Volume 14 , Issue 2 , PP: 62-77, 2025 | Cite this article as | XML | Html | PDF | Full Length Article
Alaa Q. Raheema 1 *
Doi: https://doi.org/10.54216/JISIoT.140206
Deep learning offers practical answers for neural network models when applied to cloud registering security. Via robotization Distinguish dangers, decrease manual checking, and further develop in general security adequacy. Deep learning network models assume a pivotal part in security errands like interruption discovery, malware identification, anomaly recognition, and log examination. requires Deep Learning mix in cloud security cautiously assesses existing frameworks, characterizes goals, chooses dataset with arrangement, model tuning and last changes for consistence. Moreover, applying deep learning methods in cloud security requires thought of variables, for example, computational assets, information assortment, arrangement costs, model turn of events, mix endeavors, and continuous observing and support. This study proposes an artificial neural network (ANN) model portrayal in the cloud to track down cloud security parts and recreate security techniques and researches the essential moves toward coordinate these models in the cloud. Regarding that the adequacy of the ANN scheme relies upon cloud parameters like the nature of the preparation information and the network architecture Also, weight change calculations. The review emploies a dataset from Kaggle.com to approve the recreation and blueprints the means Partake in preparing and assessment of the ANN structure.
Cloud Computing , Artificial Neural Networks , Anomally Detection , Network Security , Deep Learning
[1] Agarwal, N.; Hussain, S. Z. (2018). A Closer Look at Intrusion Detection System for Web Applications. Security and Communication Networks, 2018, pp 1-27.
[2] Manthiramoorthy, C., Khan, K. M. S., & A, N. A. (2023). Comparing Several Encrypted Cloud Storage Platforms. International Journal of Mathematics, Statistics, and Computer Science, 2, 44–62. https://doi.org/10.59543/ijmscs.v2i.7971.
[3] Somani, G.; Gaur, M. S.; Sanghi, D.; Conti, M.; Buyya, R. (2017). DDoS attacks in cloud computing: Issues, taxonomy, and future directions. Computer Communications 107, pp. 30-48..
[4] Firas Mahdi Muhsin Al-Salbi, “Investigation of QoS Multicast Routing Based on Intelligent Multiple Constrained”, www.ccsenet.org/cis Computer and Information Science Vol. 4, No. 4; July 2011, 64 ISSN 1913-8989 E-ISSN 1913-8997
[5] Deshpande, P.; Sharma, S. C.; Peddoju, S. K.; Junaid. S. (2018). HIDS: A host based intrusion detection system for cloud computing environment. International Journal of System Assurance Engineering and Management 9(3), pp. 567-576.
[6] Seyed Mohammad Mousavi and Marc St-Hilaire, (2019). Early detection of DDoS attacks against SDN controllers. In Computing, Networking and Communications (ICNC), 2019 International Conference on, pages 77–81. IEEE.
[7] Jun Li, (2018). Drawbridge: software-defined ddos-resistant traffic engineering. In ACM SIGCOMM Computer Communication Review, volume 44, pages 591–592. ACM.
[8] Li, S. H., Kao, Y. C., Zhang, Z. C., Chuang, Y. P., & Yen, D. C. (2015). A network behavior-based botnet detection mechanism using PSO and K-means, ACM Transactions on Management Information Systems (TMIS), 6(1), 3.
[9] Prasad, K. M., Reddy, A. R. M., & Rao, K. V. (2018). DoS and DDoS attacks: defense, detection and traceback mechanisms-a survey. Global Journal of Computer Science and Technology.
[10] Aggarwal, A., & Gupta, A. (2015). Survey on data mining and IP traceback technique in DDoS attack. International Journal of Engineering and Computer Science, 4(06).
[11] Somani, G., Gaur, M. S., Sanghi, D., Conti, M., & Buyya, R. (2017). DDoS attacks in cloud computing: Issues, taxonomy, and future directions. Computer Communications, 107, 30-48.
[12] Kostas Giotis, et. al., (2017). Combining openflow and sflow for an effective and scalable anomaly detection and mitigation mechanism on sdn environments. Computer Networks, 62:122–136, 2017.
[13] Z. Zhu, J. Peng, K. Liu, and X. Zhang, “A game-based resource pricing and allocation mechanism for profit maximization in cloud computing,” Soft comput, vol. 24, no. 6, pp. 4191–4203, Mar. 2020, doi: 10.1007/s00500-019-04183-0.
[14] M. Manavi, Y. Zhang, and G. Chen, “Resource Allocation in Cloud Computing Using Genetic Algorithm and Neural Network,” Aug. 2023, [Online]. Available: http://arxiv.org/abs/2308.11782
[15] N. Swatthong and C. Aswakul, “Optimal cloud orchestration model of containerized task scheduling strategy using integer linear programming: Case studies of iotcloudserve@tein project,” Energies (Basel), vol. 14, no. 15, Aug. 2021, doi: 10.3390/en14154536.
[16] M. Yadav and A. Mishra, “An enhanced ordinal optimization with lower scheduling overhead based novel approach for task scheduling in cloud computing environment,” Journal of Cloud Computing, vol. 12, no. 1, Dec. 2023, doi: 10.1186/s13677-023-00392-z.
[17] K. Y. Tai, F. Y. S. Lin, and C. H. Hsiao, “An Integrated Optimization-Based Algorithm for Energy Efficiency and Resource Allocation in Heterogeneous Cloud Computing Centers,” IEEE Access, vol. 11, pp. 53418–53428, 2023, doi: 10.1109/ACCESS.2023.3280930.
[18] M. S. Al-Asaly, M. A. Bencherif, A. Alsanad, and M. M. Hassan, “A deep learning-based resource usage prediction model for resource provisioning in an autonomic cloud computing environment,” Neural Comput Appl, vol. 34, no. 13, pp. 10211–10228, Jul. 2022, doi: 10.1007/s00521-021-06665-5.
[19] M. Ghobaei-Arani and A. Souri, “LP-WSC: a linear programming approach for web service composition in geographically distributed cloud environments,” Journal of Supercomputing, vol. 75, no. 5, pp. 2603–2628, May 2019, doi: 10.1007/s11227-018-2656-3.
[20] F. Yao, C. Pu, and Z. Zhang, “Task duplication-based scheduling algorithm for budget-constrained workflows in cloud computing,” IEEE Access, vol. 9, pp. 37262–37272, 2021, doi: 10.1109/ACCESS.2021.3063456.
[21] P. S. Rawat, P. Dimri, S. Kanrar, and G. P. Saroha, “Optimize Task Allocation in Cloud Environment Based on Big-Bang Big-Crunch,” Wirel Pers Commun, vol. 115, no. 2, pp. 1711–1754, Nov. 2020, doi: 10.1007/s11277-020-07651-1.
[22] W. Shi, D. Tang, and P. Zou, “Research on cloud enterprise resource integration and scheduling technology based on mixed set programming,” Tehnicki Vjesnik, vol. 28, no. 6, pp. 2027–2035, Nov. 2021, doi: 10.17559/TV-20210718091658.
[23] L. Zhu, F. Wu, Y. Hu, K. Huang, and X. Tian, “A heuristic multi-objective task scheduling framework for container-based clouds via actor-critic reinforcement learning,” Neural Comput Appl, vol. 35, no. 13, pp. 9687–9710, May 2023, doi: 10.1007/s00521-023-08208-6.
[24] L. Hamid, A. Jadoon, and H. Asghar, “Comparative analysis of task level heuristic scheduling algorithms in cloud computing,” Journal of Supercomputing, vol. 78, no. 11, pp. 12931–12949, Jul. 2022, doi: 10.1007/s11227-022-04382-x.
[25] S. C. Nayak, S. Parida, C. Tripathy, and P. K. Pattnaik, “An enhanced deadline constraint based task scheduling mechanism for cloud environment,” Journal of King Saud University - Computer and Information Sciences, vol. 34, no. 2, pp. 282–294, Feb. 2022, doi: 10.1016/j.jksuci.2018.10.009.
[26] S. Mangalampalli, G. R. Karri, M. Kumar, O. I. Khalaf, C. A. T. Romero, and G. M. A. Sahib, “DRLBTSA: Deep reinforcement learning based task-scheduling algorithm in cloud computing,” Multimed Tools Appl, vol. 83, no. 3, pp. 8359–8387, Jan. 2024, doi: 10.1007/s11042-023-16008-2.
[27] R. Mishra and M. Gupta, “Cloud Scheduling Heuristic Approaches for Load Balancing in Cloud Computing,” in 2023 6th International Conference on Information Systems and Computer Networks, ISCON 2023, Institute of Electrical and Electronics Engineers Inc., 2023. doi: 10.1109/ISCON57294.2023.10112056.
[28] P. Banerjee et al., “MTD-DHJS: Makespan-Optimized Task Scheduling Algorithm for Cloud Computing with Dynamic Computational Time Prediction,” IEEE Access, vol. 11, pp. 105578–105618, 2023, doi: 10.1109/ACCESS.2023.3318553.
[29] T. Dokeroglu, T. Kucukyilmaz, and E. G. Talbi, “Hyper-heuristics: A survey and taxonomy,” Comput Ind Eng, vol. 187, Jan. 2024, doi: 10.1016/j.cie.2023.109815.
[30] Q.-Z. Xiao, J. Zhong, L. Feng, L. Luo, and J. Lv, “A Cooperative Coevolution Hyper-Heuristic Framework for Workflow Scheduling Problem.”
[31] J. H. Drake, A. Kheiri, E. Özcan, and E. K. Burke, “Recent advances in selection hyper-heuristics,” Sep. 01, 2020, Elsevier B.V. doi: 10.1016/j.ejor.2019.07.073.
[32] T. M. Shami, D. Grace, A. Burr, and P. D. Mitchell, “Single candidate optimizer: a novel optimization algorithm,” Evol Intell, Apr. 2022, doi: 10.1007/s12065-022-00762-7.
[33] G. R. Raidl, J. Puchinger, C. Blum, G. R. Raidl, J. Puchinger, and C. Blum, “Metaheuristic Hybrids.”
[34] T. Dokeroglu, E. Sevinc, T. Kucukyilmaz, and A. Cosar, “A survey on new generation metaheuristic algorithms,” Comput Ind Eng, vol. 137, Nov. 2019, doi: 10.1016/j.cie.2019.106040.
[35] K. G. Krishnasamy, K. Periasamy, P. M. Veerappan, G. Thangavel, R. Lamba, and S. Muthusamy, “A Pair-Task Heuristic for Scheduling Tasks in Heterogeneous Multi-Cloud Environment,” 2022, doi: 10.21203/rs.3.rs-1903846/v1.
[36] J. Chen, T. Du, and G. Xiao, “A multi-objective optimization for resource allocation of emergent demands in cloud computing,” Journal of Cloud Computing, vol. 10, no. 1, Dec. 2021, doi: 10.1186/s13677-021-00237-7.
[37] M. Ibrahim, S. Nabi, A. Baz, N. Naveed, and H. Alhakami, “Towards a task and resource aware task scheduling in Cloud Computing: An experimental comparative evaluation,” International Journal of Networked and Distributed Computing, vol. 8, no. 3, pp. 131–138, Jun. 2020, doi: 10.2991/ijndc.k.200515.003.
[38] H. Ben Alla, S. Ben Alla, A. Ezzati, and A. Touhafi, “A novel multiclass priority algorithm for task scheduling in cloud computing,” Journal of Supercomputing, vol. 77, no. 10, pp. 11514–11555, Oct. 2021, doi: 10.1007/s11227-021-03741-4.
[39] H. Hamzeh, S. Meacham, K. Khan, K. Phalp, and A. Stefanidis, “MRFS: A Multi-resource Fair Scheduling Algorithm in Heterogeneous Cloud Computing,” in Proceedings - 2020 IEEE 44th Annual Computers, Software, and Applications Conference, COMPSAC 2020, Institute of Electrical and Electronics Engineers Inc., Jul. 2020, pp. 1653–1660. doi: 10.1109/COMPSAC48688.2020.00-18.
[40] N. A. Almojel and A. E. S. Ahmed, “Tasks and Resources Allocation Approach with Priority Constraints in Cloud Computing,” International Journal of Grid and High Performance Computing (IJGHPC), vol. 14, no. 1, pp. 1–17, 2022.
[41] A. Brandwajn and T. Begin, “First-come-first-served queues with multiple servers and customer classes,” Performance Evaluation, vol. 130, pp. 51–63, Apr. 2019, doi: 10.1016/j.peva.2018.11.001.
[42] Saudi Computer Society., Institute of Electrical and Electronics Engineers. Saudi Arabia Section, Institute of Electrical and Electronics Engineers. Region 8, and Institute of Electrical and Electronics Engineers, 2nd International Conference on Computer Applications & Information Security (ICCAIS’ 2019) : 01-03 May, 2019 Riyadh, Kingdom of Saudi Arabia.
[43] D. Alsadie, “Virtual Machine Placement Methods using Metaheuristic Algorithms in a Cloud Environment-A Comprehensive Review,” IJCSNS International Journal of Computer Science and Network Security, vol. 22, no. 4, doi: 10.22937/IJCSNS.2022.22.4.19.
[44] H. Hamzeh, S. Meacham, K. Khan, K. Phalp, and A. Stefanidis, “MRFS: A Multi-resource Fair Scheduling Algorithm in Heterogeneous Cloud Computing,” in Proceedings - 2020 IEEE 44th Annual Computers, Software, and Applications Conference, COMPSAC 2020, Institute of Electrical and Electronics Engineers Inc., Jul. 2020, pp. 1653–1660. doi: 10.1109/COMPSAC48688.2020.00-18.
[45] N. A. Almojel and A. E. S. Ahmed, “Tasks and Resources Allocation Approach with Priority Constraints in Cloud Computing,” International Journal of Grid and High Performance Computing (IJGHPC), vol. 14, no. 1, pp. 1–17, 2022.
[46] A. Brandwajn and T. Begin, “First-come-first-served queues with multiple servers and customer classes,” Performance Evaluation, vol. 130, pp. 51–63, Apr. 2019, doi: 10.1016/j.peva.2018.11.001.
[47] Saudi Computer Society., Institute of Electrical and Electronics Engineers. Saudi Arabia Section, Institute of Electrical and Electronics Engineers. Region 8, and Institute of Electrical and Electronics Engineers, 2nd International Conference on Computer Applications & Information Security (ICCAIS’ 2019) : 01-03 May, 2019 Riyadh, Kingdom of Saudi Arabia.
[48] D. Alsadie, “Virtual Machine Placement Methods using Metaheuristic Algorithms in a Cloud Environment-A Comprehensive Review,” IJCSNS International Journal of Computer Science and Network Security, vol. 22, no. 4, doi: 10.22937/IJCSNS.2022.22.4.19.