Detection of Malicious Cloud Bandwidth Consumption in Cloud Computing Using Machine Learning Techniques.

Journal: Computational intelligence and neuroscience
Published Date:

Abstract

The Internet of Things, sometimes known as IoT, is a relatively new kind of Internet connectivity that connects physical objects to the Internet in a way that was not possible in the past. The Internet of Things is another name for this concept (IoT). The Internet of Things has a larger attack surface as a result of its hyperconnectivity and heterogeneity, both of which are characteristics of the IoT. In addition, since the Internet of Things devices are deployed in managed and uncontrolled contexts, it is conceivable for malicious actors to build new attacks that target these devices. As a result, the Internet of Things (IoT) requires self-protection security systems that are able to autonomously interpret attacks in IoT traffic and efficiently handle the attack scenario by triggering appropriate reactions at a pace that is faster than what is currently available. In order to fulfill this requirement, fog computing must be utilised. This type of computing has the capability of integrating an intelligent self-protection mechanism into the distributed fog nodes. This allows the IoT application to be protected with the least amount of human intervention while also allowing for faster management of attack scenarios. Implementing a self-protection mechanism at malicious fog nodes is the primary objective of this research work. This mechanism should be able to detect and predict known attacks based on predefined attack patterns, as well as predict novel attacks based on no predefined attack patterns, and then choose the most appropriate response to neutralise the identified attack. In the environment of the IoT, a distributed Gaussian process regression is used at fog nodes to anticipate attack patterns that have not been established in the past. This allows for the prediction of new cyberattacks in the environment. It predicts attacks in an uncertain IoT setting at a speedier rate and with greater precision than prior techniques. It is able to effectively anticipate both low-rate and high-rate assaults in a more timely manner within the dispersed fog nodes, which enables it to mount a more accurate defence. In conclusion, a fog computing-based self-protection system is developed to choose the most appropriate reaction using fuzzy logic for detected or anticipated assaults using the suggested detection and prediction mechanisms. This is accomplished by utilising a self-protection system that is based on the development of a self-protection system that utilises the suggested detection and prediction mechanisms. The findings of the experimental investigation indicate that the proposed system identifies threats, lowers bandwidth usage, and thwarts assaults at a rate that is twenty-five percent faster than the cloud-based system implementation.

Authors

  • Duggineni Veeraiah
    Department of CSE, Lakireddy Bali Reddy College of Engineering (Autonomous), Mylavaram 521230, NTR District, Andhra Pradesh, India.
  • Rajanikanta Mohanty
    Department of CSE-SP FET, Jain University, Bangalore, Karnataka, India.
  • Shakti Kundu
    Directorate of Online Education, Manipal University Jaipur, Jaipur, Rajasthan, India.
  • Dharmesh Dhabliya
    Department of Information Technology, Vishwakarma Institute of Information Technology, Pune, Maharashtra, India.
  • Mohit Tiwari
    Department of Computer Science and Engineering, Bharati Vidyapeeth's College of Engineering, Delhi, India.
  • Sajjad Shaukat Jamal
    Department of Mathematics, College of Science, King Khalid University, Abha 61413, Saudi Arabia.
  • Awal Halifa
    Kwame Nkrumah University of Science and Technology, Kumasi, Ghana.