Affiliation:
1. Department Information Technology, College of Computers and Information Technology, Taif University, Taif 21944, Saudi Arabia
Abstract
Cloud computing services have become indispensable to people’s lives. Many of their activities are performed through cloud services, from small companies to large enterprises and individuals to government agencies. It has enabled clients to use companies’ services on demand at the lowest cost anywhere, anytime, over the Internet. Despite these advantages, cloud networks are vulnerable to many types of attacks. However, as the adoption of cloud services accelerates, the risks associated with these services have also increased. For this reason, solutions have been implemented to improve cloud security, such as monitoring networks, the backbone of the cloud infrastructure, and detecting and classifying cyberattacks. Therefore, an intrusion detection system (IDS) is one of the essential defenses for detecting attacks in the cloud computing network. Current IDSs encounter some challenges in handling and simultaneously analyzing the large scale of traffic found in the cloud environment, and this affects the accuracy of cyberattack detection. Therefore, this research proposes a deep learning-based model by leveraging advanced convolutional neural networks (CNNs)-based model architecture to detect cyberattacks in the cloud environment efficiently. The proposed CNN-based model for intrusion detection consists of multiple significant stages: dataset collection, preprocessing, the SMOTE balance data strategy, feature selection, model training, testing, and performance evaluation. Experiments have demonstrated that the proposed model is highly effective in protecting cloud networks against various potential attacks. With over 98.67% accuracy, precision, and recall, the model has proven its ability to detect and classify network intrusions. Detailed analyses show that the model is proficient in securing cloud security measures and mitigating the risks associated with evolving security threats.
Reference37 articles.
1. Jouini, M., and Rabai, L.B.A. (2019). A security framework for secure cloud computing environments. Cloud security: Concepts, Methodologies, Tools, and Applications, IGI Global.
2. Saini, P.S., Behal, S., and Bhatia, S. (2020, January 12–14). Detection of DDoS attacks using machine learning algorithms. Proceedings of the 2020 7th International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India.
3. Cloud computing: A perspective study;Wang;New Gener. Comput.,2010
4. Bakro, M., Bisoy, S.K., Patel, A.K., and Naal, M.A. (2021). Performance analysis of cloud computing encryption algorithms. Advances in Intelligent Computing and Communication, Proceedings of the ICAC 2020, Colombo, Sri Lanka, 10–11 December 2020, Springer.
5. El Alloussi, H., Fetjah, L., and Sekkaki, A. (2012, January 23–24). L’état de l’art de la sécurité dans le Cloud Computing. Proceedings of the INTIS 2012, Mohammadia, Morocco.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献