DS Journal of Cyber Security (DS-CYS)

Research Article | Open Access | Download Full Text

Volume 1 | Issue 1 | Year 2023 | Article Id: CYS-V1I1P105 DOI: https://doi.org/10.59232/CYS-V1I1P105

Cyberattack Detection via Artificial Intelligence in Cloud Computing Environment

N.Suresh

ReceivedRevisedAcceptedPublished
04 Jun 202316 Jun 202302 Jul 202305 Jul 2023

Citation

N.Suresh. “Cyberattack Detection via Artificial Intelligence in Cloud Computing Environment.” DS Journal of Cyber Security, vol. 1, no. 1, pp. 46-52, 2023.

Abstract

Cyberattack detection is the ability of IT firms to quickly and efficiently identify threats to the network, apps, or other network assets. The first step in creating a successful cyber detection and response strategy is understanding the risks that exist in the online environment. In cyberspace, every method utilised to defend a business's assets, personnel, and operations from online threats is referred to as cyber security. Due to more complex networks and more frequent and sophisticated attacks, organisations need various cyber security solutions to reduce their cyber risk. A deep learning-based cyberattack detection system is proposed in this paper for detecting cyberattacks in cloud environments. Prior to reducing the dimensions, independent component analysis is used to extract the relevant characteristics. As a result, LSTM with multi-head attention is used to categorise different sorts of cyberattacks. The deep learning model's energy usage and detection time will be assessed and contrasted with alternative approaches. We demonstrate through experimental findings that our suggested framework not only distinguishes various cyberattacks but also achieves a high level of detection accuracy (up to 99.1%).

Keywords

Cyber security, Cyberattack, Intrusion detection, Dimension reduction, Multi-Head LSTM, Deep Learning.

References

[1] Avinash Kumar et al., "Sarcasm Detection Using Multi-Head Attention Based Bidirectional LSTM," IEEE Access, vol. 8, pp. 6388-6397, 2020.

[CrossRef] [Google Scholar] [Publisher Link]

[2] Jamal Raiyn, "A Survey of Cyber-Attack Detection Strategies," International Journal of Security and Its Applications, vol. 8, no. 1, pp. 247-256, 2014.

[CrossRef] [Google Scholar] [Publisher Link]

[3] Alfonso Valdes, and Keith Skinner, "Adaptive, Model-Based Monitoring for Cyber-Attack Detection," Recent Advances in Intrusion Detection, RAID 2000, vol. 1907, pp. 80-93, 2000.

[CrossRef] [Publisher Link]

[4] Shailendra Singh, and Sanjay Silakari, "A Survey of Cyber-Attack Detection Systems," International Journal of Computer Science and Network Security, vol. 9, no. 5, pp. 1-10, 2009.

[Google Scholar] [Publisher Link]

[5] Nong Ye, Yebin Zhang, and C. M. Borror, "Robustness of the Markov-Chain Model for Cyber-Attack Detection," IEEE Transactions on Reliability, vol. 53, no. 1, pp. 116-123, 2004.

[CrossRef] [Google Scholar] [Publisher Link]

[6] Eman Mousavinejad et al., "A Novel Cyber-Attack Detection Method in Networked Control Systems," IEEE Transactions on Cybernetics, vol. 48, no. 11, pp. 3254-3264, 2018.

[CrossRef] [Google Scholar] [Publisher Link]

[7] Noam Ben-Asher, and Cleotilde Gonzalez, "Effects of Cyber Security Knowledge on Attack Detection," Computers in Human Behavior, vol. 48, pp. 51-61, 2015.

[CrossRef] [Google Scholar] [Publisher Link]

[8] Usman Inayat et al., "Learning-Based Methods for Cyber-Attacks Detection in IoT Systems: A Survey on Methods, Analysis, and Future Prospects," Electronics, vol. 11, no. 9, 2022.

[CrossRef] [Google Scholar] [Publisher Link]

[9] Hadis Karimipour et al., "A Deep and Scalable Unsupervised Machine Learning System for Cyber-Attack Detection in Large-Scale Smart Grids," IEEE Access, vol. 7, pp. 80778-80788, 2019.

[CrossRef] [Google Scholar] [Publisher Link]

[10] Abdulrahman Al-Abassi et al., "An Ensemble Deep Learning-Based Cyber-Attack Detection in Industrial Control System," IEEE Access, vol. 8, pp. 83965-83973, 2020.

[CrossRef] [Google Scholar] [Publisher Link]

[11] Rupinder Paul Khandpur et al., "Crowdsourcing Cybersecurity: Cyber-Attack Detection Using Social Media," CIKM '17: Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, pp. 1049-1057, 2017.

[CrossRef] [Google Scholar] [Publisher Link]

Cyberattack Detection via Artificial Intelligence in Cloud Computing Environment