Skip to main content

Advertisement

Log in

A New Secure Model for Cloud Environments Using RBFNN and AdaBoost

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

The emergence of data today requires the enhancement of cybersecurity due to the importance and sensitivity of the information contained in data. Therefore, Cloud Computing is a new model that has made it convenient to distribute and store data because of its distinctive characteristics. Security, though, is a major worry for cloud services due to the various risks they confront regularly, which increases the danger of losing consumer trust. In this regard, many tools have been used to secure Cloud. Recently, Intrusion Detection System (IDS) is a frequently used security tool because of its effectiveness. But when confronted with an important volume and variety of network data, the current IDS might show overfitting, poor classification accuracy (ACC) and high rates of false positives (FPR). Then to develop IDS, studies used new technologies like Machine Learning, Deep Learning and Ensemble Learning. In this article to mitigate the above problems the used datasets are preprocessed with Min–Max normalization and dummies function. Furthermore, this model is built on the Radial Basis Function Neural Network (RBFNN) and AdaBoost approaches for anomaly detection. In particular, the RBFNN classifier has been added to boost detection precision and support effective decision-making, while the AdaBoost is employed to improve feature selection and training. In addition, the principal idea is to mention the impact of integrating feature selection. To demonstrate this, we give a comparison between the two models. In the first one, we directly apply RBFNN after preprocessing data, in the second one, we integer AdaBoost for feature selection, then we apply RBFNN for prediction. Finally, the NSL-KDD and CICIDS2017 datasets are used in the trials. Our suggested idea achieves 99.7% and 99.5% ACC, 0.6% and 0.18% FPR, respectively. The results produced using AdaBoost for feature selection have demonstrated that our suggested concept is more effective than utilizing RBFNN directly also it performs well compared with the other studies.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Data Availability

Available on the request.

References

  1. Ahmad W, Rasool A, Javed AR, Baker T, Jalil Z. Article cyber security in IoT-Based cloud computing: a comprehensive survey. Electronics. 2022;11:16.

    Article  MATH  Google Scholar 

  2. Belal MM, Sundaram DM. Comprehensive review on intelligent security defenses in the cloud: taxonomy, security issues, ML/DL techniques, challenges and future trends. J King Saud Univ Comput Inform Sci. 2022;34:9102–31.

    MATH  Google Scholar 

  3. Velde V, Mandala SK, Vurukonda N, Ramesh D. WITHDRAWN: enterprise-based data deployment inference methods in cloud infrastructure. Mater Today. 2021.

  4. Azrour M, Mabrouki J, Guezzaz A, Kanwal A. Internet of things security: challenges and key issues, Security and Communication Networks, 2021.

  5. Maray M, Shuja J. Computation offloading in mobile cloud computing and mobile edge computing: survey, taxonomy, and open issues. Mob Inf Syst. 2022;2022:1121822.

    MATH  Google Scholar 

  6. Mayuranathan M, Murugan M, Dhanakoti V. Best features based intrusion detection system by RBM model for detecting DDoS in cloud environment. Springer. 2019.

  7. Pallathadka P, Sajja G, Phasinam K, Ritonga M, Naved M, Bansal R, Quiñonez-Choquecota J. An investigation of various applications and related challenges in cloud computing. Materialstoday. 2022;51:2245–8.

    Google Scholar 

  8. Catillo M, Pecchia A, Villano U. A deep learning method for lightweight and cross-device IoT botnet detection. MDPI J. 2022;13:837.

    Google Scholar 

  9. Khraisat A, Gondal I, Vamplew P, Kamruzzaman J. Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity. 2019;2:1–22.

    Article  Google Scholar 

  10. Halbouni A, Gunawan TS, Habaebi MH, Halbouni M, Kartiwi M, Ahmad R. Machine learning and deep learning approaches for CyberSecurity: a review. IEEE Access. 2022;10:19572–85.

    Article  MATH  Google Scholar 

  11. AlRazib M, Javeed D, Khan MT, Alkanhel R, Muthanna MSA. Cyber threats detection in smart environments using SDN-Enabled DNN-LSTM Hybrid framework. IEEE Access. 2022;10:53015–26.

    Article  Google Scholar 

  12. Guezzaz A, Asimi Y, Azrour M, Asimi A. Mathematical validation of proposed machine learning classifier for heterogeneous traffic and anomaly detection. Big Data Min Analy. 2021;4:18–24.

    Article  MATH  Google Scholar 

  13. Guezzaz A, Asimi A, Tbatou Z, Asimi Y, Sadqi Y. A global intrusion detection system using pcapsocks sniffer and multilayer perceptron classifier. Int J Network Secur. 2019;21(3):438–50.

    MATH  Google Scholar 

  14. Guezzaz A, Asimi A, Asimi Y, Azrour M, Benkirane S. A distributed intrusion detection approach based on machine learning techniques for cloud security. Intelligent systems in big data, semantic web and machine learning. Adv Intell Syst Comput. 2021;1344:85–94.

    Article  MATH  Google Scholar 

  15. Nassif AB, Talib MA, Nasir Q, Albadani H, Dakalbab FM. Machine learning for cloud security: a systematic review. IEEE Access. 2021;9:20717–35.

    Article  Google Scholar 

  16. Singh A, Chatterjee K. Cloud security issues and challenges: a survey. J Netw Comput Appl. 2016;79:88–115.

    Article  MATH  Google Scholar 

  17. Mollah MB, Azad MAK, Vasilakos A. Security and privacy challenges in mobile cloud computing: survey and way ahead. J Netw Comput Appl. 2017;84:38–54.

    Article  Google Scholar 

  18. Brohi SN, Bamiah MA. Challenges and benefits for adopting the paradigm of cloud computing. Int J Adv Eng Sci Technol. 2011;8:286–90.

    Google Scholar 

  19. Chiba Z, Abghour N, Moussaid K, El Omri A, Rida M. A cooperative and hybrid network intrusion detection framework in cloud computing based SNORT and optimized back propagation neural network. Procedia Comput Sci. 2016;83:1200–6.

    Article  MATH  Google Scholar 

  20. Patil K, Desai B. Leveraging LLM for zero-day exploit detection in cloud networks. Asian Am Res Lett J. 2024;1:1.

    MATH  Google Scholar 

  21. Azzedin F, Suwad H, Rahman MM. An asset-based approach to mitigate zero-day ransomware attacks. Comput Mater Continua. 2022;73:1.

    Google Scholar 

  22. Ahmad R, Alsmadi I, Alhamdani W, Tawalbeh LA. Zero-day attack detection: a systematic literature review. Artif Intell Rev. 2023;56:10733–811.

    Article  MATH  Google Scholar 

  23. Khan ZA, Namin AS. A survey of DDOS attack detection techniques for IoT systems using BlockChain technology. Electronics. 2022;11:3892.

    Article  MATH  Google Scholar 

  24. Arthi K, Kumarand MR, Bhagyashree B. A novel method to monitor threats in cloud computing environment. Int J Comput Trends Technol. 2017.

  25. Guezzaz A, Asimi A, Asimi Y, Tbatou Z, Sadqi Y. A lightweight neural classifier for intrusion detection. Gen Lett Math. 2017;2(2):57–66.

    MATH  Google Scholar 

  26. Baniasadi S, Rostami O, Martín D, Kaveh M. A novel deep supervised learning-based approach for intrusion detection in IoT systems. Sensors. 2022;22:4459.

    Article  MATH  Google Scholar 

  27. Butt UA, Mehmood M, Shah SBH, Amin R, Shaukat MW, Raza SM, Suh DY, Piran MJ. A review of machine learning algorithms for cloud computing security. Electronics. 2020;9:1379.

    Article  Google Scholar 

  28. Panker T, Nissim N. Leveraging malicious behavior traces from volatile memory using machine learning methods for trusted unknown malware detection in Linux cloud environments. Knowl Based Syst. 2021.

  29. Xiao Y, Xing C, Zhang T, Zhao Z. An intrusion detection model based on feature reduction and convolutional neural networks. IEEE Access. 2019;7:42210–9.

    Article  MATH  Google Scholar 

  30. Jiang F, Fu Y, Gupta BB, Liang Y, Rho S, Lou F, Meng F, Tian Z. Deep learning based multi-channel intelligent attack detection for data security. IEEE Trans Sustain Comput. 2020;5(2):204–12.

    Article  Google Scholar 

  31. Tian Q, Han D, Li KC, Liu X, Duan L, Castiglione A. An intrusion detection approach based on improved deep belief network. Appl Intell. 2020;50:3162–78.

    Article  MATH  Google Scholar 

  32. Mohy-eddine M, Guezzaz A, Benkirane S, et al. An effective intrusion detection approach based on ensemble learning for IIoT edge computing. J Comput Virol Hacking Tech. 2022;19:469–81.

    Article  Google Scholar 

  33. Guezzaz A, Azrour M, Benkirane S, Mohyeddine M, Attou H, Douiba M. A Lightweight hybrid intrusion detection framework using machine learning for edge-based IIoT security. Int Arab J Infor Technol. 2022;19(5):822–30.

    Google Scholar 

  34. Mohy-eddine M, Guezzazand A, Benkirane S. An efficient network intrusion detection model for IoT security using K-NN classifier and feature selection. Multimed Tools Appl. 2023;82:23615–33.

    Article  Google Scholar 

  35. Hazman C, Guezzaz A, Benkirane S, Azrour M. IDS-SIoEL: intrusion detection framework for IoT-based smart environments security using ensemble learning. Clust Comput. 2022;26:4069–83.

    Article  Google Scholar 

  36. Douiba M, Benkirane S, Guezzaz A, Azrour M. An improved anomaly detection model for IoT security using decision tree and gradient boosting. J Supercomput. 2022;79:3392–411.

    Article  Google Scholar 

  37. Attou H, Guezzaz A, Benkirane S, Azrour M, Farhaoui Y. Cloud-based intrusion detection approach using machine learning techniques. Big Data Min Anal. 2023;6:311–20.

    Article  Google Scholar 

  38. Marwan M, Kartit A, Ouahmane H. Security enhancement in healthcare cloud using machine learning. Procedia Comput Sci. 2018;127:388–97.

    Article  Google Scholar 

  39. Gao X, Hu C, Shan C, Liu B, Niu Z, Xie H. Malware classification for the cloud via semi-supervised transfer learning. J Infor Secur Appl. 2020;55: 102661.

    MATH  Google Scholar 

  40. Abusitta A, Bellaiche M, Dagenais M, Halabi T. A deep learning approach for proactive multi-cloud cooperative intrusion detection system. Futur Gener Comput Syst. 2019;98:308–18.

    Article  Google Scholar 

  41. Kim H, Kim J, Kim Y, Kim I, Kim KJ. Design of network threat detection and classification based on machine learning on cloud computing. Clust Comput. 2018;22:2341–50.

    Article  MATH  Google Scholar 

  42. Jaber AN, Rehman SU. FCM–SVM based intrusion detection system for cloud computing. Clust Comput. 2020;23:1–11.

    Article  MATH  Google Scholar 

  43. Samriya JK, Kumar N. A novel intrusion detection system using hybrid clustering-optimization approach in cloud computing. Mater Today. 2020;2(1):23–54.

    MATH  Google Scholar 

Download references

Funding

This study was not funded and without financially supporting. We did this research work as academic researchers of computer sciences at university.

Author information

Authors and Affiliations

Authors

Contributions

Hanaa Attouis the main author that manages the contribution and gives the detailed description of the model. AzidineGuezzaz writes the abstract, introduction and analyzes the related works section. Said Benkirane evaluates the results obtained from implementation and drowing the figures. MouradeAzrour participates in implementation of the model prepared the final manuscript and corrected the English language.

Corresponding author

Correspondence to Azidine Guezzaz.

Ethics declarations

Conflict of interest

Our work has not been funded and without financially supporting. We declare that we have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Attou, H., Guezzaz, A., Benkirane, S. et al. A New Secure Model for Cloud Environments Using RBFNN and AdaBoost. SN COMPUT. SCI. 6, 188 (2025). https://doi.org/10.1007/s42979-025-03691-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-025-03691-1

Keywords