Abstract
The large-scale deployment of data driven internet of things (IoT) leads to employing a number of self-directed mobile or static sensor nodes in various areas of interest where the mobile nodes specifically operates on collecting data and cooperatively transmit that data back to the integrated cloud systems. The cloud enabled IoT has its wide range of applicability into various business, commercial and military applications. The wireless links can be easily disrupted by the adversaries due to their large attack surface. Adversaries in this regard ranges from hackers with a laptop to corporations and government officials. Due to the complex nature of localization of dynamic IoT nodes specifically the low power sensor devices, it becomes compelled to make themselves vulnerable for reprogramming and capture by an unauthorized user. On the other hand the deployment of low power sensor devices implicates operational constraints on conventional high level strong encryption approaches due to their limited processing power and computational capability. Owing to these issues the security challenges in current and futuristic IoTs are more. The study conceptualized an analytical system well-capable of protecting data and IoT driven cloud systems and also detect network intrusion considering artificial intelligence (AI) systems. The study also theoretically exhibits the extensive analysis of AI algorithms in cloud network intrusion detection. The performance analysis further conveyed the superiority of the proposed model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ensemble Learning: Wiki Data Mining Ensemble Learning. https://sites.google.com/a/kingofat.com/wiki/datamining/classification
Li, K., Han, Y.: Study of selective ensemble learning method and its diversity based on decision tree and neural network. In: Control and Decision Conference (CCDC) (2010)
KDD99: KDDCup1999data (1999). http://kdd.ics.uci.edu/databases/kddcup99/10percent.gz
Mell, P., Grance, T.: The NIST Definition of Cloud Computing. Special Publication 800-145, September 2011
Yassin, W., Udzir, N.I., Muda, Z., Abdullah, A., Abdullah, M.T.: Cloud based intrusion detection service framework. In: IEEE International Conference Cyber Security, Cyber Warfare and Digital Forensic (CyberSec) (2012)
Zhang, J., Zulkernine, M.: Network intrusion detection using Random Forests. In: Proceedings of the Third Annual Conference on Privacy, Security and Trust, pp. 53–61 (2005)
Kai, L., Ping, Z.Z.: Using an ensemble classifier on learning evaluation for E-Learning system. In: International Conference on Computer Science and Service System (2012)
Janeja, V.P., Azari, A., Heilig, B.: B-dids: mining anomalies in a Bigdistributed intrusion detection system. In: IEEE International Conference on Big Data, pp. 32–34 (2014)
Tang, Y., Wang, Y., Cooper, K.M.L., Li, L.: Towards big data bayesian network learning - an ensemble learning based approach. In: 2014 IEEE International Congress Big Data (BigData Congress), pp. 355–357 (2014)
Jiang, Y.: Selective ensemble learning algorithm. In: International Conference on Electrical and Control Engineering (2012)
Su, L., Liao, H., Yu, Z., Zhao, Q.: Ensemble learning for question classification. In: IEEE International Conference on Intelligent Computing and Intelligent Systems, ICIS 2009, vol. 3 (2009)
Zhang, J., Zulkernine, M.: A hybrid network intrusion detection technique using random forests. In: The First International Conference on Availability, Reliability and Security (2006)
Abdulsalam, H., Skillicorn, D.B., Martin, P.: Classification using steaming random forests. IEEE Trans. Knowl. Data Eng. 23(1), 22–36 (2011)
Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: Proceedings of IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA 2009), pp. 1–6. IEEE Press, July 2009
Boughaci, D., Herkat, M.L., Lazzazi, M.A.: A specific fuzzy genetic algorithm for intrusion detection. In: Proceedings of ICCIT (2012)
Debie, E.: Reduct Based Ensemble Learning System for real-valued classification problem. In: IEEE Symposium on Computational Intelligence and Ensemble Learning (CIEL) (2013)
Tesfahun, A., Bhaskari, D.L.: Intrusion detection using random forests classifier with SMOTE and feature reduction. In: International Conference on Cloud & Ubiquitous Computing & Emerging Technologies (2013)
MeeraGandhi, G., Appavoo, K., Srivatsa, S.K.: Effective network intrusion detection using classifiers decision trees and decision rules. Adv. Netw. Appl. 2(3), 686–692 (2010)
Pedrycz, W., Sosnowski, Z.A.: C-fuzzy decision tree. IEEE Trans. Syst. Man Cybernet. Part C 35(4), 498–511 (2005)
Pedrycz, W., Sosnowski, Z.A.: Designing decision tree with the use of fuzzy granulation. IEEE Trans. Syst. Man. Cybern. A Syst. Hum. 30(2), 151–159 (2000)
Modi, C., Patel, D., Patel, H., Borisaniya, B., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in Cloud. J. Netw. Comput. Appl. 36(1), 42–57 (2013)
Kleber, V., Schulter, A., Westphall, C.B., Westphall, C.K.: Intrusion detection for grid and cloud computing. IT Prof. 12(4), 38–43 (2010)
Li, Z., Sun, W., Wang, L.: A neural network based distributed intrusion detection system on cloud platform. In: IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS), pp. 75–79 (2012)
Wu, S., Er, M.J., Gao, Y.: A fast approach for automatic generation of fuzzy rules by generalized dynamic fuzzy neural networks. IEEE Computational Intelligence Society, pp. 578–594, August 2001
Masarat, S., Taheri, H., Sharifian, S.: A novel framework, based on fuzzy ensemble of classifiers for intrusion detection systems. In: International Conference on Computer and Knowledge Engineering (ICCKE), pp. 165–170 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Shahabadkar, R., Shahabadkar, K.R. (2019). Implication of Artificial Intelligence to Enhance the Security Aspects of Cloud Enabled Internet of Things (IoT). In: Silhavy, R. (eds) Software Engineering Methods in Intelligent Algorithms. CSOC 2019. Advances in Intelligent Systems and Computing, vol 984. Springer, Cham. https://doi.org/10.1007/978-3-030-19807-7_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-19807-7_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-19806-0
Online ISBN: 978-3-030-19807-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)