Skip to main content

Implication of Artificial Intelligence to Enhance the Security Aspects of Cloud Enabled Internet of Things (IoT)

  • Conference paper
  • First Online:
Software Engineering Methods in Intelligent Algorithms (CSOC 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 984))

Included in the following conference series:

  • 644 Accesses

Abstract

The large-scale deployment of data driven internet of things (IoT) leads to employing a number of self-directed mobile or static sensor nodes in various areas of interest where the mobile nodes specifically operates on collecting data and cooperatively transmit that data back to the integrated cloud systems. The cloud enabled IoT has its wide range of applicability into various business, commercial and military applications. The wireless links can be easily disrupted by the adversaries due to their large attack surface. Adversaries in this regard ranges from hackers with a laptop to corporations and government officials. Due to the complex nature of localization of dynamic IoT nodes specifically the low power sensor devices, it becomes compelled to make themselves vulnerable for reprogramming and capture by an unauthorized user. On the other hand the deployment of low power sensor devices implicates operational constraints on conventional high level strong encryption approaches due to their limited processing power and computational capability. Owing to these issues the security challenges in current and futuristic IoTs are more. The study conceptualized an analytical system well-capable of protecting data and IoT driven cloud systems and also detect network intrusion considering artificial intelligence (AI) systems. The study also theoretically exhibits the extensive analysis of AI algorithms in cloud network intrusion detection. The performance analysis further conveyed the superiority of the proposed model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ensemble Learning: Wiki Data Mining Ensemble Learning. https://sites.google.com/a/kingofat.com/wiki/datamining/classification

  2. Li, K., Han, Y.: Study of selective ensemble learning method and its diversity based on decision tree and neural network. In: Control and Decision Conference (CCDC) (2010)

    Google Scholar 

  3. www.cs.waikato.ac.nz/ml/weka

  4. KDD99: KDDCup1999data (1999). http://kdd.ics.uci.edu/databases/kddcup99/10percent.gz

  5. Mell, P., Grance, T.: The NIST Definition of Cloud Computing. Special Publication 800-145, September 2011

    Google Scholar 

  6. Yassin, W., Udzir, N.I., Muda, Z., Abdullah, A., Abdullah, M.T.: Cloud based intrusion detection service framework. In: IEEE International Conference Cyber Security, Cyber Warfare and Digital Forensic (CyberSec) (2012)

    Google Scholar 

  7. Zhang, J., Zulkernine, M.: Network intrusion detection using Random Forests. In: Proceedings of the Third Annual Conference on Privacy, Security and Trust, pp. 53–61 (2005)

    Google Scholar 

  8. Kai, L., Ping, Z.Z.: Using an ensemble classifier on learning evaluation for E-Learning system. In: International Conference on Computer Science and Service System (2012)

    Google Scholar 

  9. Janeja, V.P., Azari, A., Heilig, B.: B-dids: mining anomalies in a Bigdistributed intrusion detection system. In: IEEE International Conference on Big Data, pp. 32–34 (2014)

    Google Scholar 

  10. Tang, Y., Wang, Y., Cooper, K.M.L., Li, L.: Towards big data bayesian network learning - an ensemble learning based approach. In: 2014 IEEE International Congress Big Data (BigData Congress), pp. 355–357 (2014)

    Google Scholar 

  11. Jiang, Y.: Selective ensemble learning algorithm. In: International Conference on Electrical and Control Engineering (2012)

    Google Scholar 

  12. Su, L., Liao, H., Yu, Z., Zhao, Q.: Ensemble learning for question classification. In: IEEE International Conference on Intelligent Computing and Intelligent Systems, ICIS 2009, vol. 3 (2009)

    Google Scholar 

  13. Zhang, J., Zulkernine, M.: A hybrid network intrusion detection technique using random forests. In: The First International Conference on Availability, Reliability and Security (2006)

    Google Scholar 

  14. Abdulsalam, H., Skillicorn, D.B., Martin, P.: Classification using steaming random forests. IEEE Trans. Knowl. Data Eng. 23(1), 22–36 (2011)

    Article  Google Scholar 

  15. Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: Proceedings of IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA 2009), pp. 1–6. IEEE Press, July 2009

    Google Scholar 

  16. Boughaci, D., Herkat, M.L., Lazzazi, M.A.: A specific fuzzy genetic algorithm for intrusion detection. In: Proceedings of ICCIT (2012)

    Google Scholar 

  17. Debie, E.: Reduct Based Ensemble Learning System for real-valued classification problem. In: IEEE Symposium on Computational Intelligence and Ensemble Learning (CIEL) (2013)

    Google Scholar 

  18. Tesfahun, A., Bhaskari, D.L.: Intrusion detection using random forests classifier with SMOTE and feature reduction. In: International Conference on Cloud & Ubiquitous Computing & Emerging Technologies (2013)

    Google Scholar 

  19. MeeraGandhi, G., Appavoo, K., Srivatsa, S.K.: Effective network intrusion detection using classifiers decision trees and decision rules. Adv. Netw. Appl. 2(3), 686–692 (2010)

    Google Scholar 

  20. Pedrycz, W., Sosnowski, Z.A.: C-fuzzy decision tree. IEEE Trans. Syst. Man Cybernet. Part C 35(4), 498–511 (2005)

    Google Scholar 

  21. Pedrycz, W., Sosnowski, Z.A.: Designing decision tree with the use of fuzzy granulation. IEEE Trans. Syst. Man. Cybern. A Syst. Hum. 30(2), 151–159 (2000)

    Article  Google Scholar 

  22. Modi, C., Patel, D., Patel, H., Borisaniya, B., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in Cloud. J. Netw. Comput. Appl. 36(1), 42–57 (2013)

    Article  Google Scholar 

  23. Kleber, V., Schulter, A., Westphall, C.B., Westphall, C.K.: Intrusion detection for grid and cloud computing. IT Prof. 12(4), 38–43 (2010)

    Article  Google Scholar 

  24. Li, Z., Sun, W., Wang, L.: A neural network based distributed intrusion detection system on cloud platform. In: IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS), pp. 75–79 (2012)

    Google Scholar 

  25. Wu, S., Er, M.J., Gao, Y.: A fast approach for automatic generation of fuzzy rules by generalized dynamic fuzzy neural networks. IEEE Computational Intelligence Society, pp. 578–594, August 2001

    Google Scholar 

  26. Masarat, S., Taheri, H., Sharifian, S.: A novel framework, based on fuzzy ensemble of classifiers for intrusion detection systems. In: International Conference on Computer and Knowledge Engineering (ICCKE), pp. 165–170 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ramesh Shahabadkar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shahabadkar, R., Shahabadkar, K.R. (2019). Implication of Artificial Intelligence to Enhance the Security Aspects of Cloud Enabled Internet of Things (IoT). In: Silhavy, R. (eds) Software Engineering Methods in Intelligent Algorithms. CSOC 2019. Advances in Intelligent Systems and Computing, vol 984. Springer, Cham. https://doi.org/10.1007/978-3-030-19807-7_2

Download citation

Publish with us

Policies and ethics