On Development of a Machine Learning Based Cloud Security Model for Securing Data from Cyberattacks

Authors

  • A.Daniel Department of Computer Science and Engineering, Amity University, Madhya Pradesh, India. Author

Keywords:

Intrusion detection systems, cloud computing, machine learning, feature extraction

Abstract

Malicious hackers, cybercriminals, and terrorists are becoming more dangerous because of the proliferation of decentralised computer systems that interact extensively. There must be a specific security solution in place to protect cloud computing because of its extensive use and scattered and decentralised nature. Filters, which keep track of everything from internet traffic to logs to use statistics, can tell the difference between anticipated and unexpected activity on a network by keeping tabs on anything from settings to logs to log files. There have been a lot of research on the location of network security measures in cloud computing environments, as well as the techniques used to implement them. Studies like this aim to find as many intrusions as possible and to speed up and increase the accuracy of detection while reducing false alarms. There is a lot of computation required, but the results aren't as accurate as they could be. Machine learning techniques, both supervised and unsupervised, can be used to detect and prevent attacks in cloud computing environments. For cloud computing, attack detection, network security accuracy, reliability and accessibility are significantly improved by using the recommended technique, which considerably reduces false alarms.

Downloads

Download data is not yet available.

References

Ahmim, L. Maglaras, M.A. Ferrag, M. Derdour, H. Janicke, in: A novel hierarchical intrusion detectionsystem based on decision tree and rules-based models, Santorini Island, Greece, 2019, pp. 228–233.

Goeschel, Reducing false positives in intrusion detection systems using data-mining techniques utilizing support vector machines, decision trees, and naive Bayes for off-line analysis, in: In Proceedings of the SoutheastCon 2016, 2016, pp. 1–6.

Hu, T. Li, N. Xie, J. Hu, False positive elimination in intrusion detection based on clustering. In, in: Proceedings of the 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), 2015, pp. 519–523.

Kuttranont, K. Boonprakob, C. Phaudphut, S. Permpol, P. Aimtongkhamand, U. KoKaew, B. Waikham, C. So-In, Parallel KNN and Neighborhood Classification Implementations on GPU for Network IntrusionDetection, J. Telecommun. Electron. Comput. Eng. (JTEC) 9 (2017) 29–33.

Ma, F. Wang, J. Cheng, Y. Yu, Chen, X (2016) A hybrid spectral clustering and deep neural network ensemblealgorithm for intrusion detection in sensor networks, Sensors 16 (2016) 1701.

Mayhew, M. Atighetchi, A. Adler, R. Greenstadt, Use of machine learning in big data analyticsfor insider threat detection, in: In Proceedings of the MILCOM 2015–2015 IEEE Military CommunicationsConference, 2015, pp. 915–922.

Min, J. Long, Q. Liu, J. Cui, W. Chen, TR-IDS: Anomaly-based intrusion detection throughtext-convolutional neural network and random forest, Secur. Commun, Netw, 2018, p. 4943509.

Peng, K.; Leung, V.C.; Huang, Q(2018). Clustering approach based on mini batch kmeans for intrusion detectionsystem over big data. IEEE Access 2018, 6, 11897–11906.

Rigaki, M.; Garcia, S.(2018) Bringing a gan to a knife-fight: Adapting malware communication to avoid detection.In Proceedings of the 2018 IEEE Security and PrivacyWorkshops (SPW), San Francisco, CA, USA, pp. 70–75.

[Teng, N. Wu, H. Zhu, L. Teng, W. Zhang, SVM-DT-based adaptive and collaborative intrusion detection.IEEE/CAA, J. Autom. Sin. 5 (2017) 108–118.

Yu, J. Long, Z. Cai, (2017) Network intrusion detection through stacking dilated convolutional autoencoders, Secur. Commun. Netw. 2017 (2017) 4184196.

Zeng, H. Gu, W. Wei, Guo Y. Deep, Full Range: A Deep Learning Based Network Encrypted TrafficClassification and Intrusion Detection Framework, IEEE Access 7 (2019) 45182–45190.

Published

2024-04-29

Issue

Section

Research Articles

How to Cite

A.Daniel. 2024. “On Development of a Machine Learning Based Cloud Security Model for Securing Data from Cyberattacks”. International Journal of Scientific and Research in Engineering(IJSRE) 1 (2): 39-48. http://ijsre.org/index.php/home/article/view/8.

Similar Articles

You may also start an advanced similarity search for this article.