[go: up one dir, main page]

Skip to main content
Log in

Investigation of Cybersecurity Attacks and Threats on Cloud Using Black Widow Algorithm with Recurrent Neural Network

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

The amount of personal and sensitive information collected by data collectors is rising. Those details are processed and saved on the cloud’s servers. Risks and hazards exist in the cloud infrastructure. The amount of data stored on the cloud is enormous, and some of it is secret or personal, making it vulnerable to a breach or attack. In this case, a strong security solution was required to secure the data from hackers and eavesdroppers. In the field of cloud computing, anomalies and insider assaults will deactivate service providers, resulting in the entire system failing. Insider assaults and infiltration are difficult to handle with traditional network defensive measures. The anomaly identification approach is created in this study to determine the incidence of attack, and the proposed approach uses black widow algorithm for feature selection whereby the classification is attained using recurrent neural network (RNN). The process of feature selection will eliminate the redundant features and the significant features are retrieved using meta-heuristic technique. The selected features are utilized for classification using RNN. The feature selection highly helps the process of classification and it enhances the accuracy of the classification. The classification process is simplified by the feature selection process and the training error is minimized by the RNN technique. The use of a neural network to effectively identify features improves classification accuracy. The RNN’s performance investigation and outcomes categorize real-time threats in the cloud environment with high accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Data Availability

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.

References

  1. Rashid A, Chaturvedi A. Cloud computing characteristics and services: a brief review. Intern J Computer Sci Eng. 2019;7(2):421–6.

    Google Scholar 

  2. Sunyaev A. Cloud computing. Intern computing. 2020. https://doi.org/10.1007/978-3-030-34957-8_7.

    Article  Google Scholar 

  3. Alam T. Cloud Computing and its role in the Information Technology. IAIC Trans Sustain Digit Innovation (ITSDI). 2020;1(2):108–15.

    Article  Google Scholar 

  4. Butt SA, Tariq MI, Jamal T, Ali A, Martinez JLD, De-La-Hoz-Franco E. Predictive variables for agile development merging cloud computing services. IEEE Access. 2019;7:99273–82.

    Article  Google Scholar 

  5. Arpaci I. A hybrid modeling approach for predicting the educational use of mobile cloud computing services in higher education. Comput Hum Behav. 2019;90:181–7.

    Article  Google Scholar 

  6. Yang P, Xiong N, Ren J. Data security and privacy protection for cloud storage: a survey. IEEE Access. 2020;8:131723–40.

    Article  Google Scholar 

  7. Attaran M, Woods J. Cloud computing technology: improving small business performance using the Internet. J Small Bus Entrep. 2019;31(6):495–519.

    Article  Google Scholar 

  8. Patil SS, Chavan R. Cloud business intelligence: an empirical study. Stud Indian Place Names UGC Care J. 2020;27:747–54.

    Google Scholar 

  9. Gochhait S, Butt SA, Jamal T, Ali A. Cloud enhances agile software development. In Cloud Computing Applications and Techniques for E-Commerce (pp. 28–49). IGI Global, 2020.

  10. Abdalla PA Varol A Advantages to disadvantages of cloud computing for small-sized business. In 2019 7th International Symposium on Digital Forensics and Security (ISDFS) (pp. 1-6): 2019 IEEE.

  11. Khan S. Cloud computing: issues and risks of embracing the cloud in a business environment. Intern J Edu Managt Eng. 2019;9(4):44.

    Google Scholar 

  12. Song Y Wang H Wei X Wu L Efficient attribute-based encryption with privacy-preserving key generation and its application in industrial cloud. Security and communication networks, 2019

  13. Li Z, Shen H, Cheng Q, Liu Y, You S, He Z. Deep learning based cloud detection for medium and high resolution remote sensing images of different sensors. ISPRS J Photogramm Remote Sens. 2019;150:197–212.

    Article  Google Scholar 

  14. Ghosh AM, Grolinger K Deep learning: Edge-cloud data analytics for iot. In 2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE) (pp. 1-7). 2019; IEEE.

  15. Zhang Z, Dai Y, Sun J. Deep learning based point cloud registration: an overview. Virtual Real Intell Hardw. 2020;2(3):222–46.

    Article  Google Scholar 

  16. Blum AL, Langley P. Selection of relevant features and examples in machine learning. Artif Intell. 1997;97(1–2):245–71.

    Article  MathSciNet  MATH  Google Scholar 

  17. Quinlan JR (2014) Programs for Machine Learning. ISBN: 9780080500584, Paperback ISBN: 9781558602380. https://www.elsevier.com/books/c45/quinlan/978-0-08-050058-4.

  18. Holmes, G., Donkin, A., & Witten, I. H. 1994. Weka: A machine learning workbench. In Proceedings of ANZIIS'94-Australian New Zealnd Intelligent Information Systems Conference (pp. 357–361). IEEE.

  19. Witten IH, Frank E. Data mining: practical machine learning tools and techniques with Java implementations. ACM SIGMOD Rec. 2002;31(1):76–7.

    Article  Google Scholar 

  20. Hartigan JA, Wong MA. Algorithm AS 136: A k-means clustering algorithm. J Royal Stat Soc Ser C (Appl Stat). 1979;28(1):100–8.

    MATH  Google Scholar 

  21. Keller JM, Gray MR, Givens JA. A fuzzy k-nearest neighbor algorithm. IEEE Trans Syst Man Cybern. 1985;4:580–5.

    Article  Google Scholar 

  22. Hearst MA, Dumais ST, Osuna E, Platt J, Scholkopf B. Support vector machines. IEEE Intell Sys Their appl. 1998;13(4):18–28.

    Article  Google Scholar 

  23. Bezdek JC, Ehrlich R, Full W. FCM: The fuzzy c-means clustering algorithm. Comput Geosci. 1984;10(2–3):191–203.

    Article  Google Scholar 

  24. Haykin S Neural networks and learning machines.[sl] pearson Upper Saddle River. NJ, USA, 3: 2009.

  25. Murray AF, editor. Applications of neural networks. Boston: Kluwer Academic Publishers; 1995. p. 157–89.

    Book  Google Scholar 

  26. Lane B Poole M Camp M Murray-Krezan J. Using machine learning for advanced anomaly detection and classification. In Advanced Maui Optical and Space Surveillance Tech. Conf. (AMOS): (2016).

  27. HM M, Kumar RA. A survey on machine learning techniques used for detection of DDOS attacks (May 17, 2019). In: Proceedings of the Second International Conference on Emerging Trends in Science & Technologies For Engineering Systems (ICETSE-2019). 2019. https://ssrn.com/abstract=3508610.

  28. Sheta AF, Alamleh A. A professional comparison of c4 5, mlp, svm for network intrusion detection based feature analysis. Intern Congr glob Sci Technol. 2015;47:15.

    Google Scholar 

  29. Nguyen KK, Hoang DT, Niyato D Wang P, Nguyen D, Dutkiewicz E. Cyberattack detection in mobile cloud computing: A deep learning approach. In: 2018 IEEE Wireless Communications and Networking Conference (WCNC). 2018;1–6. https://doi.org/10.1109/WCNC.2018.8376973.

Download references

Funding

The authors declare that they have no known competing financial interests.

Author information

Authors and Affiliations

Authors

Contributions

The author has contributed the entire work.

Corresponding author

Correspondence to S. Senthil Kumar.

Ethics declarations

Conflict of Interest

The authors declare that there is no conflict of interest.

Informed Consent

Informed consent was obtained from all individual participants included in the study.

Informed Consent on Studies with Human and Animal Subjects

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the topical collection “Predictive Artificial Intelligence for Cyber Security and Privacy” guest edited by Hardik A. Gohel, S. Margret Anouncia and Anthoniraj Amalanathan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Senthil Kumar, S., Arockia Panimalar, S., Krishnakumar, A. et al. Investigation of Cybersecurity Attacks and Threats on Cloud Using Black Widow Algorithm with Recurrent Neural Network. SN COMPUT. SCI. 3, 451 (2022). https://doi.org/10.1007/s42979-022-01304-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-022-01304-9

Keywords