4.8 Review

Comprehensive review on intelligent security defences in cloud: Taxonomy, security issues, ML/DL techniques, challenges and future trends

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Survey and taxonomy of information-centric vehicular networking security attacks

Mena Safwat et al.

Summary: ICN vehicular networks enhance data transmission and time sensitivity by providing features such as location-independent naming, in-network caching, name-based routing, built-in security, and high mobility. However, interacting with external networks introduces new security vulnerabilities, highlighting the importance of understanding attacks on VANETs.

AD HOC NETWORKS (2022)

Article Computer Science, Hardware & Architecture

A new intelligent multilayer framework for insider threat detection

Mohammed Nasser Al-Mhiqani et al.

Summary: This study proposed a new multilayer framework for insider threat detection, where the first layer selects the best classification model based on multiple criteria decision making methods, and the second layer introduces a hybrid insider threat detection method.

COMPUTERS & ELECTRICAL ENGINEERING (2022)

Article Computer Science, Information Systems

Privacy-Preserving cloud-Aided broad learning system

Haiyang Liu et al.

Summary: The paper introduces a secure, efficient, and verifiable outsourcing algorithm for BLS, allowing resource-constrained devices to outsource BLS algorithm to cloud server for model training while ensuring the confidentiality of client's sensitive information. It also enables client to verify the correctness of returned results with a high probability.

COMPUTERS & SECURITY (2022)

Article Computer Science, Hardware & Architecture

Deep Learning for HDD Health Assessment: An Application Based on LSTM

Aniello De Santo et al.

Summary: This article proposes an LSTM-based model combined with temporal analysis for estimating the health status of hard drives based on their time to failure. Experimental results show that this approach outperforms existing methods on multiple datasets.

IEEE TRANSACTIONS ON COMPUTERS (2022)

Article Computer Science, Artificial Intelligence

Reinforcement learning and its connections with neuroscience and psychology

Ajay Subramanian et al.

Summary: Reinforcement learning has achieved success in complex tasks, drawing inspiration from animal learning, psychology, and neuroscience. Research suggests it is a promising candidate for modeling learning and decision-making in the brain, with significant implications for advancing AI and brain science.

NEURAL NETWORKS (2022)

Article Computer Science, Software Engineering

3D Shape Segmentation Using Soft Density Peak Clustering and Semi-Supervised Learning

Zhenyu Shu et al.

Summary: This paper proposes a novel semi-supervised algorithm for 3D shape segmentation, which achieves satisfactory results by locating seed faces with simple interaction and automatically learning label information.

COMPUTER-AIDED DESIGN (2022)

Article Automation & Control Systems

Cyber Security Intrusion Detection for Agriculture 4.0: Machine Learning-Based Solutions, Datasets, and Future Directions

Mohamed Amine Ferrag et al.

Summary: This paper reviews and analyzes intrusion detection systems for Agriculture 4.0 cyber security, covering cyber security threats, evaluation metrics, and classification of intrusion detection systems based on machine learning techniques. It also introduces public datasets, implementation frameworks, and outlines challenges and future research directions in this field.

IEEE-CAA JOURNAL OF AUTOMATICA SINICA (2022)

Review Computer Science, Information Systems

Advanced digital signatures for preserving privacy and trust management in hierarchical heterogeneous IoT: Taxonomy, capabilities, and objectives

Mahdi R. Alagheband et al.

Summary: This article discusses the importance of digital signatures in security and privacy protection in IoT systems, and investigates some latest digital signature schemes to help researchers achieve higher levels of security, privacy, and unique functionalities.

INTERNET OF THINGS (2022)

Article Computer Science, Information Systems

PDLM: Privacy-Preserving Deep Learning Model on Cloud with Multiple Keys

Xindi Ma et al.

Summary: The paper discusses the successful application of deep learning in various fields and the importance of privacy issues. To address privacy concerns, a novel PDLM model is proposed to conduct deep learning training on encrypted data under multiple keys, preserving user privacy and analyzing efficiency theoretically.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2021)

Article Computer Science, Hardware & Architecture

MDCHD: A novel malware detection method in cloud using hardware trace and deep learning

Donghai Tian et al.

Summary: With the rise of cloud computing, virtualization security has become increasingly important. To defend against malware attacks in the cloud, researchers have proposed virtualization-based malware detection solutions. One novel method called MDCHD utilizes deep learning and Lamport's ring buffer algorithm to achieve acceptable detection accuracy with minimal performance cost.

COMPUTER NETWORKS (2021)

Article Computer Science, Hardware & Architecture

Security and privacy-aware Artificial Intrusion Detection System using Federated Machine Learning

K. P. Sanal Kumar et al.

Summary: This paper highlights the importance of data-driven machine learning algorithms and cybersecurity paradigms in Beyond 5G networks, proposing a new edge intelligence model mechanism and designing an intrusion detection system to monitor and protect edge networks. The experiments and comparison results demonstrate the superior optimization and security of the proposed system compared to existing edge security models.

COMPUTERS & ELECTRICAL ENGINEERING (2021)

Article Computer Science, Information Systems

A Multi-Perspective malware detection approach through behavioral fusion of API call sequence

Eslam Amer et al.

Summary: The widespread development of the malware industry poses a major threat to electronic society, hence the need for intelligent heuristic tools in malware analysis; studies show that generic behavioral graph models can effectively characterize the differences in behaviors between malicious and non-malicious processes.

COMPUTERS & SECURITY (2021)

Article Computer Science, Information Systems

Machine learning based deep job exploration and secure transactions in virtual private cloud systems

S. Rajasoundaran et al.

Summary: Virtual Private Cloud (VPC) is an emerging cloud environment used for secure data communication. Evaluation of cloud jobs and runtime cloud events is necessary for flawless VPC service. Secure job service schemes ensure elimination of attacks, unauthorized jobs, improper accesses and intrusions in VPC.

COMPUTERS & SECURITY (2021)

Article Computer Science, Information Systems

Privacy-preserving multikey computing framework for encrypted data in the cloud

Jun Zhang et al.

Summary: Preparing large amounts of training data is crucial for the success of machine learning, while privacy-preserving techniques like homomorphic encryption are proposed to address individual privacy concerns. Collaboration between different institutions is common in the era of big data, but there are risks to data privacy when encrypting data under a single key in multi-institution scenarios.

INFORMATION SCIENCES (2021)

Article Computer Science, Information Systems

Optimized extreme learning machine for detecting DDoS attacks in cloud computing

Gopal Singh Kushwah et al.

Summary: This paper proposes a DDoS attack detection system based on an improved Self-adaptive evolutionary extreme learning machine (SaE-ELM), which achieves high detection accuracy on multiple datasets. The system shows significantly improved learning and classification capabilities, outperforming other techniques in performance.

COMPUTERS & SECURITY (2021)

Article Computer Science, Artificial Intelligence

Deep-Hook: A trusted deep learning-based framework for unknown malware detection and classification in Linux cloud environments

Tom Landman et al.

Summary: Since the beginning of the 21st century, cloud computing has seen rapid growth and has become essential for most organizations' IT infrastructure. Linux-based virtual servers are popular targets for cyber-attacks, leading to the need for advanced malware detection mechanisms. Deep-Hook is proposed as a trusted framework for detecting unknown malware in Linux cloud environments.

NEURAL NETWORKS (2021)

Article Computer Science, Interdisciplinary Applications

Malicious mining code detection based on ensemble learning in cloud computing environment

Shudong Li et al.

Summary: The study proposes a method for detecting malicious mining code in cloud platforms by fusing Bagging and Boosting algorithms to construct a detection model, reducing the variance of model detection significantly and achieving higher accuracy and robustness compared to traditional classifiers. The experimental results show high values of AUC (0.992) and F1-score (0.987), with a low standard deviation of AUC values under different data inputs (0.0009).

SIMULATION MODELLING PRACTICE AND THEORY (2021)

Review Automation & Control Systems

Computing Paradigms in Emerging Vehicular Environments: A Review

Lion Silva et al.

Summary: Determining the structure of vehicular network environments can be achieved in various ways, with the evolution from VANET to IoVs and the adoption of wireless technologies and data analytics paradigms playing crucial roles. Security issues are closely linked to the characteristics of vehicular networks, showing complementarity and shared problems among them.

IEEE-CAA JOURNAL OF AUTOMATICA SINICA (2021)

Article Automation & Control Systems

Task Scheduling for Multi-Cloud Computing Subject to Security and Reliability Constraints

Qing-Hua Zhu et al.

Summary: This work proposes a novel scheduling method called matching and multi-round allocation (MMA) to optimize task completion time and total cost in a multi-cloud environment, ensuring security and reliability constraints are met.

IEEE-CAA JOURNAL OF AUTOMATICA SINICA (2021)

Article Computer Science, Artificial Intelligence

Leveraging malicious behavior traces from volatile memory using machine learning methods for trusted unknown malware detection in Linux cloud environments

Tomer Panker et al.

Summary: This paper presents the first trusted framework for detecting unknown malware in Linux VM cloud-environments using machine-learning algorithms and informative traces from volatile memory. The framework was rigorously evaluated in experiments and showed high accuracy in detecting unknown malware and categorizing them by attack category.

KNOWLEDGE-BASED SYSTEMS (2021)

Article Computer Science, Information Systems

Trust Management Systems in Cloud Services Environment: Taxonomy of Reputation Attacks and Defense Mechanisms

Salah T. Alshammari et al.

Summary: The adoption of cloud data storage has led to a new way of storing data with concerns on data security and privacy in the cloud computing environment. Researchers aim to enhance the security of data stored in cloud storage systems by integrating trust models with cryptographic access control models.

IEEE ACCESS (2021)

Review Computer Science, Information Systems

Machine learning approaches to IoT security: A systematic literature review

Rasheed Ahmad et al.

Summary: As IoT applications continue to expand, attacks on them are growing rapidly, with recent research trends emphasizing the development of models that integrate big data and machine learning technologies for better security.

INTERNET OF THINGS (2021)

Review Computer Science, Information Systems

Machine Learning for Cloud Security: A Systematic Review

Ali Bou Nassif et al.

Summary: This paper provides a Systematic Literature Review (SLR) of the techniques in Machine Learning (ML) used for securing Cloud environments. The results show that the most common Cloud security issues are related to DDoS attacks and data privacy, with the popular ML technique being Support Vector Machine (SVM). The majority of papers compared their models with others and various evaluation metrics were used, with true positive rate being the most applied metric.

IEEE ACCESS (2021)

Review Computer Science, Information Systems

A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies

Bader Alouffi et al.

Summary: Cloud computing has become a widely studied area in academia and industry, with security threats like data tampering and leakage being major concerns. This systematic literature review identified blockchain as a potential technology to address security challenges in cloud computing.

IEEE ACCESS (2021)

Article Computer Science, Hardware & Architecture

A hybrid machine learning approach for malicious behaviour detection and recognition in cloud computing

Mahdi Rabbani et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)

Article Computer Science, Hardware & Architecture

A survey on security challenges in cloud computing: issues, threats, and solutions

Hamed Tabrizchi et al.

JOURNAL OF SUPERCOMPUTING (2020)

Article Computer Science, Information Systems

Highly efficient federated learning with strong privacy preservation in cloud computing

Chen Fang et al.

COMPUTERS & SECURITY (2020)

Article Computer Science, Theory & Methods

Generalizing from a Few Examples: A Survey on Few-shot Learning

Yaqing Wang et al.

ACM COMPUTING SURVEYS (2020)

Article Computer Science, Information Systems

Voting extreme learning machine based distributed denial of service attack detection in cloud computing

Gopal Singh Kushwah et al.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2020)

Review Computer Science, Information Systems

A Review of Machine Learning Algorithms for Cloud Computing Security

Umer Ahmed Butt et al.

ELECTRONICS (2020)

Article Computer Science, Information Systems

Malware classification for the cloud via semi-supervised transfer learning

Xianwei Gao et al.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2020)

Review Computer Science, Information Systems

Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues

Shahab Shamshirband et al.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2020)

Article Telecommunications

Green Cloud Multimedia Networking: NFV/SDN Based Energy-Efficient Resource Allocation

Ahmadreza Montazerolghaem et al.

IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING (2020)

Article Computer Science, Information Systems

CICIDS-2017 Dataset Feature Analysis With Information Gain for Anomaly Detection

Kurniabudi et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Design of network threat detection and classification based on machine learning on cloud computing

Hyunjoo Kim et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)

Article Computer Science, Theory & Methods

A deep learning approach for proactive multi-cloud cooperative intrusion detection system

Adel Abusitta et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Artificial Intelligence

A machine learning based intrusion detection scheme for data fusion in mobile clouds involving heterogeneous client networks

Saurabh Dey et al.

INFORMATION FUSION (2019)

Review Chemistry, Multidisciplinary

Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey

Hongyu Liu et al.

APPLIED SCIENCES-BASEL (2019)

Review Computer Science, Information Systems

On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

Rakesh Kumar et al.

COMPUTER SCIENCE REVIEW (2019)

Article Computer Science, Information Systems

Continuous security assessment of cloud based applications using distributed hashing algorithm in SDLC

K. Vijayakumar et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)

Article Computer Science, Artificial Intelligence

Trusted detection of ransomware in a private cloud using machine learning methods leveraging meta-features from volatile memory

Aviad Cohen et al.

EXPERT SYSTEMS WITH APPLICATIONS (2018)

Article Computer Science, Theory & Methods

A Domain Partition-Based Trust Model for Unreliable Clouds

PeiYun Zhang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Information Systems

Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures

John Patrick Barrowclough et al.

SECURITY AND COMMUNICATION NETWORKS (2018)

Article Computer Science, Information Systems

An Introduction to Dew Computing: Definition, Concept and Implications

Partha Pratim Ray

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Cloud-Based Cyber-Physical Intrusion Detection for Vehicles Using Deep Learning

George Loukas et al.

IEEE ACCESS (2018)

Review Engineering, Multidisciplinary

Identity and access management in cloud environment: Mechanisms and challenges

I. Indu et al.

ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH (2018)

Proceedings Paper Computer Science, Artificial Intelligence

Security Enhancement in Healthcare Cloud using Machine Learning

Mbarek Marwan et al.

PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES (ICDS2017) (2018)

Article Computer Science, Hardware & Architecture

Virtualization layer security challenges and intrusion detection/prevention systems in cloud computing: a comprehensive review

Chirag N. Modi et al.

JOURNAL OF SUPERCOMPUTING (2017)

Article Computer Science, Hardware & Architecture

Privacy Preserving Deep Computation Model on Cloud for Big Data Feature Learning

Qingchen Zhang et al.

IEEE TRANSACTIONS ON COMPUTERS (2016)

Review Computer Science, Hardware & Architecture

A survey of security issues for cloud computing

Minhaj Ahmad Khan

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)

Article Computer Science, Theory & Methods

Secure and controllable k-NN query over encrypted cloud data with key confidentiality

Youwen Zhu et al.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2016)

Article Computer Science, Artificial Intelligence

Detection of known and unknown DDoS attacks using Artificial Neural Networks

Alan Saied et al.

NEUROCOMPUTING (2016)

Proceedings Paper Computer Science, Theory & Methods

A Study on Data Storage Security Issues in Cloud Computing

Naresh Vurukonda et al.

2ND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING, COMMUNICATION & CONVERGENCE, ICCC 2016 (2016)

Article Computer Science, Information Systems

Security in cloud computing: Opportunities and challenges

Mazhar Ali et al.

INFORMATION SCIENCES (2015)

Article Computer Science, Hardware & Architecture

Malware behavioural detection and vaccine development by using a support vector model classifier

Ping Wang et al.

JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2015)

Article Computer Science, Theory & Methods

Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing

Jiawei Yuan et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)

Article Computer Science, Information Systems

An access control model for cloud computing

Younis A. Younis et al.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2014)

Article Computer Science, Theory & Methods

A Survey of Security Issues in Hardware Virtualization

Gabor Pek et al.

ACM COMPUTING SURVEYS (2013)

Article Computer Science, Theory & Methods

A novel intrusion severity analysis approach for Clouds

Junaid Arshad et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING AND ESCIENCE (2013)

Review Computer Science, Hardware & Architecture

An intrusion detection and prevention system in cloud computing: A systematic review

Ahmed Patel et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)

Review Computer Science, Hardware & Architecture

A survey of intrusion detection techniques in Cloud

Chirag Modi et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)

Article Computer Science, Hardware & Architecture

A survey on security issues and solutions at different layers of Cloud computing

Chirag Modi et al.

JOURNAL OF SUPERCOMPUTING (2013)

Article Computer Science, Theory & Methods

A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing

Md. Tanzim Khorshed et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2012)

Article Computer Science, Theory & Methods

Addressing cloud computing security issues

Dimitrios Zissis et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING AND ESCIENCE (2012)

Article Computer Science, Theory & Methods

Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility

Rajkumar Buyya et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2009)

Article Computer Science, Information Systems

A hybrid machine learning approach to network anomaly detection

Taeshik Shon et al.

INFORMATION SCIENCES (2007)