Enhancing cloud security through the integration of deep learning and data mining techniques: A comprehensive review

Israa ezzat salem, Karim Hashim Al-Saedi


Cloud computing is crucial in all areas of data storage and online service delivery. It adds various benefits to the conventional storage and sharing system, such as simple access, on-demand storage, scalability, and cost savings. The employment of its rapidly expanding technologies may give several benefits in protecting the Internet of Things (IoT) and physical cyber systems (CPS) from various cyber threats, with IoT and CPS providing facilities for people in their everyday lives. Because malware (malware) is on the rise and there is no well-known strategy for malware detection, leveraging the cloud environment to identify malware might be a viable way forward. To avoid detection, a new kind of malware employs complex jamming and packing methods. Because of this, it is very hard to identify sophisticated malware using typical detection methods. The article presents a detailed assessment of cloud-based malware detection technologies, as well as insight into understanding the cloud's use in protecting the Internet of Things and critical infrastructure from intrusions. This study examines the benefits and drawbacks of cloud environments in malware detection, as well as presents a methodology for detecting cloud-based malware using deep learning and data extraction and highlights new research on the issues of propagating existing malware. Finally, similarities and variations across detection approaches will be exposed, as well as detection technique flaws. The findings of this work may be utilized to highlight the current issue being tackled in malware research in the future.

Full Text:



S. Morgan, "Cybersecurity almanac: 100 facts, figures, predictions and statistics," Cybercrime Magazine Cisco and Cybersecurity Ventures, 2019. doi: 10.13140/RG.2.2.23577.67686.

Y. Ye, T. Li, S. Zhu, W. Zhuang, E. Tas, U. Gupta and M. Abdulhayoglu, "Combining file content and file relations for cloud based malware detection," in Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 222-230, 2011. doi: 10.1145/2020408.2020439.

Ö. Aslan, R.Samet and Ö.O.Tanrıöver, "Using a Subtractive Center Behavioral Model to Detect Malware," Security and Communication Networks 2020, pp.1-12, 2020.doi:10.1155/2020/8897014.

H. R. Abdulshaheed, S. A. Binti, and I. I. Sadiq, “A Review on Smart Solutions Based-On Cloud Computing and Wireless Sensing,” Int. J. Pure Appl. Math., vol. 119, no. 18, pp. 461–486, 2018.

Constrained internet of things (IoT)devices,"Software:PracticeandExperience47(3),pp421-441,2017.doi:10 .1002/spe.v47 .3

O. Kayode, D. Gupta, and A. S. Tosun, "Towards a distributed estimator in smart home environment," in 2020 IEEE 6th World Forum on Internet of Things (WF-IoT), IEEE, pp. 1-6, 2020. doi: 10.1109/WF-IoT48130.2020.9220994.

A. Singh and A. Jain, "Study of cyber-attacks on cyber-physical system," in Proceedings of 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT), pp. 26-27, 2018.

Y. Ye, T. Li, S. Zhu, W. Zhuang, E. Tas, U. Gupta and M. Abdulhayoglu, "Combining file content and file relations for cloud based malware detection," in Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD), pp. 222-230, Aug., 2011.

W. Hardy, L.Chen, S.Hou,Y.Ye,and X.Li,"DL4MD: A deep learning framework for intelligent malware detection," in Proceedings of the International Conference on Data Science (ICDATA), The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), p61.,2016.doi:10/1016/j.procs/2017/01/012

T. Aldwairi, D. Perera, and M. A. Novotny, "An evaluation of the performance of Restricted Boltzmann Machines as a model for anomaly network intrusion detection," Computer Networks, vol. 144, pp. 111-119, 2018. doi: 10.1016/j.comnet.2018.08.012.

Y. Cheng, X. Zhou, S. Wan, and K.-K.R Choo, "Deep Belief Network for Meteorological Time Series Prediction in the Internet of Things," IEEE Internet of Things Journal, vol. 14, no. 8, 2015.

M. Chowdhury, A. Rahman, and R. Islam, "Malware analysis and detection using data mining and machine learning classification," in Proceedings of the International Conference on Applications and Techniques in Cyber Security and Intelligence (ATCI), Edizioni della Normale: Cham, Switzerland, Jun., pp. 266-274.

M.Zekri,S.E.Kafhali,N.Aboutabit,andY.Saadi,"DDoSattackdetectionusingmachinelearningtechniquesincloudcomputingenvironments,"inProceedingsofthe2017 3rd International Conference of Cloud Computing Technologies and Applications (CloudTech), IEEE: Oct., pp.1-7.doi:10 .1109/CloudTech .2017 .8095622

Y. Ye, L. Chen, S. Hou, W. Hardy, and X. Li, "DeepAM: a heterogeneous deep learning framework for intelligent malware detection," Knowledge and Information Systems, vol. 54, no. 2, pp. 265-285, 2018. doi: 10.1007/s10115-017-1125-5.

J. Sun, R. Wyss, A. Steinecker, and P. Glocker, "Automated fault detection using deep belief networks for the quality inspection of electromotors," Technisches Messen, vol. 81, no. 5, pp. 255-263, 2014. doi: 10.1515/teme-2014-0009.

S. Tsimenidis, T. Lagkas and K.Rantos,"Deep learning in IoT intrusion detection," Journal of Network and Systems Management , vol .30 , no .1 , pp .1 -40 ,2022 .doi:10 .1007/s10922-021-09638-w .

M.Elsisi et al., "Effective IoT-based Deep Learning Platform for Online Fault Diagnosis of Power Transformers Against Cyberattack and Data Uncertainties," Measurement , vol .189 , no .110686 ,2022 .doi:10 .1016/j.measurement2021 .110686 .

S. Q. Salih and A. R. A. Alsewari, “A new algorithm for normal and large-scale optimization problems: Nomadic People Optimizer,” Neural Comput. Appl., vol. 32, no. 14, pp. 10359–10386, 2020, doi: 10.1007/s00521-019-04575-1.

S. Malik, A. K. Tyagi, and S. Mahajan, "Architecture, Generative Model, and Deep Reinforcement Learning for IoT Applications: Deep Learning Perspective," in Artificial Intelligence-based Internet of Things Systems, Springer, Cham, 2022, pp. 243-265. doi: 10.1007/978-3-030-93613-1_12.

D. Kajaree and R. Behera, "A Survey on Healthcare Monitoring System Using Body Sensor Network," Int. J. Innov. Res. Comput. Commun. Eng., vol. 5, no. 2, pp. 1302–1309, 2017.

F.C.C Garcia, C.M.C Creayla and E.Q.B Macabebe, "Development of an Intelligent System for Smart Home Energy Disaggregation Using Stacked Denoising Autoencoders," in International Symposium on Robotics and Intelligent Sensors (IRIS), IEEE Japan, 2016.

T.J Saleem and M.A Chishti, "Deep Learning for Internet of Things Data Analytics," Procedia Computer Science, vol.163 , pp .381–390 ,2019 . doi:10.1016/j.procs.2019.12

S.M Tabish , M.Z Shafiq and M Farooq , "Malware detection using statistical analysis of byte-level file content," in Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics (CSI-KDD), pp .23-31 ,2009 .

R. Chalapathy and S. Chawla, "Deep learning for anomaly detection: A survey," arXiv preprint arXiv:1901.03407, 2019. doi: 10.1145/3359996.

Z. Cui, F. Xue, X. Cai, Y. Cao, G.G. Wang and J. Chen, "Detection of malicious code variants based on deep learning," IEEE Transactions on Industrial Informatics, vol. 14, no. 7, pp. 3187-3196, Jul. 2018. doi: 10.1109/TII.2018.2835063.

A. Azmoodeh, A. Dehghantanha and K.K.R Choo, "Robust malware detection for internet of (battlefield) things devices using deep eigenspace learning," IEEE Transactions on Sustainable Computing, vol. 4, no. 1, pp. 88-95, Jan.-Mar., 2019.doi:10 .1109/TSUSC .2018 .2886192.

A.Azmoodeh,A.Dehghantanha,andK.K.R.Choo,"Robustmalwaredetectionforinternetof(battlefield)thingsdevicesusingdeepeigenspacelearning,"IEEETransactions on Sustainable Computing , vol .4 , no .1 , pp .88-95 , Jan.-Mar.,2019.doi:10 .1109/TSUSC .2018 .2886192.

D. Ucci, L. Aniello, and R. Baldoni, "Survey of machine learning techniques for malware analysis," Computers & Security, vol. 81, pp. 123-147, May 2020. doi: 10.1016/j.cose.2018.11.010.

D. Gibert, C. Mateu, and J. Planes, "The rise of machine learning for detection and classification of malware: Research developments, trends and challenges," Journal of Network and Computer Applications, vol. 153, p. 102526, 2020. doi: 10.1016/j.jnca.2020.102526.

Z. Cui, L. Du, P.Wang, X.Cai,and W.Zhang,"Malicious code detection based on CNNs and multi-objective algorithm," Journal of Parallel and Distributed Computing , vol .129 ,pp .50-58 ,2019.doi:10 .1016/j.jpdc .2019 .02 .007.

O.Or-Meir,N.Nissim,Y.Elovici,andL.Rokach,"Dynamic malware analysis in the modern era—A state of the art survey," ACM Computing Surveys (CSUR), vol .52,no .5,pages1-48 ,2019.doi:10 .1145/3341713.

I.Santos,F.Brezo,X.Ugarte-Pedrero,andP.G.Bringas,"Opcode sequences as representation of executables for data-mining-based unknown malware detection," Information Sciences ,vol .231 ,pp .64-82 ,2013.doi:10 .1016/j.ins .2012 .12 .038

A. Bhattacharya and R. T. Goswami, "Comparative analysis of different feature ranking techniques in data mining-based android malware detection," in Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, Singapore, 2017, pp. 39-49, doi: 10.1007/978-981-10-6623-3_5.

R. Sihwail, K. Omar, and K. Z. Ariffin, "A survey on malware analysis techniques: Static, dynamic, hybrid and memory analysis," Int. J. Adv. Sci. Eng. Inf. Technol., vol. 8, no. 4-2, pp. 1662-1671, 2018.

Xianwei Gao et al., "Malware classification for the cloud via semi-supervised transfer learning," Journal of Information Security and Applications, vol. 55, p.102661-, 2020, doi:10.1016/j.jisa.2020.102661.

M.Venkata Rao et al., "Deep Learning CNN Framework for Detection and Classification of Internet Worms," Journal of Interconnection Networks , vol .21 , no .4 , p .2144024-,2022.

H.Alkahtani and T.Aldhyani,"Artificial Intelligence Algorithms for Malware Detection in Android-Operated Mobile Devices," Sensors (Basel Switzerland), vol .22 , no .6 , p .2268-,2022 ,doi:10 .3390/s22062268.

Z.Z.Edie,"MALWARE DETECTION SYSTEM BASED ON DEEP LEARNING TECHNIQUE," Iraqi Journal of Information and Communications Technology ,vol .1,no .1,p .33-44-,2021Or-Meir, O., Nissim, N., Elovici, Y., & Rokach, L. (2019). Dynamic malware analysis in the modern era—A state of the art survey. ACM Computing Surveys (CSUR), 52(5), 1-48.‏

A. Altaher, "An improved Android malware detection scheme based on an evolving hybrid neuro-fuzzy classifier (EHNFC) and permission-based features," Neural Comput. Appl., vol. 28, pp. 4147-4157, 2016. doi: 10.1007/s00521-016-2383-8.

Z. Yuan, Y. Lu, and Y. Xue, "Droiddetector: android malware characterization and detection using deep learning," Tsinghua Sci Technol, vol. 21, pp. 114-123, 2016. doi: 10.1109/TST.2016.7444962.

A. Boukhtouta et al., "Network malware classification comparison using DPI and flow packet headers," J Comput Virol Hacking Tech, vol. 12, pp. 69-100, 2016. doi: 10.1007/s11416-015-0264-x.

Y. Ding et al., "A fast malware detection algorithm based on objective-oriented association mining," Comput Secur, vol. 39, no.B, pp.315-324, 2013.doi:10 .1016/j.cose .2013 .08 .003

M. Eskandari, Z. Khorshidpour, and S. Hashemi, "HDM-Analyser: a hybrid analysis approach based on data mining techniques for malware detection," J. Comput. Virol. Hacking Tech., vol. 9, pp. 77-93, 2013. doi: 10.1007/s11416-013-0185-5.

Q. Miao, J. Liu, Y. Cao, and J. Song, "Malware detection using bilayer behavior abstraction and improved one-class support vector machines," Int. J. Inf. Secur., vol. 15, pp. 361-379, 2016. doi: 10.1007/s10207-015-0298-y.

S.D Nikolopoulos and I Polenakis, "A graph-based model for malware detection and classification using system-call groups," J Comput Virol Hacking Tech., vol. 13, pp. 29-46, 2016.doi:10 .1007/s11416-016-0271-x.

S.Sheen,R.Anitha,andV.Natarajan,"Androidbasedmalwaredetectionusingamultifeaturecollaborativedecisionfusionapproach,"Neurocomputing ,vol .151 ,pp .905 -912 ,2015.doi :10 .1016/j.neucom .2014 .08 .089 .

M.Norouzi,A.Souri,andM.SamadZamini,"Adataminingclassificationapproachforbehavioralmalwaredetection"J.Comput.Netw.Communications ,vol .2016 ,pp .9 ,2016.doi :10 .1155/2016/2690592 .

S. Q. Salih, “A New Training Method based on Black Hole Algorithm for Convolutional Neural Network,” J. Southwest Jiaotong Univ., vol. 54, no. 3, Jun. 2019, doi: 10.35741/issn.0258-2724.54.3.22.

H. Tao et al., “A Newly Developed Integrative Bio-Inspired Artificial Intelligence Model for Wind Speed Prediction,” IEEE Access, vol. 8, pp. 83347–83358, 2020, doi: 10.1109/ACCESS.2020.2990439.

DOI: http://dx.doi.org/10.21533/pen.v11i3.3596


  • There are currently no refbacks.

Copyright (c) 2023 Israa ezzat salem, Karim Hashim Al-Saedi

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

ISSN: 2303-4521

Digital Object Identifier DOI: 10.21533/pen

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License