Enhancing Cloud Security: An Optimization-based Deep Learning Model for Detecting Denial-of-Service Attacks

被引:0
作者
Alhazmi, Lamia [1 ]
机构
[1] Taif Univ, Coll Business Adm, Dept Management Informat Syst, POB 11099, Taif 21944, Saudi Arabia
关键词
DOS attack; cloud database; generative adversarial networks; attack detection; security threats; THE-ART; INTERNET;
D O I
10.14569/IJACSA.2023.0140737
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
DoS (Denial-of-Service) attacks pose an imminent threat to cloud services and could cause significant financial and intellectual damage to cloud service providers and their customers. DoS attacks can also result in revenue loss and security vulnerabilities due to system disruptions, interrupted services, and data breaches. However, despite machine learning methods being the research subject for detecting DoS attacks, there has not been much advancement in this area. As a consequence of this, there is a requirement for additional research in this field to create the most effective models for the detection of DoS attacks in cloud-based environments. This research paper suggests a deep convolutional generative adversarial network as an optimization-based deep learning model for identifying DoS bouts in the cloud. The proposed model employs Deep Convolutional Generative Adversarial Networks (DCGAN) to comprehend the spatial and temporal features of network traffic data, thereby enabling the attack detection of patterns indicative of DoS assaults. Furthermore, to make the DCGAN more accurate and resistant to attacks, it is trained on a massive collection of network traffic data. Moreover, the model is optimized via backpropagation and stochastic gradient descent to lessen the loss function, quantifying the gap between the simulated and observed traffic volumes. The testing findings prove that the suggested model is superior to the most recent technology methods for identifying cloud-based DoS assaults in Precision and the rate of false positives.
引用
收藏
页码:330 / 338
页数:9
相关论文
共 35 条
[1]   An Ensemble Deep Learning-Based Cyber-Attack Detection in Industrial Control System [J].
Al-Abassi, Abdulrahman ;
Karimipour, Hadis ;
Dehghantanha, Ali ;
Parizi, Reza M. .
IEEE ACCESS, 2020, 8 :83965-83973
[2]  
Alloqmani A, 2021, INT J ADV COMPUT SC, V12, P205
[3]   Managing Security of Healthcare Data for a Modern Healthcare System [J].
Almalawi, Abdulmohsen ;
Khan, Asif Irshad ;
Alsolami, Fawaz ;
Abushark, Yoosef B. B. ;
Alfakeeh, Ahmed S. S. .
SENSORS, 2023, 23 (07)
[4]   Analysis of the Exploration of Security and Privacy for Healthcare Management Using Artificial Intelligence: Saudi Hospitals [J].
Almalawi, Abdulmohsen ;
Khan, Asif Irshad ;
Alsolami, Fawaz ;
Abushark, Yoosef B. ;
Alfakeeh, Ahmed S. ;
Mekuriyaw, Walelign Dinku .
COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
[5]  
Alzaidi BS, 2022, INT J ADV COMPUT SC, V13, P76
[6]   A Time-Efficient Approach Toward DDoS Attack Detection in IoT Network Using SDN [J].
Bhayo, Jalal ;
Jafaq, Riaz ;
Ahmed, Awais ;
Hameed, Sufian ;
Shah, Syed Attique .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (05) :3612-3630
[7]   Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis [J].
Ferrag, Mohamed Amine ;
Friha, Othmane ;
Maglaras, Leandros ;
Janicke, Helge ;
Shu, Lei .
IEEE ACCESS, 2021, 9 :138509-138542
[8]   State of the art of autonomous agricultural off-road vehicles driven by renewable energy systems [J].
Ghobadpour, Amin ;
Boulon, Loic ;
Mousazadeh, Hossein ;
Malvajerdi, Ahmad Sharifi ;
Rafiee, Shahin .
EMERGING AND RENEWABLE ENERGY: GENERATION AND AUTOMATION, 2019, 162 :4-13
[9]   Deep learning disease prediction model for use with intelligent robots [J].
Koppu, Srinivas ;
Maddikunta, Praveen Kumar Reddy ;
Srivastava, Gautam .
COMPUTERS & ELECTRICAL ENGINEERING, 2020, 87
[10]   A distributed intrusion detection system to detect DDoS attacks in blockchain-enabled IoT network [J].
Kumar, Randhir ;
Kumar, Prabhat ;
Tripathi, Rakesh ;
Gupta, Govind P. ;
Garg, Sahil ;
Hassan, Mohammad Mehedi .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2022, 164 :55-68