Adaptive firefly algorithm for resource allocation and modified advanced encryption standard algorithm for hypervisor attack detection on cloud computing

Authors

DOI:

https://doi.org/10.56294/sctconf2024933

Keywords:

Hypervisor Attack Detection, Modified Advanced Encryption Standard (MAES) Algorithm, Adaptive Firefly (AF) Optimization Algorithm

Abstract

Introduction: the advantages and wide-ranging applications of cloud computing have made it a prominent attention for scholars these days. The dispersed structure of cloud and its whole dependence on the internet for service delivery extant security problems.

Method: hypervisor attack detection is carried out in this study using Modified Advanced Encryption Standard (MAES) system which ensures security prominently. It finds and detects the attacks earlier for secured VM migration. The proposed system includes main phases including system framework, load balancing, resource allocation and hypervisor attack detection via MAES algorithm. Initially, Over the duration of cloud computing, consider the quantity of tasks, VM, and cloud users. In this research, the MMH system is employed for load balancing to balance the total burden across the cloud. Tasks are moved from overloaded to underloaded nodes to attain load balancing. Next, the allocation of resources is carried out utilizing Adaptive Firefly (AF) optimization system which is used to select best resources optimally. It generates the best fitness values to choose the best resources.

Results: it is also focused to improve the cost metric, computational complexity, throughput and VM performance in cloud. Then, to detect hypervisor attacks, the MAES method is employed. It specializes on offering enhanced security for cloud data and is employed to identify hypervisor and VM attackers.

Conclusions: the findings produced the conclusion that the suggested MAES method superior to the current approaches according to throughput, computation cost, Mean Square Error (MSE) rate, and energy use

References

1. Zekri M, El Kafhali S, Aboutabit N, and Saadi Y. DDoS attack detection using machine learning techniques in cloud computing environments. In 3rd international conference of cloud computing technologies and applications (CloudTech), pp. 1-7. https://doi.org/10.1109/CloudTech.2017.8284731.

2. Rawashdeh A, Alkasassbeh M, and Al-Hawawreh M. An anomaly-based approach for DDoS attack detection in cloud environment. International Journal of Computer Applications in Technology, 57(4), pp.312-324. https://doi.org/10.1504/IJCAT.2018.093533.

3. Tsai JT, Fang JC, and Chou JH. Optimized task scheduling and resource allocation on cloud computing environment using improved differential evolution algorithm. Computers & Operations Research, 40(12), pp. 3045-3055. https://doi.org/10.1016/j.cor.2013.06.012.

4. Ding D, Fan X, Zhao Y, Kang K, Yin Q, and Zeng J. Q-learning based dynamic task scheduling for energy-efficient cloud computing. Future Generation Computer Systems, 108, pp. 361-371. https://doi.org/10.1016/j.future.2020.02.018.

5. Yakubu IZ, Musa ZA, Muhammed L, Ja’afaru B, Shittu F, and Matinja ZI. Service level agreement violation preventive task scheduling for quality of service delivery in cloud computing environment. Procedia Computer Science, 178, pp. 375-385. https://doi.org/10.1016/j.procs.2020.11.039.

6. Gamal M, Rizk R, Mahdi H, and Elnaghi BE. Osmotic bio-inspired load balancing algorithm in cloud computing. IEEE Access, 7, pp. 42735-42744. https://doi.org/10.1109/ACCESS.2019.2907615.

7. Chandrakala N, and Rao BT. Migration of Virtual Machine to improve the Security in Cloud Computing. International Journal of Electrical & Computer Engineering,(2088-8708) 8(1), pp. 210-219. http://doi.org/10.11591/ijece.v8i1.pp210-219.

8. Zhou, Z., Yu, J., Li, F. and Yang, F., 2018. Virtual machine migration algorithm for energy efficiency optimization in cloud computing. Concurrency and Computation: Practice and Experience, 30(24), pp. 1-10. https://doi.org/10.1002/cpe.4942.

9. Thiam C, and Thiam F. An energy-efficient VM migrations optimization in cloud data centers. In 2019 IEEE AFRICON, pp. 1-5. https://doi.org/10.1109/AFRICON46755.2019.9133776.

10. Adeshara N, Rede A, Jain S, Dhoot K, and Mhamane S. Optimizing Resource Utilization by Vm Migration Among Virtual Machines of a Cloud Server. In 5th International Conference on Communication and Electronics Systems (ICCES), pp. 671-677. https://doi.org/10.1109/ICCES48766.2020.9138010.

11. Saxena D, Gupta I, Kumar J, Singh AK, and Wen X. A secure and multiobjective virtual machine placement framework for cloud data center. IEEE Systems Journal, 16(2), pp. 3163-3174. https://doi.org/10.1109/JSYST.2021.3092521.

12. Hung LH, Wu CH, Tsai CH, and Huang HC. Migration-based load balance of virtual machine servers in cloud computing by load prediction using genetic-based methods. IEEE Access, 9, pp. 49760-49773. https://doi.org/10.1109/ACCESS.2021.3065170.

13. Nikolai J, and Wang Y. Hypervisor-based cloud intrusion detection system. In International Conference on Computing, Networking and Communications (ICNC), pp. 989-993. https://doi.org/10.1109/ICCNC.2014.6785472.

14. Kumara A, and Jaidhar CD. Hypervisor and virtual machine dependent Intrusion Detection and Prevention System for virtualized cloud environment. In 1st international conference on telematics and future generation networks (TAFGEN), pp. 28-33. https://doi.org/10.1109/TAFGEN.2015.7289570.

15. Dildar MS, Khan N, Abdullah JB, and Khan AS. Effective way to defend the hypervisor attacks in cloud computing. In 2017 2nd International Conference on Anti-Cyber Crimes (ICACC), pp. 154-159. https://doi.org/10.1109/Anti-Cybercrime.2017.7905282.

16. Aldribi A, Traoré I, Moa B, and Nwamuo O. Hypervisor-based cloud intrusion detection through online multivariate statistical change tracking. Computers & Security, 88, pp. 101646. https://doi.org/10.1016/j.cose.2019.101646.

17. Elshabka MA, Hassan HA, Sheta WM, and Harb HM. Security-aware dynamic VM consolidation. Egyptian Informatics Journal, 22(3), pp. 277-284. https://doi.org/10.1016/j.eij.2020.10.002.

18. Annadanam CS, Chapram S, and Ramesh T. Intermediate node selection for Scatter-Gather VM migration in cloud data center. Engineering Science and Technology, an International Journal, 23(5), pp. 989-997. https://doi.org/10.1016/j.jestch.2020.01.008.

19. Maipan-Uku JY, Muhammed A, Abdullah A, and Hussin M. Max-average: An extended max-min scheduling algorithm for grid computing environtment. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 8(6), pp. 43-47.

20. Elzeki OM, Reshad MZ, and Elsoud MA. Improved max-min algorithm in cloud computing. International Journal of Computer Applications, 50(12), pp. 22-27.

21. Annadanam CS, Chapram S, and Ramesh T. Intermediate node selection for Scatter-Gather VM migration in cloud data center. Engineering Science and Technology, an International Journal, 23(5), pp. 989-997. https://doi.org/10.1016/j.jestch.2020.01.008.

22. Liu J, Mao Y, Liu X, and Li Y. A dynamic adaptive firefly algorithm with globally orientation. Mathematics and Computers in Simulation, 174, pp. 76-101. https://doi.org/10.1016/j.matcom.2020.02.020.

23. Kaur G, and Kaur K. An adaptive firefly algorithm for load balancing in cloud computing. In Proceedings of Sixth International Conference on Soft Computing for Problem Solving: SocProS ,1, pp. 63-72. https://doi.org/10.1007/978-981-10-3322-3_7.

24. Szefer J, Keller E, Lee RB, and Rexford J. Eliminating the hypervisor attack surface for a more secure cloud. In Proceedings of the 18th ACM conference on Computer and communications security, pp. 401-412. https://doi.org/10.1145/2046707.2046754.

25. Pendli V, Pathuri M, Yandrathi S, and Razaque A. Improvising performance of advanced encryption standard algorithm. In second international conference on mobile and secure services (MobiSecServ), pp. 1-5. https://doi.org/10.1109/MOBISECSERV.2016.7440224.

Downloads

Published

2024-01-01

How to Cite

1.
Banu Priya M, Maheswari D. Adaptive firefly algorithm for resource allocation and modified advanced encryption standard algorithm for hypervisor attack detection on cloud computing. Salud, Ciencia y Tecnología - Serie de Conferencias [Internet]. 2024 Jan. 1 [cited 2024 Dec. 12];3:933. Available from: https://conferencias.ageditor.ar/index.php/sctconf/article/view/845