An Improved Harris Hawks Optimization Algorithm for Malware Intrusion Detection in Cloud Storage
Keywords:
Cloud Data Security, Malware Intrusion Detection, Multilayer Perceptron Model, Harris Hawks Optimization, Unknown Malware AttacksAbstract
Defending against malware threats has become a crucial concern in the continually evolving realm of cloud computing. Creative malware has become a rising challenge to cloud data security. Hence, we have proposed a methodology for Cloud Malware Intrusion Detection to strengthen cloud infrastructures against the constant threat of unknown malware attacks. Harris Hawks Optimization (HHO) and the Multilayer Perceptron (MLP) are proposed as a hybrid approach to tackling malware attacks in the cloud using deep learning to detect subtle abnormalities as an indicative solution to identify hidden malware threats. Hence, the MLP model provides part of a vigilant data monitoring system inside the cloud architecture. By modifying the MLP's hyperparameters, HHO serves as an optimization engine, enhancing the MLP's accuracy and efficiency. This hybrid approach has the capacity to safeguard cloud resources against the constantly changing and threatening landscape of malware, which provides an efficient and adaptive defense system, as proved by the implementation process. Accuracy of 98.45%, precision of 98.55%, recall of 99.88%, and F1 Score of 99.21% have been achieved during the experimentation.
Downloads
References
Al-Hawawreh, M., & Moustafa, N., “Explainable deep learning for attack intelligence and combating cyber-physical attacks,” Ad Hoc Networks, pp. 103329, 2023.
Fascí, L. S., Fisichella, M., Lax, G., & Qian, C., “Disarming visualization-based approaches in malware detection systems,” Computers & Security, vol. 126, pp. 103062, 2023.
Liu, C., Lu, J., Feng, W., Du, E., Di, L., & Song, Z., “MOBIPCR: Efficient, accurate, and strict ML-based mobile malware detection,” Future Generation Computer Systems, vol. 144, pp. 140-150, 2023.
Wen, Q., & Chow, K. P., “CNN based zero-day malware detection using small binary segments,” Forensic Science International: Digital Investigation, vol. 38, pp. 301128, 2021.
Tian, D., Ying, Q., Jia, X., Ma, R., Hu, C., & Liu, W., “MDCHD: A novel malware detection method in cloud using hardware trace and deep learning,” Computer Networks, vol. 198, pp. 108394, 2021.
Mohammed, M.A., Lakhan, A., Zebari, D.A., Abdulkareem, K.H., Nedoma, J., Martinek, R., Tariq, U., Alhaisoni, M. and Tiwari, P., “Adaptive secure malware efficient machine learning algorithm for healthcare data,” CAAI Transactions on Intelligence Technology, 2023.
Liu, X., Liu, X., Xiong, N., Luo, D., Xu, G., & Chen, X., “AAJS: An Anti-Malicious Attack Graphic Similarity Judgment System in Cloud Computing Environments,” Electronics, vol. 12, no. 9, pp. 1983, 2023.
Ping, Y., Zhan, Y., Lu, K., & Wang, B., “Public data integrity verification scheme for secure cloud storage,” Information, vol. 11, no. 9, pp. 409, 2023.
Susilo, W., Jiang, P., Lai, J., Guo, F., Yang, G., & Deng, R. H., “Sanitizable access control system for secure cloud storage against malicious data publishers,” IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 3, pp. 2138-2148, 2021.
Aslan, Ö., Ozkan-Okay, M., & Gupta, D., “A review of cloud-based malware detection system: Opportunities, advances and challenges,” European Journal of Engineering and Technology Research, vol. 6, no. 3, pp.1-8, 2021.
Aljumah, A., & Ahanger, T. A., “Cyber security threats, challenges and defence mechanisms in cloud computing,” IET communications, vol. 14, no. 7, pp. 1185-1191, 2020.
Vellela, S. S., Balamanigandan, R., & Praveen, S. P., “Strategic Survey on Security and Privacy Methods of Cloud Computing Environment,” Journal of Next Generation Technology, vol. 2, no. 1, 2022.
George, A. S., & Sagayarajan, S., “Securing Cloud Application Infrastructure: Understanding the Penetration Testing Challenges of IaaS, PaaS, and SaaS Environments,” Partners Universal International Research Journal, vol. 2, no. 1, pp. 24-34, 2023.
Jadhav, A., & Chawan, P. M., “A System for Detection and Prevention of Data Leak,” International Research Journal of engineering and Technology, pp: 471-474, 2021.
Pronika, S.S.Tyagi, “Enhancing Security of Cloud Data through Encryption with AES and Fernet Algorithm through Convolutional-Neural-Networks (CNN)”, International Journal of Computer Networks and Applications (IJCNA), vol. 8, no. 4, pp. 288-299, 2021.
Roychowdhury, S., & Singh, B. K, “A Hybrid and Multi-objective Approach for Data Leak and Tamper Detection in Healthcare Cloud Data”, In Machine Vision and Augmented Intelligence: Select Proceedings of MAI, Singapore: Springer Nature Singapore, pp: 275-285, 2023.
Mottupalli, R. K., “Augmenting the Cloud Environment Security Through Blockchain Based Hash Algorithms”, Journal of Computer Sciences Institute, vol. 26, pp. 1-6, 2023.
Rubio-Medrano, C. E., Soundrapandian, P. K. D., Hill, M., Claramunt, L., Baek, J., & Ahn, G. J., “DyPolDroid: Protecting against permission-abuse attacks in android,” Information Systems Frontiers, vol. 25, no. 2, pp. 529-548, 2023.
Song, H., Li, J., & Li, H., “A cloud secure storage mechanism based on data dispersion and encryption,” IEEE Access, vol. 9, pp. 63745-63751, 2021.
Deyannis, D., Papadogiannaki, E., Kalivianakis, G., Vasiliadis, G., & Ioannidis, S., “Trustav: Practical and privacy preserving malware analysis in the cloud”, In Proceedings of the tenth ACM conference on data and application security and privacy, pp. 39-48, 2020.
Gao, X., Hu, C., Shan, C., Liu, B., Niu, Z., & Xie, H., “Malware classification for the cloud via semi-supervised transfer learning,” Journal of Information Security and Applications, vol. 55, pp. 102661, 2020.
Qaisar, Z. H., Almotiri, S. H., Al Ghamdi, M. A., Nagra, A. A., & Ali, G., “A scalable and efficient multi-agent architecture for malware protection in data sharing over mobile cloud,” IEEE Access, vol. 9, pp. 76248-76259, 2021.
Aslan, Ö., Ozkan-Okay, M., & Gupta, D., “Intelligent behavior-based malware detection system on cloud computing environment,” IEEE Access, vol. 9, pp. 83252-83271, 2021.
Mishra, P., Aggarwal, P., Vidyarthi, A., Singh, P., Khan, B., Alhelou, H. H., & Siano, P., “VMShield: Memory introspection-based malware detection to secure cloud-based services against stealthy attacks,” IEEE Transactions on Industrial Informatics, vol. 17, no. 10, pp. 6754-6764, 2021.
Vinay J., Zuhair Bilal, Rohit K., Syed Ali Zuhaib, Dr. Mouleeswaran S. K., “Cloud based Malware Detection System,” International Journal of Engineering Research & Technology (IJERT), vol. 11, no. 5, 2022.
Ben Abdel Ouahab, I., Elaachak, L., & Bouhorma, M, “Image-based malware classification using multi-layer perceptron”, In Networking, Intelligent Systems and Security: Proceedings of NISS, Springer Singapore, pp: 453-464, 2021.
Long, Do., “Detecting malware using the MLP algorithm,” International Journal of Advanced Trends in Computer Science and Engineering, vol. 9, pp. 5640-5644, 2020.
Mohammed, A. J., Arif, M. H., & Ali, A. A., “A multilayer perceptron artificial neural network approach for improving the accuracy of intrusion detection systems,” IAES International Journal of Artificial Intelligence, vol. 9, no. 4, pp. 609-615, 2020.
Abbas, S., Sampedro, G. A., Abisado, M., Almadhor, A., Yousaf, I., & Hong, S. P., “Harris-Hawk-Optimization-Based Deep Recurrent Neural Network for Securing the Internet of Medical Thing,” Electronics, vol. 12, no. 12, pp. 2612, 2023.
Alsubai, S., Dutta, A. K., Alnajim, A. M., Ayub, R., AlShehri, A. M., & Ahmad, N., “Artificial intelligence-driven malware detection framework for internet of things environment,” PeerJ Computer Science, vol. 9, pp. 1366, 2023.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.