| ESP Journal of Engineering & Technology Advancements |
| © 2024 by ESP JETA |
| Volume 4 Issue 3 |
| Year of Publication : 2024 |
| Authors : Gaurav Sarraf, Vibhor Pal |
:10.56472/25832646/JETA-V4I3P122 |
Gaurav Sarraf, Vibhor Pal, 2024. "Adaptive Deep Learning for Identification of Real-Time Anomaly in Zero-Trust Cloud Networks", ESP Journal of Engineering & Technology Advancements 4(3): 209-218.
The zero-trust cloud networks decentralized and dynamic nature turns them into easy targets of advanced cyberattacks, and the traditional security controls are not sufficient anymore. This article introduces a self-sovereign cloud security model utilizing Convolutional Neural Network (CNN) to detect anomalies. Selected methodology utilizes CSE-CIC-IDS2018 dataset, and includes extensive preprocessing in terms of outlier elimination by Local Outlier Factor (LOF), Z-score outliers, and dimensionality reduction by Principal Component Analysis (PCA). The dataset is split into testing of 10% and 90% training data and CNN model is used to extract spatio-temporal patterns of network traffic to classify normal and malicious streams with high accuracy. It is shown through experimental findings which proposed model has a higher performance of 99.87 accuracy, 99.86% recall and precision, and a F1-score of 99.87, being better than benchmark models like the MLP-PSO, LSTM, and SVM. The findings demonstrate the strength, scalability, and usefulness of the model in offering real-time Anomaly Detection (AD) in zero-trust cloud networks.
[1] S. Saeed, S. A. Altamimi, N. A. Alkayyal, E. Alshehri, and D. A. Alabbad, “Digital Transformation and Cybersecurity Challenges for Businesses Resilience: Issues and Recommendations,” Sensors, vol. 23, no. 15, 2023, doi: 10.3390/s23156666.
[2] D. Patel, “Leveraging Blockchain and AI Framework for Enhancing Intrusion Prevention and Detection in Cybersecurity,” Tech. Int. J. Eng. Res., vol. 10, no. 6, pp. 853–858, 2023, doi: 10.56975/tijer.v10i6.158517.
[3] P. Gogoi, D. K. Bhattacharyya, B. Borah, and J. Kalita, “A Survey of Outlier Detection Methods in Network Anomaly Identification,” Comput. J., vol. 54, pp. 570–588, 2011, doi: 10.1093/comjnl/bxr026.
[4] D. Patel, “Zero Trust and DevSecOps in Cloud-Native Environments with Security Frameworks and Best Practices,” Int. J. Adv. Res. Sci. Commun. Technol., vol. 3, no. 3, pp. 454–464, Jan. 2023, doi: 10.48175/IJARSCT-11900D.
[5] V. M. L. G. Nerella, “A Database-Centric CSPM Framework for Securing Mission-Critical Cloud Workloads,” Int. J. Intell. Syst. Appl. Eng., vol. 10, no. 1, pp. 209–217, 2022.
[6] V. Verma, “Big Data and Cloud Databases Revolutionizing Business Intelligence,” TIJER, vol. 9, no. 1, pp. 48–58, 2022.
[7] S. S. Synam Neeli, “Critical Cybersecurity Strategies for Database Protection Against Cyber Attacks,” J. Artif. Intell. Mach. Learn. Data Sci., vol. 1, no. 1, Nov. 2022, doi: 0.51219/JAIMLD/sethu-sesha-synam-neeli/461.
[8] A. R. Bilipelli, “End-to-End Predictive Analytics Pipeline of Sales Forecasting in Python for Business Decision Support Systems,” Int. J. Curr. Eng. Technol., vol. 12, no. 6, pp. 819–827, 2022.
[9] W. Yeoh, M. Liu, M. Shore, and F. Jiang, “Zero trust cybersecurity: Critical success factors and A maturity assessment framework,” Comput. Secur., vol. 133, Oct. 2023, doi: 10.1016/j.cose.2023.103412.
[10] H. Kali, “The Future Of Hr Cybersecurity: Ai-Enabled Anomaly Detection In Workday Security.,” Int. J. Recent Technol. Sci. Manag., vol. 8, no. 6, 2023, doi: 10.10206/IJRTSM.2025803096.
[11] S. Srinivasan, R. Sundaram, K. Narukulla, S. Thangavel, and S. B. Venkata Naga, “Cloud-Native Microservices Architectures: Performance, Security, and Cost Optimization Strategies,” Int. J. Emerg. Trends Comput. Sci. Inf. Technol., vol. 4, no. 1, pp. 16–24, 2023, doi: 10.63282/3050-9246.ijetcsit-v4i1p103.
[12] V. Shah, “Analyzing Traffic Behavior in IoT-Cloud Systems : A Review of Analytical Frameworks,” Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol., vol. 9, no. 3, pp. 877–885, 2023, doi: 10.32628/IJSRCSEIT.
[13] K. Arshad et al., “Deep Reinforcement Learning for Anomaly Detection: A Systematic Review,” IEEE Access, vol. 10, pp. 124017–124035, 2022, doi: 10.1109/ACCESS.2022.3224023.
[14] S. H. Haji and S. Y. Ameen, “Attack and Anomaly Detection in IoT Networks using Machine Learning Techniques: A Review,” Asian J. Res. Comput. Sci., 2021, doi: 10.9734/ajrcos/2021/v9i230218.
[15] R. Sharma, C. A. Chan, and C. Leckie, “Probabilistic Distributed Intrusion Detection For Zero-Trust Multi-Access Edge Computing,” in NOMS 2023-2023 IEEE/IFIP Network Operations and Management Symposium, May 2023, pp. 1–9. doi: 10.1109/NOMS56928.2023.10154326.
[16] H. A. Hassan, E. El-Din Hemdan, M. Shokair, F. E. A. El-Samie, and W. El-Shafai, “An Efficient Attack Detection Framework in Software-Defined Networking using Intelligent Techniques,” in ICEEM 2023 - 3rd IEEE International Conference on Electronic Engineering, 2023. doi: 10.1109/ICEEM58740.2023.10319575.
[17] S. S. Khan and A. B. Mailewa, “Detecting Network Transmission Anomalies using Autoencoders-SVM Neural Network on Multi-class NSL-KDD Dataset,” in 2023 IEEE 13th Annual Computing and Communication Workshop and Conference, CCWC 2023, 2023. doi: 10.1109/CCWC57344.2023.10099056.
[18] A. Vinolia, N. Kanya, and V. N. Rajavarman, “Machine Learning and Deep Learning based Intrusion Detection in Cloud Environment: A Review,” in Proceedings - 5th International Conference on Smart Systems and Inventive Technology, ICSSIT 2023, 2023. doi: 10.1109/ICSSIT55814.2023.10060868.
[19] W. Yunanto and H. K. Pao, “User Behaviour Risk Evaluation in Zero Trust Architecture Environment,” in 2022 IEEE 8th World Forum on Internet of Things, WF-IoT 2022, 2022. doi: 10.1109/WF-IoT54382.2022.10152197.
[20] A. Srinivasan, V. Parmar, T. Oh, J. Ryoo, and M. Viglione, “Anomaly Detection System for Smart Home using Machine Learning,” in 2021 International Conference on Software Security and Assurance (ICSSA), IEEE, Nov. 2021, pp. 52–55. doi: 10.1109/ICSSA53632.2021.00018.
[21] S. Satam, P. Satam, and S. Hariri, “Multi-level Bluetooth Intrusion Detection System,” in Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA, 2020. doi: 10.1109/AICCSA50499.2020.9316514.
[22] P. Nskh, M. N. Varma, and R. R. Naik, “Principle component analysis based intrusion detection system using support vector machine,” in 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), 2016, pp. 1344–1350. doi: 10.1109/RTEICT.2016.7808050.
[23] Y. Zhang, X. Chen, L. Jin, X. Wang, and D. Guo, “Network Intrusion Detection: Based on Deep Hierarchical Network and Original Flow Data,” IEEE Access, vol. 7, pp. 37004–37016, 2019, doi: 10.1109/ACCESS.2019.2905041.
[24] H. Liu and H. Wang, “Real-Time Anomaly Detection of Network Traffic Based on CNN,” Symmetry (Basel)., vol. 15, no. 6, Jun. 2023, doi: 10.3390/sym15061205.
[25] S. Alzughaibi and S. El Khediri, “A Cloud Intrusion Detection Systems Based on DNN Using Backpropagation and PSO on the CSE-CIC-IDS2018 Dataset,” Appl. Sci., vol. 13, no. 4, 2023, doi: 10.3390/app13042276.
[26] Y.-C. Wang, Y.-C. Houng, H.-X. Chen, and S.-M. Tseng, “Network Anomaly Intrusion Detection Based on Deep Learning Approach,” Sensors, vol. 23, no. 4, p. 2171, Feb. 2023, doi: 10.3390/s23042171.
[27] P. Lin, K. Ye, and C.-Z. Xu, Dynamic Network Anomaly Detection System by Using Deep Learning Techniques. 2019. doi: 10.1007/978-3-030-23502-4.
Zero-Trust Cloud Networks, Anomaly Detection, Local Outlier Factor (LOF), Patio-Temporal Patterns, Intrusion Detection, Cybersecurity, Machine Learning (ML), Deep Learning (DL).