IJCNIS Vol. 15, No. 6, 8 Dec. 2023
Cover page and Table of Contents: PDF (size: 559KB)
Full Text (PDF, 559KB), PP.40-51
Views: 0 Downloads: 0
Cloud Computing, Security, Intrusion Detection System (IDS), Z-Score Normalization, Intelligent Adorn Dragonfly Optimization (IADO), Intermittent Deep Neural Network (IDNN) Classification, and Searchable Encryption
Cloud computing's popularity and success are directly related to improvements in the use of Information and Communication Technologies (ICT). The adoption of cloud implementation and services has become crucial due to security and privacy concerns raised by outsourcing data and business applications to the cloud or a third party. To protect the confidentiality and security of cloud networks, a variety of Intrusion Detection System (IDS) frameworks have been developed in the conventional works. However, the main issues with the current works are their lengthy nature, difficulty in intrusion detection, over-fitting, high error rate, and false alarm rates. As a result, the proposed study attempts to create a compact IDS architecture based on cryptography for cloud security. Here, the balanced and normalized dataset is produced using the z-score preprocessing procedure. The best attributes for enhancing intrusion detection accuracy are then selected using an Intelligent Adorn Dragonfly Optimization (IADO). In addition, the trained features are used to classify the normal and attacking data using an Intermittent Deep Neural Network (IDNN) classification model. Finally, the Searchable Encryption (SE) mechanism is applied to ensure the security of cloud data against intruders. In this study, a thorough analysis has been conducted utilizing various parameters to validate the intrusion detection performance of the proposed I2ADO-DNN model.
M. Nafees Muneera, G. Anbu Selvi, V. Vaissnave, Gopal Lal Rajora, "A Cryptographic based I2ADO-DNN Security Framework for Intrusion Detection in Cloud Systems", International Journal of Computer Network and Information Security(IJCNIS), Vol.15, No.6, pp.40-51, 2023. DOI:10.5815/ijcnis.2023.06.04
[1]V. Chang, L. Golightly, P. Modesti, Q. A. Xu, L. M. T. Doan, K. Hall, et al., "A Survey on Intrusion Detection Systems for Fog and Cloud Computing," Future Internet, vol. 14, p. 89, 2022.
[2]Z. Liu, B. Xu, B. Cheng, X. Hu, and M. Darbandi, "Intrusion detection systems in the cloud computing: a comprehensive and deep literature review," Concurrency and Computation: Practice and Experience, vol. 34, p. e6646, 2022.
[3]A. Kumar, R. S. Umurzoqovich, N. D. Duong, P. Kanani, A. Kuppusamy, M. Praneesh, et al., "An intrusion identification and prevention for cloud computing: From the perspective of deep learning," Optik, vol. 270, p. 170044, 2022.
[4]S. El Kafhali, I. El Mir, and M. Hanini, "Security threats, defense mechanisms, challenges, and future directions in cloud computing," Archives of Computational Methods in Engineering, vol. 29, pp. 223-246, 2022.
[5]L. Vu, Q. U. Nguyen, D. N. Nguyen, D. T. Hoang, and E. Dutkiewicz, "Deep Generative Learning Models for Cloud Intrusion Detection Systems," IEEE Transactions on Cybernetics, 2022.
[6]A. Ometov, O. L. Molua, M. Komarov, and J. Nurmi, "A survey of security in cloud, edge, and fog computing," Sensors, vol. 22, p. 927, 2022.
[7]P. Ghosh, S. Sinha, R. R. Sharma, and S. Phadikar, "An efficient IDS in cloud environment using feature selection based on DM algorithm," Journal of Computer Virology and Hacking Techniques, pp. 1-16, 2022.
[8]S. Naaz, K. Mir, and I. R. Ansari, "Enhancement of Network Security Through Intrusion Detection," in Soft Computing for Security Applications, ed: Springer, 2022, pp. 517-527.
[9]M. Almiani, A. Abughazleh, Y. Jararweh, and A. Razaque, "Resilient Back Propagation Neural Network Security Model For Containerized Cloud Computing," Simulation Modelling Practice and Theory, vol. 118, p. 102544, 2022.
[10]S. Sobin Soniya and S. Maria Celestin Vigila, "Analysis of Cloud-Based Intrusion Detection System," in Information and Communication Technology for Competitive Strategies (ICTCS 2020), ed: Springer, 2022, pp. 1133-1141.
[11]V. Parganiha, S. P. Shukla, and L. K. Sharma, "Cloud Intrusion Detection Model Based on Deep Belief Network and Grasshopper Optimization," International Journal of Ambient Computing and Intelligence (IJACI), vol. 13, pp. 1-24, 2022.
[12]D. S. David, M. Anam, C. Kaliappan, S. Arun, and D. Sharma, "Cloud security service for identifying unauthorized user behaviour," CMC-Computers, Materials & Continua, vol. 70, pp. 2581-2600, 2022.
[13]P. Ghosh, Z. Alam, R. R. Sharma, and S. Phadikar, "An efficient SGM based IDS in cloud environment," Computing, vol. 104, pp. 553-576, 2022.
[14]M. Linadinesh, G. Vanathi, L. Sri Vasundhra, and R. K. Shubhakarini, "CLOUD SECURITYUSING MACHINE LEARNING ALGORITHM," International Journal of Advanced Engineering Science and Information Technology, vol. 9, pp. 18-24, 2022.
[15]M. Bhandari, V. S. Gutte, and P. Mundhe, "A Survey Paper on Characteristics and Technique Used for Enhancement of Cloud Computıng and Their Security Issues," in Pervasive Computing and Social Networking, ed: Springer, 2022, pp. 217-230.
[16]M. Waqas, K. Kumar, A. A. Laghari, U. Saeed, M. M. Rind, A. A. Shaikh, et al., "Botnet attack detection in Internet of Things devices over cloud environment via machine learning," Concurrency and Computation: Practice and Experience, vol. 34, p. e6662, 2022.
[17]A. K. Sangaiah, A. Javadpour, F. Ja’fari, P. Pinto, W. Zhang, and S. Balasubramanian, "A hybrid heuristics artificial intelligence feature selection for intrusion detection classifiers in cloud of things," Cluster Computing, pp. 1-14, 2022.
[18]M. Saran, R. K. Yadav, and U. N. Tripathi, "Machine Learning based Security for Cloud Computing: A Survey," International Journal of Applied Engineering Research, vol. 17, pp. 338-344, 2022.
[19]L. Karuppusamy, J. Ravi, M. Dabbu, and S. Lakshmanan, "Chronological salp swarm algorithm based deep belief network for intrusion detection in cloud using fuzzy entropy," International Journal of Numerical Modelling: Electronic Networks, Devices and Fields, vol. 35, p. e2948, 2022.
[20]G. Sreelatha, A. V. Babu, and D. Midhunchakkaravarthy, "Improved security in cloud using sandpiper and extended equilibrium deep transfer learning based intrusion detection," Cluster Computing, pp. 1-16, 2022.
[21]A. B. Nassif, M. A. Talib, Q. Nasir, H. Albadani, and F. M. Dakalbab, "Machine learning for cloud security: a systematic review," IEEE Access, vol. 9, pp. 20717-20735, 2021.
[22]A. Guezzaz, A. Asimi, Y. Asimi, M. Azrour, and S. Benkirane, "A distributed intrusion detection approach based on machine leaning techniques for a cloud security," in Intelligent Systems in Big Data, Semantic Web and Machine Learning, ed: Springer, 2021, pp. 85-94.
[23]M. M. Ahsan, K. D. Gupta, A. K. Nag, S. Poudyal, A. Z. Kouzani, and M. P. Mahmud, "Applications and evaluations of bio-inspired approaches in cloud security: A review," IEEE Access, vol. 8, pp. 180799-180814, 2020.
[24]A. Meryem and B. E. Ouahidi, "Hybrid intrusion detection system using machine learning," Network Security, vol. 2020, pp. 8-19, 2020.
[25]M. Almiani, A. AbuGhazleh, A. Al-Rahayfeh, S. Atiewi, and A. Razaque, "Deep recurrent neural network for IoT intrusion detection system," Simulation Modelling Practice and Theory, vol. 101, p. 102031, 2020.
[26]V. Kanimozhi and T. P. Jacob, "Artificial Intelligence outflanks all other machine learning classifiers in Network Intrusion Detection System on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing," ICT Express, vol. 7, pp. 366-370, 2021/09/01/ 2021.
[27]R. Faek, M. Al-Fawa'reh, and M. Al-Fayoumi, "Exposing bot attacks using machine learning and flow level analysis," in International Conference on Data Science, E-learning and Information Systems 2021, 2021, pp. 99-106.
[28]G. S. Kushwah and V. Ranga, "Optimized extreme learning machine for detecting DDoS attacks in cloud computing," Computers & Security, vol. 105, p. 102260, 2021.