lakshmanan, B 2015, ‘Anomaly based host intrusion detection system using semantic based system call patterns’, IEEE International Conference on Intelligent Systems and Control, pp. 1-4.

Andrey Rukavitsyn, Konstantin Borisenko & Andrey Shorov 2017, ‘Self- learning method for DDoS detection model in cloud computing’, IEEE Conference on Russian Young Researchers in Electrical and Electronic Engineering, pp. 544-547.

Aqeel Sahi, David Lai, Yan L & Mohammed Diykh 2017, ‘An efficient DDoS TCP flood attack detection and prevention system in a cloud environment’, IEEE Journal and Magazines, vol. 5, pp. 6036-6048.

Ashish Kumbhare & Manoj Chaudhari 2014, ‘IDS: Survey on intrusion detection system in cloud computing’, International Journal of Computer Science and Mobile Computing, vol. 3 no. 4, pp. 497-502.

Ashwini Khadke & Mangala Madankar 2016, ‘Review on mitigation of distributed denial of service (DDoS) attacks in cloud computing’, International Conference on Intelligent Systems and Control, pp. 1-5.

Berkah Santoso, I, Rien Suryatama Idrus, M & Irwan Prasetya Gunawan 2016, ‘Designing network intrusion and detection system using signature- based method for protecting openstack private cloud’, International Annual Engineering Seminar, pp. 61-66.

Chandrashekhar Azad & Vijay Kumar Jha 2017, ‘Fuzzy min–max neural network and particle swarm optimization based intrusion detection system’, Technical Paper on Microsystem Technologies, vol. 23, no. 4, pp. 907-918.

Chi-Chun Lo, Chun-Chieh Huang & Joy Ku 2010, ‘A cooperative intrusion detection system framework for cloud computing networks’, International Conference on Parallel Processing Workshops, pp. 280-284.

Chirag Modi, N, Dhiren Patell, R, Avi Patd & Rajarajan Muttukrishnan 2012, ‘Bayesian classifier and snort based network intrusion detection system in cloud computing’, IEEE Third International Conference on Computing, Communication and Networking.

Chithik Raja, M & Munir Ahmed Rabbani, M 2016, ‘Combined analysis of support vector machine and principle component analysis for IDS’, International Conference on Communication and Electronics System, pp. 1-5.

Chunjie Zhou, Shuang Huang, Naixue Xiong, Shuang-HuaYang, Huiyun Li, Yuanqing Qin & Xuan Li 2015, ‘Design and analysis of multimodel- based anomalyintrusion detection systems in industrial process automation’, IEEE Transaction on Systems, Man and Cybernetics Systems, vol. 45, no. 10, pp. 1345-1360.

Claudio Mazzariello, Roberto Bifulco & Roberto Canonico 2010, ‘Integrating a network IDS into an open source cloud computing environment’, International Conference on Information Assurance and Security, pp. 265-270.

Dataset: Available from: <http://kdd.ics.uci.edu/databases/kddcup99/ kddcup99.html>.

Fadwa Abdul Aziz Alseiari & Zeyar Aung 2015, ‘Real-time anomaly- based distributed intrusion detection systems for advanced metering infrastructure utilizing stream data mining’, International Conference on Smart Grid and Clean Energy Technologies, pp. 148-153.

FarzanehIzak Shiri, Bharanidharan Shanmugam & Norbik BashahIdris 2011, ‘A parallel technique for improving the performance of signature- based network intrusion detection system’, International Conference on Communication Software and Networks, pp. 692-696.

Downloads

Published

23.02.2024

How to Cite

Nirmale, V. K. ., Rao, C. M. ., Ramesh, M. ., Nirmala, M. ., Girinath, S. ., & Kumar, N. M. . (2024). Fuzzy Integrated Latent Dirichlet Allocation Algorithm for Intrusion Detection in Cloud Environments. International Journal of Intelligent Systems and Applications in Engineering, 12(17s), 249–259. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4870

Issue

Section

Research Article

Most read articles by the same author(s)