A Securing Infrastructure Against Signature-based Assaults Using Karnaugh Detection Systems


  • Syeda Wajiha Zahra Student, Department of Computing, Abasyn University, Islamabad, Pakistan
  • Muhammad Nadeem Lecturer, Department of Computing, Alhamd Islamic University, Islamabad, Pakistan
  • Ali Arshad Lecturer, Department of Computing, National University of Technology, Islamabad, Pakistan
  • Saman Riaz Lecturer, Department of Computing, National University of Technology, Islamabad, Pakistan


Malware Analysis, Cloud Attacks, cloud malware detection, Attacks, Karnaugh Map, signature attacks, Cloud servers


Cloud computing is one of the efficient business models for offering customers online services. Approximately 81% of businesses worldwide rely on the cloud; however, one of the most pressing issues is cloud security. Malware of several kinds can cause havoc in the clouds. Attacks on the cloud might come from both the inside and the outside. The signature attacks that can occur from outside the cloud server will be the main topic of this study. Brute Force and Signature-Threats are the two outside attacks that attack cloud servers the most. Numerous procedures can stop brute force assaults, but few solutions can detect signature attacks from the network. In this study, to secure data from attacks, a secure architecture will be created, and externally signature-based attacks will be done on the cloud server. The development of an effective method to identify signature attacks coming from outside the cloud is structured. The performance of the mechanism will then be determined using the various keys implemented on a Karnaugh Map, and the tool's effectiveness will then be assessed.


Nadeem Muhammad, Arshad Ali, Riaz Saman, Zahra Syeda, Dutta Ashit, Alaybani Sultan. A Secure Architecture to Protect the Network from Replay Attacks during Client-to-Client Data Transmission. Appl Sci. 2022; 12(16): 8143. 10.3390/app12168143.

Roschke S, Feng Cheng, Meinel C. 8th IEEE International Conference on Intrusion Detection in the Cloud. In Dependable, Autonomic and Secure Computing, 2009 (DASC'09). 2009 Dec 12–14; 729–734.

Gul I, Hussain M. Distributed cloud intrusion detection model. Int J Adv Sci Technol. 2012 Sep; 34: 71–82.

Nadeem Muhammad, Arshad Ali, Riaz Saman, Zahra Syeda, Dutta Ashit, Alruban Abdulrahman, Almutairi Badr, Alaybani Sultan. Two-Layer Security Algorithms to Prevent Attacks on Data in Cyberspace. Appl Sci. 2022; 12(19): 9736. 10.3390/app12199736.

Sabahi F. Virtualization-level security in cloud computing. IEEE 3rd Int Conf Communication Software Networks. 2011; 250–254.

Nadeem Muhammad, Arshad Ali, Riaz Saman, Zahra Syeda, Shahab Band S, Mosavi Amir. Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks. Comput Mater Contin. 2022; 74(2): 2625–2640. 10.32604/cmc.2023.030899.

Tadapaneni NR. A Survey of Various Load Balancing Algorithms in Cloud Computing. Int J Sci Adv Res Technol. 2020; 6(4): 484–487.

Puthal, Sahoo, Mishra, Swain. Cloud computing features, Issues and Challenges: A big picture. International Conference on Computational Intelligence & Networks. 2015; 116–123.

Bikram B. Safe on the Cloud: A Perspective into the Security Concerns of Cloud Computing. 2009; 4: 34–35.

Nadeem Muhammad, Arshad Ali, Riaz Saman, Zahra Syeda, Dutta Ashit, Moteri Moteeb, Alaybani Sultan. An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms. Comput Mater Contin. 2022; 74(2): 4059–4079. 10.32604/cmc.2023.032882.

Jamil D, Zaki H. Cloud Computing Security. Int J Eng Sci Technol. 2011; 3(4): 3478–3483.

Nadeem Muhammad, Arshad Ali, Riaz Saman, Zahra Syedawajiha, Rashid Muhammad, Shahab Band S, Mosavi Amir. Preventing Cloud Network from Spamming Attacks Using Cloudflare and KNN. Comput Mater Contin. 2022; 74(2): 2641–2659. 10.32604/cmc.2023.028796.

Shen Z, Tong Q. The security of cloud computing system enabled by trusted computing technology. In 2nd International Conference on Signal Processing Systems (ICSPS 2010). 2010; 2: 2–11.

Modi CN, Patel DR, Patel A, Rajarajan M. Integrating signature apriori based network intrusion detection system (NIDS) in cloud computing. In 2nd International Conference on Communication, Computing and Security. 2012; 905–912.

Zahra SW, Arshad A, Nadeem M, Riaz S, Dutta AK, Alzaid Z, Alabdan R, Almutairi B, Almotairi S. Development of Security Rules and Mechanisms to Protect Data from Assaults. Appl Sci. 2022; 12(24): 12578. [online] doi:10.3390/app122412578.

Can O, Sahingoz OK. A survey of intrusion detection systems in wireless sensor networks. In 2015 6th international conference on modeling, simulation, and applied optimization (ICMSAO). 2015; 1–6.

Nadeem Muhammad Arshad Ali, Riaz Saman, Zahra Syeda, Dutta Ashit, Alaybani Sultan. Preventing the Cloud Networks through Semi-Supervised Clustering from Both Sides Attacks. Appl Sci. 2022; 12(15): 7701(19p). 10.3390/app12157701.

Kenkre PS, Pai A, Colaco L. Real Time Intrusion Detection and Prevention System. Cham: Springer International Publishing; 2015; 405–411.

Lin W-C, Ke S-W, Tsai C-F. CANN: an intrusion detection system based on combining cluster centers and nearest neighbors. Knowl Based Syst. 2015; 78(Suppl C): 13–21.

Gaikwad DP, Thool Ravindra C. Intrusion Detection System Using Bagging Ensemble Method of Machine Learning. International Conference on Computing Communication Control and Automation; IEEE Computer Society. 2015; 291–295.

Dhage SN, Meshram BB, Rawat R, Padawe S, Paingaokar M, Misra A. Intrusion detection system in cloud computing environment. In Proceedings of the International Conference & Workshop on Emerging Trends in Technology (ICWET'11). ACM, New York, NY, USA. 2011; 235–239. 22. Aryachandra A, Yulianto Fazmah Arif, Anggis SN. Intrusion Detection System (IDS) server placement analysis in cloud computing. 2016 4th International Conference on Information and Communication Technology (ICoICT), Bandung, Indonesia. 2016; 1–5. 10.1109/ICoICT.2016.7571954.

Saad EN, Mahdi KE, Zbakh M. Cloud computing architectures based IDS. 2012 IEEE International Conference on Complex Systems (ICCS), Agadir, Morocco. 2012; 1–6. doi: 10.1109/ICoCS.2012.6458581.

Mazzariello C, Bifulco R, Canonico R. Integrating a network IDS into an open source Cloud Computing environment. 6th International Conference on Information Assurance and Security (IAS). 2010; 265–270.

Alhomoud Adeeb, Munir Rashid, Pagna Diss Jules, Awan Irfan, Al-Dhelaan Abdullah. Performance Evaluation Study of Intrusion Detection Systems. Procedia Comput Sci. 2011; 5: 173–180. 10.1016/j.procs.2011.07.024.

Tadapaneni Narendra Rao. Cloud Computing Security Challenges. Int J Innov Eng Res Technol. 2020 Jun; 7(6): 1–6.

Nadeem Muhammad, Arshad Ali, Riaz Saman, Shahab Band S, Mosavi Amir. Intercept the Cloud Network From Brute Force and DDoS Attacks via Intrusion Detection and Prevention System. IEEE Access. 2021; 9: 152300–152309. 10.1109/ACCESS.2021.3126535.