Detection of Malicious Cloud Bandwidth Consumption in Cloud Computing Using Machine Learning Techniques

被引:2
|
作者
Veeraiah, Duggineni [1 ,2 ]
Mohanty, Rajanikanta [3 ]
Kundu, Shakti [4 ]
Dhabliya, Dharmesh [5 ]
Tiwari, Mohit [6 ]
Jamal, Sajjad Shaukat [7 ]
Halifa, Awal [8 ,9 ]
机构
[1] Lakireddy Bali Reddy Coll Engn Autonomous, Dept CSE, Mylavaram 521230, Andhra Pradesh, India
[2] Jawaharlal Nehru Technol Univ Kakinada, Kakinada, India
[3] Jain Univ, Dept CSE SP FET, Bangalore, Karnataka, India
[4] Manipal Univ Jaipur, Directorate Online Educ, Jaipur, Rajasthan, India
[5] Vishwakarma Inst Informat Technol, Dept Informat Technol, Pune, Maharashtra, India
[6] Bharati Vidyapeeths Coll Engn, Dept Comp Sci & Engn, Delhi, India
[7] King Khalid Univ, Coll Sci, Dept Math, Abha, Saudi Arabia
[8] Kwame Nkrumah Univ Sci & Technol, Kumasi, Ghana
[9] Tamale Tech Univ, Dept Elect & Elect Engn, Tamale, Ghana
关键词
ATTACK;
D O I
10.1155/2022/4003403
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
The Internet of Things, sometimes known as IoT, is a relatively new kind of Internet connectivity that connects physical objects to the Internet in a way that was not possible in the past. The Internet of Things is another name for this concept (IoT). The Internet of Things has a larger attack surface as a result of its hyperconnectivity and heterogeneity, both of which are characteristics of the IoT. In addition, since the Internet of Things devices are deployed in managed and uncontrolled contexts, it is conceivable for malicious actors to build new attacks that target these devices. As a result, the Internet of Things (IoT) requires self-protection security systems that are able to autonomously interpret attacks in IoT traffic and efficiently handle the attack scenario by triggering appropriate reactions at a pace that is faster than what is currently available. In order to fulfill this requirement, fog computing must be utilised. This type of computing has the capability of integrating an intelligent self-protection mechanism into the distributed fog nodes. This allows the IoT application to be protected with the least amount of human intervention while also allowing for faster management of attack scenarios. Implementing a self-protection mechanism at malicious fog nodes is the primary objective of this research work. This mechanism should be able to detect and predict known attacks based on predefined attack patterns, as well as predict novel attacks based on no predefined attack patterns, and then choose the most appropriate response to neutralise the identified attack. In the environment of the IoT, a distributed Gaussian process regression is used at fog nodes to anticipate attack patterns that have not been established in the past. This allows for the prediction of new cyberattacks in the environment. It predicts attacks in an uncertain IoT setting at a speedier rate and with greater precision than prior techniques. It is able to effectively anticipate both low-rate and high-rate assaults in a more timely manner within the dispersed fog nodes, which enables it to mount a more accurate defence. In conclusion, a fog computing-based self-protection system is developed to choose the most appropriate reaction using fuzzy logic for detected or anticipated assaults using the suggested detection and prediction mechanisms. This is accomplished by utilising a self-protection system that is based on the development of a self-protection system that utilises the suggested detection and prediction mechanisms. The findings of the experimental investigation indicate that the proposed system identifies threats, lowers bandwidth usage, and thwarts assaults at a rate that is twenty-five percent faster than the cloud-based system implementation.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Malicious attack detection approach in cloud computing using machine learning techniques
    M. Arunkumar
    K. Ashok Kumar
    [J]. Soft Computing, 2022, 26 : 13097 - 13107
  • [2] Malicious attack detection approach in cloud computing using machine learning techniques
    Arunkumar, M.
    Kumar, K. Ashok
    [J]. SOFT COMPUTING, 2022, 26 (23) : 13097 - 13107
  • [3] Malicious PDF Documents Detection using Machine Learning Techniques A Practical Approach with Cloud Computing Applications
    Torres, Jose
    De Los Santos, Sergio
    [J]. ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, : 337 - 344
  • [4] Apply machine learning techniques to detect malicious network traffic in cloud computing
    Amirah Alshammari
    Abdulaziz Aldribi
    [J]. Journal of Big Data, 8
  • [5] Apply machine learning techniques to detect malicious network traffic in cloud computing
    Alshammari, Amirah
    Aldribi, Abdulaziz
    [J]. JOURNAL OF BIG DATA, 2021, 8 (01)
  • [6] A hybrid machine learning approach for malicious behaviour detection and recognition in cloud computing
    Rabbani, Mahdi
    Wang, Yong Li
    Khoshkangini, Reza
    Jelodar, Hamed
    Zhao, Ruxin
    Hu, Peng
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 151
  • [7] DDoS Attack Detection using Machine Learning Techniques in Cloud Computing Environments
    Zekri, Marwane
    El Kafhali, Said
    Aboutabit, Noureddine
    Saadi, Youssef
    [J]. PROCEEDINGS OF 2017 3RD INTERNATIONAL CONFERENCE OF CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2017, : 236 - 242
  • [8] Analysis and Detection of DDoS Attacks on Cloud Computing Environment using Machine Learning Techniques
    Wani, Abdul Raoof
    Rana, Q. P.
    Saxena, U.
    Pandey, Nitin
    [J]. PROCEEDINGS 2019 AMITY INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AICAI), 2019, : 870 - 875
  • [9] Hybrid Intrusion Detection System Using Machine Learning Techniques in Cloud Computing Environments
    Aljamal, Ibraheem
    Tekeoglu, Ali
    Bekiroglu, Korkut
    Sengupta, Saumendra
    [J]. 2019 IEEE/ACIS 17TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT AND APPLICATIONS (SERA), 2019, : 84 - 89
  • [10] Framework to Analyze Malicious Behaviour in Cloud Environment using Machine Learning Techniques
    Jha, Pranay
    Sharma, Ashok
    [J]. 2021 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2021,