An Improved Explainable Artificial Intelligence for Intrusion Detection System in Cloud Environment

Authors

  • Rejna Azeez Nazeema Department of Computer Science, Jazan University, College of Computer Science and Information Technology, Jazan, Kingdom of Saudi Arabia.
  • Shama Kouser Department of Computer Science, Jazan University, College of Computer Science and Information Technology, Jazan, Saudi Arabia.
  • Samar Mansour Hassen Department: Management Information Systems, Jazan University, College of Business Administration, Jazan, Saudi Arabia.
  • Nagla Babikar Department of Computer Science, Jazan University, College of Computer Science and Information Technology, Jazan, Saudi Arabia.
  • Mawahib Sharafeldin Adam Boush Department of Computer Science, Jazan University, College of Computer Science and Information Technology, Jazan, Saudi Arabia. mboush@jazanu.edu.

Keywords:

NIDS, Dataset, Deep Learning (DL), XAI, Intrusion Detection

Abstract

Automated Anomaly Detection (AD) systems that can spot suspicious activities are perfect for cloud computing applications. Previous research has not solved the open challenge of irregularity discovery in cloud computing. The usual operations of a cloud server must be characterised, malicious anomalies must be distinguished from benign ones, and false alarms must be avoided at all costs to prevent alert fatigue. Various industrial applications showcase the growing potential of the cloud infrastructure. The Network Intrusion Detection System (NIDS) is seen as a crucial part of data transmission security, which seems to be in jeopardy. Upcoming advances in intellectual IDS have made use of Explainable Artificial Intelligence (XAI) methods. The bulk of IDS is based on either supervised or uncontrolled XAI methods. The lowered model's capacity to identify attack patterns is diminished due to the fact that NIDS relies on supervised learning using labelled data. Also, the unsupervised model can't deliver a reasonable result. Later, to enhance the performance of unsupervised learning, a high-quality feature set will be selected using an effective feature selection technique. Finally, a Machine Learning (ML) classifier based on XAI will be used for classification. The optimal generalizability capacity for data training is shown by this strategy. Analyses are also performed on the unlabeled data. In this step, we filter away the dataset's noisy and redundant samples. The anticipated technique outperforms other existing methods in terms of accuracy, according to the experimental data.

Downloads

Download data is not yet available.

References

Hochenbaum, Jordan, Owen S. Vallis, and Arun Kejariwal, "Automatic anomaly detection in the cloud via statistical learning," arXiv preprint arXiv:1704.07706, 2017.

Garg, Sahil, Kuljeet Kaur, Shalini Batra, Gagangeet Singh Aujla, Graham Morgan, Neeraj Kumar, Albert Y. Zomaya, and Rajiv Ranjan, "En-ABC: An ensemble artificial bee colony-based anomaly detection scheme for cloud environment," Journal of Parallel and Distributed Computing 135, 2020, pp. 219-233.

Islam, Mohammad S., William Pourmajidi, Lei Zhang, John Steinbacher, Tony Erwin, and Andriy Miranskyy, "Anomaly detection in a large-scale cloud platform," In 2021 IEEE/ACM 43rd International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP), pp. 150-159, IEEE, 2021.

Xin, Ruyue, Hongyun Liu, Peng Chen, and Zhiming Zhao, "Robust and accurate performance anomaly detection and prediction for cloud applications: a novel ensemble learning-based framework," Journal of Cloud Computing 12, no. 1 ,2023, pp. 1-16.

Sherubha, P., S. P. Sasirekha, A. Dinesh Kumar Anguraj, J. Vakula Rani, Raju Anitha, S. Phani Praveen, and R. Hariharan Krishnan, "An efficient unsupervised learning approach for detecting anomaly in cloud," Computer Systems Science and Engineering 45, no. 1 ,2023, pp. 149-166.

He, Zecheng, Guangyuan Hu, and Ruby B. Lee, "CloudShield: Real-time Anomaly Detection in the Cloud," In Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, pp. 91-102, 2023.

Shahzad, Faisal, Abdul Mannan, Abdul Rehman Javed, Ahmad S. Almadhor, Thar Baker, and Dhiya Al-Jumeily OBE, "Cloud-based multiclass anomaly detection and categorization using ensemble learning," Journal of Cloud Computing 11, no. 1, 2022, pp. 1-12.

Garg, Sahil, Kuljeet Kaur, Neeraj Kumar, Georges Kaddoum, Albert Y. Zomaya, and Rajiv Ranjan, "A hybrid deep learning-based model for anomaly detection in cloud datacenter networks," IEEE Transactions on Network and Service Management 16, no. 3, 2019, pp. 924-935.

He, Zilong, Pengfei Chen, Xiaoyun Li, Yongfeng Wang, Guangba Yu, Cailin Chen, Xinrui Li, and Zibin Zheng, "A spatiotemporal deep learning approach for unsupervised anomaly detection in cloud systems," IEEE Transactions on Neural Networks and Learning Systems, 2020.

Garg, Sahil, Kuljeet Kaur, Neeraj Kumar, Georges Kaddoum, Albert Y. Zomaya, and Rajiv Ranjan, "A hybrid deep learning-based model for anomaly detection in cloud datacenter networks," IEEE Transactions on Network and Service Management 16, no. 3, 2019, pp. 924-935.

He, Zilong, Pengfei Chen, Xiaoyun Li, Yongfeng Wang, Guangba Yu, Cailin Chen, Xinrui Li, and Zibin Zheng, "A spatiotemporal deep learning approach for unsupervised anomaly detection in cloud systems," IEEE Transactions on Neural Networks and Learning Systems 2020.

Thakkar, Nidhi, Miren Karamta, Seema Joshi, and M. B. Potdar, "Anomaly detection and categorization in cloud environment using deep learning Techniques," Int. J. Comput. Sci. Eng. (IJCSE) 7, no. 5, 2019 pp. 211-214.

Hagemann, Tanja, and Katerina Katsarou, "A systematic review on anomaly detection for cloud computing environments," In Proceedings of the 2020 3rd Artificial Intelligence and Cloud Computing Conference, pp. 83-96, 2020.

Chkirbene, Zina, Aiman Erbad, Ridha Hamila, Ala Gouissem, Amr Mohamed, and Mounir Hamdi, "Machine learning based cloud computing anomalies detection," IEEE Network 34, no. 6 2020, pp. 178-183.

NG, Bhuvaneswari Amma, and S. Selvakumar, "Anomaly detection framework for Internet of things traffic using vector convolutional deep learning approach in fog environment," Future Generation Computer Systems 113, 2020, pp. 255-265.

Gulenko, Anton, Marcel Wallschläger, Florian Schmidt, Odej Kao, and Feng Liu, "Evaluating machine learning algorithms for anomaly detection in clouds," In 2016 IEEE International Conference on Big Data (Big Data), pp. 2716-2721. IEEE, 2016.

Shakya, Dr Subarna, and Dr S. Smys, "Anomalies detection in fog computing architectures using deep learning," Journal of Trends in Computer Science and Smart Technology 2, no. 1, 2020, pp. 46-55.

Meng, Qiuhan, and Songye Zhu, "Anomaly detection for construction vibration signals using unsupervised deep learning and cloud computing," Advanced Engineering Informatics 55, 2023, pp. 101907.

Fuat, T. Ü. R. K, "Analysis of Intrusion Detection Systems in UNSW-NB15 and NSL-KDD Datasets with Machine Learning Algorithms," Bitlis Eren Üniversitesi Fen Bilimleri Dergisi 12, no. 2 2023, pp. 465-477.

Walling, Supongmen, and Sibesh Lodh, "Performance Evaluation of Supervised Machine Learning Based Intrusion Detection with Univariate Feature Selection on NSL KDD Dataset," 2023.

Venkatesan, Srinath, "Design an intrusion detection system based on feature selection using ML algorithms," Mathematical Statistician and Engineering Applications 72, no. 1, 2023, pp. 702-710.

Mondal, Birupaxha, Fahim Faisal, Zeba Tusnia Towshi, Md Fahad Monir, and Tarem Ahmed, "A gradient boosted ml approach to feature selection for wireless intrusion detection," In 2023 IEEE 97th Vehicular Technology Conference (VTC2023-Spring), pp. 1-5. IEEE, 2023.

Al Lail, Mustafa, Alejandro Garcia, and Saul Olivo, "Machine learning for network intrusion detection A comparative study," Future Internet 15, no. 7, 2023, pp. 243.

Downloads

Published

24.03.2024

How to Cite

Nazeema, R. A. ., Kouser, S. ., Hassen, S. M. ., Babikar, N. ., & Adam Boush, M. S. . (2024). An Improved Explainable Artificial Intelligence for Intrusion Detection System in Cloud Environment. International Journal of Intelligent Systems and Applications in Engineering, 12(3), 352–360. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5258

Issue

Section

Research Article

Similar Articles

You may also start an advanced similarity search for this article.