SDN-enabled adaptive security framework for multi-cloud infrastructures using deep learning-based threat detection and policy management


Abstract

Organizations achieve agility, expandability, and enhanced resource utilization in multi-cloud environments but encounter notable challenges in ensuring uniform and strong security across varied cloud platforms. The diversity of cloud providers, each with distinct configurations and security policies, complicates harmonized policy enforcement, creating significant vulnerabilities in data protection and threat detection. Moreover, the shifting and dispersed nature of multi-cloud operations broaden the attack surface, rendering real-time threat mitigation more complex. To address these challenges, we introduced a groundbreaking Software-Defined Networking (SDN)-enabled framework incorporating deep learning for attack detection and adaptive security policy management. The developed framework consists of two primary components: Software Defined Multicloud Defense Controller (SDMDC), which delivers centralized, instantaneous security policy enforcement (control plane), while MCIDS-G facilitates widespread threat detection across cloud platforms (Data plane). SDMDC’s comprehensive IDS system was constructed using the Cross-Cloud Threat Transformer model. MCIDS-G’s regional IDS system was formulated using the LSTM model.
Additionally, the Lemerus optimizer is utilized in SDMDC for economic policy management. SDMDC implements security standards that extend all cloud environments where applications operate. Cloud security issues persist because the solution integrates coordinated international security techniques with threat identification abilities and policy administration systems. The SDMDC manage the input and output of traffic and east-west movement between separate cloud environments, including AWS and supplementary service providers. Fundamental scalability capabilities function with flexible functions in the proposed framework. The system provides automatic policy implementation between platforms and facilitates instantaneous reaction to threats to preserve security consistency. Our finalized developments have revolutionized this work through a crucial breakthrough. The proposed framework signifies an improved security solution compared to existing multi-cloud protection approaches, which introduces new research directions. Research advancement in new directions becomes feasible when traffic management elements, firewall integrations and FQDN policy enforcement with proxy management solutions are deployed.
Ask to review this manuscript

Notes for potential reviewers

  • Volunteering is not a guarantee that you will be asked to review. There are many reasons: reviewers must be qualified, there should be no conflicts of interest, a minimum of two reviewers have already accepted an invitation, etc.
  • This is NOT OPEN peer review. The review is single-blind, and all recommendations are sent privately to the Academic Editor handling the manuscript. All reviews are published and reviewers can choose to sign their reviews.
  • What happens after volunteering? It may be a few days before you receive an invitation to review with further instructions. You will need to accept the invitation to then become an official referee for the manuscript. If you do not receive an invitation it is for one of many possible reasons as noted above.

  • PeerJ Computer Science does not judge submissions based on subjective measures such as novelty, impact or degree of advance. Effectively, reviewers are asked to comment on whether or not the submission is scientifically and technically sound and therefore deserves to join the scientific literature. Our Peer Review criteria can be found on the "Editorial Criteria" page - reviewers are specifically asked to comment on 3 broad areas: "Basic Reporting", "Experimental Design" and "Validity of the Findings".
  • Reviewers are expected to comment in a timely, professional, and constructive manner.
  • Until the article is published, reviewers must regard all information relating to the submission as strictly confidential.
  • When submitting a review, reviewers are given the option to "sign" their review (i.e. to associate their name with their comments). Otherwise, all review comments remain anonymous.
  • All reviews of published articles are published. This includes manuscript files, peer review comments, author rebuttals and revised materials.
  • Each time a decision is made by the Academic Editor, each reviewer will receive a copy of the Decision Letter (which will include the comments of all reviewers).

If you have any questions about submitting your review, please email us at peer.review@peerj.com.

Your institution may have Open Access funds available for qualifying authors. See if you qualify

Publish for free

Comment on Articles or Preprints and we'll waive your author fee
Learn more

Five new journals in Chemistry

Free to publish • Peer-reviewed • From PeerJ
Find out more