A Deep Learning and Optimization-Aided Intrusion Detection Framework for Adaptive Threat Detection in Dynamic Public Cloud Environments

Authors

  • Banitamani Mallik, Kilaru Madhavi, K. Anuradha, D. Kavitha, K. Prathibha, Nanda Kumar Enjeti

Keywords:

Intrusion Detection Systems, Cloud Computing, Deep Learning, Deep Belief Networks, Cat Swarm Optimization, Long Short-Term Memory, Network Security, Cyber Threats

Abstract

The article proposes a novel way to combine cutting-edge Deep Learning (DL) algorithms and optimization strategies to improve the effectiveness of Intrusion Detection Systems (IDS) in cloud environments. The proposed approach aims to address common issues including overfitting, imbalanced data, and the identification of unknown attack types by combining Deep Belief Networks (DBN) with Cat Swarm Optimization assisted Long Short-Term Memory (CSO-LSTM). Utilizing DBN for feature extraction lowers dimensionality, allowing for a more thorough examination of network data, and LSTM takes care of temporal factors that are essential for identifying multi-stage assaults. System performance is improved with LSTM weight optimization using Cat Swarm Optimization. The DBN architecture and the energy dependence model provide a strong basis for identifying latent patterns in the NSL-KDD dataset. This research tries to improve the adaptability and accuracy of intrusion detection systems (IDS) by integrating deep learning (DL) and optimization approaches in a comprehensive manner, in addition to addressing the current limits in IDS for cloud environments. The findings show encouraging gains in precision and flexibility, indicating the possibility for the suggested framework to overcome current intrusion detection for cloud environments constraints.

Downloads

Download data is not yet available.

References

Tari, Z. (2014). Cloud Computing: A Primer. Chapman and Hall/CRC.

Patel, M., et al. (2013). Intrusion Detection Systems: A Review. International Journal of Computer Applications, 75(13).

Hashizume, K., et al. (2013). Cloud Computing Security Issues and Solutions: A Survey. International Journal of Information Management, 33(1), 13-25.

Chiba, R., et al. (2016). Positioning, Detection Time, and Data Sources of Intrusion Detection Systems in Cloud Environments. Procedia Computer Science, 82, 165-172.

Wen, Y., et al. (2022). Back Propagation and Neural Network-Based Cloud Computing Intrusion Detection Technology. Journal of Ambient Intelligence and Humanized Computing, 13(2), 1747-1759.

Hizal, A., et al. (2021). NSL-KDD: A New Intrusion Detection Dataset for the Cloud Era. Journal of King Saud University - Computer and Information Sciences.

Kumar, A., et al. (2022). Fuzzy Min-Max Neural Network-Based Intrusion Detection Scheme for Cloud Computing. Neural Computing and Applications, 1-19.

Chiba, R., et al. (2019). Hybrid Framework of Deep Neural Network and Enhanced Genetic Algorithm for Intrusion Detection. IEEE Access, 7, 158336-158346.

Geetha, P., & Deepa, S. (2022). Fisher Kernel-Based Weight Dropped Bi-LSTM Classifier for Intrusion Detection. Computers, Materials & Continua, 70(1), 1065-1083.

Muhuri, P. K., et al. (2020). Genetic Algorithm-Based Feature Selection for LSTM-RNN in Intrusion Detection. In Proceedings of the International Conference on Computational Intelligence and Data Engineering (ICCIDE), 1-6.

Bhardwaj, A., et al. (2020). An Autoencoder-Based Deep Learning Architecture for DDoS Attack Detection in Cloud Computing. Soft Computing, 24(1), 331-341.

Muthukumar, S., & Rajendran, P. (2015). An Intelligent Technique for Building Intrusion Detection System with Enhanced Security. Procedia Computer Science, 46, 866-874.

Latanicki, J., et al. (2010). Intelligent Security Model for Application Layer DoS Attack Detection in Cloud Computing. In Proceedings of the International Conference on Computer Science and Information Technology (ICCSIT), 18-22.

Rajendran, P., et al. (2019). Multi-layered LSTM Network for Detection of Multi-stage Attacks in Cloud Computing. Future Generation Computer Systems, 91, 442-452.

Yu, L., et al. (2013). Cloud-Based Intrusion Detection System. In Proceedings of the International Conference on Cloud Computing and Big Data (CloudCom-Asia), 1-6.

Aldribi, A., et al. (2020). A Novel Intrusion Detection System for Cloud Computing Environments Based on Fuzzy C-Means and SVM. Journal of Ambient Intelligence and Humanized Computing, 11(6), 2451-2464.

Wang, W., et al. (2018). A Centralized HIDS Framework for Resource Efficiency in Cloud Computing. Future Generation Computer Systems, 79, 518-529.

Aljurayban, S., & EmamSaleh, I. (2015). Layered Intrusion Detection Framework (LIDF) for Cloud Computing. Journal of King Saud University - Computer and Information Sciences.

Fischer, A., et al. (2014). Deep Learning with Boltzmann Machines: A Learning Algorithm for the Architecture of the Human Brain. Neural Computation, 26(1), 1- 48.

Hinton, G. E., et al. (2012). A Practical Guide to Training Restricted Boltzmann Machines. In Neural Networks: Tricks of the Trade (pp. 599-619). Springer.

Pankajavalli, P. B., & Karthick, G. S. (2022). Efficient Data Flow Graph Modeling Using Free Poisson Law for Fault-Tolerant Routing in Internet of Things. In Computer Networks and Inventive Communication Technologies: Proceedings of Fifth ICCNCT 2022 (pp. 475-487). Singapore: Springer Nature Singapore.

Al-Emadi, I., et al. (2020). A Comprehensive Review on Long Short-Term Memory Networks: From Data Preprocessing to Model Optimization. IEEE Access, 8, 144516-144543.

Yu, S., et al. (2019). A Novel Intrusion Detection System for Cloud Computing Based on LSTM Networks. IEEE Access, 7, 133379-133389.

Karthick, G. S. "Energy-Aware Reliable Medium Access Control Protocol for Energy-Efficient and Reliable Data Communication in Wireless Sensor Networks." SN Computer Science 4.5 (2023): 449.

Downloads

Published

26.03.2024

How to Cite

Banitamani Mallik. (2024). A Deep Learning and Optimization-Aided Intrusion Detection Framework for Adaptive Threat Detection in Dynamic Public Cloud Environments . International Journal of Intelligent Systems and Applications in Engineering, 12(21s), 4515 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/6334

Issue

Section

Research Article