Skip to main content
Log in

An effective optimization enabled deep learning based Malicious behaviour detection in cloud computing

  • Regular Paper
  • Published:
International Journal of Intelligent Robotics and Applications Aims and scope Submit manuscript

Abstract

The quick deployment of cloud with computing platforms has driven novel tendencies which shifted operations of networks. However, the cloud is facing several security issues and is susceptible because of suspicious tasks and attacks. This paper devises a new method to detect malicious activities in cloud. Here, first step is the simulation of cloud patterns, wherein the data outsourced by the users are utilized for detecting malicious behaviors. The data pre-processing is done to eradicate unnecessary data and noise contained in the data and is performed using a min–max normalization process. The selection of imperative features is done using distance measure, namely Hellinger distance for mining the essential features. The augmentation of data is performed to make the data appropriate for improved processing. The malicious behavior detection is performed by exploiting the Deep Q network wherein training is performed with Autoregressive chimp optimization algorithm (AChOA), which is developed by integrating chimp optimization algorithm (ChOA) and Conditional Autoregressive Value at risk (CAViaR). The proposed AChOA-based Deep Q network outperformed with the highest testing accuracy of 94%, sensitivity of 94.1%, and specificity of 91.4%.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Abbreviations

CU:

Cloud user

IDS:

Intrusion Detection Systems

EMRs:

Electronic Medical Records

HMM:

Hidden Markov Model

SVM:

Support Vector Machines

NN:

Neural Networks

TPA:

Third-Party Auditor

CNN:

Convolutional Neural Network

VHD:

Virtual Honeypot Device

AFO:

App feature ontology

VMs:

Virtual machines

En-ABC:

Ensemble Artificial Bee Colony-based Anomaly Detection Scheme

TA-Edge:

Trusted Authority for Edge Computing

SDN-ADS:

Software-Defined Network-based Anomaly Detection System

PSO-PNN:

Particle Swarm Optimization-based probabilistic neural network

NB:

Naive Bayes

CSP:

Cloud Service Provider

AMD:

Agent-based malware detection

References

  • Aljamal, I., Tekeoğlu, A., Bekiroglu, K. and Sengupta, S.: Hybrid intrusion detection system using machine learning techniques in cloud computing environments. In: software engineering research, management and applications (SERA), pp. 84–89, 2019.

  • Almorsy, M., Grundy, J. and Müller, I.: An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107, 2016.

  • Aslan, Ö., Ozkan-Okay, M., Gupta, D.: Intelligent behavior-based Malware detection system on cloud computing environment. IEEE Access 9, 83252–83271 (2021)

    Article  Google Scholar 

  • KDD Cup 1999 Data, http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. Accessed on Oct 2021.

  • Dasgupta, A., Drineas, P., Harb, B., Josifovski, V. and Mahoney, M.W.: Feature selection methods for text classification. In: Proceedings of the ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 230–239, (2007)

  • Engle, R.F., Manganelli, S.: CAViaR: conditional autoregressive value at risk by regression quantiles. J. Bus. Econ. Stat. 22(4), 367–381 (2004)

    Article  MathSciNet  Google Scholar 

  • The Bot-IoT Dataset, "https://ieee-dataport.org/documents/bot-iot-dataset," Accessed on Oct 2021.

  • Garg, S., Kaur, K., Batra, S., Aujla, G.S., Morgan, G., Kumar, N., Zomaya, A.Y., Ranjan, R.: En-ABC: an ensemble artificial bee colony based anomaly detection scheme for cloud environment. J. Parallel Distrib. Comput. 135, 219–233 (2020)

    Article  Google Scholar 

  • A Gentle Introduction to the Bootstrap Method, https://machinelearningmastery.com/a-gentle-introduction-to-the-bootstrap-method/. Accessed on Nov 2021.

  • Gupta, S., Kumar, P.: An immediate system call sequence based approach for detecting malicious program executions in cloud environment. Wirel. Pers. Commun. 81(1), 405–425 (2015)

    Article  Google Scholar 

  • Jayalakshmi, T., Santhakumaran, A.: Statistical normalization and back propagation for classification. Int. J. Comput. Theory Eng. 3(1), 1793–8201 (2011)

    Google Scholar 

  • Khishe, M., Mosavi, M.R.: Chimp optimization algorithm. Expert Syst. Appl. 149, 113338 (2020)

    Article  Google Scholar 

  • Lee, S.H., Yu, S.M., Kim, Y.P. and Yoo, C.: DetecClu: live malicious detection engine for cloud. Proceedings of 2016 IEMEK symposium on embedded technology. Hotel Inter-Citi Daejeon, Korea. pp. 1–2 (2016)

  • Li, S., Li, Y., Tian, Z.: Malicious mining code detection based on ensemble learning in cloud computing environment. Simul. Modell. Pract. Theor. (14 August 2021)

  • Manickam, M., Rajagopalan, S.P.: A hybrid multi-layer intrusion detection system in cloud. Clust. Comput. 22(2), 3961–3969 (2019)

    Article  Google Scholar 

  • Michael Mahesh, K.: Workflow scheduling using Improved Moth Swarm optimization algorithm in cloud computing. Multimed Res 3(3), 36–43 (2020)

    Article  Google Scholar 

  • OS, J.N.: Detection of malicious Android applications using Ontology-based intelligent model in mobile cloud environment. J. Inf. Secur. Appl. 58, 102751 (2021)

    Google Scholar 

  • Panker, T., Nissim, N.: Leveraging malicious behavior traces from volatile memory using machine learning methods for trusted unknown malware detection in Linux cloud environments. Knowl.-Based Syst. 226, 107095 (2021)

    Article  Google Scholar 

  • Patil, R., Dudeja, H., Modi, C.: Designing in-VM-assisted lightweight agent-based malware detection framework for securing virtual machines in cloud computing. Int. J. Inf. Secur. 19(2), 147–162 (2020)

    Article  Google Scholar 

  • Qureshi, K.N., Jeon, G., Piccialli, F.: Anomaly detection and trust authority in artificial intelligence and cloud computing. Comput. Netw. 184, 107647 (2021)

    Article  Google Scholar 

  • Rabbani, M., Wang, Y.L., Khoshkangini, R., Jelodar, H., Zhao, R., Hu, P.: A hybrid machine learning approach for malicious behaviour detection and recognition in cloud computing. J. Netw. Comput. Appl. 151, 102507 (2020)

    Article  Google Scholar 

  • Razaque, A., Rizvi, S.S.: Privacy preserving model: a new scheme for auditing cloud stakeholders. J. Cloud Comput. 6(1), 1–17 (2017)

    Article  Google Scholar 

  • Roderick, M., MacGlashan, J. and Tellex, S.: Implementing the deep q-network. arXiv preprint arXiv:1711.07478, (2017)

  • Sasaki, H., Horiuchi, T. and Kato, S.: A study on vision-based mobile robot learning by deep Q-network. In: Proceedings of 56th Annual Conference of the Society of Instrument and Control Engineers of Japan (SICE), pp. 799–804, 2017.

  • Sohal, A.S., Sandhu, R., Sood, S.K., Chang, V.: A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. Comput Secur 74, 340–354 (2018)

    Article  Google Scholar 

  • Tian, L., Lin, C. and Ni, Y.: Evaluation of user behavior trust in cloud computing, In: Computer Application and System Modeling (ICCASM), vol.7, (2010)

  • Zhang, Y., Chunxiang, Xu., Li, H., Yang, K., Zhou, J., Lin, X.: Healthdep an efficient and secure deduplication scheme for cloud-assisted ehealth systems. IEEE Trans. Industr. Inf. 14(9), 4101–4112 (2018)

    Article  Google Scholar 

Download references

Funding

The authors declare they have no funding in this manuscript.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sukhada Bhingarkar.

Ethics declarations

Conflict of interest

The Authors declare they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bhingarkar, S., Revathi, S.T., Kolli, C.S. et al. An effective optimization enabled deep learning based Malicious behaviour detection in cloud computing. Int J Intell Robot Appl 7, 575–588 (2023). https://doi.org/10.1007/s41315-022-00239-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41315-022-00239-x

Keywords