Payam Shojaeian Zanjani,Saeed Ebrahimi Nejad Motlagh Tehrani,



abnormal behavior,security,cloud computing,evolutionary algorithm,imperialist competitive algorithm,


In the present era, we have a new method called cloud computing, in which the services are shared over the Internet. There are many organizations that provide cloud processing services. Cloud processing allows users and developers to use these services without interfering with the technical knowledge or control of the technology they require, but on the other hand, day to day, more information of individuals and companies is stored inside clouds, which puts the challenge of data security ahead of users. Information security in virtual environments and new area of cloud computing has always been emphasized as one of the basic infrastructures and essential requirements for ICT-intensive use. Although absolute security is unattainable both in the real environment and in the virtual environment, it is possible to create a level of security that is sufficiently adequate in almost all environmental conditions. In cloud computing, there are many security challenges that must be addressed by cloud service providers to convince users to use this technology. One of the most important issues is ensuring the user's data is inaccurate and unavailable. For the user, the security process used to store data in the cloud is very obscure, long, and vague. In this research, a security approach based on abnormal behavior is designed to detect events that are unusual and abnormal in relation to other system behaviors. The focus of this paper is the use of evolutionary algorithms such as genetics or other new algorithms such as an imperialist competitive algorithm to detect these abnormal behaviors with intelligence agents. In similar studies, various optimization methods such as genetic algorithms, pso have been used. The proposed algorithm can be compared and evaluated with previous methods.


I. A. Vakili, N.J. Navimipour. Comprehensive and systematic review of the
service composition mechanisms in the cloud environments. J. Netw.
Comput. Appl., 81 pp. 24-36, 2017.
II. B. Wang, Y. Zheng, W. Lou, and Y. T. Hou, “DDoS attack protection in the
era of cloud computing and software-defined networking,” Computer
Networks, vol. 81, pp. 308-319, 2015.
III. Beiter, Michael, et al. “End-to-end policy based encryption techniques for
multi-party data management.” Computer Standards & Interfaces, 36.4 689-
703, 2014.
IV. Bose, Ranjit, Xin Luo, and Yuan Liu. “The Roles of Security and Trust:
Comparing Cloud Computing and Banking.” Procedia-Social and Behavioral
Sciences, 73: 30-34, 2013.
V. Che, Jianhua, et al. “Study on the security models and strategies of cloud
computing.” Procedia Engineering , 23: 586-593, 2011.
VI. Dastjerdi, Amir Vahid, Kamalrulnizam Abu Bakar, and Sayed Gholam
Hassan Tabatabaei. “Distributed intrusion detection in clouds using mobile
agents.” Advanced Engineering Computing and Applications in Sciences,
2009. ADVCOMP’09. Third International Conference on. IEEE, 2009.
VII. Govinda, K., and E. Sathiyamoorthy. “Agent Based Security for Cloud
Computing using Obfuscation.” Procedia Engineering 38 (2012): 125-129.
VIII. Jalal Nouri,D.,Saniee Abadeh, M.&Ghareh Mohammadi, F. HYEI: A New
Hybrid Evolutionary Imperialist Competitive Algorithm for Fuzzy
Knowledge Discovery. Advances in Fuzzy Systems. vol. 14, no. 11, 387-395,
IX. Jin, Hai, et al. “A guest-transparent file integrity monitoring method in
virtualization environment.” Computers & Mathematics with Applications,
60, 2: 256-266, 2010.
X. K. Vieira, A. Schulter, C. Westphall, and C. Westphall, “Intrusion detection
techniques in grid and cloud computing environment,” IT Professional, IEEE
Computer Society, vol. 12, pp. 38-43, 2010.
XI. Kim, Junghan, Inhyuk Kim, and Young Ik Eom. “Nopfit: File system
integrity tool for virtual machine using multi-byte nop injection.”
Computational Science and Its Applications (ICCSA), 2010 International
Conference on. IEEE, 2010.
XII. Kong, Jinzhu, AdjointVM: a new intrusion detection model for cloud
computing. Elsevier, 2011.
XIII. Kousiouris, George, et al. “Dynamic, behavioral-based estimation of resource
provisioning based on high-level application terms in Cloud platforms.”
Future Generation Computer Systems, 32: 27-40, 2014.
XIV. Kshetri, Nir. “Privacy and security issues in cloud computing: The role of
institutions and institutional evolution.” Telecommunications Policy, 37, 4:
372-386, 2013.
XV. Lai, Yung-Liang. “Analyzing strategies of mobile agents on malicious cloud
platform with Agent-Based Computational Economic Approach.” Expert
Systems with Applications, 40, 7: 2615-2620, 2013..

XVI. Lo, Chi-Chun, Chun-Chieh Huang, and Joy Ku. “A cooperative intrusion
detection system framework for cloud computing networks.” Parallel
processing workshops (ICPPW), 2010 39th international conference on.
IEEE, 2010.
XVII. M. Haresh, S. Kalady, and V. Govindan, “Agent based dynamic resource
allocation on federated clouds,” in Recent Advances in Intelligent
Computational Systems (RAICS), IEEE, 2011, pp. 111-114, 2011.
XVIII. M. Tang, X. Dai, J. Liu, J. Chen. Towards a trust evaluation middleware for
cloud service selection. Future Gener. Comput. Syst., 74, pp. 302-312, 2017.
XIX. Ms. Parag K. Shelke, Ms. Sneha Sontakke, Dr.A. D. Gawande, Intrusion
Detection System for Cloud Computing. International Journal of Scientific &
Technology Research, 2012.
XX. N. Dot. Anomaly Detection via Online Over-Sampling Principal Component
Analysis| FTJ1314, 2015.
XXI. N. Ghadiri, A. Baraani-Dastjerdi, N. Ghasem-Aghaee, and M. A.
Nematbakhsh, “Optimizing the performance and robustness of type-2 fuzzy
group nearest-neighbor queries,” Mobile Information Systems, vol. 7, pp.
123-145, 2011.
XXII. Pearson Siani. Toward accountability in the cloud. EEE Internet
Comput;15(4):64–99, 2011.
XXIII. R.Roustaei and F.Yousefi Fakhr. A Hybrid Meta-Heuristic Algorithm based
on Imperialist Competition Algorithm. Journal of AIand Data Mining Vol 6,
No 1, 59-67, 2018.
XXIV. Rasheed, Hassan. “Data and infrastructure security auditing in cloud
computing environments.” International Journal of Information Management
34.3: 364-368, 2014.
XXV. Rong Chunming, Nguyen Son T. Cloud trends and security challenges. In:
Proceedings of the 3rd international workshop on security and computer
networks (IWSCN 2011), 2011.
XXVI. Shin, Dong-Hee. “User centric cloud service model in public sectors: policy
implications of cloud services.” Government Information Quarterly 30.2:194-
203, 2013.
XXVII. Sood, Sandeep K. “A combined approach to ensure data security in cloud
computing.” Journal of Network and Computer Applications 35.6, 1831-
1838, 2012.
XXVIII. T. Garfinkel and M. Rosenblum, “A Virtual Machine Introspection Based
Architecture for Intrusion Detection,” in Ndss, pp. 191-206, 2003.
XXIX. Tarigonda, Siva, A. Ganesh, and Srinivasulu Asadi. “Providing Data Security
in Cloud Computing using Novel and Mixed Agent based Approach.”
International Journal of Computer Applications 112.6, 2015.
XXX. Tianfield, Huaglory. “Cloud computing architectures.” Systems, Man, and
Cybernetics (SMC), 2011 IEEE International Conference on. IEEE, 2011.
XXXI. Turki Alharkan, Patrick Martin, IDSaaS: Intrusion Detection System as a
Service in Public Clouds. IEEE/ACM International Symposium on Cluster,
Cloud and Grid Computing, 2012.

XXXII. Waqar, Adeela, et al. “A framework for preservation of cloud users’ data
privacy using dynamic reconstruction of metadata.” Journal of Network and
Computer Applications 36.1, 235-248, 2013.
XXXIII. Y. Wang, J. Wei. Toward protecting control flow confidentiality in cloudbased
computation. Comput. Secur., 52, pp. 106-127, 2015.
XXXIV. Z. Cai, X. Guan, P. Shao, Q. Peng, and G. Sun, “A rough set theory based
method for anomaly intrusion detection in computer network systems,”
Expert Systems, vol. 20, pp. 251-259, 2003.
XXXV. Zhang, Xuyun, et al. “An efficient quasi-identifier index based approach for
privacy preservation over incremental data sets on cloud.” Journal of
Computer and System Sciences 79.5: 542-555, 2013.
XXXVI. Zhao Gansen, Rong Chunming, Li Jin, Zhang Feng, Tang Yong. Trusted
data sharing over untrusted cloud storage providers. In: Proceedings of the
2nd IEEE international conference on cloud computing technology and
science (CloudCom 2010), 2010.
XXXVII. Zissis, Dimitrios, and Dimitrios Lekkas. “Addressing cloud computing
security issues.” Future Generation Computer Systems, 28, 3: 583-592, 2012.

View Download