A Neuro Fuzzy Based Intrusion Detection System for a Cloud Data Center Using Adaptive Learning

نویسندگان

  • Pandeeswari Nagarajan
  • Ganeshkumar Perumal
چکیده

With its continuous improvements, the cloud computing system leaves an open door for malicious activities. This promotes the significance of constructing a malware action detection component to discover the anomalies in the virtual environment. Besides, the traditional intrusion detection system does not suit for the cloud environment. So, the proposed scheme develops an anomaly detection system, named Hypervisor Detector at a hypervisor layer to detect the abnormalities in the virtual network. Besides, the fuzzy systems have the ability to detect the presence of uncertain and imprecise nature of anomalies; they are not able to construct models based on target data. One of the successful approaches, which integrate fuzzy systems with adaptation and learning proficiencies of a neural network, such as ANFIS (Adaptive Neuro Fuzzy Inference System) model, is based on target values. The Hypervisor Detector is designed and developed with an ANFIS and practised with a hybrid algorithm, a combination of the back propagation gradient descent technique with the least square method. For the experiments and performance analysis, DARPA’s KDD cup data set is used. The performance analysis and results show that the model proposed is well designed to detect the abnormalities in virtual environment with the minimum false alarm rate and reduced overhead.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fraud Detection of Credit Cards Using Neuro-fuzzy Approach Based on TLBO and PSO Algorithms

The aim of this paper is to detect bank credit cards related frauds. The large amount of data and their similarity lead to a time consuming and low accurate separation of healthy and unhealthy samples behavior, by using traditional classifications. Therefore in this study, the Adaptive Neuro-Fuzzy Inference System (ANFIS) is used in order to reach a more efficient and accurate algorithm. By com...

متن کامل

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

Entropy Based Fuzzy Rule Weighting for Hierarchical Intrusion Detection

Predicting different behaviors in computer networks is the subject of many data mining researches. Providing a balanced Intrusion Detection System (IDS) that directly addresses the trade-off between the ability to detect new attack types and providing low false detection rate is a fundamental challenge. Many of the proposed methods perform well in one of the two aspects, and concentrate on a su...

متن کامل

A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection

A hybrid approach for intrusion detection in computer networks is presented in this paper. The proposed approach combines an evolutionary-based fuzzy system with an Ant Colony Optimization procedure to generate high-quality fuzzy-classification rules. We applied our hybrid learning approach to network security and validated it using the DARPA KDD-Cup99 benchmark data set. The results indicate t...

متن کامل

An Adaptive Hybrid Multi-level Intelligent Intrusion Detection System for Network Security

Intrusion Detection System (IDS) plays a vital factor in providing security to the networks through detecting malicious activities. Due to the extensive advancements in the computer networking, IDS has become an active area of research to determine various types of attacks in the networks. A large number of intrusion detection approaches are available in the literature using several traditional...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016