Supervised learning for Attack Detection in Cloud

  • Animesh Kumar Department of Computer Science and Engineering, Birla Institute of Technology, Mesra, Ranchi, Jharkhand, India https://orcid.org/0009-0007-3679-8025
  • Sandip Dutta Department of Computer Science and Engineering, Birla Institute of Technology, Mesra, Ranchi, Jharkhand, India https://orcid.org/0000-0002-3932-3048
  • Prashant Pranav Department of Computer Science and Engineering, Birla Institute of Technology, Mesra, Ranchi, Jharkhand, India https://orcid.org/0000-0002-3932-3048
Keywords: Cloud Attack, Cloud Computing, Machine Learning, Supervised Learning, Security Issues, Support Vector Machine

Abstract

In this study, we approach a supervised learning algorithm to detect attacks in cloud computing. We categorize “Normal” and “Attack” statuses on the dataset. The model evaluation process uses the kappa statistic, the F1-score, recall, accuracy, and precision. The system has a very high detection and efficiency rate, with a detection rate of over 99%. A total of 9594 cases and 44 distinct columns are included in the dataset. The study's results were displayed using a ROC curve and a confusion matrix. This study focuses on implementing a supervised learning algorithm for detecting attacks in cloud computing environments. The main objective is distinguishing between "Normal" and "Attack" statuses based on a carefully curated dataset. Several metrics, such as the kappa statistic, F1-score, recall, accuracy, and precision, are employed to evaluate the model's performance. The dataset utilized in this research comprises 9594 cases and encompasses 44 distinct columns, each representing specific features relevant to cloud computing security. Through a rigorous evaluation process, the algorithm demonstrates exceptional efficiency, achieving a remarkable detection rate of over 99%. Such high accuracy in identifying attacks is crucial for ensuring the integrity and security of cloud-based systems. The significance of this study lies in its successful application of a supervised learning approach to tackle cloud computing security challenges effectively. The model's high detection rate and efficiency indicate its potential for real-world deployment in cloud-based systems, contributing to enhanced threat detection and mitigation. These results hold promising implications for bolstering the security measures of cloud computing platforms and safeguarding sensitive data and services from potential attacks.

References

Agrawal, N., & Tapaswi, S. (2019). Defense mechanisms against DDoS attacks in a cloud computing environment: State-of-the-art and research challenges. IEEE Communications Surveys & Tutorials, 21(4), 3769-3795. https://doi.org/1109/COMST.2019.2934468.

Aldhyani, T. H. H., & Alkahtani, H. (2022). Artificial Intelligence Algorithm-Based Economic Denial of Sustainability Attack Detection Systems: Cloud Computing Environments. Sensors, 22(13), 4685. MDPI AG. Retrieved from http://dx.doi.org/10.3390/s22134685

Anitha, P. T., Dibaba, W., & Boddu, R. (2023, May). Mitigation of Attacks Using Cybersecurity Deep Models in Cloud Servers. IEEE, In 2023 International Conference on Disruptive Technologies (ICDT). pp. 202-205. https://doi.org/10.1109/ICDT57929.2023.10150832.

Arunkumar, M., & Kumar, K. A. (2023). GOSVM: Gannet optimization based support vector machine for malicious attack detection in cloud environment. International Journal of Information Technology, 15(3), 1653-1660. https://doi.org/10.1007/s41870-023-01192-z

Ashlam, A. A., Badii, A., & Stahl, F. (2023). Data-Mining and Hashing to Prevent Application-Layer DDoS and SQL Injection Attacks. In 2023 IEEE International Conference on Advanced Systems and Emergent Technologies (IC_ASET), pp. 01-06. https://doi.org/10.1109/IC_ASET58101.2023.10150694.

Bag, S., Golder, R., Sarkar, S., & Maity, S. (2023). SENE: A novel manifold learning approach for distracted driving analysis with spatio-temporal and driver praxeological features. Engineering Applications of Artificial Intelligence, 123, 106332. https://doi.org/10.1016/j.engappai.2023.106332

Bicego, M. (2023). DisRFC: a dissimilarity-based Random Forest Clustering approach. Pattern Recognition, 133, 109036. https://doi.org/10.1016/j.patcog.2022.109036

Butt, U.A., Amin, R., Mehmood, M. (2023). Cloud Security Threats and Solutions: A Survey. Wireless Pers Commun, 128, 387–413. https://doi.org/10.1007/s11277-022-09960-z

Chauhan, N., Kumar, V., & Dixit, S. (2023). To achieve sustainability in a supply chain with Digital integration: A TISM approach. International Journal of Experimental Research and Review, 30, 442-451. https://doi.org/10.52756/ijerr.2023.v30.041

Clemens, V., Schulz, L. C., Gartner, M., & Hausheer, D. (2023, May). DDoS Detection in P4 Using Hyperloglog and Countmin Sketches. In NOMS 2023-2023 IEEE/IFIP Network Operations and Management Symposium, pp. 1-6. https://doi.org/10.1109/NOMS56928.2023.10154315.

Das, S., & Sarkar, S. (2022). News media mining to explore speed-crash-traffic association during COVID-19. Transportation Research Record, 03611981221121261. https://doi.org/10.1177/03611981221121261

Dash, G., Sharma, C., & Sharma, S. (2023). Sustainable Marketing and the Role of Social Media: An Experimental Study Using Natural Language Processing (NLP). Sustainability, 15(6), 5443. MDPI AG. Retrieved from http://dx.doi.org/10.3390/su15065443

Dey, P., Chowdhury, S., Abadie, A., Yaroson, E. V., & Sarkar, S. (2023). Artificial Intelligence-Driven Supply Chain Resilience in Vietnamese Manufacturing Small-and Medium-Sized Enterprises. International Journal of Production Research. https://doi.org/10.1080/00207543.2023.2179859

Emil Selvan, G. S. R., Ganeshan, R., Jingle, I., & Ananth, J. P. (2023). FACVO-DNFN: Deep learning-based feature fusion and Distributed Denial of Service attack detection in cloud computing. Knowledge-Based Systems, 261, 110132. https://doi.org/10.1016/j.knosys.2022.110132

Gemmer, D. D., Meyer, B. H., de Mello, E. R., Schwarz, M., Wangham, M. S., & Nogueira, M. (2023, May). A Scalable Cyber Security Framework for the Experimentation of DDoS Attacks of Things. In NOMS 2023-2023 IEEE/IFIP Network Operations and Management Symposium, pp. 1-7. https://doi.org/10.1109/NOMS56928.2023.10154400.

George, A. S., & Sagayarajan, S. (2023). Securing Cloud Application Infrastructure: Understanding the Penetration Testing Challenges of IaaS, PaaS, and SaaS Environments. Partners Universal International Research Journal, 2(1), 24-34. https://doi.org/10.5281/zenodo.7723187

Gong, S., Ochiai, H., & Esaki, H. (2020). Scan-Based Self Anomaly Detection: Client-Side Mitigation of Channel-Based Man-in-the-Middle Attacks Against Wi-Fi. In 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC), pp. 1498-1503. https://doi.org/10.1109/COMPSAC48688.2020.00-43.

Gopinath, N., & Shyry, S. P. (2023). Side Channel Attack Free Quantum Key Distribution Using Entangled Fuzzy Logic. Braz. J. Phys., 53, 35. https://doi.org/10.1007/s13538-022-01246-w

GSR, E. S., Ganeshan, R., Jingle, I. D. J., & Ananth, J. P. (2023). FACVO-DNFN: Deep learning-based feature fusion and Distributed Denial of Service attack detection in cloud computing. Knowledge-Based Systems, 261, 110132. https://doi.org/10.1016/j.knosys.2022.110132

Ha, G., Chen, H., Jia, C., & Li, M. (2022). Threat model and defense scheme for side-channel attacks in client-side deduplication. Tsinghua Science and Technology, 28(1), 1-12. https://doi.org/10.26599/TST.2021.9010071

Iban, M. C., & Bilgilioglu, S.S. (2023). Snow avalanche susceptibility mapping using novel tree-based machine learning algorithms (XGBoost, NGBoost, and LightGBM) with eXplainable Artificial Intelligence (XAI) approach. Stochastic Environmental Research and Risk Assessment, 37(6), 2243-2270. https://doi.org/10.1007/s00477-023-02392-6

Jain, A., & Rajak, R. (2023). A systematic review of workflow scheduling techniques in a fog environment. International Journal of Experimental Research and Review, 30, 100-108. https://doi.org/10.52756/ijerr.2023.v30.011

Joshi, A., Capezza, S., Alhaji, A., & Chow, M. Y. (2023). Survey on AI and Machine Learning Techniques for Microgrid Energy Management Systems. IEEE/CAA Journal of Automatica Sinica, 10(7), 1513-1529. https://doi.org/10.1109/JAS.2023.123657.

Joshi, A., Capezza, S., Alhaji, A., & Chow, M. Y. (2023). Survey on AI and Machine Learning Techniques for Microgrid Energy Management Systems. IEEE/CAA Journal of Automatica Sinica, 10(7), 1513-1529. https://doi.org/10.1109/JAS.2023.123657.

Khan, F., Jan, M. A., Alturki, R., Alshehri, M. D., Shah, S. T., & ur Rehman, A. (2023). A Secure Ensemble Learning-Based Fog-Cloud Approach for Cyberattack Detection in IoMT. IEEE Transactions on Industrial Informatics, pp. 1-9. https://doi.org/10.1109/TII.2022.3231424.

Khurana, D., Koli, A., & Khatter, K. (2023). Natural language processing: state of the art, current trends and challenges. Multimed. Tools Appl., 82, 3713–3744. https://doi.org/10.1007/s11042-022-13428-4

Kreuzberger, D., Kühl, N., & Hirschl, S. (2023). Machine learning operations (mlops): Overview, definition, and architecture. IEEE Access, 11, 31866 -31879. https://doi.org/10.1109/ACCESS.2023.3262138

Kurani, A., Doshi, P., & Vakharia, A. (2023). A Comprehensive Comparative Study of Artificial Neural Network (ANN) and Support Vector Machines (SVM) on Stock Forecasting. Ann. Data. Sci., 10, 183–208. https://doi.org/10.1007/s40745-021-00344-x

Kwekha-Rashid, A.S., Abduljabbar, H.N., & Alhayani, B. (2023). Coronavirus disease (COVID-19) cases analysis using machine-learning applications. Appl. Nanosci., 13, 2013–2025. https://doi.org/10.1007/s13204-021-01868-7

Lu, Y., Qi, Y., Qi, S., Zhang, F., Wei, W., Yang, X., & Dong, X. (2021). Secure deduplication-based storage systems with resistance to side-channel attacks via fog computing. IEEE Sensors Journal, 22(18), 17529-17541. https://doi.org/10.1109/JSEN.2021.3052782.

Ma, T., Xu, C., Yang, S., Huang, Y., an, Q., Kuang, X., & Grieco, L. A. (2023). A Mutation-Enabled Proactive Defense against Service-Oriented Man-in-The-Middle Attack in Kubernetes. IEEE Transactions on Computers, pp. 1-14. https://doi.org/10.1109/TC.2023.3238125

Mohy-eddine, M., Guezzaz, A., Benkirane, S., & Azrour, M. (2023). An efficient network intrusion detection model for IoT security using K-NN classifier and feature selection. Multimedia Tools and Applications, pp. 1-19. https://doi.org/10.1007/s11042-023-14795-2

Paramanik, A. R., Sarkar, S., & Sarkar, B. (2022). OSWMI: An objective-subjective weighted method for minimizing inconsistency in multi-criteria decision making. Computers & Industrial Engineering, 169, 108138. https://doi.org/10.1016/j.cie.2022.108138

Patel, S. K. (2022). Attack detection and mitigation scheme through novel authentication model enabled optimized neural network in smart healthcare. Computer Methods in Biomechanics and Biomedical Engineering, pp. 1-27. https://doi.org/10.1080/10255842.2022.2045585

Patel, S.K. (2022). Attack detection and mitigation scheme through novel authentication model enabled optimized neural network in smart healthcare. Computer Methods in Biomechanics and Biomedical Engineering, pp. 1-27. https://doi.org/10.1080/10255842.2022.2045585

Pramanik, A., Sarkar, S., & Maiti, J. (2021). A real-time video surveillance system for traffic pre-events detection. Accident Analysis & Prevention, 154, 106019. https://doi.org/10.1016/j.aap.2021.106019

Radhakishan, V., & Selvakumar, S. (2011, September). Prevention of man-in-the-middle attacks using ID based signatures. IEEE, In 2011 Second International Conference on Networking and Distributed Computing, 165-169. htps://doi.org/10.1109/ICNDC.2011.40

Rajak, R., Choudhary, A., & Sajid, M. (2023). Load balancing techniques in cloud platform: A systematic study. International Journal of Experimental Research and Review, 30, 15-24. https://doi.org/10.52756/ijerr.2023.v30.002

Ren, M., Tian, Y., Kong, S., Zhou, D., & Li, D. (2020, June). An detection algorithm for ARP man-in-the-middle attack based on data packet forwarding behavior characteristics. In 2020 IEEE 5th Information Technology and Mechatronics Engineering Conference (ITOEC), IEEE, 1599-1604. https://doi.org/10.1109/ITOEC49072.2020.9141555.

Sahi, A., Lai, D., Li, Y., & Diykh, M. (2017). An efficient DDoS TCP flood attack detection and prevention system in a cloud environment. IEEE Access, 5, 6036-6048. https://doi.org/10.1109/ACCESS.2017.2688460.

Saleh, A., Dharshinni, N. P., Perangin-Angin, D., Azmi, F., & Sarif, M. I. (2023). Implementation of Recommendation Systems in Determining Learning Strategies Using the Naïve Bayes Classifier Algorithm. Sinkron: Jurnal dan Penelitian Teknik Informatika, 8(1), 256-267. https://doi.org/10.33395/sinkron.v8i1.11954

Sarkar, S., Pramanik, A., Maiti, J., & Reniers, G. (2020). Predicting and analyzing injury severity: A machine learning-based approach using class-imbalanced proactive and reactive data. Safety Science, 125, 104616. https://doi.org/10.1016/j.ssci.2020.104616

Sarkar, S., Vinay, S., Djeddi, C., & Maiti, J. (2021). Text mining-based association rule mining for incident analysis: a case study of a steel plant in India. In Pattern Recognition and Artificial Intelligence: 4th Mediterranean Conference, MedPRAI 2020, Hammamet, Tunisia, December 20–22, 2020, Proceedings Springer International Publishing, 4, 257-273. https://doi.org/10.1007/978-3-030-71804-6_19

Sarkar, S., Vinay, S., Raj, R., Maiti, J., & Mitra, P. (2019). Application of optimized machine learning techniques for prediction of occupational accidents. Computers & Operations Research, 106, 210-224. https://doi.org/10.1016/j.cor.2018.02.021

Sultan, A. B. M., Mehmood, S., & Zahid, H. (2022). Man in the Middle Attack Detection for MQTT based IoT devices using different Machine Learning Algorithms. IEEE, in 2022 2nd International Conference on Artificial Intelligence (ICAI), pp. 118-121. https://doi.org/10.1109/ICCCNT54827.2022.9984365.

Utukuru, S., Pisipati, R. K., & Karlapalem, K. (2023). Missing Data Resilient Ensemble Subspace Decision Tree Classifier. In Proceedings of the 6th Joint International Conference on Data Science & Management of Data (10th ACM IKDD CODS and 28th COMAD), pp. 104-107. https://doi.org/10.1145/3570991.3571006

Verma, R., & Chandra, S. (2023). RepuTE: A soft voting ensemble learning framework for reputation-based attack detection in fog-IoT milieu. Engineering Applications of Artificial Intelligence, 118, 105670. https://doi.org/10.1016/j.engappai.2022.105670

Wang, N., Guo, H., Jing, Y., Zhang, Y., Sun, B., Pan, X., Chen, H., Xu, J., Wang, M., Chen, Xi, Song, L., & Cui, W. (2023). Development and validation of risk prediction models for large for gestational age infants using logistic regression and two machine learning algorithms. Journal of Diabetes, 15(4), 338-348. https://doi.org/10.1111/1753-0407.13375

Wu, K., Xu, Z., Lyu, X., & Ren, P. (2023). Cross-supervised learning for cloud detection. GIScience & Remote Sensing, 60(1), 2147298. https://doi.org/10.1080/15481603.2022.2147298

Yan, Q., Yu, F. R., Gong, Q., & Li, J. (2015). Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges. IEEE Communications Surveys & Tutorials, 18(1), 602-622. https://doi.org/10.1109/COMST.2015.2487361.

Yu, J., Yin, H., Xia, X., Chen, T., Li, J., & Huang, Z. (2023). Self-supervised learning for recommender systems: A survey. IEEE Transactions on Knowledge and Data Engineering, https://doi.org/10.1109/TKDE.2023.3282907.

Zhang, Y., Mao, Y., Xu, M., Xu, F., & Zhong, S. (2019). Towards thwarting template side-channel attacks in secure cloud deduplications. IEEE Transactions on Dependable and Secure Computing, 18(3), 1008-1018. https://doi.org/10.1109/TDSC.2019.2911502.

Published
2023-07-30
How to Cite
Kumar, A., Dutta, S., & Pranav, P. (2023). Supervised learning for Attack Detection in Cloud. International Journal of Experimental Research and Review, 31(Spl Volume), 74-84. https://doi.org/10.52756/10.52756/ijerr.2023.v31spl.008