Optimizing trust, Cloud Environments Fuzzy Neural Network, Intrusion Detection System

Authors

  • Archana B. Associate Professor,Department of CSE,Vidya Vikas Institute of Engineering and Technology, Mysuru, Karnataka, India, Pincode: 570028
  • N. Jeebaratnam Assistant Professor, Department of ECE, Centurion University of Technology and Management,R. Sitapur, Paralakhemundi, Odisha, Pincode: 761200
  • B. Nageswara Rao Faculty of Mathematics,School of Technology, Apollo University,Murukambathu, Chittoor (Dist),Andhra Pradesh, India, Pincode: 517127.
  • U. Sesadri Associate Professor, Department of CSE, Vardhaman College of Engineering, Shamshabad, Hyderabad, Telangana, India, Pincode: 501218.
  • N. Shirisha Associate Professor, Department of Computer Science and Engineering, MLR Institute of Technology, Hyderabad, India, Pincode:500043.
  • Nellore Manoj Kumar Department of Mathematics, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences (SIMATS), Thandalam, Chennai, Tamilnadu, India, Pincode: 602 105.

Keywords:

Cloud Computing, Intrusion Detection System, Neuro-Fuzzy, K-Means, Denial of Services, Cloud Security

Abstract

In the dynamic landscape of cloud computing, ensuring the security and integrity of services is paramount. This article introduces a novel approach to cloud intrusion detection by leveraging the synergies of fuzzy logic and neural networks. The proposed Fuzzy Neural Network Aided Cloud Intrusion Detection System (FNN-CIDS) integrates the adaptability of fuzzy systems with the learning capabilities of neural networks to enhance the detection accuracy of malicious activities within cloud environments. The system is designed to discern subtle patterns indicative of intrusion attempts, thereby fortifying the defense mechanisms for trusted services hosted in the cloud. The article presents the conceptual framework of FNN-CIDS, detailing the integration of fuzzy logic for rule-based inference and neural networks for pattern recognition. Experimental results demonstrate the system's efficacy in identifying diverse intrusion scenarios while minimizing false positives. This research provides a promising path for improving the reliability of cloud computing infrastructures and advances strong security frameworks for cloud-based applications. In this sense, the research effort provides a trust evaluation system to determine the reliability of cloud services and an intrusion detection system to guarantee intrusion-free cloud services. the construction of a cloud intrusion detection system using a neuro-fuzzy based self-constructing clustering algorithm. The performance of this method has been compared to other well-known clustering methods in the field of cloud intrusion detection using result analysis.

Downloads

Download data is not yet available.

References

Abraham, A & Jain R 2005, ‘Soft computing models for network intrusion detection systems’, Classification and Clustering for Knowledge Discovery. Studies in Computational Intelligence, Springer, Berlin, vol. 4, pp. 191–207.

Ahmad, S, Ahmad, B, Saqib, SM & Khattak, RM 2012, ‘Trust Model: Cloud’s Provider and Cloud’s User’, International Journal of Advanced Science and Technology, vol. 44, pp. 69-80.

Alsafi, HM, Abduallah, WM & Patha, AK 2012, ‘IDPS: an integrated intrusion handling model for cloud computing environment’, International Journal of Computing and Information Technology, vol. 4, no. 1, pp. 1-16.

Alsharafat, W 2013, ‘Applying Artificial Neural Network and eXtended Classifier System for Network Intrusion Detection’, The International Arab Journal of Information Technology, vol. 10, no. 3, pp. 230-238.

Amirreza, Z & Alireza, Z 2012, ‘Internet intrusion detection system service in a cloud’, International Journal of Computer Science Issues, vol. 9, no. 5, pp. 308-315.

Ang, JH, Tan, KC & Mamun, AA 2010, ‘An evolutionary memetic algorithm for rule extraction’, Expert Systems with Applications, vol. 37, no. 2, pp. 1302-1315.

Aziz, ASA, Salama, MA, Hassanien, AE & Hanafi, SEO 2012, ‘Artificial Immune System Inspired Intrusion Detection System using Genetic Algorithm’, Informatica, An International Journal of Computing and Informatics, vol. 36, no. 4, pp. 347-357.

Bakshi, A & Yogesh, B 2010, ‘Securing cloud from ddos attacks using intrusion detection system in virtual machine’, Proceedings of Second International Conference on Communication Software and Networks, pp. 260-264.

Balazs, K, Koczy, LT & Botzheim, J 2008, ‘Comparison of Fuzzy Rule-based Learning and Inference Systems’, Proceedings of ninth International Symposium of Hungarian Researchers on Computational Intelligence and Informatics, pp. 61-75.

Bapuji, V, Kumar, RN, Govardhan, A & Sarma, SSVN 2012, ‘Soft Computing and Artificial Intelligence Techniques for Intrusion Detection System’, Network and Complex Systems, vol. 2, no. 4, pp. 24-31.

Bezdek, JC 1981, ‘Pattern Recognition with Fuzzy Objective Function Algorithms’, Kluwer Academic PublishersNorwell, MA, USA.

Bhadauria, R & Sanyal, S 2012, ‘A survey on security issues in cloud computing and associated mitigation techniques’, International Journal of Computer Applications, vol. 47, no. 18, pp. 47-66.

Bhat, AH, Patra, S & Jena, D 2013, ‘Machine learning approach for intrusion detection on cloud virtual machines’, International Journal of Application or Innovation in Engineering & Management, vol. 2, no. 6, pp. 57-66.

Calheiros, RN, Ranjan, R, Rose, CAFD & Buyya, R 2009, ‘CloudSim: A novel framework for modeling and simulation of cloud computing infrastructures and services’, Technical Report, GRIDS-TR-2009-1, Grid Computing and Distributed Systems Laboratory, The University of Melbourne, Australia.

Calheiros, RN, Ranjan, R, Beloglazov, A, Rose, CAFD & Buyya, R 2011, ‘CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms’, Software – Practice & Experience, vol. 41, no. 1, pp. 23-50.

Chandran, SP & Angepat, M 2010, ‘Cloud Computing: Analysing the risks involved in cloud computing environments’, Proceedings of Natural Sciences and Engineering, Sweden, pp. 2-4.

Chiu, SL 1994, ‘Fuzzy model identification based on cluster estimation’, Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, vol. 2, no. 3, pp. 267-278.

Chung, CJ, Khatkar, P, Xing, T, Lee, J & Huang, D 2013, ‘NICE: network intrusion detection and countermeasure selection in virtual network systems’, IEEE Transactions on Dependable Secure Computing, vol. 10, no. 4, pp. 198-211.

Cozar, J, Ossa, L & Gamez, JA 2014, ‘Learning TSK-0 linguistic fuzzy rules by means of local search algorithms’, Applied Soft Computing, vol. 21, pp. 57-71.

Dhage, SN, Meshram, BB, Rawat, R, Padawe, S, Paingaokar, M & Misra, A 2011, ‘Intrusion detection system in cloud computing environment’, Proceedings of International Conference and Workshop on Emerging Trends in Technology, pp. 235-239.

Dolev, S, Gilboa, N & Kopeetsky, M 2014, ‘Efficient private multi- party computations of trust in the presence of curious and malicious users’, Journal of Trust Management, vol. 1, no. 8, pp. 1-21.

Dunlap GW, King ST, Cinar S, Basrai M, & Chen PM 2002, ‘Revirt: enabling intrusion analysis through virtual machine logging and replay’, Proceedings of fifth symposium on operating systems design and implementation, USENIX, Boston, vol. 36, no. SI, pp. 211-224.

Eom, JH & Park, MW 2013, ‘Design of Internal Traffic Checkpoint of Security Checkpoint Model in the Cloud Computing’, International Journal of Security and Its Applications, vol. 7, no. 1, pp. 119-128.

Eucalyptus. Available from: http://www.eucalyptus.com [5 March 2015].

Fan, W & Perros, H 2014, ‘A novel trust management framework for multi-cloud environments based on trust service providers’, Knowledge-Based Systems, vol. 70, no. C, pp. 392 - 406.

Downloads

Published

23.02.2024

How to Cite

B., A. ., Jeebaratnam, N. ., Rao, B. N. ., Sesadri, U. ., Shirisha, N. ., & Kumar, N. M. . (2024). Optimizing trust, Cloud Environments Fuzzy Neural Network, Intrusion Detection System. International Journal of Intelligent Systems and Applications in Engineering, 12(17s), 260–275. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4871

Issue

Section

Research Article