Detection of Malicious Cloud Bandwidth Consumption in Cloud Computing Using Machine Learning Techniques

Author:

Veeraiah Duggineni12,Mohanty Rajanikanta3,Kundu Shakti4,Dhabliya Dharmesh5,Tiwari Mohit6,Jamal Sajjad Shaukat7ORCID,Halifa Awal89ORCID

Affiliation:

1. Department of CSE, Lakireddy Bali Reddy College of Engineering (Autonomous), Mylavaram 521230, NTR District, Andhra Pradesh, India

2. Jawaharlal Nehru Technological University Kakinada, Kakinada, East Godavari, India

3. Department of CSE-SP FET, Jain University, Bangalore, Karnataka, India

4. Directorate of Online Education, Manipal University Jaipur, Jaipur, Rajasthan, India

5. Department of Information Technology, Vishwakarma Institute of Information Technology, Pune, Maharashtra, India

6. Department of Computer Science and Engineering, Bharati Vidyapeeth’s College of Engineering, Delhi, India

7. Department of Mathematics, College of Sciences, King Khalid University, Abha, Saudi Arabia

8. Kwame Nkrumah University of Science and Technology, Kumasi, Ghana

9. Department of Electrical and Electronics Engineering, Tamale Technical University, Tamale, Ghana

Abstract

The Internet of Things, sometimes known as IoT, is a relatively new kind of Internet connectivity that connects physical objects to the Internet in a way that was not possible in the past. The Internet of Things is another name for this concept (IoT). The Internet of Things has a larger attack surface as a result of its hyperconnectivity and heterogeneity, both of which are characteristics of the IoT. In addition, since the Internet of Things devices are deployed in managed and uncontrolled contexts, it is conceivable for malicious actors to build new attacks that target these devices. As a result, the Internet of Things (IoT) requires self-protection security systems that are able to autonomously interpret attacks in IoT traffic and efficiently handle the attack scenario by triggering appropriate reactions at a pace that is faster than what is currently available. In order to fulfill this requirement, fog computing must be utilised. This type of computing has the capability of integrating an intelligent self-protection mechanism into the distributed fog nodes. This allows the IoT application to be protected with the least amount of human intervention while also allowing for faster management of attack scenarios. Implementing a self-protection mechanism at malicious fog nodes is the primary objective of this research work. This mechanism should be able to detect and predict known attacks based on predefined attack patterns, as well as predict novel attacks based on no predefined attack patterns, and then choose the most appropriate response to neutralise the identified attack. In the environment of the IoT, a distributed Gaussian process regression is used at fog nodes to anticipate attack patterns that have not been established in the past. This allows for the prediction of new cyberattacks in the environment. It predicts attacks in an uncertain IoT setting at a speedier rate and with greater precision than prior techniques. It is able to effectively anticipate both low-rate and high-rate assaults in a more timely manner within the dispersed fog nodes, which enables it to mount a more accurate defence. In conclusion, a fog computing-based self-protection system is developed to choose the most appropriate reaction using fuzzy logic for detected or anticipated assaults using the suggested detection and prediction mechanisms. This is accomplished by utilising a self-protection system that is based on the development of a self-protection system that utilises the suggested detection and prediction mechanisms. The findings of the experimental investigation indicate that the proposed system identifies threats, lowers bandwidth usage, and thwarts assaults at a rate that is twenty-five percent faster than the cloud-based system implementation.

Funder

King Khalid University

Publisher

Hindawi Limited

Subject

General Mathematics,General Medicine,General Neuroscience,General Computer Science

Reference35 articles.

1. Lineswitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling Dos Attacks;M. Ambrosin

2. Flow-Based Management For Energy Efficient Campus Networks

3. A Cloud-Based Machine Learning Approach to Reduce Noise in ECG Arrhythmias for Smart Healthcare Services;P. Jain;Computational Intelligence and Neuroscience,2022

4. Handling Intrusion and DDoS Attacks in Software-Defined Networks Using Machine Learning Techniques;J. S. Ashraf

5. Novel framework based on deep learning and cloud analytics for smart patient monitoring and recommendation (SPMR)

Cited by 5 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Enhancement of Energy Utilization by Reliable Routing and Secure Data Transmission in Heterogeneous WSN;2023 IEEE 4th Annual Flagship India Council International Subsections Conference (INDISCON);2023-08-05

2. Enhancement of Voice Quality and System Capacity by Error Detection and Correction Method in Wireless Digital Communication;2023 IEEE 4th Annual Flagship India Council International Subsections Conference (INDISCON);2023-08-05

3. A Comparative Study of Artificial Intelligence and Machine Learning In 5G Innovation;2022 International Conference on Futuristic Technologies (INCOFT);2022-11-25

4. Analysis of the Integration of 5G with Artificial Intelligence;2022 International Conference on Futuristic Technologies (INCOFT);2022-11-25

5. An Evaluation of Intelligent Network Data Analytics Based on Machine Learning In 5G Data Networks;2022 International Conference on Futuristic Technologies (INCOFT);2022-11-25

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3