Affiliation:
1. Department of Computer Science and Engineering Teerthanker Mahaveer University Moradabad Uttar Pradesh India
Abstract
SummaryThe distributed and decentralized architecture of cloud computing is important for a number of industries, including business, government, entertainment, education, and information technology. It facilitates a wide aspect of information technology, where the computing model is vulnerable to attacks or intrusion. For detecting malicious activities, a novel intrusion detection system (IDS) is required to be developed. In this paper, an enhanced synthetic minority oversampling technique (SMOTE) with a hybrid one‐dimensional residual auto encoder and the Ensemble of Gradient Boosting (1D‐RAE‐EGB) models are proposed for cloud intrusion detection. The proposed IDS resolves the class imbalance problem through enhanced SMOTE. In addition, noise reduction is accomplished with ID‐RAE, which minimizes the data dimension. Finally, the soft voting‐based ensemble classification model is used for attack detection. The ensemble gradient boosting model comprises categorical boosting (CatBoost), extreme gradient boosting (XGBoost), and light gradient boosting machine (LightGBM). The ensemble model is fine‐tuned by reducing the number of parameters under fitting conditions since it is not compulsory to re‐adjust the weight values in a backpropagation process. The proposed IDS is implemented in Python using the NSL‐KDD dataset. The accuracy, precision, recall, f1‐score, false positive rate (FPR), false negative rate (FNR), specificity, and Kappa measure obtained for the proposed IDS are 99.98%, 99.3%, 98.5%, 99.95%, 0.723, 0.46, 99.98%, and 99.97%, respectively.
Reference33 articles.
1. Ensemble models for intrusion detection system classification;Geethamanikanta J;IJSSAN,2022
2. GOA‐IDBN‐SC: an improvised feature extraction and classification approach for cloud intrusion detection;Parganiha V;Des Eng,2021
3. Efficient network threat detection and classification method using SVM+ NB algorithm on cloud computing;Kavitha K;IJARET,2020
4. Building an efficient intrusion detection system using grasshopper optimization algorithm for anomaly detection
5. An Optimal Intrusion Detection System using GWO-CSA-DSAE Model