Malicious attack detection approach in cloud computing using machine learning techniques

被引:0
|
作者
M. Arunkumar
K. Ashok Kumar
机构
[1] Sathyabama Institute of Science and Technology (Deemed To Be University),Department of Computer Science and Engineering
来源
Soft Computing | 2022年 / 26卷
关键词
Cloud computing; DDoS attack; Intrusion detection systems; Attack mitigation; Firewall;
D O I
暂无
中图分类号
学科分类号
摘要
The increasing development of decentralized computer systems that interact extensively has increased the criticality of confronting cyberattackers, hackers, and terrorists. With the development of cloud computing and its widespread use, as well as its dispersed and decentralized character, a unique security measure is required to safeguard this architecture. By monitoring, validating, and managing settings, records, internet traffic, usage data, as well as the operations of specific activities, firewalls can distinguish between normal and unexpected behaviours, thus adding additional network security to cloud computing systems. The location of network security mechanisms in cloud computing environment and also the methods employed in such methods are the two primary aspects where many studies have concentrated their efforts. The objective of such studies is to reveal as many incursions as feasible and to improve the pace and correctness of sensing while minimizing false alarms. Nevertheless, these methods have a large computing burden, a poor degree of precision, and a large time consumption. We propose an accurate and complete approach for detecting and preventing assaults in cloud computing environment via the use of a machine learning techniques both supervised and un-supervised. The operational findings demonstrate that the suggested approach substantially increases attack detection, network security correctness, dependability, and accessibility in cloud computing environment, while drastically reducing false alarms.
引用
收藏
页码:13097 / 13107
页数:10
相关论文
共 50 条
  • [21] EFFICIENT DDoS ATTACK DETECTION USING MACHINE LEARNING TECHNIQUES
    Nazarudeen, Fathima
    Sundar, Sumod
    2022 IEEE INTERNATIONAL POWER AND RENEWABLE ENERGY CONFERENCE, IPRECON, 2022,
  • [22] Detection of adversarial phishing attack using machine learning techniques
    Sudar, K. Muthamil
    Rohan, M.
    Vignesh, K.
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2024, 49 (03):
  • [23] A DDoS Attack Detection on Cloud Framework Using Improved Features Based Machine Learning Approach
    Bhargav, Ravi
    Jain, Vishal
    Verma, Manish
    2022 SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL, COMPUTING, COMMUNICATION AND SUSTAINABLE TECHNOLOGIES (ICAECT), 2022,
  • [24] Classification of Bugs in Cloud Computing Applications Using Machine Learning Techniques
    Tabassum, Nadia
    Namoun, Abdallah
    Alyas, Tahir
    Tufail, Ali
    Taqi, Muhammad
    Kim, Ki-Hyung
    APPLIED SCIENCES-BASEL, 2023, 13 (05):
  • [25] Black box attack and network intrusion detection using machine learning for malicious traffic
    Zhu, Yiran
    Cui, Lei
    Ding, Zhenquan
    Li, Lun
    Liu, Yongji
    Hao, Zhiyu
    COMPUTERS & SECURITY, 2022, 123
  • [26] Privilege Escalation Attack Detection and Mitigation in Cloud Using Machine Learning
    Mehmood, Muhammad
    Amin, Rashid
    Muslam, Muhana Magboul Ali
    Xie, Jiang
    Aldabbas, Hamza
    IEEE ACCESS, 2023, 11 : 46561 - 46576
  • [27] Lexical features based malicious URL detection using machine learning techniques
    Saleem Raja, A.
    Vinodini, R.
    Kavitha, A.
    MATERIALS TODAY-PROCEEDINGS, 2021, 47 : 163 - 166
  • [28] Prevention and detection of DDOS attack in virtual cloud computing environment using Naive Bayes algorithm of machine learning
    Shang Y.
    Measurement: Sensors, 2024, 31
  • [29] A scalable distributed machine learning approach for attack detection in edge computing environments
    Kozik, Rafal
    Choras, Michal
    Ficco, Massimo
    Palmieri, Francesco
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 119 : 18 - 26
  • [30] DDoS Attack Detection and Mitigation Techniques in Cloud Computing Environment
    Devi, Kiruthika B. S.
    Subbulakshmi, T.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT SUSTAINABLE SYSTEMS (ICISS 2017), 2017, : 512 - 517