Gradient Fuzzy based Cyberattack Detection

International Journal of Computer Science and Engineering
© 2023 by SSRG - IJCSE Journal
Volume 10 Issue 3
Year of Publication : 2023
Authors : R. Surendiran, S. Veerapandi

pdf
How to Cite?

R. Surendiran, S. Veerapandi, "Gradient Fuzzy based Cyberattack Detection," SSRG International Journal of Computer Science and Engineering , vol. 10,  no. 3, pp. 11-16, 2023. Crossref, https://doi.org/10.14445/23488387/IJCSE-V10I3P102

Abstract:

Cloud computing is the need-based supply of computer system resources, particularly processing power and data storage, without necessitating direct and active monitoring by users. Numerous sites, each of which is a data centre, frequently host large cloud operations. A cloud assault is a cyberattack that targets a platform of cloud-based services, including hosted apps in PaaS or SaaS frameworks, storage services, and computer services. In this paper, a novel Gradient Fuzzy based Cyberattack detection in healthcare environment technique has been proposed to detect and recover the attacker. To preprocess the input NSL KDD dataset utilized for normalization and data cleaning methods to select the features extraction via CNN. Fuzzy K means clustering uses the features acquired via CNN is used for creating bounding boxes for extracted features. To identify the attack and to classify the type of attack by means of the Mobile Net technique. MATLAB implemented the simulation result. The efficiency of the suggested methodology is analyzed using the parameters like precision, Specificity, Accuracy, and recall. The performance analysis of the proposed is calculated based on the parameters like accuracy. The proposed achieves an accuracy range of 97.95%. The result shows that the proposed enhances the overall accuracy better than 37.45 %, 22.85%, and 17.07% in TPA, ITA, and EDoS.

Keywords:

Fuzzy K means clustering, Preprocessing, MATLAB, Cyberattack detection, Convolution Neural Network.

References:

[1] Waqas Ahmad et al., "Cyber Security in IoT-Based Cloud Computing: A Comprehensive Survey," Electronics, vol. 11, no. 1, p. 16, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Sangwon Hyun et al., "Interface to Network Security Functions for Cloud-Based Security Services," IEEE Communications Magazine, vol. 56, no. 1, pp. 171-178, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Isaac Odun-Ayo et al., "Cloud-Based Security Driven Human Resource Management System," Advances in Digital Technologies, pp. 96-106, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Alaeddine Mihoub et al., "Denial of Service Attack Detection and Mitigation for Internet of Things Using Looking-Back-Enabled Machine Learning Techniques," Computers & Electrical Engineering, vol. 98, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Xia Chen et al., "Distributed Resilient Control Against Denial of Service Attacks in DC Microgrids with Constant Power Load," Renewable and Sustainable Energy Reviews, vol. 153, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Ammarah Cheema et al., "Prevention Techniques against Distributed Denial of Service Attacks in Heterogeneous Networks: A Systematic Review," Security and Communication Networks, vol. 2022, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Hammond Pearce et al., "FLAW3D: A Trojan-Based Cyber Attack on the Physical Outcomes of Additive Manufacturing," IEEE/ASME Transactions on Mechatronics, vol. 27, no. 6, pp. 5361-5370, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[8] V. Bolbot et al., "Identification of Cyber-Attack Scenarios in a Marine Dual-Fuel Engine," Trends in Maritime Technology and Engineering, CRC Press, vol. 1, pp. 503-510, 2022.
[Google Scholar] [Publisher Link]
[9] Hashim Albasheer et al., "Cyber-attack Prediction Based on Network Intrusion Detection Systems for Alert Correlation Techniques: A Survey," Sensors, vol. 22, no. 4, p. 1494, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Jie Yang et al., "A Robust Active Distribution Network Defensive Strategy against Cyber‐Attack Considering Multi‐ Uncertainties," IET Generation, Transmission & Distribution, vol. 16, no. 8, pp. 1476-1488, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Karan B. Virupakshar et al., "Distributed Denial of Service (DDoS) Attacks Detection System for Openstack-Based Private Cloud," Procedia Computer Science, vol. 167, pp. 2297-2307, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Rajat Saxena, and Somnath Dey, “DDoS Attack Prevention using Collaborative Approach for Cloud Computing,” Cluster Computing, vol. 23, no. 2, pp. 1329-1344, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Daizong Liu, and Wei Hu, "Imperceptible Transfer Attack and Defense on 3D Point Cloud Classification," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 45, no. 4, pp. 4727-4746, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Theyazn H. H. Aldhyani, and Hasan Alkahtan, "Artificial Intelligence Algorithm-Based Economic Denial of Sustainability Attack Detection Systems: Cloud Computing Environments," Sensors, vol. 22, no. 13, p .4685, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Sandeep Kautish, A. Reyana, and Ankit Vidyarthi, "SDMTA: Attack Detection and Mitigation Mechanism for DDos Vulnerabilities in Hybrid Cloud Environment," IEEE Transactions on Industrial Informatics, vol. 18, no. 9, pp. 6455-6463, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[16] G. P. Dimf, P. Kumar, and K. Paul Joshua, "CNN with BI-LSTM Electricity Theft Detection based on Modified Cheetah Optimization Algorithm in Deep Learning," SSRG International Journal of Electrical and Electronics Engineering, vol. 10, no. 2, pp. 35-43, 2023.
[CrossRef] [Publisher Link]
[17] Sheetakshi Shukla, and Tasneem Bano Rehman, "VAPT & Exploits, along with Classification of Exploits," SSRG International Journal of Computer Science and Engineering, vol. 9, no. 3, pp. 1-4, 2022.
[CrossRef] [Publisher Link]
[18] S. Kannan, and T. Pushparaj, "Creation of Testbed Security using Cyber-Attacks," SSRG International Journal of Computer Science and Engineering, vol. 4, no. 11, pp. 4-14, 2017.
[CrossRef] [Publisher Link]
[19] G. P. Dimf, P. Kumar, and K. Paul Joshua, "CNN with BI-LSTM Electricity Theft Detection based on Modified Cheetah Optimization Algorithm in Deep Learning," SSRG International Journal of Electrical and Electronics Engineering, vol. 10, no. 2, pp. 35-43, 2023.
[CrossRef] [Publisher Link]
[20] Sabita Nayak, and Amit Kumar, "An Intelligent CSO-DBNN Based Cyber Intrusion Detection Model for Smart Grid Power System," International Journal of Engineering Trends and Technology, vol. 68, no. 6, pp. 50-57, 2020.
[Google Scholar] [Publisher Link]