Abstract
The quick deployment of cloud with computing platforms has driven novel tendencies which shifted operations of networks. However, the cloud is facing several security issues and is susceptible because of suspicious tasks and attacks. This paper devises a new method to detect malicious activities in cloud. Here, first step is the simulation of cloud patterns, wherein the data outsourced by the users are utilized for detecting malicious behaviors. The data pre-processing is done to eradicate unnecessary data and noise contained in the data and is performed using a min–max normalization process. The selection of imperative features is done using distance measure, namely Hellinger distance for mining the essential features. The augmentation of data is performed to make the data appropriate for improved processing. The malicious behavior detection is performed by exploiting the Deep Q network wherein training is performed with Autoregressive chimp optimization algorithm (AChOA), which is developed by integrating chimp optimization algorithm (ChOA) and Conditional Autoregressive Value at risk (CAViaR). The proposed AChOA-based Deep Q network outperformed with the highest testing accuracy of 94%, sensitivity of 94.1%, and specificity of 91.4%.





Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Abbreviations
- CU:
-
Cloud user
- IDS:
-
Intrusion Detection Systems
- EMRs:
-
Electronic Medical Records
- HMM:
-
Hidden Markov Model
- SVM:
-
Support Vector Machines
- NN:
-
Neural Networks
- TPA:
-
Third-Party Auditor
- CNN:
-
Convolutional Neural Network
- VHD:
-
Virtual Honeypot Device
- AFO:
-
App feature ontology
- VMs:
-
Virtual machines
- En-ABC:
-
Ensemble Artificial Bee Colony-based Anomaly Detection Scheme
- TA-Edge:
-
Trusted Authority for Edge Computing
- SDN-ADS:
-
Software-Defined Network-based Anomaly Detection System
- PSO-PNN:
-
Particle Swarm Optimization-based probabilistic neural network
- NB:
-
Naive Bayes
- CSP:
-
Cloud Service Provider
- AMD:
-
Agent-based malware detection
References
Aljamal, I., Tekeoğlu, A., Bekiroglu, K. and Sengupta, S.: Hybrid intrusion detection system using machine learning techniques in cloud computing environments. In: software engineering research, management and applications (SERA), pp. 84–89, 2019.
Almorsy, M., Grundy, J. and Müller, I.: An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107, 2016.
Aslan, Ö., Ozkan-Okay, M., Gupta, D.: Intelligent behavior-based Malware detection system on cloud computing environment. IEEE Access 9, 83252–83271 (2021)
KDD Cup 1999 Data, http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. Accessed on Oct 2021.
Dasgupta, A., Drineas, P., Harb, B., Josifovski, V. and Mahoney, M.W.: Feature selection methods for text classification. In: Proceedings of the ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 230–239, (2007)
Engle, R.F., Manganelli, S.: CAViaR: conditional autoregressive value at risk by regression quantiles. J. Bus. Econ. Stat. 22(4), 367–381 (2004)
The Bot-IoT Dataset, "https://ieee-dataport.org/documents/bot-iot-dataset," Accessed on Oct 2021.
Garg, S., Kaur, K., Batra, S., Aujla, G.S., Morgan, G., Kumar, N., Zomaya, A.Y., Ranjan, R.: En-ABC: an ensemble artificial bee colony based anomaly detection scheme for cloud environment. J. Parallel Distrib. Comput. 135, 219–233 (2020)
A Gentle Introduction to the Bootstrap Method, https://machinelearningmastery.com/a-gentle-introduction-to-the-bootstrap-method/. Accessed on Nov 2021.
Gupta, S., Kumar, P.: An immediate system call sequence based approach for detecting malicious program executions in cloud environment. Wirel. Pers. Commun. 81(1), 405–425 (2015)
Jayalakshmi, T., Santhakumaran, A.: Statistical normalization and back propagation for classification. Int. J. Comput. Theory Eng. 3(1), 1793–8201 (2011)
Khishe, M., Mosavi, M.R.: Chimp optimization algorithm. Expert Syst. Appl. 149, 113338 (2020)
Lee, S.H., Yu, S.M., Kim, Y.P. and Yoo, C.: DetecClu: live malicious detection engine for cloud. Proceedings of 2016 IEMEK symposium on embedded technology. Hotel Inter-Citi Daejeon, Korea. pp. 1–2 (2016)
Li, S., Li, Y., Tian, Z.: Malicious mining code detection based on ensemble learning in cloud computing environment. Simul. Modell. Pract. Theor. (14 August 2021)
Manickam, M., Rajagopalan, S.P.: A hybrid multi-layer intrusion detection system in cloud. Clust. Comput. 22(2), 3961–3969 (2019)
Michael Mahesh, K.: Workflow scheduling using Improved Moth Swarm optimization algorithm in cloud computing. Multimed Res 3(3), 36–43 (2020)
OS, J.N.: Detection of malicious Android applications using Ontology-based intelligent model in mobile cloud environment. J. Inf. Secur. Appl. 58, 102751 (2021)
Panker, T., Nissim, N.: Leveraging malicious behavior traces from volatile memory using machine learning methods for trusted unknown malware detection in Linux cloud environments. Knowl.-Based Syst. 226, 107095 (2021)
Patil, R., Dudeja, H., Modi, C.: Designing in-VM-assisted lightweight agent-based malware detection framework for securing virtual machines in cloud computing. Int. J. Inf. Secur. 19(2), 147–162 (2020)
Qureshi, K.N., Jeon, G., Piccialli, F.: Anomaly detection and trust authority in artificial intelligence and cloud computing. Comput. Netw. 184, 107647 (2021)
Rabbani, M., Wang, Y.L., Khoshkangini, R., Jelodar, H., Zhao, R., Hu, P.: A hybrid machine learning approach for malicious behaviour detection and recognition in cloud computing. J. Netw. Comput. Appl. 151, 102507 (2020)
Razaque, A., Rizvi, S.S.: Privacy preserving model: a new scheme for auditing cloud stakeholders. J. Cloud Comput. 6(1), 1–17 (2017)
Roderick, M., MacGlashan, J. and Tellex, S.: Implementing the deep q-network. arXiv preprint arXiv:1711.07478, (2017)
Sasaki, H., Horiuchi, T. and Kato, S.: A study on vision-based mobile robot learning by deep Q-network. In: Proceedings of 56th Annual Conference of the Society of Instrument and Control Engineers of Japan (SICE), pp. 799–804, 2017.
Sohal, A.S., Sandhu, R., Sood, S.K., Chang, V.: A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. Comput Secur 74, 340–354 (2018)
Tian, L., Lin, C. and Ni, Y.: Evaluation of user behavior trust in cloud computing, In: Computer Application and System Modeling (ICCASM), vol.7, (2010)
Zhang, Y., Chunxiang, Xu., Li, H., Yang, K., Zhou, J., Lin, X.: Healthdep an efficient and secure deduplication scheme for cloud-assisted ehealth systems. IEEE Trans. Industr. Inf. 14(9), 4101–4112 (2018)
Funding
The authors declare they have no funding in this manuscript.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The Authors declare they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Bhingarkar, S., Revathi, S.T., Kolli, C.S. et al. An effective optimization enabled deep learning based Malicious behaviour detection in cloud computing. Int J Intell Robot Appl 7, 575–588 (2023). https://doi.org/10.1007/s41315-022-00239-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41315-022-00239-x