Abstract
The amount of personal and sensitive information collected by data collectors is rising. Those details are processed and saved on the cloud’s servers. Risks and hazards exist in the cloud infrastructure. The amount of data stored on the cloud is enormous, and some of it is secret or personal, making it vulnerable to a breach or attack. In this case, a strong security solution was required to secure the data from hackers and eavesdroppers. In the field of cloud computing, anomalies and insider assaults will deactivate service providers, resulting in the entire system failing. Insider assaults and infiltration are difficult to handle with traditional network defensive measures. The anomaly identification approach is created in this study to determine the incidence of attack, and the proposed approach uses black widow algorithm for feature selection whereby the classification is attained using recurrent neural network (RNN). The process of feature selection will eliminate the redundant features and the significant features are retrieved using meta-heuristic technique. The selected features are utilized for classification using RNN. The feature selection highly helps the process of classification and it enhances the accuracy of the classification. The classification process is simplified by the feature selection process and the training error is minimized by the RNN technique. The use of a neural network to effectively identify features improves classification accuracy. The RNN’s performance investigation and outcomes categorize real-time threats in the cloud environment with high accuracy.









Similar content being viewed by others
Data Availability
Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.
References
Rashid A, Chaturvedi A. Cloud computing characteristics and services: a brief review. Intern J Computer Sci Eng. 2019;7(2):421–6.
Sunyaev A. Cloud computing. Intern computing. 2020. https://doi.org/10.1007/978-3-030-34957-8_7.
Alam T. Cloud Computing and its role in the Information Technology. IAIC Trans Sustain Digit Innovation (ITSDI). 2020;1(2):108–15.
Butt SA, Tariq MI, Jamal T, Ali A, Martinez JLD, De-La-Hoz-Franco E. Predictive variables for agile development merging cloud computing services. IEEE Access. 2019;7:99273–82.
Arpaci I. A hybrid modeling approach for predicting the educational use of mobile cloud computing services in higher education. Comput Hum Behav. 2019;90:181–7.
Yang P, Xiong N, Ren J. Data security and privacy protection for cloud storage: a survey. IEEE Access. 2020;8:131723–40.
Attaran M, Woods J. Cloud computing technology: improving small business performance using the Internet. J Small Bus Entrep. 2019;31(6):495–519.
Patil SS, Chavan R. Cloud business intelligence: an empirical study. Stud Indian Place Names UGC Care J. 2020;27:747–54.
Gochhait S, Butt SA, Jamal T, Ali A. Cloud enhances agile software development. In Cloud Computing Applications and Techniques for E-Commerce (pp. 28–49). IGI Global, 2020.
Abdalla PA Varol A Advantages to disadvantages of cloud computing for small-sized business. In 2019 7th International Symposium on Digital Forensics and Security (ISDFS) (pp. 1-6): 2019 IEEE.
Khan S. Cloud computing: issues and risks of embracing the cloud in a business environment. Intern J Edu Managt Eng. 2019;9(4):44.
Song Y Wang H Wei X Wu L Efficient attribute-based encryption with privacy-preserving key generation and its application in industrial cloud. Security and communication networks, 2019
Li Z, Shen H, Cheng Q, Liu Y, You S, He Z. Deep learning based cloud detection for medium and high resolution remote sensing images of different sensors. ISPRS J Photogramm Remote Sens. 2019;150:197–212.
Ghosh AM, Grolinger K Deep learning: Edge-cloud data analytics for iot. In 2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE) (pp. 1-7). 2019; IEEE.
Zhang Z, Dai Y, Sun J. Deep learning based point cloud registration: an overview. Virtual Real Intell Hardw. 2020;2(3):222–46.
Blum AL, Langley P. Selection of relevant features and examples in machine learning. Artif Intell. 1997;97(1–2):245–71.
Quinlan JR (2014) Programs for Machine Learning. ISBN: 9780080500584, Paperback ISBN: 9781558602380. https://www.elsevier.com/books/c45/quinlan/978-0-08-050058-4.
Holmes, G., Donkin, A., & Witten, I. H. 1994. Weka: A machine learning workbench. In Proceedings of ANZIIS'94-Australian New Zealnd Intelligent Information Systems Conference (pp. 357–361). IEEE.
Witten IH, Frank E. Data mining: practical machine learning tools and techniques with Java implementations. ACM SIGMOD Rec. 2002;31(1):76–7.
Hartigan JA, Wong MA. Algorithm AS 136: A k-means clustering algorithm. J Royal Stat Soc Ser C (Appl Stat). 1979;28(1):100–8.
Keller JM, Gray MR, Givens JA. A fuzzy k-nearest neighbor algorithm. IEEE Trans Syst Man Cybern. 1985;4:580–5.
Hearst MA, Dumais ST, Osuna E, Platt J, Scholkopf B. Support vector machines. IEEE Intell Sys Their appl. 1998;13(4):18–28.
Bezdek JC, Ehrlich R, Full W. FCM: The fuzzy c-means clustering algorithm. Comput Geosci. 1984;10(2–3):191–203.
Haykin S Neural networks and learning machines.[sl] pearson Upper Saddle River. NJ, USA, 3: 2009.
Murray AF, editor. Applications of neural networks. Boston: Kluwer Academic Publishers; 1995. p. 157–89.
Lane B Poole M Camp M Murray-Krezan J. Using machine learning for advanced anomaly detection and classification. In Advanced Maui Optical and Space Surveillance Tech. Conf. (AMOS): (2016).
HM M, Kumar RA. A survey on machine learning techniques used for detection of DDOS attacks (May 17, 2019). In: Proceedings of the Second International Conference on Emerging Trends in Science & Technologies For Engineering Systems (ICETSE-2019). 2019. https://ssrn.com/abstract=3508610.
Sheta AF, Alamleh A. A professional comparison of c4 5, mlp, svm for network intrusion detection based feature analysis. Intern Congr glob Sci Technol. 2015;47:15.
Nguyen KK, Hoang DT, Niyato D Wang P, Nguyen D, Dutkiewicz E. Cyberattack detection in mobile cloud computing: A deep learning approach. In: 2018 IEEE Wireless Communications and Networking Conference (WCNC). 2018;1–6. https://doi.org/10.1109/WCNC.2018.8376973.
Funding
The authors declare that they have no known competing financial interests.
Author information
Authors and Affiliations
Contributions
The author has contributed the entire work.
Corresponding author
Ethics declarations
Conflict of Interest
The authors declare that there is no conflict of interest.
Informed Consent
Informed consent was obtained from all individual participants included in the study.
Informed Consent on Studies with Human and Animal Subjects
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article is part of the topical collection “Predictive Artificial Intelligence for Cyber Security and Privacy” guest edited by Hardik A. Gohel, S. Margret Anouncia and Anthoniraj Amalanathan.
Rights and permissions
About this article
Cite this article
Senthil Kumar, S., Arockia Panimalar, S., Krishnakumar, A. et al. Investigation of Cybersecurity Attacks and Threats on Cloud Using Black Widow Algorithm with Recurrent Neural Network. SN COMPUT. SCI. 3, 451 (2022). https://doi.org/10.1007/s42979-022-01304-9
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s42979-022-01304-9