Abstract
Security solutions, especially intrusion detection and blockchain, have been individually employed in the cloud for detecting cyber threats and preserving private data. Both solutions demand ensembled models-based learning that can alert the campaign of complex malicious events and concurrently accomplish data privacy. Such models would also provide additional security and privacy to the live migration of Virtual Machines (VMs) in the cloud. This would allow the secure transfer of one or more VMs between datacentres or cloud providers in real-time. This paper proposes a Deep Blockchain Framework (DBF) designed to offer security-based distributed intrusion detection and privacy-based blockchain with smart contracts in the cloud. The intrusion detection method is employed yet using a Bidirectional Long Short-Term Memory (BiLSTM) deep learning algorithm to deal with sequential network data and is assessed using the dataset of UNSW-NB15. The Privacy-based blockchain and smart contract methods are developed using the Ethereum library to provide privacy to the distributed intrusion detection engines. The DBF framework is compared with compelling privacy-preserving intrusion detection models, and the empirical results reveal that DBF outperforms the compelling models. The framework has the potential to be used as a decision support system that can assist users and cloud providers in securely and timely migrating their data in a fast and reliable manner.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Patel, A., Taghavi, M., Bakhtiyari, K., Júnior, J.C.: An intrusion detection and prevention system in cloud computing: a systematic review. J. Netw. Comput. Appl. 36(1), 25–41 (2013)
Ahmed, M., Mahmood, A.N., Hu, J.: A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19–31 (2016)
Alkadi, O.S., Moustafa, N., Turnbull, B., Choo, K.-K.R.: An ontological graph identification method for improving localisation of IP prefix Hijacking in network systems. IEEE Trans. Inf. Forensics Secur. 15, 1164–1174 (2019)
Aitzhan, N.Z., Svetinovic, D.: Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams. IEEE Trans. Depend. Secure Comput. 15(5), 840–852 (2016)
Sayeed, S., Marco-Gisbert, H.: Assessing blockchain consensus and security mechanism against the 51% attack. Appl. Sci. 9(9), 1788 (2019)
Fraga-Lamas, P., Fernández-Caramés, T.M.: A review on blockchain technologies for an advanced and cyber-resilient automotive industry. IEEE Access 7, 17578–17598 (2019)
Liu, J., Liu, Z.: A survey on security verification of blockchain smart contracts. IEEE Access 7, 77894–77904 (2019)
Baldwin, C.: Bitcoin worth $72 million stolen from Bitfinex exchange in Hong Kong. https://www.reuters.com/article/us-bitfinex-hacked-hongkong-idUSKCN10E0KP. Accessed July 2019
Peters, G.W., Panayi, E.: Understanding modern banking ledgers through blockchain technologies: future of transaction processing and smart contracts on the internet of money. In: Banking Beyond Banks and Money, pp. 239–278. Springer (2016)
Hardwick, F.S., Gioulis, A., Akram, R.N., Markantonakis, K.: E-voting with blockchain: an e-voting protocol with decentralisation and voter privacy. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 1561–1567 (2018)
Knirsch, F., Unterweger, A., Eibl, G., Engel, D.: Privacy-preserving smart grid tariff decisions with blockchain-based smart contracts. In: Sustainable Cloud and Energy Services, pp. 85–116. Springer (2018)
Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 82, 395–411 (2018)
Fernández-Caramés, T.M., Fraga-Lamas, P.: A review on the use of blockchain for the internet of things. IEEE Access 6, 32979–33001 (2018)
Tian, F.: A supply chain traceability system for food safety based on HACCP, blockchain & Internet of things. In: 2017 International Conference on Service Systems and Service Management, pp. 1–6 (2017)
Abeyratne, S.A., Monfared, R.P.: Blockchain ready manufacturing supply chain using distributed ledger. Int. J. Res. Eng. Technol. 5(9), 1–10 (2016)
Yue, X., Wang, H., Jin, D., Li, M., Jiang, W.: Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control. J. Med. Syst. 40(10), 218 (2016)
Karafiloski, E., Mishev, A.: Blockchain solutions for big data challenges: a literature review. In: IEEE EUROCON 2017-17th International Conference on Smart Technologies, pp. 763–768 (2017)
Meng, W., Tischhauser, E.W., Wang, Q., Wang, Y., Han, J.: When intrusion detection meets blockchain technology: a review. IEEE Access 6, 10179–10188 (2018)
Ølnes, S., Ubacht, J., Janssen, M.: Blockchain in government: Benefits and implications of distributed ledger technology for information sharing. Elsevier (2017)
Alketbi, A., Nasir, Q., Talib, M.A.: Blockchain for government services—use cases, security benefits and challenges. In: 2018 15th Learning and Technology Conference (L&T), pp. 112–119 (2018)
Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. 36(1), 42–57 (2013)
AlKadi, O., Moustafa, N., Turnbull, B., Choo, K.-K.R.: Mixture localization-based outliers models for securing data migration in cloud centers. IEEE Access 7, 114607–114618 (2019)
Li, W., Meng, W., Kwok, L.-F., Horace, H.: Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model. J. Netw. Comput. Appl. 77, 135–145 (2017)
Bernabe, J.B., Canovas, J.L., Hernandez-Ramos, J.L., Moreno, R.T., Skarmeta, A.: Privacy-preserving solutions for Blockchain: review and challenges. IEEE Access 7, 164908–164940 (2019)
Olleros, F.X., Zhegu, M.: Research Handbook on Digital Transformations. Edward Elgar Publishing, Cheltenham (2016)
Tschorsch, F., Scheuermann, B.: Bitcoin and beyond: a technical survey on decentralized digital currencies. IEEE Commun. Surv. Tutor. 18(3), 2084–2123 (2016)
Wood, G.: Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper, vol. 151, no. 2014, pp. 1–32 (2014)
Liang, X., Shetty, S., Tosh, D., Kamhoua, C., Kwiat, K., Njilla, L.: ProvChain: a blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In: Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, pp. 468–477. IEEE Press (2017)
Alexopoulos, N., Vasilomanolakis, E., Ivánkó, N.R., Mühlhäuser, M.: Towards blockchain-based collaborative intrusion detection systems. In: International Conference on Critical Information Infrastructures Security, pp. 107–118. Springer (2017)
Wan, C., et al.: Goshawk: a novel efficient, robust and flexible blockchain protocol. In: International Conference on Information Security and Cryptology, pp. 49–69. Springer (2018)
Liu, C.H., Lin, Q., Wen, S.: Blockchain-enabled data collection and sharing for industrial IoT with deep reinforcement learning. IEEE Trans. Ind. Inf. 15(6), 3516–3526 (2018)
Liang, G., Weller, S.R., Luo, F., Zhao, J., Dong, Z.Y.: Distributed blockchain-based data protection framework for modern power systems against cyber attacks. IEEE Trans. Smart Grid 10(3), 3162–3173 (2018)
Huebsch, R., Chun, B., Hellerstein, J., Loo, B., Maniatis, P., Roscoe, T., Shenker, S., Stoica, I., Yumerefendi, A.: The architecture of PIER: an Internet-scale query processor. In: Proceedings of 2nd Biennial Conference on Innovative Data System Research, pp. 28–43 (2005)
Dalbehera, P., Andersson, S., Varshney, R., Wallin, P.: Dynamic configuration of trusted executed environment resources. Google Patents (2016)
Mishra, P., Khurana, K., Gupta, S., Sharma, M.K.: VMAnalyzer: malware semantic analysis using integrated CNN and bi-directional LSTM for detecting VM-level attacks in cloud. In: 2019 Twelfth International Conference on Contemporary Computing (IC3), pp. 1–6. IEEE (2019)
Yadav, R.M.: Effective analysis of malware detection in cloud computing. Comput. Secur. 83, 14–21 (2019)
Bengio, Y., Boulanger-Lewandowski, N., Pascanu, R.: Advances in optimizing recurrent networks. In: 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 8624–8628. IEEE (2013)
Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735–1780 (1997)
Schuster, M., Paliwal, K.K.: Bidirectional recurrent neural networks. IEEE Trans. Signal Process. 45(11), 2673–2681 (1997)
Graves, A., Schmidhuber, J.: Framewise phoneme classification with bidirectional LSTM and other neural network architectures. Neural Netw. 18(5–6), 602–610 (2005)
Cui, Z., Ke, R., Wang, Y.: Deep bidirectional and unidirectional LSTM recurrent neural network for network-wide traffic speed prediction. arXiv preprint arXiv:1801.02143 (2018)
Rumelhart, D.E., Hinton, G.E., Williams, R.J.: Learning representations by back-propagating errors. Nature 323(6088), 533–536 (1986)
Google. Google Colaboratory. https://colab.research.google.com. Accessed May 2019
Moustafa, N., Hu, J., Slay, J.: A holistic review of network anomaly detection systems: a comprehensive survey. J. Netw. Comput. Appl. 128, 33–55 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Alkadi, O., Moustafa, N., Turnbull, B. (2021). A Collaborative Intrusion Detection System Using Deep Blockchain Framework for Securing Cloud Networks. In: Arai, K., Kapoor, S., Bhatia, R. (eds) Intelligent Systems and Applications. IntelliSys 2020. Advances in Intelligent Systems and Computing, vol 1250. Springer, Cham. https://doi.org/10.1007/978-3-030-55180-3_41
Download citation
DOI: https://doi.org/10.1007/978-3-030-55180-3_41
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-55179-7
Online ISBN: 978-3-030-55180-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)