A Comprehensive Taxonomy and Systematic Review of Intelligent Attack Defense Systems for Multi-Cloud Environment

Authors

  • Rashmi Verma Department of Computer Science, Banasthali Vidyapith, Banasthali 304022, Rajasthan, India
  • Manisha Jailia Department of Computer Science, Banasthali Vidyapith, Banasthali 304022, Rajasthan, India

Keywords:

Multi cloud, Inter cloud, Nature Inspired algorithms, Evolutionary Computing, Attack Detection, Intrusion Detection

Abstract

Oftentimes, public cloud users and companies implemented multi-cloud in meeting their needs of cloud computing. Security and data confidentiality remains most important deliberations in selecting and studying cloud computing. Of late, developments in machine learning techniques have engrossed the attention of the research fraternity to create intrusion detection systems (IDS) to intelligently detect glitches in the network traffic flow. The purpose of this paper is to underline the significance on nature-inspired meta-heuristic intelligent algorithms and advantages in these methods on attack detection in multi-cloud environment. A thorough systematic review has been proffered. The findings obtained have shown that the hybrid intelligence-based algorithms have a substantial impact on resolving the issue of attack detection in multi-cloud, and such an effect has augmented in the recent years. Apart from that, this paper focuses on providing more effective algorithms and research directions for attack detection and avoidance in multi-cloud in the future.

Downloads

Download data is not yet available.

References

R. Flexera, State of the Cloud Report form Flexera, (2019)

R. Duncan, R. A multi-cloud world requires a multi-cloud security approach. Computer Fraud & Security, 5(2020), 11-12.

K. A. Torkura, M. I. Sukmana, F.Cheng, &C. Meinel, C, Continuous auditing and threat detection in multi-cloud infrastructure, Computers & Security, 102((2021) 102124.

J. Hong, T. Dreibholz, J.A. Schenkel, J.A. Hu, An overview of multi-cloud computing. In Workshops of the international conference on advanced information networking and applications (2019) 1055-1068.

H. Tabrizchi, M. Kuchaki Rafsanjani, A survey on security challenges in cloud computing: issues, threats, and solutions. The journal of supercomputing, 76(2020), 9493-9532.

D. G. Amalarathinam, J.M. Priya, Survey on Data Security in Multi-Cloud Environment. International Journal of Pure and Applied Mathematics, 118(2018), 323-334.

S. Berger, S. Garion, Y. Moatti, D. Naor, D. Pendarakis, A. Shulman-Peleg&Y. Weinsberg, Security intelligence for cloud management infrastructures. IBM Journal of Research and Development, 60(2016), 11-1.

N. Kaloudi, J. Li, The AI-based cyber threat landscape: A survey. ACM Computing Surveys (CSUR), 53(2020), 1-34.

M. Teo, H. Mahdin, L.J. Hwee, H.A. Dicken, T.X. Hui, T.M. Ling, &M.S. Azmi, A review on cloud computing security. JOIV: International Journal on Informatics Visualization, 2((2018), 293-298.

A. Riaz, H.F. Ahmad, A. Kiani, J. Qadir, R. Rasool &U. Younis, Intrusion detection systems in cloud computing: A contemporary review of techniques and solutions. Journal of Information Science and Engineering, 33(2017), 611-634.

P. Deshpande, S. C. Sharma, S. K. Peddoju, &S. Junaid, HIDS: A host based intrusion detection system for cloud computing environment. International Journal of System Assurance Engineering and Management, 9(2018), 567-576.

F. Tong, Z. Yan, A hybrid approach of mobile malware detection in Android. Journal of Parallel and Distributed computing, 103(2017), 22-31.

J. P. Barrowclough,R. Asif, Securing cloud hypervisors: a survey of the threats, vulnerabilities, and countermeasures. Security and Communication Networks, 2018.

A. I. Torre-Bastida, J. Díaz-de-Arcaya, E. Osaba, K. Muhammad, D. Camacho &J. Del Ser,Bio-inspired computation for big data fusion, storage, processing, learning and visualization: state of the art and future directions. Neural Computing and Applications, (2021), 1-31.

M. M. Ahsan, K. D. Gupta, A.K. Nag, S. Poudyal, A.Z. Kouzani, &M.P. Mahmud, Applications and evaluations of bio-inspired approaches in cloud security: A review. IEEE Access, 8(2020), 180799-180814.

X. Fan, W. Sayers, S. Zhang, Z. Han, L. Ren, &H. Chizari, Review and classification of bio-inspired algorithms and their applications. Journal of Bionic Engineering, 17(2020), 611-631.

S. Dwivedi, M. Vardhan, S. Tripathi, Defense against distributed DoS attack detection by using intelligent evolutionary algorithm. International Journal of Computers and Applications, (2020), 1-11.

N. Gélvez, H. Espitia, J. Bayona, Testing of a Virtualized Distributed Processing System for the Execution of Bio-Inspired Optimization Algorithms. Symmetry, 12(2020), 1192.

D. Zeghida, D. Meslati, N. Bounour, Bio-IR-M: a multi-paradigm modeling for bio-inspired multi-agent systems. Informatica, 42 (2018).

A. Abusitta, M. Bellaiche, M. Dagenais, Multi-cloud cooperative intrusion detection system: trust and fairness assurance. Annals of Telecommunications, 74(2019), 637-653.

H. Kurdi, S. Alsalamah, A.Alatawi, S. Alfaraj, L. Altoaimy, &S.H. Ahmed, Healthybroker: A trustworthy blockchain-based multi-cloud broker for patient-centered ehealth services. Electronics, 8(2019), 602.

A. Tchernykh, V. Miranda-López, M. Babenko, F. Armenta-Cano, G. Radchenko, A.Y. Drozdov, &A. Avetisyan, Performance evaluation of secret sharing schemes with data recovery in secured and reliable heterogeneous multi-cloud storage. Cluster Computing, 22(2019), 1173-1185.

A. Abusitta, M. Bellaiche, M. Dagenais, &T. Halabi, A deep learning approach for proactive multi-cloud cooperative intrusion detection system. Future Generation Computer Systems, 98(2019), 308-318.

J. Cui, X. Zhang, H. Zhong, J. Zhang, &L. Liu, Extensible conditional privacy protection authentication scheme for secure vehicular networks in a multi-cloud environment. IEEE Transactions on Information Forensics and Security, 15(2019), 1654-1667.

A. Kim, M. Park, &D.H. Lee, AI-IDS: Application of deep learning to real-time Web intrusion detection. IEEE Access, 8(2020), 70245-70261.

D. Singh, D. Patel, B. Borisaniya, &C. Modi, Collaborative ids framework for cloud. International Journal of Network Security, (2013)

S. Ghribi, S, Distributed and cooperative intrusion detection in cloud networks. In Proceedings of the Doctoral Symposium of the 17th International Middleware Conference (2016), 1-2.

T. Mohanraj, R. Santhosh, R, Security and privacy issue in multi-cloud accommodating Intrusion Detection System. Distributed and Parallel Databases, (2021), 1-19.

X. Tang, X, Reliability-aware cost-efficient scientific workflows scheduling strategy on multi-cloud systems. IEEE Transactions on Cloud Computing, (2021)

M. Alaluna, L. Ferrolho, J.R. Figueira, N. Neves, &F.M. Ramos, Secure multi-cloud virtual network embedding. Computer Communications, 155(2020), 252-265.

I. Bolodurina, D. Parfenov, Development models and intelligent algorithms for improving the quality of service and security of multi-cloud platforms. In International Conference on Remote Engineering and Virtual Instrumentation (2018), 386-394.

M. Abdelsalam, R. Krishnan, R. Sandhu, Online malware detection in cloud auto-scaling systems using shallow convolutional neural networks. In IFIP Annual Conference on Data and Applications Security and Privacy ((2019), 381-397, Springer, Cham.

V. Casola, A. De Benedictis, M. Rak,U. Villano, Security-by-design in multi-cloud applications: An optimization approach. Information Sciences, 454(2018), 344-362.

D. J. Hemanth, &S. Smys, (Eds.), Computational Vision and Bio Inspired Computing, 28(2018). Springer.

S. Sen,A survey of intrusion detection systems using evolutionary computation, In Bio-inspired computation in telecommunications (2015), 73-94

H. Huseynov, T. Saadawi, K. Kourai, Hardening the Security of Multi-Access Edge Computing through Bio-Inspired VM Introspection, Big Data and Cognitive Computing, 5(2021), 52.

Y. X. Xie, L. X., Ji, L.S. Li, Z. Guo, &T. Baker, An adaptive defense mechanism to prevent advanced persistent threats. Connection Science, 33(2021), 359-379.

S. I. Shyla, S. S. Sujatha, Cloud security: LKM and optimal fuzzy system for intrusion detection in cloud environment. Journal of Intelligent Systems, 29(2020), 1626-1642.

Z. Chiba, N. Abghour, K. Moussaid, M. Rida, Intelligent approach to build a Deep Neural Network based IDS for cloud environment using combination of machine learning algorithms. Computers & Security, 86(2019), 291-317.

L. Khatibzadeh, Z. Bornaee, A. GhaemiBafghi, Applying catastrophe theory for network anomaly detection in cloud computing traffic. Security and Communication Networks, 2019.

M. Aloqaily, S. Otoum, I. Al Ridhawi, Y. Jararweh, An intrusion detection system for connected vehicles in smart cities. Ad Hoc Networks, 90(2019), 101842.

A. Ahmad, W.S. Zainudin, M.N. Kama, N.B. Idris, &M.M. Saudi, Cloud Co-residency denial of service threat detection inspired by artificial immune system, In Proceedings of the 2018 Artificial Intelligence and Cloud Computing Conference (2018), 76-82).

R. Roman, R. Rios, J.A. Onieva, J. Lopez, Immune system for the internet of things using edge technologies. IEEE Internet of Things Journal, 6(2018), 4774-4781.

D. Grzonka, A. Jakóbik, J. Kołodziej, S. Pllana, Using a multi-agent system and artificial intelligence for monitoring and improving the cloud performance and security, Future generation computer systems, 86(2018), 1106-1117.

V. Ramadevi, &K. Manjunatha Chari, FPGA realization of an efficient image scalar with modified area generation technique, Multimedia Tools and Applications, 78(2019), 23707-23732.

A. Nicolaou, S. Shiaeles,N. Savage, Mitigating insider threats using bio-inspired models. Applied Sciences, 10(2020), 5046.

L. Gupta, T. Salman, A. Ghubaish, D. Unal, A.K. Al-Ali, &R. Jain, Cybersecurity of multi-cloud healthcare systems: A hierarchical deep learning approach, Applied Soft Computing, (2022) 108439.

M. I., Hussain, J. He, N. Zhu, Z. Ali Zardari, F. Razque, S. Hussain, &M.S. Pathan, An archetype for mitigating the security threats in multi-cloud environment by implementing tree-based next-generation firewalls. Journal of Intelligent & Fuzzy Systems, (2021), 1-12.

L. Xu, Y. Tu, Y. Zhang, A grasshopper optimization-based approach for task assignment in cloud logistics. Mathematical Problems in Engineering, 2020.

M. Hosseini Shirvani, Bi-objective web service composition problem in multi-cloud environment: a bi-objective time-varying particle swarm optimisation algorithm, Journal of Experimental & Theoretical Artificial Intelligence, 33(2021), 179-202.

H. Larijani, A. Javed, N. Mtetwa, &J. Ahmad, Intrusion detection using swarm intelligence. In 2019 UK/China Emerging Technologies (UCET), IEEE, (2019), 1-5.

T. A Alamiedy, M. Anbar, Z.N. Alqattan, Q. M. Alzubi, Anomaly-based intrusion detection system using multi-objective grey wolf optimisation algorithm, Journal of Ambient Intelligence and Humanized Computing, 11(2020), 3735-3756.

D. Dhanya, D. Arivudainambi, Dolphin partner optimization based secure and qualified virtual machine for resource allocation with streamline security analysis, Peer-to-Peer Networking and Applications, 12(2019), 1194-1213.

R .Kesavamoorthy, K. RubaSoundar, Swarm intelligence based autonomous DDoS attack detection and defense using multi agent system, Cluster Computing, 22(2019), 9469-9476.

K. Pradeep, T. Prem Jacob, A hybrid approach for task scheduling using the cuckoo and harmony search in cloud computing environment. Wireless Personal Communications, 101(2018), 2287-2311.

H. Mezni, M. Sellami, J,Kouki, Security‐aware SaaS placement using swarm intelligence, Journal of Software: Evolution and Process, 30(2018), e1932.

S. Asghari, N.J. Navimipour,. Nature inspired meta‐heuristic algorithms for solving the service composition problem in the cloud environments. International Journal of Communication Systems, 31(2018), e3708.

M. I. Hussain, J. He, N. Zhu, F. Sabah, Z.A. Zardari, S. Hussain, F. Razque, Hybrid SFLA-UBS Algorithm for Optimal Resource Provisioning with Cost Management in Multi-cloud Computing. resource, 12(2021).

M. A. Khan,HCRNNIDS: hybrid convolutional recurrent neural network-based network intrusion detection system. Processes, 9(2021), 834.

V. Ravindranath, S. Ramasamy, R. Somula, K.S. Sahoo, A.H. Gandomi, Swarm intelligence-based feature selection for intrusion and detection system in cloud infrastructure. In 2020 IEEE Congress on Evolutionary Computation (CEC), IEEE, (2020) 1-6.

N. Khare, P. Devan, C.L. Chowdhary, S. Bhattacharya, G. Singh, S. Singh, B. Yoon, SMO-DNN: spider monkey optimization and deep neural network hybrid classifier model for intrusion detection. Electronics, 9(2020), 692.

K.N. Vhatkar, G.P. Bhole, Particle swarm optimisation with grey wolf optimisation for optimal container resource allocation in cloud. IET Networks, 9(2020), 189-199.

M.A. Alphonsa, N. MohanaSundaram, A reformed grasshopper optimization with genetic principle for securing medical data. Journal of Information Security and Applications, 47(2019), 410-420.

S. Garg, K. Kaur, N. Kumar, G. Kaddoum, A.Y. Zomaya, R. Ranjan, A hybrid deep learning-based model for anomaly detection in cloud datacenter networks. IEEE Transactions on Network and Service Management, 16(2019), 924-935.

R.M. Yadav, Effective analysis of malware detection in cloud computing. Computers & Security, 83(2019), 14-21.

B. Hajimirzaei, N.J. Navimipour, Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm, Ict Express, 5(2019), 56-59.

C. Yang, Anomaly network traffic detection algorithm based on information entropy measurement under the cloud computing environment. Cluster Computing, 22(2019), 8309-8317.

M. Manickam, S.P. Rajagopalan, A hybrid multi-layer intrusion detection system in cloud. Cluster Computing, 22(2019), 3961-3969.

Y. Weng, L. Liu, A collective anomaly detection approach for multidimensional streams in mobile service security. IEEE Access, 7(2019), 49157-49168.

D. Selvapandian, R. Santhosh, Deep learning approach for intrusion detection in IoT-multi cloud environment. Automated Software Engineering, 28((2021), 1-17.

G. BouGhantous, A.Q. Gill, Evaluating the DevOps Reference Architecture for Multi-cloud IoT-Applications. SN Computer Science, 2(2021), 1-35.

M.S. Islam, W. Pourmajidi, L. Zhang, J. Steinbacher, T. Erwin, A. Miranskyy, Anomaly detection in a large-scale cloud platform. In 2021 IEEE/ACM 43rd International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP) IEEE (2021) 150-159.

P. Santhosh Kumar, L. Parthiban, Scalable anomaly detection for large-scale heterogeneous data in cloud using optimal elliptic curve cryptography and gaussian kernel Fuzzy C-means clustering. Journal of Circuits, Systems and Computers, 29(2020), 2050074.

I. M. Stephanakis, I.P. Chochliouros, E. Sfakianakis, S.N. Shirazi, D. Hutchison, Hybrid self-organizing feature map (SOM) for anomaly detection in cloud infrastructures using granular clustering based upon value-difference metrics. Information Sciences, 494(2019), 247-277.

T. Zoppi, A. Ceccarelli,A. Bondavalli, MADneSs: A multi-layer anomaly detection framework for complex dynamic systems. IEEE Transactions on Dependable and Secure computing, 18(2019), 796-809.

O. AlKadi, N. Moustafa, B. Turnbull, K.K.R. Choo, Mixture localization-based outliers models for securing data migration in cloud centers. IEEE Access, 7(2019), 114607-114618.

A. Alabdulatif, I. Khalil, H. Kumarage, A.Y. Zomaya, X. Yi, Privacy-preserving anomaly detection in the cloud for quality assured decision-making in smart cities. Journal of Parallel and Distributed Computing, 127(2019), 209-223.

N. Moustafa, K.K.R. Choo, I. Radwan, S.Camtepe, Outlier dirichlet mixture mechanism: Adversarial statistical learning for anomaly detection in the fog. IEEE Transactions on Information Forensics and Security, 14(2019), 1975-1987.

A. Alabdulatif, H. Kumarage, I. Khalil, X. Yi, Privacy-preserving anomaly detection in cloud with lightweight homomorphic encryption. Journal of Computer and System Sciences, 90(2017), 28-45.

A. Yousefipour, A. M. Rahmani, M. Jahanshahi,Improving the Load Balancing and Dynamic Placement of Virtual Machines in Cloud Computing using Particle Swarm Optimization Algorithm, IJE TRANSACTIONS C: Aspects Vol. 34, No. 6, (June 2021) 1419-1429.

A. Zandvakili, N. Mansouri*, M. M. Javidi, Energy-aware Task Scheduling in Cloud Compting Based on Discrete Pathfinder Algorithm, IJE TRANSACTIONS C: Aspects, Vol. 34, No. 09, (September 2021) 2124-2136

M. Heidari, S. Emadi, Services Composition in Multi-cloud Environments using the Skyline Service Algorithm, IJE TRANSACTIONS A: Basics Vol. 34, No. 01, (January 2021) 56-65

R. Ghafari, N. Mansouri, An Efficient Task Scheduling Based on Seagull Optimization Algorithm for Heterogeneous Cloud Computing Platforms, IJE TRANSACTIONS B: Applications Vol. 35, No. 02, (February 2022) 433-450

Gopalakrishnan Subburayalu, Hemanand Duraivelu, Arun Prasath Raveendran, Rajesh Arunachalam, Deepika Kongara & Chitra Thangavel (2023) Cluster Based Malicious Node Detection System for Mobile Ad-Hoc Network Using ANFIS Classifier, Journal of Applied Security Research, 18:3, 402-420, DOI: 10.1080/19361610.2021.2002118

Wilson, T., Johnson, M., Gonzalez, L., Rodriguez, L., & Silva, A. Machine Learning Techniques for Engineering Workforce Management. Kuwait Journal of Machine Learning, 1(2). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/120

Anand, R., Ahamad, S., Veeraiah, V., Janardan, S. K., Dhabliya, D., Sindhwani, N., & Gupta, A. (2023). Optimizing 6G wireless network security for effective communication. Innovative smart materials used in wireless communication technology (pp. 1-20) doi:10.4018/978-1-6684-7000-8.ch001 Retrieved from www.scopus.com

Downloads

Published

11.07.2023

How to Cite

Verma, R. ., & Jailia, M. . (2023). A Comprehensive Taxonomy and Systematic Review of Intelligent Attack Defense Systems for Multi-Cloud Environment. International Journal of Intelligent Systems and Applications in Engineering, 11(9s), 444–454. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3134

Issue

Section

Research Article