Optimizing trust, Cloud Environments Fuzzy Neural Network, Intrusion Detection System
Keywords:
Cloud Computing, Intrusion Detection System, Neuro-Fuzzy, K-Means, Denial of Services, Cloud SecurityAbstract
In the dynamic landscape of cloud computing, ensuring the security and integrity of services is paramount. This article introduces a novel approach to cloud intrusion detection by leveraging the synergies of fuzzy logic and neural networks. The proposed Fuzzy Neural Network Aided Cloud Intrusion Detection System (FNN-CIDS) integrates the adaptability of fuzzy systems with the learning capabilities of neural networks to enhance the detection accuracy of malicious activities within cloud environments. The system is designed to discern subtle patterns indicative of intrusion attempts, thereby fortifying the defense mechanisms for trusted services hosted in the cloud. The article presents the conceptual framework of FNN-CIDS, detailing the integration of fuzzy logic for rule-based inference and neural networks for pattern recognition. Experimental results demonstrate the system's efficacy in identifying diverse intrusion scenarios while minimizing false positives. This research provides a promising path for improving the reliability of cloud computing infrastructures and advances strong security frameworks for cloud-based applications. In this sense, the research effort provides a trust evaluation system to determine the reliability of cloud services and an intrusion detection system to guarantee intrusion-free cloud services. the construction of a cloud intrusion detection system using a neuro-fuzzy based self-constructing clustering algorithm. The performance of this method has been compared to other well-known clustering methods in the field of cloud intrusion detection using result analysis.
Downloads
References
Abraham, A & Jain R 2005, ‘Soft computing models for network intrusion detection systems’, Classification and Clustering for Knowledge Discovery. Studies in Computational Intelligence, Springer, Berlin, vol. 4, pp. 191–207.
Ahmad, S, Ahmad, B, Saqib, SM & Khattak, RM 2012, ‘Trust Model: Cloud’s Provider and Cloud’s User’, International Journal of Advanced Science and Technology, vol. 44, pp. 69-80.
Alsafi, HM, Abduallah, WM & Patha, AK 2012, ‘IDPS: an integrated intrusion handling model for cloud computing environment’, International Journal of Computing and Information Technology, vol. 4, no. 1, pp. 1-16.
Alsharafat, W 2013, ‘Applying Artificial Neural Network and eXtended Classifier System for Network Intrusion Detection’, The International Arab Journal of Information Technology, vol. 10, no. 3, pp. 230-238.
Amirreza, Z & Alireza, Z 2012, ‘Internet intrusion detection system service in a cloud’, International Journal of Computer Science Issues, vol. 9, no. 5, pp. 308-315.
Ang, JH, Tan, KC & Mamun, AA 2010, ‘An evolutionary memetic algorithm for rule extraction’, Expert Systems with Applications, vol. 37, no. 2, pp. 1302-1315.
Aziz, ASA, Salama, MA, Hassanien, AE & Hanafi, SEO 2012, ‘Artificial Immune System Inspired Intrusion Detection System using Genetic Algorithm’, Informatica, An International Journal of Computing and Informatics, vol. 36, no. 4, pp. 347-357.
Bakshi, A & Yogesh, B 2010, ‘Securing cloud from ddos attacks using intrusion detection system in virtual machine’, Proceedings of Second International Conference on Communication Software and Networks, pp. 260-264.
Balazs, K, Koczy, LT & Botzheim, J 2008, ‘Comparison of Fuzzy Rule-based Learning and Inference Systems’, Proceedings of ninth International Symposium of Hungarian Researchers on Computational Intelligence and Informatics, pp. 61-75.
Bapuji, V, Kumar, RN, Govardhan, A & Sarma, SSVN 2012, ‘Soft Computing and Artificial Intelligence Techniques for Intrusion Detection System’, Network and Complex Systems, vol. 2, no. 4, pp. 24-31.
Bezdek, JC 1981, ‘Pattern Recognition with Fuzzy Objective Function Algorithms’, Kluwer Academic PublishersNorwell, MA, USA.
Bhadauria, R & Sanyal, S 2012, ‘A survey on security issues in cloud computing and associated mitigation techniques’, International Journal of Computer Applications, vol. 47, no. 18, pp. 47-66.
Bhat, AH, Patra, S & Jena, D 2013, ‘Machine learning approach for intrusion detection on cloud virtual machines’, International Journal of Application or Innovation in Engineering & Management, vol. 2, no. 6, pp. 57-66.
Calheiros, RN, Ranjan, R, Rose, CAFD & Buyya, R 2009, ‘CloudSim: A novel framework for modeling and simulation of cloud computing infrastructures and services’, Technical Report, GRIDS-TR-2009-1, Grid Computing and Distributed Systems Laboratory, The University of Melbourne, Australia.
Calheiros, RN, Ranjan, R, Beloglazov, A, Rose, CAFD & Buyya, R 2011, ‘CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms’, Software – Practice & Experience, vol. 41, no. 1, pp. 23-50.
Chandran, SP & Angepat, M 2010, ‘Cloud Computing: Analysing the risks involved in cloud computing environments’, Proceedings of Natural Sciences and Engineering, Sweden, pp. 2-4.
Chiu, SL 1994, ‘Fuzzy model identification based on cluster estimation’, Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, vol. 2, no. 3, pp. 267-278.
Chung, CJ, Khatkar, P, Xing, T, Lee, J & Huang, D 2013, ‘NICE: network intrusion detection and countermeasure selection in virtual network systems’, IEEE Transactions on Dependable Secure Computing, vol. 10, no. 4, pp. 198-211.
Cozar, J, Ossa, L & Gamez, JA 2014, ‘Learning TSK-0 linguistic fuzzy rules by means of local search algorithms’, Applied Soft Computing, vol. 21, pp. 57-71.
Dhage, SN, Meshram, BB, Rawat, R, Padawe, S, Paingaokar, M & Misra, A 2011, ‘Intrusion detection system in cloud computing environment’, Proceedings of International Conference and Workshop on Emerging Trends in Technology, pp. 235-239.
Dolev, S, Gilboa, N & Kopeetsky, M 2014, ‘Efficient private multi- party computations of trust in the presence of curious and malicious users’, Journal of Trust Management, vol. 1, no. 8, pp. 1-21.
Dunlap GW, King ST, Cinar S, Basrai M, & Chen PM 2002, ‘Revirt: enabling intrusion analysis through virtual machine logging and replay’, Proceedings of fifth symposium on operating systems design and implementation, USENIX, Boston, vol. 36, no. SI, pp. 211-224.
Eom, JH & Park, MW 2013, ‘Design of Internal Traffic Checkpoint of Security Checkpoint Model in the Cloud Computing’, International Journal of Security and Its Applications, vol. 7, no. 1, pp. 119-128.
Eucalyptus. Available from: http://www.eucalyptus.com [5 March 2015].
Fan, W & Perros, H 2014, ‘A novel trust management framework for multi-cloud environments based on trust service providers’, Knowledge-Based Systems, vol. 70, no. C, pp. 392 - 406.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.