An Online Intrusion Detection System to Cloud Computing Based on Neucube Algorithms

Author:

Almomani Ammar1,Alauthman Mohammad2,Albalas Firas3,Dorgham O.4,Obeidat Atef1

Affiliation:

1. IT Department, Al-Huson University College, Al-Balqa Applied University, Irbid, Jordan

2. Department of Computer Science, Faculty of information technology, Zarqa University, Zarqa, Jordan

3. Department of Computer Science, Jordan University of Science and Technology, Irbid, Jordan

4. Prince Abdullah Ben Ghazi Faculty of Information Technology, Al-Balqa Applied University, Al Salt, Jordan

Abstract

This article describes how as network traffic grows, attacks on traffic become more complicated and harder to detect. Recently, researchers have begun to explore machine learning techniques with cloud computing technologies to classify network threats. So, new and creative ways are needed to enhance intrusion detection system. This article addresses the source of the above issues through detecting an intrusion in cloud computing before it further disrupts normal network operations, because the complexity of malicious attack techniques have evolved from traditional malicious attack technologies (direct malicious attack), which include different malicious attack classes, such as DoS, Probe, R2L, and U2R malicious attacks, especially the zero-day attack in online mode. The proposed online intrusion detection cloud system (OIDCS) adopts the principles of the new spiking neural network architecture called NeuCube algorithm. It is proposed that this system is the first filtering system approach that utilizes the NeuCube algorithm. The OIDCS inherits the hybrid (supervised/unsupervised) learning feature of the NeuCube algorithm and uses this algorithm in an online system with lifelong learning to classify input while learning the system. The system is accurate, especially when working with a zero-day attack, reaching approximately 97% accuracy based on the to-be-remembered (TBR) encoding algorithm.

Publisher

IGI Global

Subject

General Medicine

Reference41 articles.

1. Al-Saedi, K., Alnajjar, A., & Ramadass, S. A survey of Learning Based Techniques of Phishing Email Filtering.

2. Analysis of Intelligent Classifiers and Enhancing the Detection Accuracy for Intrusion Detection System

3. Fast-flux hunter: A system for filtering online fast-flux botnet.;A.Almomani;Neural Computing & Applications,2016

4. A Survey of Phishing Email Filtering Techniques

5. Almomani, A., Gupta, B., Wan, T.-c., Altaher, A., & Manickam, S. (2013). Phishing dynamic evolving neural fuzzy framework for online detection zero-day phishing email. arXiv:1302.0629

Cited by 21 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. A Novel Approach for Estimating Performance of IIoT-Based Virtual Control Train Sets under DoS Attacks;Security and Communication Networks;2022-09-30

2. Deep reinforcement learning for optimal denial-of-service attacks scheduling;Science China Information Sciences;2022-04-18

3. Deep-Reinforcement-Learning-Based Latency Minimization in Edge Intelligence Over Vehicular Networks;IEEE Internet of Things Journal;2022-01-15

4. Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack;IEEE Transactions on Dependable and Secure Computing;2022-01-01

5. Protecting Resources Against Volumetric and Non-volumetric Network Attacks;2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS);2021-12

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3