Abstract

A new distributed environment at less financial expenditure on communication over the Internet is presented by cloud computing. In recent times, the increased number of users has made network traffic monitoring a difficult task. Although traffic monitoring and security problems are rising in parallel, there is a need to develop a new system for providing security and reducing network traffic. A new method, iReTADS, is proposed to reduce the network traffic using a data summarization technique and also provide network security through an effective real-time neural network. Although data summarization plays a significant role in data mining, still no real methods are present to assist the summary evaluation. Thus, it is a serious endeavor to present four metrics for data summarization with temporal features such as conciseness, information loss, interestingness, and intelligibility. In addition, a new metric time is also introduced for effective data summarization. Finally, a new neural network known as Modified Synergetic Neural Network (MSNN) on summarized datasets for detecting the real-time anomaly-behaved nodes in network and cloud is introduced. Experimental results reveal that the iReTADS can effectively monitor traffic and detect anomalies. It may further drive studies on controlling the outbreaks and controlling pandemics while studying medical datasets, which results in smart healthy cities.

1. Introduction

In the last one and half decade, computer technology has significantly overpowered the conventional ways of handling the daily routines in almost every walk of life. All the daily routine activities like reading newspapers, shopping, running a business, studying, and a lot of official works have taken a shift over to the computer networks like LAN, WAN, MAN, Internet, and cloud computing. As these computer networks offer daily routine services to people across the globe, at the same time, attackers have also joined the international community on the same platform, but to disturb the streamlined activities over the networks. These kinds of regular attackers or hackers not only affect the daily routine activities but also disturb the business or government networks [1]. Countering hackers and ensuring the smooth working of computer networks need the construction of a new security mechanism to provide security to the network users and their own secret stored data. For safe and secure communication services for exponential growing e-business and electronic transactions, the use of intrusion detection and prevention systems, encryption, firewalls, authentication, and effective security mechanisms has been done [2]. Data have a significant role in every domain. The storage requirements over networks, in addition to the analysis of data, are of utmost importance to obtain knowledge [3]. A new secure arrangement method is presented, which is based on matrix eigenvalue. The aim of these arrangements is to generate a secret position for each user for storing data, which is called a secure arrangement [4]. Sometimes, the input data could be faster and easier to examine for attaining similar knowledge. For instance, a network administrator over the computer network requires surveillance and supervising the activities of the network [5]. Yet, for a small corporation network like HTTP, FTP, e-mail, and P2P applications, the quantity of data generated is enormous and difficult to analyze [6]. Moreover, the network traffic is increasing at a very rapid rate, which in turn becomes infeasible to monitor a network in real time by administrator [7]. Therefore, to analyze the current scenario of the network, a summary of the network traffic is quite useful to immediately review the situation of the network.

For a large volume of different kind of data generated from different resources like wireless sensors and cloud [8, 9], a summary is essential [10]. The intent of summarizing is to present a crisp dataset as input [11, 12]. Summarization is extensively traversed in different domains such as network data streams [11], intrusion detection systems (IDS) [13, 14], point of sales (POS) data [15], and natural text processing [16]. The summarization has been applied to various domains like healthcare, transport, security, logistics, and daily life [17] and has been demonstrated to be efficient in getting useful data out of huge datasets generated through IoT (Internet of Things) and cloud applications, which is easier to understand or interpret. It becomes even more important to summarize when the whole world is facing a pandemic outbreak and each and every sector of human life is affected.

In the same manner, a network sniffer protects and collects packets in an indiscriminate way, and an intrusion detection system (IDS) does the same. An IDS has the capability to detect different kinds of network attacks in the presented environment. The malicious network activities are identified by analyzing the packets collected by IDS, which gives alert signals to the system administartor and attack connections are blocked to avoid additional destruction from attacks. In general, intrusion detection algorithms are categorized as misuse detection and anomaly detection [18]. Misuse detection algorithm identifies attacks on the basis of known attack signatures. These algorithms are efficient in identifying known attacks with low errors. These algorithms are unable to identify newly created attacks, which do not have similar properties to the known attacks. On the other hand, the anomaly detection method relies on the hypothesis that the attackers have different behavior than a normal user. This paper, being part of iReTADS, presents the following contributions:(i)An existing metric named information loss has been modified that is biased towards recurring attributes and proposed a novel summarization technique that is based on a newly defined time metric for data summarization purpose(ii)The newly proposed metric has been employed to split the dataset into different time intervals(iii)A novel method named modified synergetic neural network (MSNN) has been designed for effective anomaly detection

Further, the paper is organized as follows: Section 2 offers the related works. Section 3 discusses the overall system architecture. Section 4 explains the proposed work. Section 5 gives the results and discussion. Section 6 has the conclusion and future enhancements.

The techniques of data summarization and anomaly detection have already been extensively researched. For association rule mining and clustering various data, summarization techniques are used, and different metrics have been proposed to improve the technique of data summarization. The authors in [19] have demonstrated that there are no universally excepted standards on the subject of what is a good summarization technique or a good summary. The aim of their technique is to represent a transactional database, implementing the notion of hyperrectangles, the Cartesian product of a set of transactions, and a set of items. To define the effectiveness of hyper and hyper + techniques. They calculate the conciseness and the quality as the ratio of coverage per cost of each hyperrectangle so that the final summary cannot be compared to another summary as there is no measure to evaluate it. In [11], the authors explored the technique of compacting the specified number of transactions to a smaller set of summaries so that every summary entitles a subset of the input transactions in such a way that every transaction is represented in the summary. The original dataset is considered as the summary by the Bottom-Up Summarization (BUS) algorithm. In the beginning, frequent item set mining is employed on the input dataset, and then item sets are searched greedily, replacing those with minimum information loss and maximum compaction gain, and represented data points are replaced with them in the summary. The process is repeated till the desired compaction gain is achieved. Here, the metric used is the same for all the techniques of compaction gain. Information loss is also used by the authors to evaluate the results for measuring the amount of information not present in the summary of the original data. Table 1 represents some of the summarized contribution towards anomaly detection. The problem of summarization of a dataset of transactions, where two objective functions, compaction gain and information loss, were used with categorical attributes, is an optimization problem by authors in [11]. In order to describe the output of any summarization algorithm, a new metric was presented by them, and for addressing this problem, they investigated two approaches. In the first approach, clustering was implemented, and for the second approach, the frequent item sets from the association analysis domain were used. In their work of summarization, they proposed one of the applications in the field of network data in which they showed how their technique could be efficiently used for summarizing network traffic into a meaningful and compact representation.

In [28], a recent investigation was done to find the possibility of anomaly detection in the context of real-time big data preprocessing and machine learning techniques. This survey includes the essential components of real-time processing of big data for anomaly detection, taxonomy of real-time big data processing, and various research challenges.

The authors in [29] studied the concept of information gain for network summarization and put forward a measure called information entropy for measuring the quality of a resolution. A probabilistic model of the information contained in a network was developed, and a formula is derived based on this model for information entropy. The network summarization method determines the computational complexity of computing network entropy; for simple deterministic node-reduction summarizations, they developed an O(E) algorithm. In order to decide the most appropriate level of summarization, analysts use network entropy. With the help of information entropy, the information is measured over the network; this network information is combined with information provided by other attributes like geospatial labels for providing a complete scenario of the information enclosed in a particular network resolution.

In [30], a hierarchical data summarization data structure is presented; it was labeled hierarchical as the data structure implemented the concept of subcomponents to systematically attain conceptually larger components. The methods proposed herein acquire a bigger component repeatedly induced by the domain understanding of the users. So, for hierarchical data summarization, the rules implemented in the creation of data structure like B+ trees were also considered, and various data structures were implemented in hierarchical data summarization. Authors in [31] proposed estimation and a real-time loss performance monitoring scheme. Asymptotic relationship between the buffer size for both Markovian and self-similar traffic and Common Language Runtime was used in the proposed scheme. Results obtained by implementing the proposed scheme showed that it required less monitoring time and obtained improved accuracy in comparison to the existing schemes.

The paper [32] presented a group of techniques and methods for traffic data collection, preprocessing, transformation, and integration till the data is forwarded for processing and transfer further for integration or fusion. Real-time data is very imperative for encouraging model accuracy, comprehensive use of assignment models, and historical traffic data for assisting online services and operations. The reliability of information and output from data fusion and processing as proposed by authors in [33] proposed the concern for analyzing the large network data for packet loss in real time, irrespective of any device installed at the network node in advance at monitoring place. However, it is found that the proposed system needs some sort of training in advance for adopting the features of the traffic to be monitored. The time series models are used for training which efficiently represent the high-speed traffic; with the help of these models, important conclusions like how to sample the data can be drawn by simulating the similar behavior shared by traffic.

This work [34] proposed four metrics, conciseness, information loss, interestingness, and intelligibility. These could be used for characterizing data summarization results. However, they modified the information loss metric because of its biased nature towards the recurring attributes. With the use of these four metrics, they assessed the existing summarization techniques on renowned network traffic datasets. A summarization method based on an already existing method was proposed, but here it is taken as an objective function; further, the classification of summarized datasets is carried out to reveal the usability of the metrics. Authors [35], with the help of the Bayesian Network, explained anomaly detection and getting learned by the real world automated identification system (AIS) data and from the additional data, resulting in the production of static and dynamic Bayesian network model. In their finding, they proposed that learned networks were pretty easy to inspect and verify in spite of the large number of variables being incorporated. In order to improve the anomaly detection performance, they confirmed the combination of both static and dynamic modeling approaches for improving the coverage of the overall model.

This work focused [36] on reducing security risk and presented two techniques of the network traffic anomaly detection in cloud communication, and these techniques, with the assistance of synergetic neural networks and the catastrophe theory, understand the dynamic behavior of the network traffic. In synergetic neural networks, a synergetic dynamic equation along with a set of ordered parameters is implemented for describing the complex nature of the network traffic system over cloud communications. Once this equation is solved, the ordered parameters confirmed by the primary factors can converge to 1, which results in anomaly detection. Catastrophe theory makes use of catastrophe potential function to explain the catastrophe dynamic process of the network traffic in cloud communications.

State of the network traffic derives from the normal one; whenever there is an anomaly in the network, the catastrophe distance index is used to assess the derivation, which helps in detecting the anomaly. They assessed the two approaches by implementing these techniques over standard Defense Advanced Research Projects Agency datasets, and it proved to be effective in detecting the network traffic anomaly and accomplished the high detection probability and low false alarm rate.

This contribution [37] presented a new increasing mapping-based hidden Markov model (IMHMM) in order to monitor the dynamic traffic efficiently. An increasing mapping is set up between the observation sequence and possible state sequence. In spite of FB variables, these mappings are used for obtaining the reestimation formulas for the model parameters. The IMHMM can be used to make fault detection and process monitoring framework to deal with large-scale dynamic processes. The IMHMM needs less storage space, and it is simple in comparison to HMM. Kim et al. [3] presented a new hybrid intrusion detection method that integrates hierarchically an anomaly detection model and a misuse detection model. Based on the C4.5 decision tree algorithm, a misuse detection model is built; later, using this model, normal training data is crumbled into smaller subsets. After that, these subsets are used to make multiple one-class SVM models. This method considerably optimizes the high time complexity of training and testing processes.

In this paper [38], a new technique SVM-L is given for anomaly detection in network traffic. Based on the concept of the dual formulation of kernel SVM and Linear Discriminant Analysis, an optimization model was proposed to adjust the hyperparameter of the classifier. Experimentally, 99% accuracy was claimed over network traffic dataset.

The work [39] proposed the ANN-based techniques for anomaly detection in Apache Spark, which works effectively for complex scenarios with multiple types of anomalies, like CPU contention, cache thrashing, and context switching anomalies, and showed 98–99% F-scores. Also, they claimed that a random duration, random start instant, and overlapped anomalies do not cause a significant influence on the performance of the proposed method.

The authors of [40] demonstrated the Convolution Neural Network features with bidirectional long short-term memory for real-time anomaly detection in the surveillance system. They claimed a 3.41% and 8.09% upsurge in accuracy on UCF-Crime and UCF-Crime2Local databases when compared to the newest methods.

The authors of [41] did a multiperspective review over smart anomaly detection in sensor systems and discussed the potential of computing (machine learning models), efficiency in communications medium, and engineering (constraints) in development of a smart anomaly detection system.

The research work [42] proposed a novel multistage anomaly detection ensemble technique named BFA-PDBSCAN for the incessant execution of computations on IoT-based applications. This selection of relevant features from the dataset is carried out by the Boruta method and extended k-medoid with a firefly-inspired strategy for performing partitioning. They claimed the effectiveness of the proposed model over several datasets.

Blockchain and smart contract-based dependable and efficient lightweight certificateless signature (CLS) scheme, which is more secure than CLS protocol alone (Susceptible to security risks), is popular for resource-constrained Industrial Internet of Things (IIoT) protocol design [43].

This paper presents a new model for anomaly detection in the cloud using data summarization and neural network. Network traffic in the cloud is monitored with the help of data summarization; it also collects the necessary data. This summarized data further can be sent to the proposed Modified Synergetic Neural Network for anomaly detection.

3. Proposed Work

In this paper, a new model called iReTADS for detecting a real-time anomaly in the cloud during communications using data summarization and neural network with temporal features is introduced. Temporal Data summarization monitors the network traffic in the cloud in real time and collects the necessary data, and the summarized data can be sent to the proposed Modified Synergetic Neural Network for anomaly detection.

3.1. System Architecture of iReTADS

This proposed system architecture comprises seven key components, namely, data collection agent, cup dataset, network trace data, data summarization module, anomaly detection module, temporal information manager, and knowledge base, as shown in Figure 1.

3.1.1. Data Collection Agent

The network data are collected from the network layer or from the KDD’99 cup dataset by the data collection agents. This data is further sent to the data summarization module for summarizing the data.

3.1.2. Data Summarization Module

Data summarization module is comprised of three chief components as a quality threshold, that is, setting, optimization, and clustering. These components use different algorithms for quality threshold setting, optimization of the data based on the threshold, and clustering the data, and then this summarized data is sent for anomaly detection module.

3.1.3. Anomaly Detection Module

Anomaly detection module for efficient classification of the dataset makes use of proposed classification techniques. This module has a component that sets the rules on the basis of fuzzy concepts by integrating the various combinations of summarized datasets to have efficient classification. For setting the time interval, this module bears the responsibility of remaining in contact with the temporal information manager.

3.1.4. Temporal Information Manager

This module has the accountability of allotting the time interval for summarizing the data; with the assistance of the knowledge base, the time-based fuzzy rules also formed the knowledge base. The knowledge base has a set of rules to answer the queries being fired by the users and execute efficient decision-making. It has contained rules in order to make a decision regarding the summarization process and classification. The decision manager manipulates and maintains the knowledge base.

3.1.5. Decision Manager

The whole process of this proposed system is monitored by the decision manager. In collaboration with the temporal information manager and knowledge base, the decision manager takes all the decisions regarding the classification and data summarization. It has all the control over data summarization, collection agent, and anomaly detection module.

3.2. Data Summarization Technique

This section is presented with a proposed metric along with four existing metrics in order to serve the purpose of data summarization. Although it is well noted that the data summarization obtains the data as input and outputs the data as well, the output cannot be misinterpreted with information or knowledge. Summary here is simply a precise form of the input data, which is made to use as a replacement for competence reasons. As a result, the whole of the measures dealing with data summarization should be objective in nature. This section is comprised of five objective measures for data summarization, namely, time, conciseness, information loss, interestingness, and intelligibility.

3.2.1. Time

This paper presents a new metric, time, which is used for data summarization. In order to monitor traffic, the time interval is a very significant parameter, as a large number of the users access the network or cloud, and many times a situation arises when the network is not traffic-free. In such conditions, when online traffic is being monitored, it should be managed with the help of time intervals amongst the data groups. Already existing techniques are performed remarkably well, even without concentrating on real-time traffic control. These existing techniques have not considered the retrieval time and randomly retrieving the information from the database. Datasets could be prepared between the particular time intervals, whether it is one week, two weeks, one day, or one hour from the server. From datasets, we can find different numbers of time appearances in various time slots. Based on this, the metric subset has to be broken based on the time intervals; using this approach, data can be retrieved based on the exact data occurrence in various time intervals.

3.2.2. Conciseness

The metric conciseness explains the compact data summary as per the dataset; conciseness is discussed and explained with different terminologies like summarization, compression ratio, and compaction gain in various works and different papers like [11, 34, 44]. In another paper, the conciseness is calculated for a set of records at a specified time interval in accordance with the [25]; the calculation is done in a similar manner as of three previous approaches, which is expressed as the ratio of the input dataset size to the summarized dataset size. Let M be the number of data points in the input dataset and S be the number of tuples in the summary. Starting time and ending time are denoted by t1 and t2.

3.2.3. Information Loss

Information loss denoted the amount of information loss in the process or in very simple terms the information that is absent in the summary. According to Ha-Thuc et al. [44], the amount of information lost is known as distortion. As per their definition, distortion is the total of the squared Euclidean distance between every data point and centroid of the cluster to which these points belong. It is quite evident from the definition of distortion in this particular work [44]that this method of information loss calculation can only be used in clustering-based summarization, hence not applicable as a general summarization metric. As per Chandola and Kumar [11, 44], information loss is given by an individual summary for a transaction as “the weighted sum of all the features which are absent in the individual summary.” Hence, aggregating the information loss of each transaction results in the total information loss of the summary. In this work, the information loss for the set of records is calculated in accordance with the work of Chandola and Kumar [11, 44] for the specific time interval further; the results are normalized. Sum of all the ratios of attributes not present to the total attributes represented per summary gives the information loss. Let S be the number of individual summaries, ti be the number of different attributes represented by summary i, and li be the number of different attributes not present in summary i. Starting time and ending time will be indicated by t1 and t2. Then,

3.2.4. Interestingness

The interestingness metric has been discussed extensively in literature; it has been an area of interest for researchers, particularly for finding interesting classification and association rules in data mining [2, 45]. Interestingness is taken up as a broad concept in the literature. It focuses on conciseness, peculiarity, coverage, diversity, reliability, surprisingness, utility, novelty, and actionability. Hoplaros et al. [34] defined interestingness as follows:

Let ni be the derived count attribute of a summary tuple, m be the number of tuples in a summary, and N be the number of total input data points. The starting time and the ending time are represented by t1 and t2.

3.2.5. Intelligibility

Intelligibility defines the characteristics of the summary, that is, the level of sense a summary makes out of the data, on account of the number of ANY attributes present in the summary. Every tuple in the summary represents a subset of the input dataset. If a tuple contains the most closely related data, then there will be fewer ANY attributes present. Let m, be the number of tuples in a summary the i tuple having the attributes ni, and li be the number of non-ANY attributes present in tuple i. As per our approach towards information loss and interestingness, intelligibility should be normalized. We define

3.3. Temporal Data Summarization Algorithm

This algorithm is comprised of three phases, namely, threshold setting, optimization, and clustering. All these three phases make use of various algorithms proposed by different authors on the basis of different metrics. These algorithms are modified in our proposed method by using temporal constraints.

3.4. Proposed Temporal Data Summarization Method

This proposed real-time data summarization method according to [34] is the combination of four phases. These four phases also contain different algorithms, namely, modified quality threshold summarization algorithm, BUS algorithm, K-means clustering algorithm, and data summarization algorithm. We used the data summarization technique, which was proposed by Hoplaros et al. [34]. A new metric called time is introduced for handling real-time data. This new metric plays a major role in the quality threshold summarization algorithm and summarization algorithm, which are present in phase 1 and phase 2, respectively. This metric uses a modified data summarization method that plays necessary roles for handling real-time data in cloud. The proposed data summarization method has introduced a new metric called time interval in Algorithm 1. This new metric is used in the quality threshold algorithm.

Phase 1: modified quality threshold summarization algorithm.
 Input: dataset D, threshold T, time interval.//Threshold setting will be different for different time interval summarized data.
Output: cluster centroids {C1, C2Ck}
 Step 1: initialize the cluster centroid C = ∅;
 Step 2: initialize the threshold t = 0;
 Step 3: initialize the k0 = 1;
 Step 4: choose data item from D and set I0 = d for the particular time interval.
 Step 5: (Ct, Et, <t1, t2>) = K-means (D, kt, It);
 Step 6: Kt+1 = Kt;
 Step 7: It+1 = Ct;
 Step 8: for i ⟵ 1 to kt do
 Step 9: if Eti less than T, then
 Step 10: C = C {Cti}
 Step 11: remove cluster i out of D
 Step 12: Kt+1 = K t+1–1
 Step 13: lt+1 = lt+1 – {Cti}
 Step 14: end
 Step 15: if D equals ∅, then
 Step 16: return centroids {C1; C2Ck};
 Step 17: randomly choose a data point d approximately close to the centroid of the largest cluster;
 Step 18: insert d to It+1;
 Step 19: kt+1 = kt+1 + 1;
 Step 20: t = t + 1;
 Step 21: go to 5;
Phase 2: apply BUS algorithm
Phase 3: apply K-means clustering
Phase 4: apply data summarization algorithm that incorporates all metrics [29].
3.5. Modified Synergetic Neural Network

This section presents a new system for anomaly detection in network and cloud communications which is a combination of temporal data summarization and a Modified Synergetic Neural Network. A Modified Synergetic Neural Network is introduced according to [46]. A new layer based on fuzzy rules for all sets of data is introduced in the framework of SNN in the starting and ending time based on Ganapathy et al. [47]. For anomaly detection, fuzzy intervals will be implemented for making efficient and appropriate decisions; when it is compared with time series, these fuzzy rules have been framed on the basis of different time intervals. There is no denying the fact about the dynamic nature of the network traffic; it is not only dynamic in nature but also complex dynamic. The network traffic has shown nonlinear, nonstationary, and complex dynamic behavior. There are many factors involved in describing the behavior or nature of this network at the broader level [1, 48]. Therefore, the network problem is treated as a high-dimensional problem. Network generation in the cloud communication environment is a task that involves many factors, and with the assistance of all these factors or parameters, it could be achieved. There are various factors that dominate the network equally, and the changes over the network are normal, but the network traffic reflects large randomness. Attackers or abnormal users dominate the key factor because when anomalies happen, all the above-discussed factors do not contribute to the network traffic at par. The network at an abnormal state shows strong certainty. Synergetic, says primary, factors contribute to the generation of the order parameter. Randomness and similarity in the cloud communication and network traffic are the characteristics of order parameters in the network. Interdisciplinary science named synergetic demonstrates the organization and formulation of structures and patterns in an open system, which are far from thermodynamics equilibrium. This science focuses on bringing temporal, spatial, and functional structures on macroscopic scales of the various individual factors of a dynamic system. According to synergetic [46], a dynamical system can be expressed as follows:where q is the system state; q+ is the adjoint state of q; V is the potential function of the system; q is the differential of q; and the other is the same on the following equations in this paper.

According to the control principle of synergetic, stable models have a dependency on the unstable models. Whenever there is the process of evolution of the system, the number of certain unstable models keeps on increasing; on the other hand, the number of stable models starts decreasing. When the number of unstable models becomes large, they start behaving as the primary factor in the system, which, as a consequence, transforms the high-dimensional problem into the low dimension problem and the values of the unstable models known as order parameters. These unstable models with the highest original order parameter decide the final state of the system. Synergetic science explains the fundamental building principle for pattern recognition and comes up with an opinion: the process of pattern recognition is pattern formation, which is a top-down approach for analyzing a problem or system. How pattern recognition works are explained here, macroqualitative variation of the system corresponds to the pattern formation, and transformation of the process from testing data to the training data is equivalent to pattern recognition, which reflects the similarity between pattern recognition and pattern formation. MSNN is the technique of pattern recognition when it comes to network traffic anomaly detection in cloud communication based on MSNN. Identified patterns and prototype patterns are presented by testing data and training data, respectively, in the process of MSNN. And the technique to identify the testing data is to map the testing data to some already existing training dataset. The identification of testing network traffic patterns q can be explained as a dynamic process in cloud communications. After mapping the initial testing data q(0) from intermediate state q(t1,t2) to a training data vector , the training data vector is most near to q(0). The process can be described as q(0) ⟶ q(t1,t2) ⟶ , where q(0) is the testing network traffic data, is the stored normal or abnormal traffic network traffic, and the intermediate state q(t1, t2) is the order parameter . To be precise, this process can be represented by a dynamic equation (2). The assumption is made that the number of the training data vectors is M and the dimension of the training data vector is N. For maintaining the linear independence of the M training data vector, M ≤ N is required.where q is the testing network traffic data vector in cloud communications with the original input data value q (0). Scalar value is the attention parameter because when it is positive, only testing data can be identified. F (t1, t2) is the fluctuation factor for the particular record login and logout time of the network traffic in cloud communications and can be ignored. Scalar values B and C are specified coefficients and must be greater than 0. is the training data vector, = (,1, ,2,….., ,N)T, where superscript T is vector transposition. + is the adjoint vector of .

should be prepared with normalization and zero mean:

In order to reduce the dimensionality of the system, the order parameters are features extracted from vector q. q can be represented by the order parameters , a training data vector , and the remaining vector :

The adjoint vector of q is defined as follows:

There is a relationship:

Typing (5) into (7), according to the orthogonal relationship, the order parameter k is defined as follows:

Style described in (2) is a powerful dynamic equation. If we neglect the fluctuation factor F(t1, t2) during the particular time interval of the network traffic in cloud communications, according to equations (1) and (2), the potential function can be described as follows:

According to equations (1), (2), and (8), correspondingly, the dynamic equations and the potential function described by the order parameter are as follows:

At the lowest potential energy of a system, the system controlled by the order parameters reaches the most stable state. Here, the order parameters attain their extreme value. The stable state of the network system is described by the following formula:

That is,

If we define

then the following equations can be inferred from (10) and (12):

As per the (15), there are four layers in the MSNN architecture in Figure 2. The top layer is the input layer in which unit j receives component qj(0) of need recognized pattern vectors original value q(0). All the order parameter components form the middle layer, where the order parameter is obtained by summing all angle indexes j through each input value qj(0), multiplying its joint unit +kj. The active order parameter recognizes the special training data chosen by the angle index k. According to the dynamical equation, MSNN will be evolved to the end state that only one of the order parameters survives, and qj is obtained through reciprocity and competition of D. The down layer is the output layer in which output pattern can be expressed as , where qj is active of output unit j and is the end of the state of the middle layer. There is  = 1 if k = k0; otherwise,  = 0. j is the component of j of the training data vector.

Time series of the network traffic in cloud communications are represented by y1, …yN; these are sampled in bytes or bits or packets per time unit. The fuzzy temporal information manager of the proposed system MSNN deals with the fuzzy time interval for detecting anomalies. Fuzzy time intervals are set up as shown in Figure 3. Normal and abnormal network traffic are set for constructing a training dataset that may contain M components from a specific time interval. Network traffic fuzzy time intervals also share the same size N. This proposed anomaly detection method is designed in such a way to make a distinction between normal and abnormal network traffic.

The process of anomaly detection includes two stages as shown in Figure 4: the training stage is to learn the training data of the normal and abnormal network traffic, and the testing stage is to detect the network traffic anomaly. The detailed detection steps are given as follows.

3.5.1. The Training Stage

(a)Choose the training data vectors { y1,…yN } from the trained dataset for specific time intervals(b)Deal with the training pattern vectors { y1,…yN } with normalization and zero mean and then compute the training data vectors for the particular time interval records(c)Compute the corresponding adjoint v +k of the training data vectors at particular time intervals

3.5.2. The Testing Stage

(a)Test on the testing data vector q(0) consisted of the testing network traffic data in cloud communications dealt with normalization and zero mean.(b)Compute the corresponding order parameter of each training data according to (8), which is in the particular time interval.(c)Evolve by the following order parameter dynamic equation (17) until the order parameters start converging to a specific training data and then to the specific training data vector q(0) in a particular time interval. Thus, the processes of the network traffic anomaly detection in cloud communications based on MSNN have been completed.where is the iterative step.

The steps of the training stage are as follows:(1)Consider the fuzzy time intervals y1,…yN of the training data, for each time interval between t1 and t2, and construct the vector set { Ytp=(yt − p + 1, …,yt) |t = 1,…,N–p + 1}, which is the time interval window(2)Obtain the set of the state variable {xt} and the control variables {ut} and {} based on normalized features extracted from each vector Ypt(3)Compute the parameters a and b of the cusp catastrophe model using the series {xt}, {ut}, and {}

In the testing stage, the main steps are as follows:(1)Construct the vector Ytp (with the same time window Winp in the training stage) of the testing data at the observed time I, which is labeled as observed point i.(2)Extract the selected normalized features to present the state variable xi and control variables ui and .(3)Compute the catastrophe distance between the observed point i(xi, ui, ) and the bifurcation set G(x, u, ), labeled as Dp. The catastrophe distance Dp is defined as follows: assuming that i(xi, ui, ) is an observed point in the testing data of the traffic in cloud communications and t(xt, ut, ) is a point of the equilibrium surface G(x, u, ), the distance between two points i(xi, ui, ) and t(xt, ut, t), labeled as DE(i, t) is computed by the Minkowski distance. The catastrophe distance Dp between the observed point i(xi, ui, i) and the equilibrium surface G(x, u, ) is defined as

As catastrophe distance Dp is more than a threshold, then anomaly can be claimed at the observing point Pi (xi, ui, i). The threshold is obtained by training.

4. Results and Discussion

In this section, the different experimental results carried out for data summarization and anomaly detection have been discussed. For data summarization, different experiments by using the four different metrics in algorithms called quality threshold algorithms (BUS algorithm and K-means clustering algorithm) have been performed. Finally, these algorithms are combined to propose Modified Synergetic Neural Network for providing better classification accuracy.

The proposed method is the combination of the very well-known and state-of-the-art techniques and, while using the strength of the neural network, gives a very good performance.

4.1. Datasets

The dataset for this experiment is taken from the third International Knowledge Discovery and Data Mining Tools Competition (KDD Cup 99) [18, 49]. Every connection record is characterized by 41 attributes. All these attributes are both discrete and continuous in nature; these variables are drastically varying to each other on the basis of statistical distributions, turning it to be a challenging task for intrusion detection [50].

This dataset contains 5 million network connection records like password guess, land attack, Neptune attack, and port scan. The twenty-two categories of attack are from the following four classes: DOS, R2L, U2R, and probe. The 41 features explain the fundamental information regarding network packet, network traffic, host traffic, and content information. Each record has 5 class labels, namely, normal, probe, DOS, R2L, and U2R. It has 391458 DOS attack records, 52 U2R attack records, 4107 probe attack records, 1126 R2L attack records, and 97278 normal records only in 10 percent of this dataset.

4.2. Experimental Results

Table 2 shows the performance of quality threshold data summarization. From this table, we can see the different four metrics such as conciseness, information loss, interestingness, and intelligibility values when considering the different threshold values with a number of clusters considered for summarization of data.

Table 3 shows the performance of BUS in data summarization. Here, the different four metrics such as conciseness, information loss, interestingness, and intelligibility values were obtained when considering the different kinds of summary sizes for summarization of data.

Table 4 shows the performance of the K-means clustering algorithm in data summarization. From this table, we can see the different four metrics such as conciseness, information loss, interestingness, and intelligibility values during the consideration of different thresholds for the different number of clusters for summarization of data.

Figure 5 shows the comparison of performance analysis between the existing quality threshold algorithm and the combination of the proposed MSNN with the quality threshold algorithm. Figure 2 explains that the MSNN framework with quality algorithm has outperformed the existing quality threshold algorithms in terms of classification accuracy. The proposed anomaly detection method provides better anomaly detection accuracy significantly while considering different thresholds for anomaly detection.

Figure 6 shows the comparison of performance analysis between the existing K-means clustering algorithm and the combination of the proposed MSNN with the K-means clustering algorithm.

From Figure 6, it can be observed that the classification accuracy of the proposed MSNN with the K-means clustering algorithm is better than the existing K-means clustering algorithm. The proposed anomaly detection method provides better anomaly detection accuracy quite significantly during the consideration of different thresholds for anomaly detection.

Figure 7 shows the comparison of performance analysis for the existing BUS algorithm, modified BUS algorithm, and the proposed MSNN with modified BUS algorithm. From this figure, it can be observed that the classification accuracy of the proposed MSNN with modified BUS algorithm is better than the existing BUS algorithm and modified BUS algorithm. The proposed anomaly detection method provides better anomaly detection accuracy significantly during the consideration of different thresholds for anomaly detection.

5. Conclusions and Future Work

This paper presents iReTADS, an intelligent real-time anomaly detection technique. As a part of it, a new metric time interval is introduced for data summarization in addition to four existing metrics for the same purpose. We proposed a novel neural network framework with fuzzy temporal features comprised of four layers, and this handles the fuzzy time interval for classification. Finally, the demonstration for classification of summarized datasets using the proposed neural network was carried out for assessing its effectiveness. Time taken while using summarized data can be a fraction of the total time taken over the original dataset, getting approximately the same results, which can save time in a critical application. These methods should be optimized and parallelized. However, the system is tested with large datasets of network traffic, which revealed another necessity. More focus should be given to real-time anomaly detection, and the research efforts will be directed to stream data summarization and anomaly detection methods. In future works, we will explore a new effective real-time anomaly detection method using soft computing techniques.

Data Availability

The data used in this study are available at https://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.