Skip to main content

AI-Enabled IDS for Identifying Malicious Traffics in Cloud Systems

  • Conference paper
  • First Online:
Advanced Computational and Communication Paradigms (ICACCP 2023)

Abstract

The widespread usage of the Internet has increased network security issues. Some of the serious threats are Brute force, Heartbleed, Botnet, Web attacks, DoS, DDoS, and Infiltration of the network. With the increased usage of online services and the development of new technologies like IoT, Cloud, Edge, and Mobile Computing, the detection of these threats is important and becoming paramount. This study presents an Intrusion Detection System (IDS) framework by proposing various hybrid models for the detection of malicious traffic. The models are developed using feature selection techniques, namely Recursive Feature Elimination, Chi-Square, Principal Component Analysis, and five Machine Learning (ML) techniques. In this experiment, the standard CSE-CIC-IDS 2018 dataset is used to examine the performance evaluation of the proposed approaches. In this paper, according to the comparison of the proposed hybrid approaches, Recursive Feature Elimination with Random Forest performs better than the other approaches with an accuracy of 99.23%. The proposed approach provides better accuracy as compared to earlier reported similar approaches in the literature.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Executive Perspectives Cisco Report (2022) Cisco Annual Internet Report–Cisco Annual Internet Report (2018–2023) White Paper. [online] Cisco. https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paper-c11-741490.html. Accessed 4 September 2022

  2. Selvakumar K, Karuppiah M, Sairamesh L, Hafizul Islam SK, Hassan MM, Fortino G, Raymond Choo K-K (2019) Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs. Inf Sci 497:77–90

    Google Scholar 

  3. Sharafaldin I, Lashkari AH, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1:108–116

    Google Scholar 

  4. Unb.ca. 2022. IDS 2018 | Datasets | Research | Canadian Institute for Cybersecurity | UNB. https://www.unb.ca/cic/datasets/ids-2018.html. Accessed 4 September 2022

  5. Samrin R, Vasumathi D (2017) Review on anomaly based network intrusion detection system. In: 2017 international conference on electrical, electronics, communication, computer, and optimization techniques (ICEECCOT). IEEE, pp 141–147

    Google Scholar 

  6. Ansari Md SA, Chattopadhayay A, Das S. A kernel level VFs logger for building efficient file system intrusion detection system. In: 2010 second international conference on computer and network technology. IEEE, pp 273–279

    Google Scholar 

  7. Elshafie HM, Mahmoud TM, Ali AA (2019) Improving the performance of the snort intrusion detection using clonal selection. In: 2019 international conference on innovative trends in computer engineering (ITCE). IEEE, pp 104–110

    Google Scholar 

  8. Keserwani PK, Govil MC, Pilli ES, Govil P (2021) An optimal NIDS for VCN using feature selection and deep learning technique: IDS for VCN. Int J Digit Crime Forensics (IJDCF) 13(6):1–25

    Google Scholar 

  9. Ansari Md SA, Pal K, Govil MC, Govil P, Srivastava A (2021) Ensemble machine learning for P2P traffic identification. Int J Comput Digit Syst

    Google Scholar 

  10. Yin C, Zhu Y, Fei J, He X (2017) A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5:21954–21961

    Article  Google Scholar 

  11. Nisioti A, Mylonas A, Yoo PD, Katos V (2018) From intrusion detection to attacker attribution: a comprehensive survey of unsupervised methods. IEEE Commun Surv Tutor 20(4):3369–3388

    Article  Google Scholar 

  12. Ansari Md SA, Govil MC, Pal K, Samaddar SG (2020) Tools and techniques in optimization of network resources. In: 2020 3rd international conference on emerging technologies in computer engineering: machine learning and internet of things (ICETCE). IEEE, pp 1–7

    Google Scholar 

  13. Barbhuiya S, Papazachos Z, Kilpatrick P, Nikolopoulos DS (2018) RADS: real-time anomaly detection system for cloud data centres. arXiv:1811.04481

  14. Alharbi A, Alsubhi K (2021) Botnet detection approach using graph-based machine learning. IEEE Access 9:99166–99180

    Article  Google Scholar 

  15. Abou Daya A, Salahuddin MA, Limam N, Boutaba R (2020) BotChase: graph-based bot detection using machine learning. IEEE Trans Netw Serv Manage 17(1):15–29

    Article  Google Scholar 

  16. Elsayed MS, Le-Khac NA, Dev S, Jurcut AD (2020) Detecting abnormal traffic in large-scale networks. In: 2020 international symposium on networks, computers and communications (ISNCC). IEEE, pp 1–7

    Google Scholar 

  17. Nguyen KK et al (2018) Cyberattack detection in mobile cloud computing: a deep learning approach. In: 2018 IEEE wireless communications and networking conference (WCNC). IEEE

    Google Scholar 

  18. Smys S, Basar A, Wang H (2020) Hybrid intrusion detection system for internet of things (IoT). J ISMAC 2(04):190–199

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Md. Sarfaraj Alam Ansari .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Biswas, S., Kumar, C., Som, S., Ansari, M.S.A., Govil, M.C. (2023). AI-Enabled IDS for Identifying Malicious Traffics in Cloud Systems. In: Borah, S., Gandhi, T.K., Piuri, V. (eds) Advanced Computational and Communication Paradigms . ICACCP 2023. Lecture Notes in Networks and Systems, vol 535. Springer, Singapore. https://doi.org/10.1007/978-981-99-4284-8_7

Download citation

Publish with us

Policies and ethics