4.7 Article

A deep learning approach for proactive multi-cloud cooperative intrusion detection system

Publisher

ELSEVIER
DOI: 10.1016/j.future.2019.03.043

Keywords

Intrusion detection systems; Deep learning; Cloud computing; Security

Funding

  1. Natural Sciences and Engineering Research Council of Canada

Ask authors/readers for more resources

The last few years have witnessed the ability of cooperative cloud-based Intrusion Detection Systems (IDS) in detecting sophisticated and unknown attacks associated with the complex architecture of the Cloud. In a cooperative setting, an IDS can consult other IDSs about suspicious intrusions and make a decision using an aggregation algorithm. However, undesired delays arise from applying aggregation algorithms and also from waiting to receive feedback from consulted IDSs. These limitations render the decisions generated by existing cooperative IDS approaches ineffective in real-time, hence making them unsustainable. To face these challenges, we propose a machine learning-based cooperative IDS that efficiently exploits the historical feedback data to provide the ability of proactive decision making. Specifically, the proposed model is based on a Denoising Autoencoder (DA), which is used as a building block to construct a deep neural network. The power of DA lies in its ability to learn how to reconstruct IDSs' feedback from partial feedback. This allows us to proactively make decisions about suspicious intrusions even in the absence of complete feedback from the IDSs. The proposed model was implemented in GPU-enabled TensorFlow and evaluated using a real-life dataset. Experimental results show that our model can achieve detection accuracy up to 95%. (C) 2019 Published by Elsevier B.V.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Information Systems

Towards Security-Based Formation of Cloud Federations: A Game Theoretical Approach

Talal Halabi, Martine Bellaiche

IEEE TRANSACTIONS ON CLOUD COMPUTING (2020)

Article Computer Science, Hardware & Architecture

Protecting the Internet of Vehicles Against Advanced Persistent Threats: A Bayesian Stackelberg Game

Talal Halabi, Omar Abdel Wahab, Ranwa Al Mallah, Mohammad Zulkernine

Summary: This article explores novel ways to launch intelligent attacks through connected vehicles, aiming to minimize the impact on road traffic services with optimal strategies. By modeling the processes of attack and defense, the article proposes solutions to address data corruption attacks and enhance the security of IoV.

IEEE TRANSACTIONS ON RELIABILITY (2021)

Article Telecommunications

A coalitional security game against data integrity attacks in autonomous vehicle networks

Anika Anwar, Talal Halabi, Mohammad Zulkernine

Summary: This paper proposes a trustworthy communication-driven vehicular collaboration framework to prevent data integrity attacks. The framework incorporates a distributed coalition formation game and a trust-based data aggregation procedure to enable dynamic joining and leaving of collaborative communities and protect against false events.

VEHICULAR COMMUNICATIONS (2022)

Proceedings Paper Computer Science, Theory & Methods

LSTM-Based Anomalous Behavior Detection in Multi-Agent Reinforcement Learning

Cameron Lischke, Tongtong Liu, Joe McCalmon, Md Asifur Rahman, Talal Halabi, Sarra Alqahtani

Summary: This paper investigates the security vulnerability in Multi-Agent Reinforcement Learning (MARL) algorithms, focusing on compromised agent attacks, and proposes a novel detection method that outperforms existing baseline models.

2022 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR) (2022)

Review Mathematics, Interdisciplinary Applications

A Review and Taxonomy on Fault Analysis in Transmission Power Systems

Yaser Al Mtawa, Anwar Haque, Talal Halabi

Summary: This study aims to provide a compact yet comprehensive review of the state-of-the-art solutions to fault analysis in transmission power systems, to help the research community in choosing suitable techniques for fault analysis.

COMPUTATION (2022)

Proceedings Paper Computer Science, Hardware & Architecture

Stealthy Data Corruption Attack Against Road Traffic Congestion Avoidance Applications

Aawista Chaudhry, Talal Halabi, Mohammad Zulkernine

Summary: This paper presents a new approach to specifically designing stealthy data corruption attacks within Intelligent Transportation Systems (ITS) and other data-reliant Cyber-Physical Systems. A Stackelberg security game is used to generate optimal attack and defense strategies. This research direction will advance the design of robust misbehavior detection systems.

52ND ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOP VOLUME (DSN-W 2022) (2022)

Proceedings Paper Computer Science, Artificial Intelligence

Optimizing the Performance of Web Applications in Mobile Cloud Computing

Jatin Patel, Talal Halabi

Summary: Cloud computing adoption is increasing, with a focus on improving performance and service quality. This paper investigates caching as a method to enhance performance in Web applications in Mobile Cloud Computing, showing that caching can speed up data retrieval by up to four times.

2021 IEEE 6TH INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD 2021) (2021)

Proceedings Paper Computer Science, Theory & Methods

Adaptive Security Risk Mitigation in Edge Computing: Randomized Defense Meets Prospect Theory

Talal Halabi

Summary: This paper addresses the challenge of ensuring the security and privacy of computations in edge computing through an adaptive approach of defense randomization. The results demonstrate that a non-deterministic defense policy yields better security compared to a static defense strategy.

2021 ACM/IEEE 6TH SYMPOSIUM ON EDGE COMPUTING (SEC 2021) (2021)

Proceedings Paper Computer Science, Information Systems

Reinforcement Learning-driven Attack on Road Traffic Signal Controllers

Najmeh Seifollahpour Arabi, Talal Halabi, Mohammad Zulkernine

Summary: Intelligent Transportation Systems utilize new technologies to provide intelligent road services and optimize decision-making, but they are vulnerable to cyber attacks, especially in dynamic TSC systems. This paper highlights the threat of intelligent attacks using DRL on TSC systems, which can lead to traffic congestion and other serious issues.

PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR) (2021)

Proceedings Paper Computer Science, Hardware & Architecture

Online Energy-efficient Resource Allocation in Cloud Computing Data Centers

Habib Ben Abdallah, Afeez Adewale Sanni, Krunal Thummar, Talal Halabi

Summary: The paper proposes an efficient algorithm for energy-efficient user allocation in data centers, comparing its performance with traditional approaches. The results show that the algorithm is significantly effective in real-time environments.

2021 24TH CONFERENCE ON INNOVATION IN CLOUDS, INTERNET AND NETWORKS AND WORKSHOPS (ICIN) (2021)

Proceedings Paper Computer Science, Artificial Intelligence

Reliability-based Formation of Cloud Federations Using Game Theory

A. B. M. Bodrul Alam, Talal Halabi, Anwar Haque, Mohammad Zulkernine

2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM) (2020)

Proceedings Paper Computer Science, Artificial Intelligence

Detecting SQL Injection Attacks in Cloud SaaS using Machine Learning

Dharitri Tripathy, Rudrarajsinh Gohil, Talal Halabi

2020 IEEE 6TH INT CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / 6TH IEEE INT CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) / 5TH IEEE INT CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS) (2020)

Proceedings Paper Computer Science, Artificial Intelligence

Predicting Future Malware Attacks on Cloud Systems using Machine Learning

Vrushang Patel, Seungho Choe, Talal Halabi

2020 IEEE 6TH INT CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / 6TH IEEE INT CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) / 5TH IEEE INT CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS) (2020)

Proceedings Paper Computer Science, Theory & Methods

Reliability-driven Task Assignment in Vehicular Crowdsourcing: A Matching Game

Talal Halabi, Mohammad Zulkernine

2019 49TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W) (2019)

Proceedings Paper Computer Science, Information Systems

Security Risk-Aware Resource Provisioning Scheme for Cloud Computing Infrastructures

Talal Halabi, Martine Bellaiche

2019 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS) (2019)

Editorial Material Computer Science, Theory & Methods

Artificial intelligence in biomedical big data and digital healthcare

Kiho Lim, Christian Esposito, Tian Wang, Chang Choi

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Editorial Material Computer Science, Theory & Methods

Cluster and cloud computing for life sciences

Jesus Carretero, Dagmar Krefting

Summary: Computational methods play a crucial role in bioinformatics and biomedicine, especially in managing large-scale data and simulating complex models. This special issue focuses on security and performance aspects in infrastructure, optimization for popular applications, and the integration of machine learning and data processing platforms to improve the efficiency and accuracy of bioinformatics.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Adaptive asynchronous federated learning

Renhao Lu, Weizhe Zhang, Qiong Li, Hui He, Xiaoxiong Zhong, Hongwei Yang, Desheng Wang, Zenglin Xu, Mamoun Alazab

Summary: Federated Learning allows collaborative training of AI models with local data, and our proposed FedAAM scheme improves convergence speed and training efficiency through an adaptive weight allocation strategy and asynchronous global update rules.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

METSM: Multiobjective energy-efficient task scheduling model for an edge heterogeneous multiprocessor system

Qiangqiang Jiang, Xu Xin, Libo Yao, Bo Chen

Summary: This paper proposes a multi-objective energy-efficient task scheduling technique (METSM) for edge heterogeneous multiprocessor systems. A mathematical model is established for the task scheduling problem, and a problem-specific algorithm (IMO) is designed for optimizing task scheduling and resource allocation. Experimental results show that the proposed algorithm can achieve optimal Pareto fronts and significantly save time and power consumption.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Editorial Material Computer Science, Theory & Methods

Preface of special issue on heterogeneous information network embedding and applications

Weimin Li, Lu Liu, Kevin I. K. Wang, Qun Jin

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Group key management in the Internet of Things: Handling asynchronicity

Mohammed Riyadh Abdmeziem, Amina Ahmed Nacer, Nawfel Moundji Deroues

Summary: Internet of Things (IoT) devices have become ubiquitous and brought the need for group communications. However, security in group communications is challenging due to the asynchronous nature of IoT devices. This paper introduces an innovative approach using blockchain technology and smart contracts to ensure secure and scalable group communications.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Multi-task peer-to-peer learning using an encoder-only transformer model

Robert Sajina, Nikola Tankovic, Ivo Ipsic

Summary: This paper presents and evaluates a novel approach that utilizes an encoder-only transformer model to enable collaboration between agents learning two distinct NLP tasks. The evaluation results demonstrate that collaboration among agents, even when working towards separate objectives, can result in mutual benefits.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

On the impact of event-driven architecture on performance: An exploratory study

Hebert Cabane, Kleinner Farias

Summary: Event-driven architecture has been widely adopted in the software industry for its benefits in software modularity and performance. However, there is a lack of empirical evidence to support its impact on performance. This study compares the performance of an event-driven application with a monolithic application and finds that the monolithic architecture consumes fewer computational resources and has better response times.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Federated Deep Learning for Wireless Capsule Endoscopy Analysis: Enabling Collaboration Across Multiple Data Centers for Robust Learning of Diverse Pathologies

Haroon Wahab, Irfan Mehmood, Hassan Ugail, Javier Del Ser, Khan Muhammad

Summary: Wireless capsule endoscopy (WCE) is a revolutionary diagnostic method for small bowel pathology. However, the manual analysis of WCE videos is cumbersome and the privacy concerns of WCE data hinder the adoption of AI-based diagnoses. This study proposes a federated learning framework for collaborative learning from multiple data centers, demonstrating improved anomaly classification performance while preserving data privacy.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

A sustainable Bitcoin blockchain network through introducing dynamic block size adjustment using predictive analytics

Maruf Monem, Md Tamjid Hossain, Md. Golam Rabiul Alam, Md. Shirajum Munir, Md. Mahbubur Rahman, Salman A. AlQahtani, Samah Almutlaq, Mohammad Mehedi Hassan

Summary: Bitcoin, the largest cryptocurrency, faces challenges in broader adaption due to long verification times and high transaction fees. To tackle these issues, researchers propose a learning framework that uses machine learning to predict the ideal block size in each block generation cycle. This model significantly improves the block size, transaction fees, and transaction approval rate of Bitcoin, addressing the long wait time and broader adaption problem.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Leveraging a visual language for the awareness-based design of interaction requirements in digital twins

Rafael Duque, Crescencio Bravo, Santos Bringas, Daniel Postigo

Summary: This paper introduces the importance of user interfaces for digital twins and presents a technique called ADD for modeling requirements of Human-DT interaction. A study is conducted to assess the feasibility and utility of ADD in designing user interfaces, using the virtualization of a natural space as a case study.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Performance analysis of parallel composite service-based applications in clouds

Xiulin Li, Li Pan, Wei Song, Shijun Liu, Xiangxu Meng

Summary: This article proposes a novel multiclass multi-pool analytical model for optimizing the quality of composite service applications deployed in the cloud. By considering embarrassingly parallel services and using differentiated parallel processing mechanisms, the model provides accurate prediction results and significantly reduces job response time.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Unraveling the MEV enigma: ABI-free detection model using Graph Neural Networks

Seongwan Park, Woojin Jeong, Yunyoung Lee, Bumho Son, Huisu Jang, Jaewook Lee

Summary: In this paper, a novel MEV detection model called ArbiNet is proposed, which offers a low-cost and accurate solution for MEV detection without requiring knowledge of smart contract code or ABIs.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

ExDe: Design space exploration of scheduler architectures and mechanisms for serverless data-processing

Sacheendra Talluri, Nikolas Herbst, Cristina Abad, Tiziano De Matteis, Alexandru Iosup

Summary: Serverless computing is increasingly used in data-processing applications. This paper presents ExDe, a framework for systematically exploring the design space of scheduling architectures and mechanisms, to help system designers tackle complexity.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

FedBnR: Mitigating federated learning Non-IID problem by breaking the skewed task and reconstructing representation

Chao Wang, Hui Xia, Shuo Xu, Hao Chi, Rui Zhang, Chunqiang Hu

Summary: This paper introduces a Federated Learning framework called FedBnR to address the issue of potential data heterogeneity in distributed entities. By breaking up the original task into multiple subtasks and reconstructing the representation using feature extractors, the framework improves the learning performance on heterogeneous datasets.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)