2017
DOI: 10.1002/cpe.4171
|View full text |Cite
|
Sign up to set email alerts
|

HIDCC: A hybrid intrusion detection approach in cloud computing

Abstract: The rapid growth of distributed computing systems that heavily communicate and interact with each other has raised the importance of confrontation against cyber intruders, attackers, and subversives. With respect to the emergence of cloud computing and its deployment all over the world, and because of its distributed and decentralized nature, a special security requirement is needed to protect this paradigm. Intrusion detection systems could differentiate usual and unusual behaviors by means of supervising, ve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
22
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(22 citation statements)
references
References 23 publications
0
22
0
Order By: Relevance
“…For both datasets, the proposed GWO-BES-DSAE NIDS model is reporting higher accuracy than other existing approaches, as depicted in Table 8. As depicted in Table 8 the FAR of the proposed NIDS model is higher than DT-EnSVM (Gu et al 2019) but lower than HIDCC (Hatef et al 2018) for the NSL-KDD dataset. Table 8 depicts that the FAR of the proposed NIDS model on the UNSW-NB15 dataset is lower than RB-IDS (Kumar et al 2019) and HLDNS (Patil, Dudeja, and Modi 2019).…”
Section: Analysis and Discussion Of Resultsmentioning
confidence: 91%
“…For both datasets, the proposed GWO-BES-DSAE NIDS model is reporting higher accuracy than other existing approaches, as depicted in Table 8. As depicted in Table 8 the FAR of the proposed NIDS model is higher than DT-EnSVM (Gu et al 2019) but lower than HIDCC (Hatef et al 2018) for the NSL-KDD dataset. Table 8 depicts that the FAR of the proposed NIDS model on the UNSW-NB15 dataset is lower than RB-IDS (Kumar et al 2019) and HLDNS (Patil, Dudeja, and Modi 2019).…”
Section: Analysis and Discussion Of Resultsmentioning
confidence: 91%
“…This integration of the two forms of detection strategies in a ''Hybrid NIDS'' [20] aims to increase the final accuracy of signature-based models for intrusion detection while eliminating the usual high level of false positives of network-based IDS (NIDS) approaches, hence a hybrid approach is embraced by most existing platforms. Other examples of hybrid are Signature-Based Anomaly Detection Scheme (SADS) [21] , Artificial Bee Colony and Artificial Fish Swarm (ABC-AFS) [22], Hybrid Intrusion Detection Approach In Cloud Computing (HIDCC) [23].…”
Section: Detection Methodsmentioning
confidence: 99%
“…[8][9][10] Therefore, it is necessary to establish a detection model that can accurately identify most of attacks, and handle large-scale data fast enough. Although the recent literatures [11][12][13] have solved these problems, they are not suitable for the detection of persistent attacks. Instead of detecting data flows individually, we subcontract data flows according to a certain rule (eg, all samples in each bag have the same source port), which can improve recall and precision of detection for persistent attacks.…”
Section: Introductionmentioning
confidence: 99%