SlideShare a Scribd company logo
Int. J. Advanced Networking and Applications
Volume: 10 Issue: 01 Pages: 3698-3703 (2018) ISSN: 0975-0290
3698
WLI-FCM and Artificial Neural Network Based
Cloud Intrusion Detection System
Pinki Sharma
Research scholar, Department of Computer Science, Punjabi University, Patiala, Punjab, India
Email: pinkisharma@gmail.com
Jyotsna Sengupta
Professor, Department of Computer Science, Punjabi University, Patiala, Punjab, India
Email: jyotsna.sengupta@gmail.com
P. K. Suri
Email: pksurikuk@gmail.com
-------------------------------------------------------------------ABSTRACT---------------------------------------------------------------
Security and Performance aspects of cloud computing are the major issues which have to be tended to in Cloud
Computing. Intrusion is one such basic and imperative security problem for Cloud Computing. Consequently, it is
essential to create an Intrusion Detection System (IDS) to detect both inside and outside assaults with high
detection precision in cloud environment. In this paper, cloud intrusion detection system at hypervisor layer is
developed and assesses to detect the depraved activities in cloud computing environment. The cloud intrusion
detection system uses a hybrid algorithm which is a fusion of WLI- FCM clustering algorithm and Back
propagation artificial Neural Network to improve the detection accuracy of the cloud intrusion detection system.
The proposed system is implemented and compared with K-means and classic FCM. The DARPA’s KDD cup
dataset 1999 is used for simulation. From the detailed performance analysis, it is clear that the proposed system is
able to detect the anomalies with high detection accuracy and low false alarm rate.
Keywords - Cloud Computing, Cloud intrusion detection system, Intrusion Detection System, IDS, Security.
--------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: April 30, 2018 Date of Acceptance: May 19, 2018
--------------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
In recent years cloud computing has revolutionized the IT
world with rapidly emerging and widely accepted
paradigm for computing systems. Today numerous
organizations have stated to upload their tremendous
amount of important data into public cloud. The sensitive
information uploaded into public open cloud [1] and that
data is vulnerable to many serious security risks such as
availability, confidentiality and integrity. The survey By
International Data Corporation (IDC)[2] reports that
security is the topmost obstacle of cloud computing (Gens,
2009). Furthermore, the continuous uninterrupted service
of cloud technology draws the attention of the intruders to
obtain entrance and abuse usres assets and services
provided by Cloud service provider (CSP). Lockheed
martin’s (2010)[3] cyber security division white paper
shows that major security concern after data security is
attack detection and prevention in cloud infrastructure.
Various technologies such as message encryption and
firewall protect the network and can be used as first line of
defence. Firewall is not suitable for detecting insider
attacks. Some of the Denial of Service attacks (DoS) and
Distributed Denial of Service attacks (DDoS) are too
complex to detect with firewall [4]. Keeping in mind, the
end goal to ensure the security of cloud computing
environment, it is necessary to develop an intrusion
detection system. A traditional network-based or host-
based intrusion detection system [1, 5] does not suit virtual
cloud environment. In this way, it is imperative to develop
an anomaly detection component which is reasonable for
detecting the wicked activities in cloud computing
systems.
An effective intrusion detection system should be quick,
effortlessly configurable, self-checked, hard to cheat, high
fault tolerance, accessible without interference, and free
from false error with an overhead as least as possible [6].
Its main mean is to assess data frameworks and to perform
early identification of noxious action for decreasing the
security hazard to an acceptably low level. High false-
positive caution rate may trouble data accessibility, though
high false-negative alert rate may bring about genuine
harm to the secured frameworks as improper access to
delicate data and information harming. The performance
of IDS is based on the measure of adequate log
information, its regular updates on them, and the quick and
correct detection of intrusion from the evaluation between
current activity of the user and the past data.
In this paper, we design and develop a technique for cloud
intrusion detection by means of the WLI fuzzy clustering
and neural network. , the WLI fuzzy clustering technique
is applied to the cloud computing network to create the
distinctive clusters. At that point, the resultant clusters
outcome is given as input for the training the neural
network for the learning process.
Rest of this paper is organized as follows: Section 2
presents existing approaches to Cloud intrusion detection
in cloud. Detailed description of proposed framework is
given in section III. Performance and quality results of
proposed framework are presented in section IV. Section
V concludes the paper with the references at the end.
Int. J. Advanced Networking and Applications
Volume: 10 Issue: 01 Pages: 3698-3703 (2018) ISSN: 0975-0290
3699
II. RELATED WORKS
N. Pandeeswari and Ganesh Kumar[7] deploy an anomaly
detection system called Hypervisor Detector at the virtual
machine monitor layer. The Hypervisor Detector is
designed with a hybrid approach FCM-ANN which is a
combination of Fuzzy C-Means clustering and Artificial
Neural Network. This model works in three phases. The
first phase of FCM-ANN is fuzzy clustering module which
is used to divide the large dataset into small clusters so as
to improve the learning capability of ANN. Fuzzy
clustering module enhances the performance of artificial
neural network. In second phase, various ANN modules
are trained according to their cluster values. In third phase,
Fuzzy aggregation module is used to combine the results
of various ANN. Here, the Hypervisor Detector is
compared with Naïve Bayes and classic ANN by using the
various evaluation criterions such as precision, recall value
and F-value under various attacks. The performance
results of FCM-ANN confirm that it outperforms the
Naïve Bayes and the classic ANN algorithms even for low
frequent attacks. Hence, the proposed Hypervisor Detector
is suitable for detecting various attacks with high detection
rate and low false alarm rate.
The authors, Vereia et al. [5] have proposed a Grid and
Cloud Computing Intrusion Detection System (GCCIDS)
that employs an audit system. GCCIDS integrates
knowledge and behaviour analysis to discover the
intrusions. This system makes use of an event auditor that
captures data from various resources like system logs,
node messages and services. Based on the captured data,
the IDS service can be used to detect intrusions by using
behaviour based and knowledge based techniques.
GCCIDS uses artificial neural network for behaviour
analysis.
Chirag N. Modi et. al.[8] Propose a framework integrating
network intrusion detection system (NIDS) in the Cloud.
Our NIDS module consists of Snort and signature apriori
algorithm. It generates new rules from captured packets.
These new rules are appended in the Snort configuration
file to improve efficiency of Snort. It aims to detect known
attacks and derivative of known attacks in Cloud by
monitoring network traffic, while ensuring low false
positive rate with reasonable computational cost. We also
recommend the positioning of NIDS in Cloud. We present
experimental setup and discuss the design goals expected
from proposed framework.
Chi-Chun Lo et al [9] proposed the co-operative intrusion
detection model for the grid and cloud computing in which
the IDS are distributed among the nodes of the grid and
alert other nodes when an attack occurs. Indeed, this
approach made a giant leap over other models for the same
as this helps other nodes in avoiding the same attacks from
occurring. This system also helps in preventing single
point of failure since the IDSs are distributed across the
cloud.
Infan Gul proposed an efficient model that used
multithreading technique for improving the performance
in the cloud computing environment to handle large
number of data packet flows. The researchers have
conducted experiments to perform the performance
evaluation of their proposed method relative to the single
thread approach. They have used parameters like
processing time and execution for their comparative study.
Z. Chiba et al. [10] described the Cooperative and hybrid
based network IDS system (CH-NIDS) using the Back
Propagation Neural network (BPN). They developed the
BPN model based on Snort and Optimized method. The
snort prior in the BPN was used to detect the unknown
attacks. Due to low convergence of BPN, they exploited
the optimization algorithm to optimize the parameters
which enhanced the detection rate and accuracy. Also, the
snort and optimized based BPN was also used to detect the
DoS and DDoS attacks by sharing alerts in central log.
Thus, simulation results were evaluated to improve the
detection rate and mitigate the false rate.
III. PROPOSED HYPERVISOR DETECTOR
The proposed intrusion detection system is developed at
the hypervisor layer that uses the proposed model for
detecting the intrusion behaviour of the cloud network.
The proposed intrusion detection is begin with, the
WLI[11] fuzzy clustering technique is apply to the cloud
system to produce the distinctive clusters. Then, the
resultant clustered result is given as input to the training
algorithm for learning process. A back propagation neural
network is used for the training purpose.
At first, the input data is provide to the WLI fuzzy
clustering method where the data are clustered together to
carried out to detect the intrusion. In WLI fuzzy method,
the Cluster Validity Index (CVI) is principally used for the
clustering of the fed data. Thus, the Euclidean Distance is
measured between the data objects, i.e., a pair of centroids
or an object centroids are used to evaluate the
heterogeneity and homogeneity measures within the
clusters. Also, it uses the fuzzy membership function
belongs to data object and cluster centroid.
Proposed WLI-ANN
Step 1: Since cluster centroids are randomly generated, the
input dataset may not contain the similar clustering results.
The N number of clusters are randomly generated from the
input data is NlCl 1, . To enhance the clustering
performance, the CVI is used to estimate the index
properties of the centroids.
Step 2: The median distance is taken as the principal
aspect in the WLI fuzzy clustering method. After that, the
distance is measured between the data object and centroid
and that is utilised for the separation of different clusters.
Accordingly, the fuzzy compactness is resolved with
supported by the fuzzy weighting distances [10] and fuzzy
cardinality of clusters. The fuzzy weighting distance is
measured by,
jiij cd 2

where, id is the th
i data object and jc represents the
th
j
cluster and ij defines the membership function. Then, the
fuzzy cardinality of cluster is given as 

K
i
ij
1
 .
Int. J. Advanced Networking and Applications
Volume: 10 Issue: 01 Pages: 3698-3703 (2018) ISSN: 0975-0290
3700
Step 3: Thus, the total fuzzy compactness of the all the
clusters ranges from Nto1 , is expresses as below.
























N
j
K
i
ij
ji
K
i
ij
f
cd
WL
1
1
2
1


Step 4 : In order to separate the clusters, the minimum and
median distance is measured between the pair of centroids.
The distance between N centroids is evaluated by
  21NN . The minimum distance of all   21NN
distance is termed as ‘min’. Then, the median distance is
determined by
 
2
21NN
distances of all clusters. Thus,
the separation measure of the cluster is evaluated as:
   







22
min
2
1
ki
ji
ki
ji
d ccmedianccWL
Step 5: Finally, the WLI fuzzy clustering caters the N
number of clusters where the input data are grouped
respectively. The WLI is estimated by the ratio of fuzzy
compactness and cluster separation. The cluster validity
index is determined by,
 
d
f
WL
WL
NWLI


2
The WLI fuzzy clustering mechanism provides
the P number of clusters which is then fed into the
proposed model. The centroid is selected by the minimum
value of WLI value in every cluster. It is formulated by,
  NWLIC
idN
 min
The training algorithm is described below.
 The WLI fuzzy clustering [11] yields the P
number of clusters where the input data are
grouped together in each cluster. Hence, the
ensuing data object is specified as input to the
NN model for the training progression. Due to P
number of clusters, we require Q number of NN
model to train the data.
 In every cluster, the data are grouped in the size
of nmP  , where P defines the total number of
clusters. The clustered data is given as input to Q
number of clusters. Thus, the clustered output is
expressed by,
 jkjjj cccC ,.....,, 21
 where, j is the number of output acquired by the
WLI fuzzy clustering mechanism and jkc
represents the output of th
k cluster. Then, the
resultant data is fed as input to the proposed NN
where the data is trained to detect the malicious
activity in the cloud environment.
 Normally, the training algorithm of neural
network is mainly used to train the data to
perform the classification process.
Once the data are trained in the network, then the trained
data are aggregated. The data aggregation is modelled by
combining the trained output of Q different NN network
models. The intent of data aggregation is to reduce the
detection error of the training algorithm. Thus, the
aggregated data is fed into the new NN network. The input
of new NN is expressed as follows
 qffft ,.....,, 21
where, t is the input of new aggregated model consists
of trained data from Q number of NN. Finally, the data
size of 1m is attained by the aggregation model to
perform the intrusion detection. On the other hand, during
testing phase, the input data is given into the hypervisor
detector where the proposed NN model is significantly
detects the intrusions or malicious activity in the cloud
network. Based on the above three phases, the intrusion is
detected using the Neural network.
IV. EXPERIMENTAL SETUP AND
PERFORMANCE
To implement the Hypervisor Detector, this work uses
cloud simulator; cloudsim 3.0. The Hypervisor Detector is
trained and tested in cloudsim 3.0. To train and test the
proposed system, the DARPA’s KDD cup dataset
1999[12] is used. This dataset has 41 features and a label
specifying the record as either normal or attack.
For testing the system model, the KDD test dataset is used.
The performance factors that are frequently used to
evaluate the performance of intrusion detection system are
as follows.1. True positive rate, 2. True negative rate, 3.
False positive rate and 4. False negative rate. True positive
rate entails that the intrusion detection system detects true
attack that has occurred. True negative rate entails that the
detection system has rightly detect the normal condition.
False positive rate implies that IDS has mistakenly marked
the normal condition as abnormal. False negative rate
indicates that the anomaly detection system cannot detect
the intrusions after a particular attack has occurred.
ii) Evaluation parameters: The performance of the
proposed cloud intrusion detection system is validated by
three metrics are accuracy, true positive rate and false
positive rate. The description of this metrics is given
below.
True Positive Rate (TPR): It is the measure for the
extent of positives which are effectively recognized as
malignant activity in the cloud environment. It is also
termed as sensitivity. The TPR is expressed as:
 FNTP
TP
TPR


False Positive Rate (FPR): It is defined as the
probability measures of falsely rejects the normal node in
the cloud network. Thus, the FPR is derived by,
Int. J. Advanced Networking and Applications
Volume: 10 Issue: 01 Pages: 3698-3703 (2018) ISSN: 0975-0290
3701
 TNFP
FP
FPR


Accuracy: The accuracy is the statistical measure of
both positive and negative rates. The higher accuracy
value provides the better detection performance. It is
formulated as given below
FNFPTNTP
TNTP
Accuracy



where, TN and TP are true positive and negatives, FP
and FN denotes the false positive and negative value.
The analysed performance is compared with exiting
clustering algorithm like FCM[13], KM[14].
V. PERFORMANCE EVALUATION
As shown in figure 1 for the no of cluster 3,4 and 5 K-
means attains 93.25, 94.16 and 91.78 TPR , FCM attains
91.16, 90.89 and 87.83 TPR and WLI attains 96.29, 94.42
and 93.56. Compared to K-means and FCM, WLI attains
highest TPR. That means WLI outperforms K-means and
FCM.
Figure 1. No of Clusters
As shown in figure 1 for the no of cluster 3, 4 and 5 K-
means attains 19.8, 20.8 and 22.83 FPR, FCM attains
20.83, 21.13 and 23.41 FPR and WLI attains 18.8, 19.91
and 20.3 FPR. Compared to K-means and FCM, WLI
attains highest FPR. That means WLI outperforms K-
means and FCM.
As shown in figure 1 for the no of cluster 3, 4 and 5 K-
means attains 91.84, 90.94 and 89.67 accuracy, FCM
attains 90.15, 89.99 and 89.46 accuracy and WLI attains
93.88, 92.16 and 90.63 Accuracy. Compared to K-means
and FCM, WLI attains highest accuracy. That means WLI
outperforms K-means and FCM.
Figure 2. % Training data
As shown in figure 2 for the % Training data 60%, 70%
and 80%, the K-means attains 93.86, 95.39 and 95.88
TPR, FCM attains 91.66, 94.51 and 94.56 TPR and WLI
attains 95.96, 96.51 and 97.71. Compared to K-means and
FCM, WLI attains highest TPR. That means WLI
outperforms K-means and FCM.
As shown in figure 2 for the % Training data 60%, 70%
and 80, the %K-means attains 20.6, 20.71 and 18.14 FPR,
FCM attains 21.3, 21.23 and 18.69 FPR and WLI attains
18.98, 19.5 and 17.46 FPR. Compared to K-means and
FCM, WLI attains highest FPR. That means WLI
outperforms K-means and FCM.
0
20
40
60
80
100
120
FCM KM WLI FCM KM WLI FCM KM WLI
TPR FPR ACCURACY
No. of Cluster
3
4
5
0
20
40
60
80
100
120
FCM KM WLI FCM KM WLI FCM KM WLI
TPR FPR ACCURACY
% Training Data
60
70
80
Int. J. Advanced Networking and Applications
Volume: 10 Issue: 01 Pages: 3698-3703 (2018) ISSN: 0975-0290
3702
As shown in figure 2 for the % Training data 60%, 70%
and 80%K-means attains 92.07, 93.14 and 93.67
accuracy, FCM attains 91.95, 92.37 and 93.26 accuracy
and WLI attains 94.18, 95.67 and 96.02 Accuracy.
Compared to K-means and FCM, WLI attains highest
accuracy. That means outperforms K-means and FCM.
Figure 3 On No. Of features
As shown in figure3 for the Number of Features 10, 20
and 30, the K-means attains 91.94, 92.94 and 93.67 TPR ,
the FCM attains 91.14, 91.99 and 92.89 TPR and WLI
attains 94.67, 95.31 and 96.84. Compared to K-means and
FCM, WLI attains highest TPR. That means WLI
outperforms K-means and FCM.
As shown in figure 3 for the Number of Features 10, 20
and 30, the K-means attains 23.26, 22.8 and 22.4 FPR,
FCM attains 26.16, 25.3 and 24.37 FPR and WLI attains
22.86, 12.51 and 20.12 FPR. Compared to K-means and
FCM, WLI attains highest FPR. That means WLI
outperforms K-means and FCM.
As shown in figure 3 for the Number of Features 10, 20
and 30, the K-means attains 89.54, 90.87 and 90.8
accuracy, FCM attains 88.67, 88.96 and 90.2 accuracy and
WLI attains 91.14, 91.49 and 92.24 Accuracy. Compared
to K-means and FCM, WLI attains highest accuracy. That
means WLI outperforms K-means and FCM.
VI. CONCLUSION
This paper presents an intrusion detection system called
Hypervisor Detector at the hypervisor layer. The
Hypervisor Detector is designed with a hybrid approach
WLI-ANN which is a combination of WLI and Artificial
Neural Network. The fuzzy C mean is running with the
WLI. The WLI partially allows the existence of closely
allocated centroids in the clustering results by considering
not only the minimum but also the median distances
between a pair of centroids and therefore possesses the
better stability. This model works in three steps. In first
step is fuzzy clustering module which is used to divide the
large dataset into small clusters so as to improve the
learning capability of ANN. In second step, various ANN
modules are trained according to their cluster values. In
third step, the results of various ANN from the second step
are combined to get the final result. The proposed
Hypervisor Detector is compared with K-means and
classic FCM by using the various evaluation criterions
such as number of clusters, number of Features used and
% of training data Used. The performance results of
proposed WLI-ANN confirm that it outperforms the K-
means and the classic FCM algorithms for more TPR,
Accuracy and low FPR. Hence, the proposed Hypervisor
Detector is suitable for detecting various attacks with high
detection rate and low false alarm rate.
REFERENCES
[1] H. Jin, G, Xiang, D. Zou, S. Wu, F. Zhao, M. Li, And
W. Zheng, AVMM-based intrusion prevention system
in cloud computing environment, Journal of
Supercomputing Springer ,66(3),2011, 1133–1151.
[2] F. Gens, New IDC IT Cloud Service Survey: Top
Benefits and Challenges Exchange,2009,online; http://
blogs .idc. com/ie/ ?p=730S.(Accessed 12 may 2017).
[3] L. Martin, WhitePaper,2010, online:/http://www. Lock
heed martin.com /data/assets/isgs/ documents/ Cloud
Computing WhitePaper.pdf.
[4] C. Modi ,D. Patel, B. Borisaniya, H. Patel, A. Patel
and M. Rajarajan, A survey of intrusion detection
techniques in Cloud, Journal of Network and
Computer Applications, 36(1),2013, 42-57.
[5] K. Vieira, A. Schulter, C.B. Westphall, and C. M.
Westphall, Intrusion detection techniques in grid and
cloud computing environment. IEEE IT Professional
Magazine , 2010,38–43
[6] S.Raja and S. Ramaiah, An Efficient Fuzzy-Based
Hybrid System to Cloud Intrusion Detection,
International Journal of Fuzzy Systems, 19(1),2016,1-
16.
0
20
40
60
80
100
120
FCM KM WLI FCM KM WLI FCM KM WLI
TPR FPR ACCURACYNo. of Features
10
20
30
Int. J. Advanced Networking and Applications
Volume: 10 Issue: 01 Pages: 3698-3703 (2018) ISSN: 0975-0290
3703
[7] N. Pandeeswari and Ganesh Kumar, Anomaly
Detection System in Cloud Environment Using Fuzzy
Clustering Based ANN, Mobile Networks and
Applications, 21(3), 2016, 494-505.
[8] C. N. Modi, D. R. Patel, A. Patel, and M. Rajarajan ,
Integrating Signature Apriori based Network Intrusion
Detection system (NIDS) in Cloud Computing. In:
Proceedings of 2nd International Conference on
Communication, Computing & Security, Procedia
Technology,6:905–912. Doi:10.1016/j. protcy.2012.10
.110
[9] C. C. Lo, C. C. Huang, and J. Ku ,A Cooperative
Intrusion Detection System Framework for Cloud
Computing Networks, 39th International Conference
on Parallel Processing Workshops , 2010, 280-284.
[10] Z. Chiba, N. Abghour, K. Moussaid and M. Rida, A
Cooperative and Hybrid Network Intrusion Detection
Framework in Cloud Computing Based on Snory and
Optimized back Propagation neural Network,
International Workshop on Mobile Cloud Computing
Sytems, Management and Security, 83, 2016, 1200-
1206.
[11] C. Wu, C. Ouyang, L. Chen, and L. Lu, A New Fuzzy
Clustering Validity Index with a Median Factor for
Centroid-based Clustering, IEEE Transactions on
Fuzzy Systems, 23(3),2015, 701 – 718.
[12] KDD Cup 1999. Available online:
http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.ht
ml, October 2007.
[13] R. kulhare and D. Singh, Intrusion Detection System
based on Fuzzy C Means Clustering and Probabilistic
Neural Network, International Journal of Computer
Applications,74 ,2013, 30-33.
[14] K. Nalavade and B. B. Mehsram, Evaluation of K-
Means Clustering for Effective Intrusion Detection and
Prevention in Massive Network Traffic Data,
International Journal of Computer Applications, 96,
2014, 9-14.
She received her BE in Electronics and Communications
from the Thapar Institute of Engg. And Tech., Patiala,
India in 1982 and MS in Computer Science and
Engineering from the Santa Clara University, Santa Clara,
California, USA, in 1985. She has completed her PhD in
Computer Science and Engineering at the Thapar Institute
Of Engg. And Tech., Patiala, India, 2002. Her research
Interests include cloud computing, ADHOC network,
wireless networks and distributed systems. She has
Attended a number of national and international
Conference and published a number of research paper in
National and International journals.
P.K. Suri is a former Professor, Dean Academic and
Chairman of the Department of Computer Science and
Application, Kurukshetra University and HCTM
Technical Campus, India. He has 40 years of teaching
and research experience with various designation in the
DCSA Kurukshetra University, Kurukshetra and in the
HCTM Technical Campus, India. He received his MSc
from the IIT Roorkee (formerly known as University of
Roorkee), Roorkee, India in 1972. He has completed his
PhD at the Faculty of Engineering, Kurukshetra
University, Kurukshetra in 1981. His research interests
Include simulation, cloud computing, ADHOC network,
Wireless networks and distributed systems software
engineering. He has attended a number of national and
international conference and published a number of
research papers in national and international journals. He
has guided more than 20 PhD research scholars.
AUTHORS BIOGRAPHY
Pinki Sharma is currently working toward her PhD in
the Department of Computer Science at the Punjabi
University, India. Her research interests include cloud
Computing and information security.
Jyotsna Sengupta is currently working as a Professor in
the Department of Computer Science at the Punjabi
University, India. She has 30 years of teaching experience
with various designations in the Department of Computer
Science at the Punjabi University, Patiala and in various
other reputed institutes.

More Related Content

PDF
Constructing a predictive model for an intelligent network intrusion detection
PDF
Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...
PDF
A survey of Network Intrusion Detection using soft computing Technique
PDF
Review for Secure Data Aggregation in Wireless Sensor Networks
PDF
Ijarcet vol-2-issue-3-901-903
DOCX
Implementation of digital image watermarking techniques using dwt and dwt svd...
PDF
Intrusion detection with Parameterized Methods for Wireless Sensor Networks
DOCX
High performance intrusion detection using modified k mean & naïve bayes
Constructing a predictive model for an intelligent network intrusion detection
Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...
A survey of Network Intrusion Detection using soft computing Technique
Review for Secure Data Aggregation in Wireless Sensor Networks
Ijarcet vol-2-issue-3-901-903
Implementation of digital image watermarking techniques using dwt and dwt svd...
Intrusion detection with Parameterized Methods for Wireless Sensor Networks
High performance intrusion detection using modified k mean & naïve bayes

What's hot (18)

DOCX
Secure data aggregation technique for wireless
PDF
Online stream mining approach for clustering network traffic
PDF
Online stream mining approach for clustering network traffic
PDF
A Survey on Cloud-Based IP Trace Back Framework
PDF
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
PDF
A novel signature based traffic classification engine to reduce false alarms ...
PDF
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
PDF
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
PDF
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
PDF
Bidirectional data centric routing protocol to improve the energy efficiency ...
PDF
Secure data dissemination protocol in wireless sensor networks using xor netw...
PDF
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...
PDF
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
PDF
Indoor tracking with bluetooth low energy devices using k nearest neighbour a...
PDF
F33022028
PDF
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
PDF
Location Based Encryption-Decryption Approach for Data Security
PDF
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
Secure data aggregation technique for wireless
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
A Survey on Cloud-Based IP Trace Back Framework
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
A novel signature based traffic classification engine to reduce false alarms ...
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
Bidirectional data centric routing protocol to improve the energy efficiency ...
Secure data dissemination protocol in wireless sensor networks using xor netw...
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
Indoor tracking with bluetooth low energy devices using k nearest neighbour a...
F33022028
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
Location Based Encryption-Decryption Approach for Data Security
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
Ad

Similar to WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System (20)

PDF
A Back Propagation Neural Network Intrusion Detection System Based on KVM
PDF
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
PDF
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
PDF
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
PDF
Secure intrusion detection and attack measure selection
PDF
Secure intrusion detection and attack measure selection in virtual network sy...
PDF
Vertualisation
PDF
Feature Selection using the Concept of Peafowl Mating in IDS
PDF
Feature Selection using the Concept of Peafowl Mating in IDS
PDF
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
PDF
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
DOCX
Nice network intrusion detection and countermeasure selection in virtual netw...
PPTX
A Novel Network Intrusion Detection Sysy.pptx
PDF
Survey of Clustering Based Detection using IDS Technique
PDF
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
PDF
Cloud Computing Using Encryption and Intrusion Detection
PDF
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
PDF
Three level intrusion detection system based on conditional generative advers...
PDF
A Collaborative Intrusion Detection System for Cloud Computing
PDF
Ijsrdv1 i4019
A Back Propagation Neural Network Intrusion Detection System Based on KVM
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
Secure intrusion detection and attack measure selection
Secure intrusion detection and attack measure selection in virtual network sy...
Vertualisation
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDS
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
Nice network intrusion detection and countermeasure selection in virtual netw...
A Novel Network Intrusion Detection Sysy.pptx
Survey of Clustering Based Detection using IDS Technique
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Cloud Computing Using Encryption and Intrusion Detection
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Three level intrusion detection system based on conditional generative advers...
A Collaborative Intrusion Detection System for Cloud Computing
Ijsrdv1 i4019
Ad

More from Eswar Publications (20)

PDF
Content-Based Image Retrieval Features: A Survey
PDF
Clickjacking Attack: Hijacking User’s Click
PDF
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
PDF
Android Based Home-Automation using Microcontroller
PDF
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
PDF
App for Physiological Seed quality Parameters
PDF
What happens when adaptive video streaming players compete in time-varying ba...
PDF
Spreading Trade Union Activities through Cyberspace: A Case Study
PDF
Identifying an Appropriate Model for Information Systems Integration in the O...
PDF
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
PDF
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
PDF
A Literature Survey on Internet of Things (IoT)
PDF
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
PDF
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
PDF
Impact of Technology on E-Banking; Cameroon Perspectives
PDF
Classification Algorithms with Attribute Selection: an evaluation study using...
PDF
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
PDF
Network as a Service Model in Cloud Authentication by HMAC Algorithm
PDF
Explosive Detection Approach by Printed Antennas
PDF
Bandwidth Estimation Techniques for Relative ‘Fair’ Sharing in DASH
Content-Based Image Retrieval Features: A Survey
Clickjacking Attack: Hijacking User’s Click
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Android Based Home-Automation using Microcontroller
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
App for Physiological Seed quality Parameters
What happens when adaptive video streaming players compete in time-varying ba...
Spreading Trade Union Activities through Cyberspace: A Case Study
Identifying an Appropriate Model for Information Systems Integration in the O...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
A Literature Survey on Internet of Things (IoT)
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Impact of Technology on E-Banking; Cameroon Perspectives
Classification Algorithms with Attribute Selection: an evaluation study using...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Explosive Detection Approach by Printed Antennas
Bandwidth Estimation Techniques for Relative ‘Fair’ Sharing in DASH

Recently uploaded (20)

PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
KodekX | Application Modernization Development
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Electronic commerce courselecture one. Pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Programs and apps: productivity, graphics, security and other tools
Review of recent advances in non-invasive hemoglobin estimation
The Rise and Fall of 3GPP – Time for a Sabbatical?
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
KodekX | Application Modernization Development
Unlocking AI with Model Context Protocol (MCP)
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Electronic commerce courselecture one. Pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Understanding_Digital_Forensics_Presentation.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
The AUB Centre for AI in Media Proposal.docx
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
NewMind AI Weekly Chronicles - August'25 Week I
Digital-Transformation-Roadmap-for-Companies.pptx

WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System

  • 1. Int. J. Advanced Networking and Applications Volume: 10 Issue: 01 Pages: 3698-3703 (2018) ISSN: 0975-0290 3698 WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System Pinki Sharma Research scholar, Department of Computer Science, Punjabi University, Patiala, Punjab, India Email: pinkisharma@gmail.com Jyotsna Sengupta Professor, Department of Computer Science, Punjabi University, Patiala, Punjab, India Email: jyotsna.sengupta@gmail.com P. K. Suri Email: pksurikuk@gmail.com -------------------------------------------------------------------ABSTRACT--------------------------------------------------------------- Security and Performance aspects of cloud computing are the major issues which have to be tended to in Cloud Computing. Intrusion is one such basic and imperative security problem for Cloud Computing. Consequently, it is essential to create an Intrusion Detection System (IDS) to detect both inside and outside assaults with high detection precision in cloud environment. In this paper, cloud intrusion detection system at hypervisor layer is developed and assesses to detect the depraved activities in cloud computing environment. The cloud intrusion detection system uses a hybrid algorithm which is a fusion of WLI- FCM clustering algorithm and Back propagation artificial Neural Network to improve the detection accuracy of the cloud intrusion detection system. The proposed system is implemented and compared with K-means and classic FCM. The DARPA’s KDD cup dataset 1999 is used for simulation. From the detailed performance analysis, it is clear that the proposed system is able to detect the anomalies with high detection accuracy and low false alarm rate. Keywords - Cloud Computing, Cloud intrusion detection system, Intrusion Detection System, IDS, Security. -------------------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: April 30, 2018 Date of Acceptance: May 19, 2018 -------------------------------------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION In recent years cloud computing has revolutionized the IT world with rapidly emerging and widely accepted paradigm for computing systems. Today numerous organizations have stated to upload their tremendous amount of important data into public cloud. The sensitive information uploaded into public open cloud [1] and that data is vulnerable to many serious security risks such as availability, confidentiality and integrity. The survey By International Data Corporation (IDC)[2] reports that security is the topmost obstacle of cloud computing (Gens, 2009). Furthermore, the continuous uninterrupted service of cloud technology draws the attention of the intruders to obtain entrance and abuse usres assets and services provided by Cloud service provider (CSP). Lockheed martin’s (2010)[3] cyber security division white paper shows that major security concern after data security is attack detection and prevention in cloud infrastructure. Various technologies such as message encryption and firewall protect the network and can be used as first line of defence. Firewall is not suitable for detecting insider attacks. Some of the Denial of Service attacks (DoS) and Distributed Denial of Service attacks (DDoS) are too complex to detect with firewall [4]. Keeping in mind, the end goal to ensure the security of cloud computing environment, it is necessary to develop an intrusion detection system. A traditional network-based or host- based intrusion detection system [1, 5] does not suit virtual cloud environment. In this way, it is imperative to develop an anomaly detection component which is reasonable for detecting the wicked activities in cloud computing systems. An effective intrusion detection system should be quick, effortlessly configurable, self-checked, hard to cheat, high fault tolerance, accessible without interference, and free from false error with an overhead as least as possible [6]. Its main mean is to assess data frameworks and to perform early identification of noxious action for decreasing the security hazard to an acceptably low level. High false- positive caution rate may trouble data accessibility, though high false-negative alert rate may bring about genuine harm to the secured frameworks as improper access to delicate data and information harming. The performance of IDS is based on the measure of adequate log information, its regular updates on them, and the quick and correct detection of intrusion from the evaluation between current activity of the user and the past data. In this paper, we design and develop a technique for cloud intrusion detection by means of the WLI fuzzy clustering and neural network. , the WLI fuzzy clustering technique is applied to the cloud computing network to create the distinctive clusters. At that point, the resultant clusters outcome is given as input for the training the neural network for the learning process. Rest of this paper is organized as follows: Section 2 presents existing approaches to Cloud intrusion detection in cloud. Detailed description of proposed framework is given in section III. Performance and quality results of proposed framework are presented in section IV. Section V concludes the paper with the references at the end.
  • 2. Int. J. Advanced Networking and Applications Volume: 10 Issue: 01 Pages: 3698-3703 (2018) ISSN: 0975-0290 3699 II. RELATED WORKS N. Pandeeswari and Ganesh Kumar[7] deploy an anomaly detection system called Hypervisor Detector at the virtual machine monitor layer. The Hypervisor Detector is designed with a hybrid approach FCM-ANN which is a combination of Fuzzy C-Means clustering and Artificial Neural Network. This model works in three phases. The first phase of FCM-ANN is fuzzy clustering module which is used to divide the large dataset into small clusters so as to improve the learning capability of ANN. Fuzzy clustering module enhances the performance of artificial neural network. In second phase, various ANN modules are trained according to their cluster values. In third phase, Fuzzy aggregation module is used to combine the results of various ANN. Here, the Hypervisor Detector is compared with Naïve Bayes and classic ANN by using the various evaluation criterions such as precision, recall value and F-value under various attacks. The performance results of FCM-ANN confirm that it outperforms the Naïve Bayes and the classic ANN algorithms even for low frequent attacks. Hence, the proposed Hypervisor Detector is suitable for detecting various attacks with high detection rate and low false alarm rate. The authors, Vereia et al. [5] have proposed a Grid and Cloud Computing Intrusion Detection System (GCCIDS) that employs an audit system. GCCIDS integrates knowledge and behaviour analysis to discover the intrusions. This system makes use of an event auditor that captures data from various resources like system logs, node messages and services. Based on the captured data, the IDS service can be used to detect intrusions by using behaviour based and knowledge based techniques. GCCIDS uses artificial neural network for behaviour analysis. Chirag N. Modi et. al.[8] Propose a framework integrating network intrusion detection system (NIDS) in the Cloud. Our NIDS module consists of Snort and signature apriori algorithm. It generates new rules from captured packets. These new rules are appended in the Snort configuration file to improve efficiency of Snort. It aims to detect known attacks and derivative of known attacks in Cloud by monitoring network traffic, while ensuring low false positive rate with reasonable computational cost. We also recommend the positioning of NIDS in Cloud. We present experimental setup and discuss the design goals expected from proposed framework. Chi-Chun Lo et al [9] proposed the co-operative intrusion detection model for the grid and cloud computing in which the IDS are distributed among the nodes of the grid and alert other nodes when an attack occurs. Indeed, this approach made a giant leap over other models for the same as this helps other nodes in avoiding the same attacks from occurring. This system also helps in preventing single point of failure since the IDSs are distributed across the cloud. Infan Gul proposed an efficient model that used multithreading technique for improving the performance in the cloud computing environment to handle large number of data packet flows. The researchers have conducted experiments to perform the performance evaluation of their proposed method relative to the single thread approach. They have used parameters like processing time and execution for their comparative study. Z. Chiba et al. [10] described the Cooperative and hybrid based network IDS system (CH-NIDS) using the Back Propagation Neural network (BPN). They developed the BPN model based on Snort and Optimized method. The snort prior in the BPN was used to detect the unknown attacks. Due to low convergence of BPN, they exploited the optimization algorithm to optimize the parameters which enhanced the detection rate and accuracy. Also, the snort and optimized based BPN was also used to detect the DoS and DDoS attacks by sharing alerts in central log. Thus, simulation results were evaluated to improve the detection rate and mitigate the false rate. III. PROPOSED HYPERVISOR DETECTOR The proposed intrusion detection system is developed at the hypervisor layer that uses the proposed model for detecting the intrusion behaviour of the cloud network. The proposed intrusion detection is begin with, the WLI[11] fuzzy clustering technique is apply to the cloud system to produce the distinctive clusters. Then, the resultant clustered result is given as input to the training algorithm for learning process. A back propagation neural network is used for the training purpose. At first, the input data is provide to the WLI fuzzy clustering method where the data are clustered together to carried out to detect the intrusion. In WLI fuzzy method, the Cluster Validity Index (CVI) is principally used for the clustering of the fed data. Thus, the Euclidean Distance is measured between the data objects, i.e., a pair of centroids or an object centroids are used to evaluate the heterogeneity and homogeneity measures within the clusters. Also, it uses the fuzzy membership function belongs to data object and cluster centroid. Proposed WLI-ANN Step 1: Since cluster centroids are randomly generated, the input dataset may not contain the similar clustering results. The N number of clusters are randomly generated from the input data is NlCl 1, . To enhance the clustering performance, the CVI is used to estimate the index properties of the centroids. Step 2: The median distance is taken as the principal aspect in the WLI fuzzy clustering method. After that, the distance is measured between the data object and centroid and that is utilised for the separation of different clusters. Accordingly, the fuzzy compactness is resolved with supported by the fuzzy weighting distances [10] and fuzzy cardinality of clusters. The fuzzy weighting distance is measured by, jiij cd 2  where, id is the th i data object and jc represents the th j cluster and ij defines the membership function. Then, the fuzzy cardinality of cluster is given as   K i ij 1  .
  • 3. Int. J. Advanced Networking and Applications Volume: 10 Issue: 01 Pages: 3698-3703 (2018) ISSN: 0975-0290 3700 Step 3: Thus, the total fuzzy compactness of the all the clusters ranges from Nto1 , is expresses as below.                         N j K i ij ji K i ij f cd WL 1 1 2 1   Step 4 : In order to separate the clusters, the minimum and median distance is measured between the pair of centroids. The distance between N centroids is evaluated by   21NN . The minimum distance of all   21NN distance is termed as ‘min’. Then, the median distance is determined by   2 21NN distances of all clusters. Thus, the separation measure of the cluster is evaluated as:            22 min 2 1 ki ji ki ji d ccmedianccWL Step 5: Finally, the WLI fuzzy clustering caters the N number of clusters where the input data are grouped respectively. The WLI is estimated by the ratio of fuzzy compactness and cluster separation. The cluster validity index is determined by,   d f WL WL NWLI   2 The WLI fuzzy clustering mechanism provides the P number of clusters which is then fed into the proposed model. The centroid is selected by the minimum value of WLI value in every cluster. It is formulated by,   NWLIC idN  min The training algorithm is described below.  The WLI fuzzy clustering [11] yields the P number of clusters where the input data are grouped together in each cluster. Hence, the ensuing data object is specified as input to the NN model for the training progression. Due to P number of clusters, we require Q number of NN model to train the data.  In every cluster, the data are grouped in the size of nmP  , where P defines the total number of clusters. The clustered data is given as input to Q number of clusters. Thus, the clustered output is expressed by,  jkjjj cccC ,.....,, 21  where, j is the number of output acquired by the WLI fuzzy clustering mechanism and jkc represents the output of th k cluster. Then, the resultant data is fed as input to the proposed NN where the data is trained to detect the malicious activity in the cloud environment.  Normally, the training algorithm of neural network is mainly used to train the data to perform the classification process. Once the data are trained in the network, then the trained data are aggregated. The data aggregation is modelled by combining the trained output of Q different NN network models. The intent of data aggregation is to reduce the detection error of the training algorithm. Thus, the aggregated data is fed into the new NN network. The input of new NN is expressed as follows  qffft ,.....,, 21 where, t is the input of new aggregated model consists of trained data from Q number of NN. Finally, the data size of 1m is attained by the aggregation model to perform the intrusion detection. On the other hand, during testing phase, the input data is given into the hypervisor detector where the proposed NN model is significantly detects the intrusions or malicious activity in the cloud network. Based on the above three phases, the intrusion is detected using the Neural network. IV. EXPERIMENTAL SETUP AND PERFORMANCE To implement the Hypervisor Detector, this work uses cloud simulator; cloudsim 3.0. The Hypervisor Detector is trained and tested in cloudsim 3.0. To train and test the proposed system, the DARPA’s KDD cup dataset 1999[12] is used. This dataset has 41 features and a label specifying the record as either normal or attack. For testing the system model, the KDD test dataset is used. The performance factors that are frequently used to evaluate the performance of intrusion detection system are as follows.1. True positive rate, 2. True negative rate, 3. False positive rate and 4. False negative rate. True positive rate entails that the intrusion detection system detects true attack that has occurred. True negative rate entails that the detection system has rightly detect the normal condition. False positive rate implies that IDS has mistakenly marked the normal condition as abnormal. False negative rate indicates that the anomaly detection system cannot detect the intrusions after a particular attack has occurred. ii) Evaluation parameters: The performance of the proposed cloud intrusion detection system is validated by three metrics are accuracy, true positive rate and false positive rate. The description of this metrics is given below. True Positive Rate (TPR): It is the measure for the extent of positives which are effectively recognized as malignant activity in the cloud environment. It is also termed as sensitivity. The TPR is expressed as:  FNTP TP TPR   False Positive Rate (FPR): It is defined as the probability measures of falsely rejects the normal node in the cloud network. Thus, the FPR is derived by,
  • 4. Int. J. Advanced Networking and Applications Volume: 10 Issue: 01 Pages: 3698-3703 (2018) ISSN: 0975-0290 3701  TNFP FP FPR   Accuracy: The accuracy is the statistical measure of both positive and negative rates. The higher accuracy value provides the better detection performance. It is formulated as given below FNFPTNTP TNTP Accuracy    where, TN and TP are true positive and negatives, FP and FN denotes the false positive and negative value. The analysed performance is compared with exiting clustering algorithm like FCM[13], KM[14]. V. PERFORMANCE EVALUATION As shown in figure 1 for the no of cluster 3,4 and 5 K- means attains 93.25, 94.16 and 91.78 TPR , FCM attains 91.16, 90.89 and 87.83 TPR and WLI attains 96.29, 94.42 and 93.56. Compared to K-means and FCM, WLI attains highest TPR. That means WLI outperforms K-means and FCM. Figure 1. No of Clusters As shown in figure 1 for the no of cluster 3, 4 and 5 K- means attains 19.8, 20.8 and 22.83 FPR, FCM attains 20.83, 21.13 and 23.41 FPR and WLI attains 18.8, 19.91 and 20.3 FPR. Compared to K-means and FCM, WLI attains highest FPR. That means WLI outperforms K- means and FCM. As shown in figure 1 for the no of cluster 3, 4 and 5 K- means attains 91.84, 90.94 and 89.67 accuracy, FCM attains 90.15, 89.99 and 89.46 accuracy and WLI attains 93.88, 92.16 and 90.63 Accuracy. Compared to K-means and FCM, WLI attains highest accuracy. That means WLI outperforms K-means and FCM. Figure 2. % Training data As shown in figure 2 for the % Training data 60%, 70% and 80%, the K-means attains 93.86, 95.39 and 95.88 TPR, FCM attains 91.66, 94.51 and 94.56 TPR and WLI attains 95.96, 96.51 and 97.71. Compared to K-means and FCM, WLI attains highest TPR. That means WLI outperforms K-means and FCM. As shown in figure 2 for the % Training data 60%, 70% and 80, the %K-means attains 20.6, 20.71 and 18.14 FPR, FCM attains 21.3, 21.23 and 18.69 FPR and WLI attains 18.98, 19.5 and 17.46 FPR. Compared to K-means and FCM, WLI attains highest FPR. That means WLI outperforms K-means and FCM. 0 20 40 60 80 100 120 FCM KM WLI FCM KM WLI FCM KM WLI TPR FPR ACCURACY No. of Cluster 3 4 5 0 20 40 60 80 100 120 FCM KM WLI FCM KM WLI FCM KM WLI TPR FPR ACCURACY % Training Data 60 70 80
  • 5. Int. J. Advanced Networking and Applications Volume: 10 Issue: 01 Pages: 3698-3703 (2018) ISSN: 0975-0290 3702 As shown in figure 2 for the % Training data 60%, 70% and 80%K-means attains 92.07, 93.14 and 93.67 accuracy, FCM attains 91.95, 92.37 and 93.26 accuracy and WLI attains 94.18, 95.67 and 96.02 Accuracy. Compared to K-means and FCM, WLI attains highest accuracy. That means outperforms K-means and FCM. Figure 3 On No. Of features As shown in figure3 for the Number of Features 10, 20 and 30, the K-means attains 91.94, 92.94 and 93.67 TPR , the FCM attains 91.14, 91.99 and 92.89 TPR and WLI attains 94.67, 95.31 and 96.84. Compared to K-means and FCM, WLI attains highest TPR. That means WLI outperforms K-means and FCM. As shown in figure 3 for the Number of Features 10, 20 and 30, the K-means attains 23.26, 22.8 and 22.4 FPR, FCM attains 26.16, 25.3 and 24.37 FPR and WLI attains 22.86, 12.51 and 20.12 FPR. Compared to K-means and FCM, WLI attains highest FPR. That means WLI outperforms K-means and FCM. As shown in figure 3 for the Number of Features 10, 20 and 30, the K-means attains 89.54, 90.87 and 90.8 accuracy, FCM attains 88.67, 88.96 and 90.2 accuracy and WLI attains 91.14, 91.49 and 92.24 Accuracy. Compared to K-means and FCM, WLI attains highest accuracy. That means WLI outperforms K-means and FCM. VI. CONCLUSION This paper presents an intrusion detection system called Hypervisor Detector at the hypervisor layer. The Hypervisor Detector is designed with a hybrid approach WLI-ANN which is a combination of WLI and Artificial Neural Network. The fuzzy C mean is running with the WLI. The WLI partially allows the existence of closely allocated centroids in the clustering results by considering not only the minimum but also the median distances between a pair of centroids and therefore possesses the better stability. This model works in three steps. In first step is fuzzy clustering module which is used to divide the large dataset into small clusters so as to improve the learning capability of ANN. In second step, various ANN modules are trained according to their cluster values. In third step, the results of various ANN from the second step are combined to get the final result. The proposed Hypervisor Detector is compared with K-means and classic FCM by using the various evaluation criterions such as number of clusters, number of Features used and % of training data Used. The performance results of proposed WLI-ANN confirm that it outperforms the K- means and the classic FCM algorithms for more TPR, Accuracy and low FPR. Hence, the proposed Hypervisor Detector is suitable for detecting various attacks with high detection rate and low false alarm rate. REFERENCES [1] H. Jin, G, Xiang, D. Zou, S. Wu, F. Zhao, M. Li, And W. Zheng, AVMM-based intrusion prevention system in cloud computing environment, Journal of Supercomputing Springer ,66(3),2011, 1133–1151. [2] F. Gens, New IDC IT Cloud Service Survey: Top Benefits and Challenges Exchange,2009,online; http:// blogs .idc. com/ie/ ?p=730S.(Accessed 12 may 2017). [3] L. Martin, WhitePaper,2010, online:/http://www. Lock heed martin.com /data/assets/isgs/ documents/ Cloud Computing WhitePaper.pdf. [4] C. Modi ,D. Patel, B. Borisaniya, H. Patel, A. Patel and M. Rajarajan, A survey of intrusion detection techniques in Cloud, Journal of Network and Computer Applications, 36(1),2013, 42-57. [5] K. Vieira, A. Schulter, C.B. Westphall, and C. M. Westphall, Intrusion detection techniques in grid and cloud computing environment. IEEE IT Professional Magazine , 2010,38–43 [6] S.Raja and S. Ramaiah, An Efficient Fuzzy-Based Hybrid System to Cloud Intrusion Detection, International Journal of Fuzzy Systems, 19(1),2016,1- 16. 0 20 40 60 80 100 120 FCM KM WLI FCM KM WLI FCM KM WLI TPR FPR ACCURACYNo. of Features 10 20 30
  • 6. Int. J. Advanced Networking and Applications Volume: 10 Issue: 01 Pages: 3698-3703 (2018) ISSN: 0975-0290 3703 [7] N. Pandeeswari and Ganesh Kumar, Anomaly Detection System in Cloud Environment Using Fuzzy Clustering Based ANN, Mobile Networks and Applications, 21(3), 2016, 494-505. [8] C. N. Modi, D. R. Patel, A. Patel, and M. Rajarajan , Integrating Signature Apriori based Network Intrusion Detection system (NIDS) in Cloud Computing. In: Proceedings of 2nd International Conference on Communication, Computing & Security, Procedia Technology,6:905–912. Doi:10.1016/j. protcy.2012.10 .110 [9] C. C. Lo, C. C. Huang, and J. Ku ,A Cooperative Intrusion Detection System Framework for Cloud Computing Networks, 39th International Conference on Parallel Processing Workshops , 2010, 280-284. [10] Z. Chiba, N. Abghour, K. Moussaid and M. Rida, A Cooperative and Hybrid Network Intrusion Detection Framework in Cloud Computing Based on Snory and Optimized back Propagation neural Network, International Workshop on Mobile Cloud Computing Sytems, Management and Security, 83, 2016, 1200- 1206. [11] C. Wu, C. Ouyang, L. Chen, and L. Lu, A New Fuzzy Clustering Validity Index with a Median Factor for Centroid-based Clustering, IEEE Transactions on Fuzzy Systems, 23(3),2015, 701 – 718. [12] KDD Cup 1999. Available online: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.ht ml, October 2007. [13] R. kulhare and D. Singh, Intrusion Detection System based on Fuzzy C Means Clustering and Probabilistic Neural Network, International Journal of Computer Applications,74 ,2013, 30-33. [14] K. Nalavade and B. B. Mehsram, Evaluation of K- Means Clustering for Effective Intrusion Detection and Prevention in Massive Network Traffic Data, International Journal of Computer Applications, 96, 2014, 9-14. She received her BE in Electronics and Communications from the Thapar Institute of Engg. And Tech., Patiala, India in 1982 and MS in Computer Science and Engineering from the Santa Clara University, Santa Clara, California, USA, in 1985. She has completed her PhD in Computer Science and Engineering at the Thapar Institute Of Engg. And Tech., Patiala, India, 2002. Her research Interests include cloud computing, ADHOC network, wireless networks and distributed systems. She has Attended a number of national and international Conference and published a number of research paper in National and International journals. P.K. Suri is a former Professor, Dean Academic and Chairman of the Department of Computer Science and Application, Kurukshetra University and HCTM Technical Campus, India. He has 40 years of teaching and research experience with various designation in the DCSA Kurukshetra University, Kurukshetra and in the HCTM Technical Campus, India. He received his MSc from the IIT Roorkee (formerly known as University of Roorkee), Roorkee, India in 1972. He has completed his PhD at the Faculty of Engineering, Kurukshetra University, Kurukshetra in 1981. His research interests Include simulation, cloud computing, ADHOC network, Wireless networks and distributed systems software engineering. He has attended a number of national and international conference and published a number of research papers in national and international journals. He has guided more than 20 PhD research scholars. AUTHORS BIOGRAPHY Pinki Sharma is currently working toward her PhD in the Department of Computer Science at the Punjabi University, India. Her research interests include cloud Computing and information security. Jyotsna Sengupta is currently working as a Professor in the Department of Computer Science at the Punjabi University, India. She has 30 years of teaching experience with various designations in the Department of Computer Science at the Punjabi University, Patiala and in various other reputed institutes.