Enhanced Detection of Anomalous Network Behavior in Cloud - Driven Big Data Systems Using Deep Learning Models

Authors

  • Ying Lin Northern Arizona University, Flagstaff, Arizona, USA

DOI:

https://doi.org/10.53469/jtpes.2024.04(08).01

Keywords:

Deep Learning Algorithms, Network Anomaly Detection, Cloud-Based Intrusion Detection Systems, Big Data Security, Convolutional Neural Networks (CNNs)

Abstract

Our study presents a deep learning-based approach to enhancing the detection of anomalous network behavior in cloud-driven Big Data environments. The proposed model was rigorously evaluated against traditional Intrusion Detection Systems (IDS) and other machine learning models, demonstrating superior performance with an accuracy of 98.7% and a recall rate of 96.7%. The model's precision, recorded at 95.4%, further underscores its capability to significantly reduce false positives, a common challenge in network security systems. These metrics not only highlight the model’s robustness in identifying both known and emerging threats but also affirm its scalability and effectiveness in real-time applications within complex cloud infrastructures. The study contributes to the field by offering a scalable solution that leverages the computational power of deep learning to address the growing complexity of network security in cloud environments. The model’s ability to process and analyze large-scale network traffic data with high precision and recall suggests a promising direction for future developments in AI-driven cybersecurity. Furthermore, the study addresses key challenges such as computational demands and data privacy concerns, providing insights into the practical deployment of such models in real-world settings.

References

Hodo, E., Bellekens, X., Hamilton, A., Tachtatzis, C., & Atkinson, R. (2017). Shallow and deep networks intrusion detection system: A taxonomy and survey. arXiv preprint arXiv:1701.02145.

Zhong, Y., Liu, Y., Gao, E., Wei, C., Wang, Z., & Yan, C. (2024). Deep Learning Solutions for Pneumonia Detection: Performance Comparison of Custom and Transfer Learning Models. medRxiv, 2024-06.

Gu, W., Zhong, Y., Li, S., Wei, C., Dong, L., Wang, Z., & Yan, C. (2024). Predicting Stock Prices with FinBERT-LSTM: Integrating News Sentiment Analysis. arXiv preprint arXiv:2407.16150.

Alashhab, Z. R., Anbar, M., Singh, M. M., Hasbullah, I. H., Jain, P., & Al-Amiedy, T. A. (2022). Distributed denial of service attacks against cloud computing environment: survey, issues, challenges and coherent taxonomy. Applied Sciences, 12(23), 12441.

Liu, J., Li, K., Zhu, A., Hong, B., Zhao, P., Dai, S., ... & Su, H. (2024). Application of Deep Learning-Based Natural Language Processing in Multilingual Sentiment Analysis. Mediterranean Journal of Basic and Applied Sciences (MJBAS), 8(2), 243-260.

Xu, Q., Feng, Z., Gong, C., Wu, X., Zhao, H., Ye, Z., ... & Wei, C. (2024). Applications of Explainable AI in Natural Language Processing. Global Academic Frontiers, 2(3), 51-64.

Mishra, N., & Pandya, S. (2021). Internet of things applications, security challenges, attacks, intrusion detection, and future visions: A systematic review. IEEE Access, 9, 59353-59377.

Zhou, R. (2024). Understanding the Impact of TikTok's Recommendation Algorithm on User Engagement. International Journal of Computer Science and Information Technology, 3(2), 201-208.

Zhou, R. (2024). Advanced Embedding Techniques in Multimodal Retrieval Augmented Generation A Comprehensive Study on Cross Modal AI Applications. Journal of Computing and Electronic Information Management, 13(3), 16-22.

Thakkar, A., & Lohiya, R. (2021). A review on machine learning and deep learning perspectives of IDS for IoT: recent updates, security issues, and challenges. Archives of Computational Methods in Engineering, 28(4), 3211-3243.

Gao, H., Wang, H., Feng, Z., Fu, M., Ma, C., Pan, H., ... & Li, N. (2016). A novel texture extraction method for the sedimentary structures’ classification of petroleum imaging logging. In Pattern Recognition: 7th Chinese Conference, CCPR 2016, Chengdu, China, November 5-7, 2016, Proceedings, Part II 7 (pp. 161-172). Springer Singapore.

Li, W., Li, H., Gong, A., Ou, Y., & Li, M. (2018, August). An intelligent electronic lock for remote-control system based on the internet of things. In journal of physics: conference series (Vol. 1069, No. 1, p. 012134). IOP Publishing.

Lim, W., Chek, K. Y. S., Theng, L. B., & Lin, C. T. C. (2024). Future of generative adversarial networks (GAN) for anomaly detection in network security: A review. Computers & Security, 103733.

Wang, Z., Yan, H., Wei, C., Wang, J., Bo, S., & Xiao, M. (2024). Research on Autonomous Driving Decision-making Strategies based Deep Reinforcement Learning. arXiv preprint arXiv:2408.03084.

Bo, S., Zhang, Y., Huang, J., Liu, S., Chen, Z., & Li, Z. (2024). Attention Mechanism and Context Modeling System for Text Mining Machine Translation. arXiv preprint arXiv:2408.04216.

Zhang, Y., & Fan, Z. (2024). Memory and Attention in Deep Learning. Academic Journal of Science and Technology, 10(2), 109-113.

Zhang, Y., & Fan, Z. (2024). Research on Zero knowledge with machine learning. Journal of Computing and Electronic Information Management, 12(2), 105-108.

Macas, M., Wu, C., & Fuertes, W. (2022). A survey on deep learning for cybersecurity: Progress, challenges, and opportunities. Computer Networks, 212, 109032.

Xu, T. (2024). Comparative Analysis of Machine Learning Algorithms for Consumer Credit Risk Assessment. Transactions on Computer Science and Intelligent Systems Research, 4, 60-67.

Xu, T. (2024). Credit Risk Assessment Using a Combined Approach of Supervised and Unsupervised Learning. Journal of Computational Methods in Engineering Applications, 1-12.

Hindy, H., Brosset, D., Bayne, E., Seeam, A. K., Tachtatzis, C., Atkinson, R., & Bellekens, X. (2020). A taxonomy of network threats and the effect of current datasets on intrusion detection systems. IEEE Access, 8, 104650-104675.

Wang, J., Zhang, H., Zhong, Y., Liang, Y., Ji, R., & Cang, Y. (2024). Advanced Multimodal Deep Learning Architecture for Image-Text Matching. arXiv preprint arXiv:2406.15306.

Wang, J., Li, X., Jin, Y., Zhong, Y., Zhang, K., & Zhou, C. (2024). Research on image recognition technology based on multimodal deep learning. arXiv preprint arXiv:2405.03091.

Jena, S., Sahu, L. K., Mishra, D., Rao, M., & Kumar, K. V. (2022, August). Co-Resident Attack and its impact on Virtual Environment. In Journal of Physics: Conference Series (Vol. 2327, No. 1, p. 012067). IOP Publishing.

Lin, Y. (2024). Application and Challenges of Computer Networks in Distance Education. Computing, Performance and Communication Systems, 8(1), 17-24.

Lin, Y. (2024). Design of urban road fault detection system based on artificial neural network and deep learning. Frontiers in neuroscience, 18, 1369832.

Lin, Y. Discussion on the Development of Artificial Intelligence by Computer Information Technology.

Yang, J. (2024). Data-Driven Investment Strategies in International Real Estate Markets: A Predictive Analytics Approach. International Journal of Computer Science and Information Technology, 3(1), 247-258.

Yang, J. (2024). Comparative Analysis of the Impact of Advanced Information Technologies on the International Real Estate Market. Transactions on Economics, Business and Management Research, 7, 102-108.

Yang, J. (2024). Application of Business Information Management in Cross-border Real Estate Project Management. International Journal of Social Sciences and Public Administration, 3(2), 204-213.

Aly, M., Khomh, F., Haoues, M., Quintero, A., & Yacout, S. (2019). Enforcing security in Internet of Things frameworks: A systematic literature review. Internet of Things, 6, 100050.

Tu, H., Shi, Y., & Xu, M. (2023, May). Integrating conditional shape embedding with generative adversarial network-to assess raster format architectural sketch. In 2023 Annual Modeling and Simulation Conference (ANNSIM) (pp. 560-571). IEEE.

Zhang, Y., Yang, K., Wang, Y., Yang, P., & Liu, X. (2023, July). Speculative ECC and LCIM Enabled NUMA Device Core. In 2023 3rd International Symposium on Computer Technology and Information Science (ISCTIS) (pp. 624-631). IEEE.

Lun, Y. Z., D’Innocenzo, A., Smarra, F., Malavolta, I., & Di Benedetto, M. D. (2019). State of the art of cyber-physical systems security: An automatic control perspective. Journal of Systems and Software, 149, 174-216.

Wang, C., Yang, H., Chen, Y., Sun, L., Wang, H., & Zhou, Y. (2012). Identification of Image-spam Based on Perimetric Complexity Analysis and SIFT Image Matching Algorithm. JOURNAL OF INFORMATION &COMPUTATIONAL SCIENCE, 9(4), 1073-1081.

Wang, C., Sun, L., Wei, J., & Mo, X. (2012). A new trojan horse detection method based on negative selection algorithm. In Proceedings of 2012 IEEE International Conference on Oxide Materials for Electronic Engineering (OMEE) (pp. 367-369).

Wang, C., Yang, H., Chen, Y., Sun, L., Zhou, Y., & Wang, H. (2010). Identification of Image-spam Based on SIFT Image Matching Algorithm. JOURNAL OF INFORMATION &COMPUTATIONAL SCIENCE, 7(14), 3153-3160.

Nassar, A., & Kamal, M. (2021). Machine Learning and Big Data analytics for Cybersecurity Threat Detection: A Holistic review of techniques and case studies. Journal of Artificial Intelligence and Machine Learning in Management, 5(1), 51-63.

Xia, Y., Liu, S., Yu, Q., Deng, L., Zhang, Y., Su, H., & Zheng, K. (2023). Parameterized Decision-making with Multi-modal Perception for Autonomous Driving. arXiv preprint arXiv:2312.11935.

Liu, M., & Li, Y. (2023, October). Numerical analysis and calculation of urban landscape spatial pattern. In 2nd International Conference on Intelligent Design and Innovative Technology (ICIDIT 2023) (pp. 113-119). Atlantis Press.

Gupta, R., Tanwar, S., Tyagi, S., & Kumar, N. (2020). Machine learning models for secure data analytics: A taxonomy and threat model. Computer Communications, 153, 406-440.

Yao, Y. (2024, May). Design of Neural Network-Based Smart City Security Monitoring System. In Proceedings of the 2024 International Conference on Computer and Multimedia Technology (pp. 275-279).

Qiu, L., & Liu, M. (2024). Innovative Design of Cultural Souvenirs Based on Deep Learning and CAD.

Devan, M., Shanmugam, L., & Tomar, M. (2021). AI-Powered Data Migration Strategies for Cloud Environments: Techniques, Frameworks, and Real-World Applications. Australian Journal of Machine Learning Research & Applications, 1(2), 79-111.

Lin, Y. (2023). Optimization and Use of Cloud Computing in Big Data Science. Computing, Performance and Communication Systems, 7(1), 119-124.

Lin, Y. (2023). Construction of Computer Network Security System in the Era of Big Data. Advances in Computer and Communication, 4(3).

Sun, L. (2023). A New Perspective on Cybersecurity Protection: Research on DNS Security Detection Based on Threat Intelligence and Data Statistical Analysis. Computer Life, 11(3), 35-39.

Sun, L. (2024). Securing supply chains in open source ecosystems: Methodologies for determining version numbers of components without package management files. Journal of Computing and Electronic Information Management, 12(1), 32-36.

Shi, Y., Ma, C., Wang, C., Wu, T., & Jiang, X. (2024, May). Harmonizing Emotions: An AI-Driven Sound Therapy System Design for Enhancing Mental Health of Older Adults. In International Conference on Human-Computer Interaction (pp. 439-455). Cham: Springer Nature Switzerland.

Soana, V., Shi, Y., & Lin, T. A Mobile, Shape-Changing Architectural System: Robotically-Actuated Bending-Active Tensile Hybrid Modules.

Downloads

Published

2024-08-20

How to Cite

Lin, Y. (2024). Enhanced Detection of Anomalous Network Behavior in Cloud - Driven Big Data Systems Using Deep Learning Models. Journal of Theory and Practice of Engineering Science, 4(08), 1–11. https://doi.org/10.53469/jtpes.2024.04(08).01