A NOVEL APPROACH TO INTRUSION-DETECTION SYSTEM: COMBINING LSTM AND THE SNAKEALGORITHM


(Received: 7-Sep.-2023, Revised: 29-Oct.-2023 , Accepted: 11-Nov.-2023)
In the epoch of digital transformation, cloud computing remains paramount, acting as the linchpin for a plethora of services from enterprise solutions to day-to-day consumer applications. Yet, its expansive nature has invariably rendered it susceptible to a myriad of cyber threats, necessitating advanced, adaptive defense mechanisms. This paper introduces a novel intrusion-detection method tailored for cloud environments, ingeniously amalgamating the temporal pattern-recognition capabilities of Long Short-Term Memory (LSTM) networks with the heuristic finesse of the Snake algorithm. Our research meticulously delineates the LSTM-Snake model’s design, implementation and exhaustive benchmarking against prevailing approaches for a rigorous and comprehensive evaluation of cloud-based intrusion-detection systems and by using the TON-IOT dataset, a carefully curated dataset tailored for cloud-centric applications. The experimental results underscore the model’s prowess, registering a commendable 99% accuracy rate in intrusion detection; a marked improvement over current state-of-the-art methodologies. The ensuing discussions offer insights into the model’s practical implications and potential limitations.

[1] B. Alouffi et al., "A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies," IEEE Access, vol. 9, pp. 57792–57807, 2021.

[2] V. Chang et al., "A Survey on Intrusion Detection Systems for Fog and Cloud Computing," Future Internet, vol. 14, no. 3, p. 89, 2022.

[3] I. H. Sarker, "Deep Learning: A Comprehensive Overview on Techniques, Taxonomy, Applications and Research Directions," SN Computer Science, vol. 2, no. 6, p. 420, 2021.

[4] Y. Yu, X. Si, C. Hu and J. Zhang, "A Review of Recurrent Neural Networks: LSTM Cells and Network Architectures," Neural computation, vol. 31, no. 7, pp. 1235–1270, 2019.

[5] L. Yang and A. Shami, "On Hyperparameter Optimization of Machine Learning Algorithms: Theory and Practice," Neurocomputing, vol. 415, pp. 295–316, 2020.

[6] F. A. Hashim and A. G. Hussien, "Snake Optimizer: A Novel Meta-heuristic Optimization Algorithm," Knowledge-based Systems, vol. 242, Article no. 108320, 2022.

[7] S. Althubiti et al., "Applying Long Short-term Memory Recurrent Neural Network for Intrusion Detection," Proc. of Southeast Con. 2018, pp. 1–5, St. Petersburg, USA, 2018.

[8] F. Cremer et al., "Cyber Risk and Cybersecurity: A Systematic Review of Data Availability," The Geneva Papers on Risk and Insurance: Issues and Practice, vol. 47, no. 3, pp. 698–736, 2022.

[9] H. Tabrizchi and M. K. Rafsanjani, "A Survey on Security Challenges in Cloud Computing: Issues, Threats and Solutions," The Journal of Supercomputing, vol. 76, no. 12, pp. 9493–9532, 2020.

[10] S. Velliangiri, P. Karthikeyan and V. Vinoth Kumar, "Detection of Distributed Denial of Service Attack in Cloud Computing Using the Optimization-based Deep Networks," Journal of Experimental & Theoretical Artificial Intelligence, vol. 33, no. 3, pp. 405–424, 2021.

[11] S. Jin, J.-G. Chung and Y. Xu, "Signature-based Intrusion Detection System (IDS) for In-vehicle Can Bus Network," Proc. of the 2021 IEEE Int. Symposium on Circuits and Systems (ISCAS), pp. 1–5, Daegu, Korea, 2021.

[12] Z. K. Maseer et al., "Benchmarking of Machine Learning for Anomaly Based Intrusion Detection Systems in the Cicids2017 Dataset," IEEE Access, vol. 9, pp. 22351–22370, 2021.

[13] E. M. Maseno, Z. Wang and H. Xing, "A Systematic Review on Hybrid Intrusion Detection System," Security and Communication Networks, vol. 2022, Article ID 9663052, May 2022.

[14] M. Bakro et al., "An Improved Design for a Cloud Intrusion Detection System Using Hybrid Features’ Selection Approach with ML Classifier," IEEE Access, vol. 11, pp. 64228–64247, 2023.

[15] M. Jelidi, A. Ghourabi and K. Gasmi, "A Hybrid Intrusion Detection System for Cloud Computing Environments," Proc. of the 2019 IEEE Int. Conf. on Computer and Information Sciences (ICCIS), pp. 1–6, Sakaka, Saudi Arabia, 2019.

[16] I. H. Sarker, "Deep Cybersecurity: A Comprehensive Overview from Neural Network and Deep Learning Perspective," SN Computer Science, vol. 2, no. 3, p. 154, 2021.

[17] R. Vinayakumar et al., "Deep Learning Approach for Intelligent Intrusion Detection System," IEEE Access, vol. 7, pp. 41525–41550, 2019.

[18] W. Wang et al., "Cloud Intrusion Detection Method Based on Stacked Contractive Auto-encoder and Support Vector Machine," IEEE Trans. on Cloud Computing, vol. 10, no. 3, pp. 1634–1646, 2020.

[19] A. Abusitta et al., "A Deep Learning Approach for Proactive Multi-cloud Cooperative Intrusion Detection System," Future Generation Computer Systems, vol. 98, pp. 308–318, 2019.

[20] M. Mohammed et al., "Decentralized IoT System Based on Blockchain and Homomorphic Technologies," Iraqi Journal of Computers, Communications, Control & Systems Engineering (IJCCCE), vol. 23, pp. 26-38, 2023.

[21] M. Aloqaily, S. Otoum, I. Al Ridhawi and Y. Jararweh, "An Intrusion Detection System for Connected Vehicles in Smart Cities," Ad Hoc Networks, vol. 90, Article ID 101842, 2019.

[22] K. Sadaf and J. Sultana, "Intrusion Detection Based on Auto-encoder and Isolation Forest in Fog Computing," IEEE Access, vol. 8, pp. 167059–167068, 2020.

[23] F. E. Laghrissi, S. Douzi, K. Douzi and B. Hssina, "Intrusion Detection Systems Using Long Short-term Memory (LSTM)," Journal of Big Data, vol. 8, no. 1, p. 65, 2021.

[24] P. Sun et al., "Dl-IDS: Extracting Features Using CNN-LSTM Hybrid Network for Intrusion Detection System," Security and Communication Networks, vol. 2020, pp. 1–11, 2020.

[25] Y. Imrana, Y. Xiang, L. Ali and Z. Abdul-Rauf, "A Bidirectional LSTM Deep Learning Approach for Intrusion Detection," Expert Systems with Applications, vol. 185, Article ID 115524, 2021.

[26] A. E. Ezugwu et al., "Metaheuristics: A Comprehensive Overview and Classification along with Bibliometric Analysis," Artificial Intelligence Review, vol. 54, pp. 4237–4316, 2021.

[27] N. Moustafa, M. Keshky, E. Debiez and H. Janicke, "Federated TON_IOT Windows Datasets for Evaluating Ai-based Security Applications," Proc. of the 2020 IEEE 19th Int. Conf. on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 848–855, Guangzhou, China, 2020.

[28] Y. Fu, Y. Du, Z. Cao, Q. Li and W. Xiang, "A Deep Learning Model for Network Intrusion Detection with Imbalanced Data," Electronics, vol. 11, no. 6, p. 898, 2022.