Cloud
Cloud
Cloud
Cloud Intrusion Detection Method Based on Stacked Contractive Auto-Encoder and Support Vector Machine
Submitted in partial fulfillment of the requirements for the award of the degree of
SUBMITTED BY
MERLIN B
Cloud Intrusion Detection
Method Based on Stacked
Contractive Auto-Encoder
and Support Vector Machine
CONTENTS
• Introduction
• Objectives
• Litrature Survey
• Problem Statement
• Scope
• Autoencoder And Its Varients
• Training Process of SCAE
• Output Layer: SVM Classifier
• Cloud Intrusion Detection SystemBased On SCAE & SVM
• SCAE & SVM Classifier
• Attack Detection
• Proposed Methodology
• Conclusion Pitch Deck
INTRODUCTION
That provides“unlimited” IT services, thereby freeing them from complex underlying hardware, software, and
protocol stacks.
Cloud computing has witnessed exponential growth and widespread adoption across industries in recent years.
Intrusion detection is one of the technologies for protecting cloud computing from malicious attacks.
A Stacked Contractive Autoencoder (SCAE) is a type of artificial neural network used for unsupervised learning
and feature extraction.
SVMs can be employed for intrusion detection in cloud environments. By analyzing network traffic patterns,
system logs, and user behaviors.
OBJECTIVES
Evaluate the performance of the proposed intrusion detection method using appropriate metrics such as
detection rate, false positive rate, and accuracy.
Optimize the model parameters and architecture to achieve optimal performance in terms of detection
accuracy, efficiency, and scalability.
Implement mechanisms for continuous learning and adaptation to evolving threat landscapes and changing
cloud configurations.
LITRATURE SURVEY
PAPERS OBJECTIVES METHODOLOGY PERFORMANCE
IEEE (2017): It has been previously shown that for In terms of the deep learning 85.7%
Cloud-Based Cyber- cyber-physical systems, architecture designed for
Physical Intrusion taking into account also the physical our intrusion detection methodology.
Detection manifestation of cyber
for Vehicles Using attacks on the vehicles can improve
Deep Learning. detection accuracy and
reduce detection latency.
PAPERS OBJECTIVES METHODOLOGY PERFORMANCE
IEEE (2019): Their proposal comes to deal intrusion detection systems, 87.76%
Introducing Deep Learning with a well-known artificial neural networks,
Self-Adaptive Misuse disadvantage of misuse IDSs, deep learning
Network Intrusion Detection namely their stiffness to
Systems adapt upon
changes.
PROBLEM STATEMENT
In the context of cloud computing, ensuring security is essential. One critical aspect is detecting and preventing
unauthorized access or malicious activities within cloud systems. However, the network traffic in a cloud
environment is complex, with large-scale data and various patterns. Developing an effective intrusion detection
system for such an environment is challenging.
SCOPE
Researching and understanding existing intrusion detection methods and cloud security challenges.
Designing the architecture for the intrusion detection system, integrating stacked contractive autoencoder and
support vector machine algorithms.
Developing software modules for data preprocessing, feature extraction, model training, and anomaly detection.
Conducting experiments to evaluate the performance of the system using real-world cloud data sets.
Documenting the entire process, including design decisions, implementation details, and experimental results.
Providing guidelines for deploying and maintaining the intrusion detection system in cloud environments.
Overall, the project aims to deliver a robust and effective intrusion detection solution tailored for cloud
environments, capable of accurately identifying and mitigating security threats.
AUTOENCODER AND ITS VARIANTS
1. Autoencoder (AE)
4. Contrastive Analysis
TRAINING PROCESS OF SCAE
• Fundamentally, the exact structure of our deep learning model will be obtained through experiments and training
on a large number of structural combinations
2. Unrolling, and
3. Supervised fine-tuning.
OUTPUT LAYER: SVM CLASSIFIER
• SVM is essentially a binary classification model, but attack types in the cloud computing environment are
diverse.Hence, more than one classifier should be employed.
• SVM can solve multi-class (m-class) classification problems, and it involves two methods:
1. “one-versusone” (OVO) and
2. “one-versus-all” (OVA).
• In the OVO approach, a separate binary classifier is trained for each pair of classes in the dataset.
• For a classification problem with \( N \) classes, this results in \( \frac{N(N-1)}{2} \) binary classifiers
• In the OVA approach, \( N \) binary classifiers are trained, each one trained to distinguish between one class and
the rest of the classes combined.
• For each classifier, the positive class is one of the \( N \) classes, and the negative class consists of all the other \
( N-1 \) classes.
• Here, we use the SCAE deep learning algorithm to extract essential features from raw network traffic.
Note that the SCAE is pretrained in an unsupervised mode and fine-tuned by employing a supervised
back-propagation algorithm.
• Once the essential features are extracted, they will be used to train the SVM classifier. Here, the SVM
classifier exploits the OVA approach to distinguish between normal and abnormal data.
• We consider SCAE & SVM as a whole or a black-box, and the learned features are not visible.
ATTACK DETECTION
• After the SCAE & SVM classifier has been trained, we use the trained and saved classifier to detect the
testing data or online traffic.
• When the network traffic is transported to the SCAE&SVM classifier, an output is generated, which
indicates whether the data is normal or an attack .
• For example, if the classifier considers records as normal, then the records will be labeled as Normal, and
others will be labeled as non-Normal.
• By contrast, if the classifier considered records as DOS, then the records will be labeled as DOS, and
others will be labeled as non DOS .
PROPOSED METHODOLOGY
FLOW DIAGRAM
Data Collection
and Preparation
Feature Extraction
(Stacked Contractive Autoencoder)
Model Training
(Support Vector Machine)
Anomaly Detection
Performance Check
1. https://ieeexplore.ieee.org/document/9112664
2. https://ieeexplore.ieee.org/document/7777224
3. https://ieeexplore.ieee.org/document/8171725
4. https://ieeexplore.ieee.org/document/8620986
5. www.wikipedia.org
6. www.chatgpt.com
THANK YOU