CFP last date
20 January 2025
Reseach Article

Enhancing Cloud Security: A Novel Intrusion Detection System Using Deep Learning Algorithms

by Vijay Kumar Gandam, E. Aravind
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 186 - Number 44
Year of Publication: 2024
Authors: Vijay Kumar Gandam, E. Aravind
10.5120/ijca2024924070

Vijay Kumar Gandam, E. Aravind . Enhancing Cloud Security: A Novel Intrusion Detection System Using Deep Learning Algorithms. International Journal of Computer Applications. 186, 44 ( Oct 2024), 36-42. DOI=10.5120/ijca2024924070

@article{ 10.5120/ijca2024924070,
author = { Vijay Kumar Gandam, E. Aravind },
title = { Enhancing Cloud Security: A Novel Intrusion Detection System Using Deep Learning Algorithms },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2024 },
volume = { 186 },
number = { 44 },
month = { Oct },
year = { 2024 },
issn = { 0975-8887 },
pages = { 36-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume186/number44/enhancing-cloud-security-a-novel-intrusion-detection-system-using-deep-learning-algorithms/ },
doi = { 10.5120/ijca2024924070 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-10-26T00:55:35.937971+05:30
%A Vijay Kumar Gandam
%A E. Aravind
%T Enhancing Cloud Security: A Novel Intrusion Detection System Using Deep Learning Algorithms
%J International Journal of Computer Applications
%@ 0975-8887
%V 186
%N 44
%P 36-42
%D 2024
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The intrinsic qualities of Cloud Computing (CC), including scalability and adaptability, have led to its adoption by several sectors. Nevertheless, cloud providers continue to face substantial challenges related to security, even though these benefits are undeniable. Unauthorized entrée, data breaches, and insider threats are some of the new dangers that CC introduces. Attackers find cloud systems appealing due to their common infrastructure. Tackling these security concerns requires the inclusion of strong security systems. Intrusion Detection Systems (IDS) are one such method that is essential for protecting cloud environments and networks. IDS keep tabs on every system and network activity. A lot of people have been looking at ways to improve IDS performance using ML and DL techniques as of late. Machine learning and deep learning algorithms have proven themselves capable of sifting through mountains of data and producing reliable forecasts. Using these methods, IDS can adjust to new threats, find past attacks, and cut down on false positives. This paper presents a new intrusion detection system (IDS) model that incorporates DL methods such as the Morlet Wavelet Kernel Function. An MLSTM classifier is suggested for the purpose of identifying breaches in the IoT-Cloud setting. Jarratt-Butterfly optimization algorithm (JBOA) selects the relevant features to increase classification accuracy. The suggested model is tested using known methodologies in terms of various parameters using the comprehensive intrusion dataset BoT-IoT. Through the use of simulations, the results prove that the suggested research classical outperforms the state-of-the-art models.

References
  1. Al-Ghuwairi, A. R., Sharrab, Y., Al-Fraihat, D., AlElaimat, M., Alsarhan, A., & Algarni, A. (2023). Intrusion detection in cloud computing based on time series anomalies utilizing machine learning. Journal of Cloud Computing, 12(1), 127.
  2. Mohamed, D., & Ismael, O. (2023). Enhancement of an IoT hybrid intrusion detection system based on fog-to-cloud computing. Journal of Cloud Computing, 12(1), 41.
  3. Samunnisa, K., Kumar, G. S. V., & Madhavi, K. (2023). Intrusion detection system in distributed cloud computing: Hybrid clustering and classification methods. Measurement: Sensors, 25, 100612.
  4. Attou, H., Guezzaz, A., Benkirane, S., Azrour, M., & Farhaoui, Y. (2023). Cloud-based intrusion detection approach using machine learning techniques. Big Data Mining and Analytics, 6(3), 311-320.
  5. Tariq, M., & Suaib, M. (2023). A review on intrusion detection in cloud computing. International Journal of Engineering and Management Research, 13(2), 207-215.
  6. Kavitha, C., Gadekallu, T. R., K, N., Kavin, B. P., & Lai, W. C. (2023). Filter-based ensemble feature selection and deep learning model for intrusion detection in cloud computing. Electronics, 12(3), 556.
  7. Attou, H., Mohy-eddine, M., Guezzaz, A., Benkirane, S., Azrour, M., Alabdultif, A., & Almusallam, N. (2023). Towards an intelligent intrusion detection system to detect malicious activities in cloud computing. Applied Sciences, 13(17), 9588.
  8. Lin, H., Xue, Q., Feng, J., & Bai, D. (2023). Internet of things intrusion detection model and algorithm based on cloud computing and multi-feature extraction extreme learning machine. Digital Communications and Networks, 9(1), 111-124.
  9. Maheswari, K. G., Siva, C., & Priya, G. N. (2023). An optimal cluster based intrusion detection system for defence against attack in web and cloud computing environments. Wireless Personal Communications, 128(3), 2011-2037.
  10. Maheswari, K. G., Siva, C., & Nalinipriya, G. (2023). Optimal cluster based feature selection for intrusion detection system in web and cloud computing environment using hybrid teacher learning optimization enables deep recurrent neural network. Computer Communications, 202, 145-153.
  11. Vashishtha, L. K., Singh, A. P., & Chatterjee, K. (2023). HIDM: A hybrid intrusion detection model for cloud based systems. Wireless Personal Communications, 128(4), 2637-2666.
  12. Srilatha, D., & Thillaiarasu, N. (2023). Implementation of Intrusion detection and prevention with Deep Learning in Cloud Computing. Journal of Information Technology Management, 15(Special Issue), 1-18.
  13. Alzughaibi, S., & El Khediri, S. (2023). A cloud intrusion detection systems based on dnn using backpropagation and pso on the cse-cic-ids2018 dataset. Applied Sciences, 13(4), 2276.
  14. Alheeti, K. M. A., Lateef, A. A. A., Alzahrani, A., Imran, A., & Al_Dosary, D. (2023). Cloud Intrusion Detection System Based on SVM. International Journal of Interactive Mobile Technologies, 17(11).
  15. Bingu, R., & Jothilakshmi, S. (2023). Design of intrusion detection system using ensemble learning technique in cloud computing environment. International Journal of Advanced Computer Science and Applications, 14(5).
  16. Wankhade, N., & Khandare, A. (2023). Optimization of deep generative intrusion detection system for cloud computing: challenges and scope for improvements. EAI Endorsed Transactions on Scalable Information Systems, 10(6).
  17. Laassar, I., Hadi, M. Y., Arifullah, H. R., & Khan, F. S. (2024). Proposed algorithm base optimisation plan for feature selection-based intrusion detection in cloud computing. Indonesian Journal of Electrical Engineering and Computer Science, 33(2), 1140-1149.
  18. Chaudhari, A., Gohil, B., & Rao, U. P. (2024). A novel hybrid framework for cloud intrusion detection system using system call sequence analysis. Cluster Computing, 27(3), 3753-3769.
  19. Ziheng, G. E., & Jiang, G. A Novel Intrusion Detection Mechanism in Cloud Computing Environments based on Artificial Neural Network and Genetic Algorithm. Telecommunications and Radio Engineering.
  20. Polepally, V., Jagannadha Rao, D. B., Kalpana, P., & Nagendra Prabhu, S. (2024). Exponential Squirrel Search Algorithm-Based Deep Classifier for Intrusion Detection in Cloud Computing with Big Data Assisted Spark Framework. Cybernetics and Systems, 55(2), 331-350.
  21. Preethi, B. C., Vasanthi, R., Sugitha, G., & Lakshmi, S. A. (2024). Intrusion detection and secure data storage in the cloud were recommend by a multiscale deep bidirectional gated recurrent neural network. Expert Systems with Applications, 255, 124428.
  22. Souri, A., Norouzi, M., & Alsenani, Y. (2024). A new cloud-based cyber-attack detection architecture for hyper-automation process in industrial internet of things. Cluster Computing, 27(3), 3639-3655.
  23. Ali, S. Y., Farooq, U., Anum, L., Mian, N. A., Asim, M., & Alyas, T. (2024). Securing cloud environments: a Convolutional Neural Network (CNN) approach to intrusion detection system. Journal of Computing & Biomedical Informatics, 6(02), 295-308.
  24. The Bot-Iot Dataset; IEEE: Piscataway, NJ, USA, 2019; Volume 5.
  25. Fan, C.; Chen, M.; Wang, X.; Wang, J.; Huang, B. A Review on Data Preprocessing Techniques toward Efficient and Reliable Knowledge Discovery From Building Operational Data. Front. Energy Res. 2021, 9, 652801
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion Detection System; Morlet Wavelet Kernel Function Long Short-Term Memory; Jarratt-Butterfly optimization algorithm; Intrusion Detection System; Cloud Computing; Deep Learning.