Internet of Things and Cloud Computing

Submit a Manuscript

Publishing with us to make your research visible to the widest possible audience.

Propose a Special Issue

Building a community of authors and readers to discuss the latest research and develop new ideas.

Cyber Security Architecture Components for Cloud Network

The cyber security landscape is constantly evolving and changing with attackers developing new tools and techniques to access organizations' systems and data. Public and private organizations are finding it increasingly difficult to defend their systems and data from these constantly changing, evolving, and persistent threats. Therefore, it is empirical and critical that both business and government agencies protect their systems and data from potential risks arising from these threats for business or organization continuity. Cybercriminals often target the networks to launch attacks on the organization-targeted systems with the intention to gain access and either steal, alter or destroy value data. These attacks may include Malware, DDoS, SQL injection, Phishing, XSS, Botnets, and many more. Cloud adoption has fundamentally changed the way applications are delivered and consumed. Traditional networks lack the security and performance capabilities and therefore cannot support these new cloud challenges. This paper proposes an architecture with built-in algorithms to detect both new and old threats. The paper starts with an analysis of the challenges for intelligent networks. The second part looks at related works that have been carried out in relation to cybersecurity in networks. The third part proposes an architecture with an algorithm built in to detect new threats to the networks. Finally, the last part deals with the implementation of the architecture.

Cloud Networks, Cloud Services, Cyber-Attacks, Traditional Networks, Cyber Security, Big Data, Machine Learning

APA Style

Thierry Mbah Mbelli. (2022). Cyber Security Architecture Components for Cloud Network. Internet of Things and Cloud Computing, 10(3), 33-36.

ACS Style

Thierry Mbah Mbelli. Cyber Security Architecture Components for Cloud Network. Internet Things Cloud Comput. 2022, 10(3), 33-36. doi: 10.11648/j.iotcc.20221003.11

AMA Style

Thierry Mbah Mbelli. Cyber Security Architecture Components for Cloud Network. Internet Things Cloud Comput. 2022;10(3):33-36. doi: 10.11648/j.iotcc.20221003.11

Copyright © 2022 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License ( which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

1. S. Puri, M. Agnihotri, “A Proactive approach for cyber attack mitigation in cloud network,” International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), 2017.
2. A. Shameli-Sendi, Y. Jarraya, M. Pourzandi, M. Cheriet, “Efficient Provisioning of Security Service Function Chaining Using Network Security Defense Patterns” IEEE Transactions on Services Computing, 2019, vol. 12, issue 4.
3. M. B. Sridhar, A. Koushik, “A Study of Big Data Analytics in Clouds with a Security Perspective,” International Journal of Engineering Research & Technology (IJERT), 2017, vol. 6, issue 1.
4. R. Savold, N. Dagher, P. Frazier, D. McCallam, “Architecting Cyber Defense: A Survey of the Leading Cyber Reference Architectures and Frameworks,” IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), 2017.
5. A. Giehl, S. Plaga, “Implementing a performant security control for Industrial Ethernet,” International Conference on Signal Processing and Information Security (ICSPIS), 2018.
6. B. Gokaraju, R. Agrawal, D. A. Doss, S. Bhattacharya, “Identification of Spatio-Temporal Patterns in Cyber Security for Detecting the Signature Identity of Hacker,” SoutheastCon, 2018.
7. S. Sen, C. Jayawardena, “Analysis of Cyber-Attack in Big Data IoT and Cyber-Physical Systems - A Technical Approach to Cybersecurity Modeling,” IEEE 5th International Conference for Convergence in Technology (I2CT), 2019.
8. L. Wang, R. Jones, “Big Data Analytics of Network Traffic and Attacks,” IEEE National Aerospace and Electronics Conference (NAECON), 2018.
9. D. S. Terzi, R. Terzi, S. Sagiroglu, “Big data analytics for network anomaly detection from netflow data,” International Conference on Computer Science and Engineering (UBMK), 2017.
10. C. Zhang, X. Shen, X. Pei, Y. Yao, “Applying Big Data Analytics Into Network Security: Challenges, Techniques and Outlooks,” IEEE International Conference on Smart Cloud (Smart Cloud), 2016.
11. C. B. M. Reddy, U. k. Reddy, E. Brumancia, R. M. Gomathi, K. Indira, “Integrative Approach Of Big Data And Network Attacks Analysis In Cloud Environment,” 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184), 2020.
12. Y. S. K. Vani, Krishnamurthy, “Survey anomaly detection in network using big data analytics,” International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), 2017.
13. Y. Wu, D. Wei, J. Feng, “Network Attacks Detection Methods Based on Deep Learning Techniques: A Survey,” Security and Communication Networks, Vol. 2020.
14. M. Aljabri, S. S. Aljameel, R. M. A. Mohammad, S. H. Almotiri, S. Mirza, F. M. Anis, M. Aboulnour, D. M. Alomari, D. H. Alhamed, H. S. Altamimi, “Intelligent Techniques for Detecting Network Attacks: Review and Research Directions,” Sensors 2021.
15. A. Bilen, A. B. Özer, “Cyber-attack method and perpetrator prediction using machine learning algorithms,” PeerJ Computer Science, April 2021.
16. B. Arpitha, R. Sharan, B. Brunda, D. Indrakumar, B. E. Ramesh, “Cyber Attack Detection and notifying system using ML Techniques,” IJESC, 2021. Vol. 11. Issue No. 06.
17. M. Chalé, N. D. Bastian, J. Weir, “Algorithm Selection Framework for Cyber Attack Detection,” WiseML, 2020.
18. G. Buchgeher, R. Weinreich, “Connecting Architecture and Implementation,” Proceedings of the Confederated International Workshops and Posters on On the Move to Meaningful Internet Systems, 2009.