Network Intrusion Detection System Based Security System for Cloud Services Using Novel Recurrent Neural Network - Autoencoder (NRNN-AE) and Genetic
Affiliation:
1. SRM Institute of Science and Technology
Abstract
Cloud Computing (CC) is a platform where resources and services are huge such as platforms, infrastructure, software and much more. Cloud computing builds its entire environment on the framework based on the user's requirement. Although many interventions are implemented for the problems that are identified in cloud security systems, intrusion and security issues on various services are rising day by day. This research focuses on cloud security systems where trusted access can be guaranteed for various resources and services using deep learning techniques. Deep Learning techniques can detect the anomaly variation based on selected features to find the intruder in the service provider's environment. A Novel Recurrent Neural Network (NRNN) - Auto Encoder (AE) model with a dataset is used to identify the abnormal and behavioral variation in the network. The proposed algorithm NRNN-AE is basically identifying the uncertainty of different types of malicious theft where the auto-encoder predicts the attacks against the unexpected network security challenges along with a genetic algorithm for optimization. Attacks based on the service are identified on each hidden layer based on classification that is processed in the cloud system. The results are obtained from the comparison of NSL-KDD dataset and KDD Cup 99 dataset for monitoring the behavioral and frequent changes in patterns. The system can improve the detection rate and achieve accuracy of 96% compared to the existing RC-NN model. Also the detection rate is reduced to 0.0008 which has a precision value in both positive and negative rate as a gradual increase in performance.
Publisher
Trans Tech Publications Ltd
Reference22 articles.
1. C. M. Mohammed and S. R. Zebaree, Sufficient comparison among cloud computing services: IaaS, PaaS, and SaaS: A review,, Int. J. Sci. Bus., vol. 5, no. 2, p.17–30, (2021). 2. A. Ahmim, M. Derdour, and M. A. Ferrag, An intrusion detection system based on combining probability predictions of a tree of classifiers,, Int. J. Commun. Syst., vol.31, no. 9, p. e3547, (2018). 3. D. Ucuz, Comparison of the IoT Platform Vendors, Microsoft Azure, Amazon Web Services,and Google Cloud, from Users' Perspectives,, 2020, p.1–4. 4. K. Gupta, D. Gupta, S. K. Prasad, and P. Johri, A Review on Cryptography based Data Security Techniques for Cloud Computing,, 2021, p.1039– 1044. 5. S. Shamshirband, M. Fathi, A. T. Chronopoulos, A. Montieri, F. Palumbo, and A. Pescapè,Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues,, J. Inf. Secur. Appl., vol. 55, p.102582, (2020).
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|