A machine learning based intrusion detection scheme for data fusion in mobile clouds involving heterogeneous client networks

Abstract The combination of traditional cloud computing and mobile computing leads to the novel paradigm of mobile cloud computing. Due to the mobility of network nodes in mobile cloud computing, security has been a challenging problem of paramount importance. When a mobile cloud involves heterogeneous client networks, such as Wireless Sensor Networks and Vehicular Networks, the security problem becomes more challenging because the client networks often have different security requirements in terms of computational complexity, power consumption, and security levels. To securely collect and fuse the data from heterogeneous client networks in complex systems of this kind, novel security schemes need to be devised. Intrusion detection is one of the key security functions in mobile clouds involving heterogeneous client networks. A variety of different rule-based intrusion detection methods could be employed in this type of systems. However, the existing intrusion detection schemes lead to high computation complexity or require frequent rule updates, which seriously harms their effectiveness. In this paper, we propose a machine learning based intrusion detection scheme for mobile clouds involving heterogeneous client networks. The proposed scheme does not require rule updates and its complexity can be customized to suit the requirements of the client networks. Technically, the proposed scheme includes two steps: multi-layer traffic screening and decision-based Virtual Machine (VM) selection. Our experimental results indicate that the proposed scheme is highly effective in terms of intrusion detection.

[1]  Eryk Dutkiewicz,et al.  Cyberattack detection in mobile cloud computing: A deep learning approach , 2017, 2018 IEEE Wireless Communications and Networking Conference (WCNC).

[2]  Kai Hwang,et al.  Cloudlet Mesh for Securing Mobile Clouds from Intrusions and Network Attacks , 2015, 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering.

[3]  Thomas Magedanz,et al.  Utilizing M2M Technologies for Building Reliable Smart Cities , 2014, 2014 6th International Conference on New Technologies, Mobility and Security (NTMS).

[4]  F. E. Grubbs Procedures for Detecting Outlying Observations in Samples , 1969 .

[5]  E. Anita,et al.  A survey on data breach challenges in cloud computing security: Issues and threats , 2017, 2017 International Conference on Circuit ,Power and Computing Technologies (ICCPCT).

[6]  Michael Stonebraker,et al.  Data Curation at Scale: The Data Tamer System , 2013, CIDR.

[7]  Georgia Sakellari,et al.  Cloud-Based Cyber-Physical Intrusion Detection for Vehicles Using Deep Learning , 2018, IEEE Access.

[8]  Vrinda Tokekar,et al.  An approach to analyze the impact of DDOS attack on mobile cloud computing , 2017, 2017 International Conference on Information, Communication, Instrumentation and Control (ICICIC).

[9]  Yu Zheng,et al.  Methodologies for Cross-Domain Data Fusion: An Overview , 2015, IEEE Transactions on Big Data.

[10]  Thomas H. Morris,et al.  Developing a Hybrid Intrusion Detection System Using Data Mining for Power Systems , 2015, IEEE Transactions on Smart Grid.

[11]  Michael Stonebraker,et al.  Text and structured data fusion in data tamer at scale , 2014, 2014 IEEE 30th International Conference on Data Engineering.

[12]  Abdul Razaque,et al.  Intelligent intrusion detection system using clustered self organized map , 2018, 2018 Fifth International Conference on Software Defined Systems (SDS).

[13]  Muttukrishnan Rajarajan,et al.  Host-Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection , 2016, IEEE Transactions on Vehicular Technology.

[14]  Zhiyuan Ma,et al.  Autonomous mobile agent based intrusion detection framework in wireless body area networks , 2015, 2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[15]  Felix Naumann,et al.  Data fusion , 2009, CSUR.

[16]  Hovav Shacham,et al.  Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.

[17]  Andreas Hotho,et al.  IP2Vec: Learning Similarities Between IP Addresses , 2017, 2017 IEEE International Conference on Data Mining Workshops (ICDMW).

[18]  Bijoy Antony Jose,et al.  Performance analysis of virtualized embedded computing systems , 2017, 2017 7th International Symposium on Embedded Computing and System Design (ISED).

[19]  Schahram Dustdar,et al.  Winds of Change: From Vendor Lock-In to the Meta Cloud , 2013, IEEE Internet Computing.

[20]  Sven Hartmann,et al.  Cyber security challenges: An efficient intrusion detection system design , 2018, 2018 International Young Engineers Forum (YEF-ECE).

[21]  Lior Rokach,et al.  Decision forest: Twenty years of research , 2016, Inf. Fusion.

[22]  Liping Li,et al.  An Approach to Verifying Data Integrity for Cloud Storage , 2017, 2017 13th International Conference on Computational Intelligence and Security (CIS).

[23]  Feng Tian,et al.  Critical review of vendor lock-in and its impact on adoption of cloud computing , 2014, International Conference on Information Society (i-Society 2014).

[24]  Vic Grout,et al.  Reducing Packet Delay through Filter Merging , 2016, 2016 IEEE/ACM 9th International Conference on Utility and Cloud Computing (UCC).

[25]  Rajni Ranjan Singh Makwana,et al.  Feature selection based intrusion detection system using the combination of DBSCAN, K-Mean++ and SMO algorithms , 2017, 2017 International Conference on Trends in Electronics and Informatics (ICEI).

[26]  Dina Moloja,et al.  Towards a cloud intrusion detection and prevention system for M-voting in South Africa , 2017, 2017 International Conference on Information Society (i-Society).

[27]  Yoonhee Kim,et al.  A Hybrid Cloud Resource Clustering Method Using Analysis of Application Characteristics , 2017, 2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems (FAS*W).

[28]  Jason Nieh,et al.  ARM Virtualization: Performance and Architectural Implications , 2016, 2016 ACM/IEEE 43rd Annual International Symposium on Computer Architecture (ISCA).

[29]  Debasish Jana,et al.  Efficient management of security and privacy issues in mobile cloud environment , 2013, 2013 Annual IEEE India Conference (INDICON).

[30]  J. Nithisha,et al.  An intelligent packet forwarding in router using self learning classifier , 2017, 2017 Third International Conference on Science Technology Engineering & Management (ICONSTEM).

[31]  Liu Yan,et al.  Multi-sensor data fusion system based on Apache Storm , 2017, 2017 3rd IEEE International Conference on Computer and Communications (ICCC).