Home| Contact Us| New Journals| Browse Journals| Journal Prices| For Authors|

Print ISSN: 0976-4143
Online ISSN:
0976-4151


  About JISR
  DLINE Portal Home
Home
Aims & Scope
Editorial Board
Current Issue
Next Issue
Previous Issue
Sample Issue
Upcoming Conferences
Self-archiving policy
Alert Services
Be a Reviewer
Publisher
Paper Submission
Subscription
Contact us
 
  How To Order
  Order Online
Price Information
Request for Complimentary
Print Copy
 
  For Authors
  Guidelines for Contributors
Online Submission
Call for Papers
Author Rights
 
 
RELATED JOURNALS
Journal of Digital Information Management (JDIM)
International Journal of Computational Linguistics Research (IJCL)
International Journal of Web Application (IJWA)

 

 
Journal of Information Security Research

Impact of Neural Networks on Improving Cloud Computing Security with AI-powered Smart Intrusion Detection
Mohsin Ali, Abdul Razaque, Damelya M. Yeskendirova, Talgat A. Nurlybayev, Nessibeli Y. Askarbekova and Zarina A. Kashaganova
International Information Technology University Manas St. 34/1, Almaty, 050000, Kazakhstan
Abstract: This work introduces a highly effective method for identifying harmful network activity by leveraging the power of artificial neural networks. These networks, particularly adept at analyzing deep packet inspection-based systems for detecting intrusions, have been the cornerstone of our research. The method was rigorously tested using a diverse range of harmless network data, including images, dynamic link library files, logs, music files, word processing documents, and malicious shell code files from the exploit and vulnerability database, exploitdb. The proposed artificial neural network design successfully distinguished between harmless and harmful network traffic. The developed neural network consistently achieved a 99% accuracy rate, a 0.99 average area under the receiver operator characteristic curve (AUC-ROC), and a false positive rate of less than 2% across various 10-fold cross-validation tests. These results underscore our classification method’s reliability, accuracy, and effectiveness. This innovative strategy for identifying harmful network traffic holds significant potential for enhancing intrusion detection systems in both traditional network traffic analysis and cyber-physical systems analysis, such as smart grids. Furthermore, we present a new intrusion detection system (IDS) that combines a multilayer perceptron (MLP) network with an artificial bee colony (ABC) and fuzzy clustering algorithms. The MLP network distinguishes between standard and irregular network data packets, while the ABC method fine-tunes the connections and prejudices of the MLP during its training phase. We used the CloudSim model and the NSL-KDD data set to validate our method, evaluating it with criteria including mean absolute error (MAE), root mean square error (RMSE), and the kappa coefficient. Our findings demonstrate that our proposed technique surpasses current leading methods in the field.
Keywords: International Information Technology University Manas St. 34/1, Almaty, 050000, Kazakhstan Impact of Neural Networks on Improving Cloud Computing Security with AI-powered Smart Intrusion Detection
DOI:https://doi.org/10.6025/jisr/2024/15/2/59-71
Full_Text   PDF 1.66 MB   Download:   11  times
References:

[1] Talaei Khoei, Tala, and Naima Kaabouch. (2023). A Comparative Analysis of Supervised and Unsupervised Models for Detecting Attacks on the Intrusion Detection Systems. Information 14, no. 2: 103.

[2] Debicha, Islam, Richard Bauwens, Thibault Debatty, Jean-Michel Dricot, Tayeb Kenaza, and Wim Mees (2023). TAD: Transfer learning-based multi-adversarial detection of evasion attacks against network intrusion detection systems. Future Generation Computer Systems 138: 185-197.

[3] Almiani, Muder, Alia AbuGhazleh, Amer Al-Rahayfeh, Saleh Atiewi, and Abdul Razaque (2020). Deep recurrent neural network for IoT intrusion detection system. Simulation Modelling Practice and Theory 101: 102031.

[4] Linka, Kevin, and Ellen Kuhl (2023). A new family of Constitutive Artificial Neural Networks towards automated model discovery. Computer Methods in Applied Mechanics and Engineering 403: 115731.

[5] Ali, Mohsin, Nurgul Nalgozhina, Olzhas Tasmagambetov, and Yerzhan N. Seitkulov (2022). Homomorphic Encryption with Enhanced Elliptic Curve for Mobile Wireless Network Security.

[6] Khan, Muhammad Ashfaq (2021). HCRNNIDS: Hybrid convolutional recurrent neural network-based network intrusion detection system. Processes 9, no. 5: 834.

[7] Alamleh, Amneh, O. S. Albahri, A. A. Zaidan, A. H. Alamoodi, A. S. Albahri, B. B. Zaidan, Sarah Qahtan et al. (2023). Multi-attribute decision-making for intrusion detection systems: A systematic review. International Journal of Information Technology & Decision Making 22, no. 01: 589-636.

[8] Razaque, Abdul, Bandar Alotaibi, Munif Alotaibi, Fathi Amsaad, Ansagan Manasov, Salim

Hariri, Banu B. Yergaliyeva, and Aziz Alotaibi (2021). Blockchain-enabled deep recurrent neural network model for clickbait detection. IEEE Access 10: 3144-3163.

[9] Capuano, Nicola, Giuseppe Fenza, Vincenzo Loia, and Claudio Stanzione (2022). Explainable
artificial intelligence in cybersecurity: A survey. IEEE Access 10: 93575-93600.

[10] Ajmal, Abdul Basit, Shawal Khan, Masoom Alam, Abolfazl Mehbodniya, Julian Webber, and
Abdul Waheed (2023). Towards Effective Evaluation of Cyber Defense: Threat Based Adversary Emulation Approach. IEEE Access.

[11] Razaque, Abdul, Bandar Alotaibi, Munif Alotaibi, Shujaat Hussain, Aziz Alotaibi, and Vladimir Jotsov (2022). Clickbait detection using deep recurrent neural network. Applied Sciences 12, no. 1: 504.

[12] He, Ke, Dan Dongseong Kim, and Muhammad Rizwan Asghar (2023). Adversarial machine
learning for network intrusion detection systems: a comprehensive survey. IEEE Communications Surveys & Tutorials.

[13] Balla, Asaad, Mohamed Hadi Habaebi, Elfatih AA Elsheikh, Md Rafiqul Islam, and F. M. Suliman (2023). The Effect of Dataset Imbalance on the Performance of SCADA Intrusion Detection Systems. Sensors 23, no. 2: 758.

[14] Folino, Francesco, Gianluigi Folino, Massimo Guarascio, Francesco Sergio Pisani, and Luigi
Pontieri (2021). On learning effective ensembles of deep neural networks for intrusion
detection. Information Fusion 72: 48-69.

[15] Srilatha, Doddi, and Gopal K. Shyam (2021). Cloud-based intrusion detection using kernel
fuzzy clustering and optimal type-2 fuzzy neural network. Cluster Computing 24, no. 3:
2657-2672.

[16] Varun, P., Ashokkumar, K. (2022). Intrusion detection system in cloud security using deep
convolutional network. Appl. Math. Inf. Sci., 16, 581–588.

[17] Shyla, S.I., Sujatha, S.S. (2020). Cloud security: LKM and optimal fuzzy system for intrusion detection in cloud environment. J. Intell. Syst., 29, 1626–1642.

[18] Mishra, P.; Varadharajan, V.; Pilli, E.S.; Tupakula, U. (2018). Vmguard: A vmi-based security
architecture for intrusion detection in cloud environment. IEEE Trans. Cloud Comput., 8,
957–971.

[19] Aoudni, Y., Donald, C., Farouk, A., Sahay, K.B., Babu, D.V., Tripathi, V., Dhabliya, D. (2022).
Cloud security based attack detection using transductive learning integrated with Hidden
Markov Model. Pattern Recognit. Lett., 157, 16–26.

[20] Velliangiri, S., Premalatha, J. (2019). Intrusion detection of distributed denial of service attack in cloud. Clust. Comput., 22, 10615–10623.

[21] Sathiyadhas, S. S., Soosai Antony, M. C. V. (2022). A network intrusion detection system in cloud computing environment using dragonfly improved invasive weed optimization integrated Shepard convolutional neural network. International Journal of Adaptive Control and Signal Processing, 36, 1060–1076.

[22] Geetha, T. V., Deepa, A. J. (2022). A FKPCA-GWO WDBILSTM classifier for intrusion

detection system in cloud environments. Knowledge-Based Systems, 253, 109557.

[23] Ayachi, Y., Mellah, Y., Saber, M., Rahmoun, N., Kerrakchou, I., Bouchentouf, T. (2022). A survey and analysis of intrusion detection models based on information security and object technology-cloud intrusion dataset. IAES International Journal of Artificial Intelligence, 11(4), 1607.

[24] Zhang, B., Zhu, J., Su, H. (2023). Toward the third generation artificial intelligence. Science China Information Sciences, 66(2), 121101.

[25] Amitay, Y., Bussi, Y., Feinstein, B., Bagon, S., Milo, I., Keren, L. (2023). CellSighter: a neural network to classify cells in highly multiplexed images. Nature Communications, 14(1), 4302.

[26] Jospin, L. V., Laga, H., Boussaid, F., Buntine, W., Bennamoun, M. (2022). Hands-on Bayesian neural networks—A tutorial for deep learning users. IEEE Computational Intelligence Magazine, 17(2), 29-48.

[27] Dasgupta, D., Akhtar, Z., Sen, S. (2022). Machine learning in cybersecurity: a comprehensive survey. The Journal of Defense Modeling and Simulation, 19(1), 57-106.

[28] Al-A’araji, N. H., Al-Mamory, S. O., Al-Shakarchi, A. H. (2021). Classification and clustering based ensemble techniques for intrusion detection systems: A survey. In Journal of Physics: Conference Series, 1818(1), 012106. IOP Publishing.

[29] Aslan, Ö., Aktuð, S. S., Ozkan-Okay, M., Yilmaz, A. A., Akin, E. (2023). A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics, 12(6), 1333.


Home | Aim & Scope | Editorial Board | Author Guidelines | Publisher | Subscription | Previous Issue | Contact Us |Upcoming Conferences|Sample Issues|Library Recommendation Form|

 

Copyright © 2011 dline.info