AI Chat Paper
Note: Please note that the following content is generated by AMiner AI. SciOpen does not take any responsibility related to this content.
{{lang === 'zh_CN' ? '文章概述' : 'Summary'}}
{{lang === 'en_US' ? '中' : 'Eng'}}
Chat more with AI
PDF (3.7 MB)
Collect
Submit Manuscript AI Chat Paper
Show Outline
Outline
Show full outline
Hide outline
Outline
Show full outline
Hide outline
Open Access

Cloud-Based Intrusion Detection Approach Using Machine Learning Techniques

Hanaa Attou1Azidine Guezzaz1( )Said Benkirane1Mourade Azrour2Yousef Farhaoui2
Technology Higher School Essaouira, Cadi Ayyad University, Marrakech 44000, Morocco.
STI Laboratory, the IDMS team, Faculty of Sciences and Techniques, Moulay Ismail University of Meknès, Errachidia 25003, Morocco.
Show Author Information

Abstract

Cloud computing (CC) is a novel technology that has made it easier to access network and computer resources on demand such as storage and data management services. In addition, it aims to strengthen systems and make them useful. Regardless of these advantages, cloud providers suffer from many security limits. Particularly, the security of resources and services represents a real challenge for cloud technologies. For this reason, a set of solutions have been implemented to improve cloud security by monitoring resources, services, and networks, then detect attacks. Actually, intrusion detection system (IDS) is an enhanced mechanism used to control traffic within networks and detect abnormal activities. This paper presents a cloud-based intrusion detection model based on random forest (RF) and feature engineering. Specifically, the RF classifier is obtained and integrated to enhance accuracy (ACC) of the proposed detection model. The proposed model approach has been evaluated and validated on two datasets and gives 98.3% ACC and 99.99% ACC using Bot-IoT and NSL-KDD datasets, respectively. Consequently, the obtained results present good performances in terms of ACC, precision, and recall when compared to the recent related works.

References

[1]
M. Ali, S. U. Khan, and A. V. Vasilakos, Security in cloud computing: Opportunities and challenges, Information Sciences, vol. 35, pp. 357383, 2015.
[2]
A. Singh and K. Chatterjee, Cloud security issues and challenges: A survey, Journal of Network and Computer Applications, vol. 79, pp. 88115, 2017.
[3]
P. S. Gowr and N. Kumar, Cloud computing security: A survey, International Journal of Engineering and Technology, vol. 7, no. 2, pp. 355357, 2018.
[4]
A. Verma and S. Kaushal, Cloud computing security issues and challenges: A survey, in Proc. First International Conference on Advances in Computing and Communications, Kochi, India, 2011, pp. 445454.
[5]
H. Alloussi, F. Laila, and A. Sekkaki, L’état de l’art de la sécurité dans le cloud computing: Problèmes et solutions de la sécurité en cloud computing, presented at Workshop on Innovation and New Trends in Information Systems, Mohamadia, Maroc, 2012.
[6]
J. Gu, L. Wang, H. Wang, and S. Wang, A novel approach to intrusion detection using SVM ensemble with feature augmentation, Computers and Security, vol. 86, pp. 5362, 2019.
[7]
Z. Chiba, N. Abghour, K. Moussaid, A. E. Omri, and M. Rida, A cooperative and hybrid network intrusion detection framework in cloud computing based snort and optimized back propagation neural network, Procedia Computer Science, vol. 83, pp. 12001206, 2016.
[8]
A. Khraisat, I. Gondal, P. Vamplew, and J. Kamruzzaman, Survey of intrusion detection systems: Techniques, datasets and challenges, Cybersecurity, vol. 2, p. 20, 2019.
[9]
A. Guezzaz, A. Asimi, Y. Asimi, Z. Tbatou, and Y. Sadqi, A global intrusion detection system using PcapSockS sniffer and multilayer perceptron classifier, International Journal of Network Security, vol. 21, no. 3, pp. 438450, 2019.
[10]
A. Guezzaz, S. Benkirane, M. Azrour, and S. Khurram, A reliable network intrusion detection approach using decision tree with enhanced data quality, Security and Communication Networks, vol. 2021, p. 1230593, 2021.
[11]
B. A. Tama and K. H. Rhee, HFSTE: Hybrid feature selections and tree-based classifiers ensemble for intrusion detection system, IEICE Trans. Inf. Syst., vol. E100.D, no. 8, pp. 17291737, 2017.
[12]
M. Azrour, J. Mabrouki, G. Fattah, A. Guezzaz, and F. Aziz, Machine learning algorithms for efficient water quality prediction, Modeling Earth Systems and Environment, vol. 8, pp. 27932801, 2022.
[13]
M. Azrour, Y. Farhaoui, M. Ouanan, and A. Guezzaz, SPIT detection in telephony over IP using K-means algorithm, Procedia Computer Science, vol. 148, pp. 542551, 2019.
[14]
M. Azrour, M. Ouanan, Y. Farhaoui, and A. Guezzaz, Security analysis of Ye et al. authentication protocol for internet of things, in Proc. International Conference on Big Data and Smart Digital Environment, Casablanca, Morocco, 2018, pp. 6774.
[15]
M. Azrour, J. Mabrouki, A. Guezzaz, and A. Kanwal, Internet of things security: Challenges and key issues, Security and Communication Networks, vol. 2021, p. 5533843, 2021.
[16]
A. Guezzaz, S. Benkirane, and M. Azrour, A novel anomaly network intrusion detection system for internet of things security, in IoT and Smart Devices for Sustainable Environment, M. Azrour, A. Irshad, and R. Chaganti, eds. Cham, Switzerland: Springer, 2022, pp. 129138.
[17]
A. Guezzaz, A. Asimi, M. Azrour, Z. Tbatou, and Y. Asimi, A multilayer perceptron classifier for monitoring network traffic, in Proc. 3rd International Conference on Big Data and Networks Technologies, Leuven, Belgium, 2019, pp. 262270.
[18]
S. Benkirane, Road safety against sybil attacks based on RSU collaboration in VANET environment, in Proc. 5th International Conference on Mobile, Secure, and Programmable Networking, Mohammedia, Morocco, 2019, pp. 163172.
[19]
Q. Zhang, L. Cheng, and R. Boutaba, Cloud computing: State-of-the-art and research challenges, J. Internet Serv. Appl., vol. 1, pp. 718, 2010.
[20]
M. K. Srinivasan, K. Sarukesi, P. Rodrigues, M. S. Manoj, and P. Revathy, State-of-the-art cloud computing security taxonomies: A classification of security challenges in the present cloud computing environment, in Proc. 2012 International Conference on Advances in Computing, Communications and Informatics, Chennai, India, 2012, pp. 470476.
[21]
A. L. Buczak and E. Guven, A survey of data mining and machine learning methods for cyber security intrusion detection, IEEE Communications Surveys & Tutorials, vol. 18, no. 2, pp. 11531176, 2016.
[22]
A. Alshammari and A. Aldribi, Apply machine learning techniques to detect malicious network traffic in cloud computing, Journal of Big Data, vol. 8, p. 90, 2021.
[23]
A. Géron, Hands-On Machine Learning with Scikit-Learn & TensorFlow: Concepts, Tools, and Techniques to Build Intelligent Systems. Sebastopol, CA, USA: O’Reilly Media, Inc., 2017.
[24]
N. Chand, P. Mishra, C. R. Krishna, E. S. Pilli, and M. C. Govil, A comparative analysis of SVM and its stacking with other classification algorithm for intrusion detection, in Proc. 2016 International Conference on Advances in Computing, Communication, & Automation (ICACCA), Dehradun, India, 2016, pp. 16.
[25]
A. B. Nassif, M. A. Talib, Q. Nasir, H. Albadani, and F. M. Dakalbab, Machine learning for cloud security: A systematic review, IEEE Access, vol. 9, pp. 2071720735, 2021.
[26]
D. Kwon, H. Kim, J. Kim, S. C. Suh, I. Kim, and K. J. Kim, A survey of deep learning-based network anomaly detection, Cluster Comput., vol. 22, pp. 949961, 2017.
[27]
M. A. Ferrag, L. Maglaras, S. Moschoyiannis, and H. Janicke, Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study, Journal of Information Security and Applications, vol. 50, p. 102419, 2020.
[28]
V. Kanimozhi and T. P. Jacob, Calibration of various optimized machine learning classifiers in network intrusion detection system on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing, International Journal of Engineering Applied Sciences and Technology, vol. 4, no. 6, pp. 209213, 2019.
[29]
L. Zhou, X. Ouyang, H. Ying, L. Han, Y. Cheng, and T. Zhang, Cyber-attack classification in smart grid via deep neural network, in Proc. 2nd International Conference on Computer Science and Application Engineering, Hohhot, China, 2018, pp. 15.
[30]
T. A. Tang, L. Mhamdi, D. McLernon, S. A. R. Zaidi, and M. Ghogho, Deep learning approach for network intrusion detection in software defined networking, in Proc. 2016 International Conference on Wireless Networks and Mobile Communications, Fez, Morocco, 2016, pp. 258263.
[31]
L. Zhang, L. Shi, N. Kaja, and D. Ma, A two-stage deep learning approach for can intrusion detection, in Proc. 2018 Ground Vehicle Syst. Eng. Technol. Symp. (GVSETS), Novi, MI, USA, 2018, pp. 111.
[32]
A. Mishra, B. B. Gupta, D. Perakovic, F. J. G. Penalvo, and C. H. Hsu, Classification based machine learning for detection of DDoS attack in cloud computing, in Proc. 2021 IEEE International Conference on Consumer Electronics, Las Vegas, NV, USA, 2021, pp. 14.
[33]
F. Jiang, Y. Fu, B. B. Gupta, Y. Liang, S. Rho, F. Lou, F. Meng, and Z. Tian, Deep learning based multi-channel intelligent attack detection for data security, IEEE Transactions on Sustainable Computing, vol. 5, no. 2, pp. 204212, 2018.
[34]
A. N. Khan, M. Y. Fan, A. Malik, and R. A. Memon, Learning from privacy preserved encrypted data on cloud through supervised and unsupervised machine learning, in Proc. 2019 2nd International Conference on Computing, Mathematics and Engineering Technologies, Sukkur, Pakistan, 2019, pp. 15.
[35]
S. Potluri and C. Diedrich, Accelerated deep neural networks for enhanced intrusion detection system, in Proc. 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation, Berlin, Germany, 2016, pp. 18.
[36]
J. Kim, J. Kim, H. L. T. Thu, and H. Kim, Long short term memory recurrent neural network classifier for intrusion detection, in Proc. 2016 International Conference on Plateform Technology and Service, Jeju, Republic of Korea, 2016, pp. 15.
[37]
J. Zhang, Anomaly detecting and ranking of the cloud computing platform by multi-view learning, Multimedia Tools and Applications, vol. 78, pp. 3092330942, 2019.
[38]
F. B. Ahmad, A. Nawaz, T. Ali, A. A. Kiani, and G. Mustafa, Securing cloud data: A machine learning based data categorization approach for cloud computing, http://doi.org/10.21203/rs.3.rs-1315357/v1, 2022.
[39]
A. Mubarakali, K. Srinivasan, R. Mukhalid, S. C. Jaganathan, and N. Marina, Security challenges in Internet of things: Distributed denial of service attack detection using support vector machine-based expert systems, Computational Intelligence, vol. 36, no. 4, pp. 15801592, 2020.
[40]
N. M. Abdulkareem and A. M. Abdulazeez, Machine learning classification based on radom forest algorithm: A review, International Journal of Science and Business, vol. 5, no. 2, pp. 128142, 2021.
[41]
L. Breiman, Random forests, Machine Learning, vol. 45, pp. 532, 2001.
[42]
I. Reis, D. Baron, and S. Shahaf, Probabilistic random forest: A machine learning algorithm for noisy data sets, The Astronomical Journal, vol. 157, no. 1, p. 16, 2018.
[43]
J. Ali, R. Khan, N. Ahmad, and I. Maqsood, Random forests and decision trees, IJCSI International Journal of Computer Science Issues, vol. 9, no. 5, pp. 272278, 2012.
[44]
B. O. Yigin, O. Algin, and G. Saygili, Comparison of morphometric parameters in prediction of hydrocephalus using random forests, Computers in Biology and Medicine, vol. 116, p. 103547, 2020.
[45]
A. Sarica, A. Cerasa, and A. Quattrone, Random forest algorithm for the classification of neuroimaging data in alzheimer’s disease: A systematic review, Frontiers in Aging Neuroscience, vol. 9, p. 329, 2017.
[46]
A. Devarakonda, N. Sharma, P. Saha, and S. Ramya, Network intrusion detection: A comparative study of four classifiers using the NSL-KDD and KDD’99 datasets, Journal of Physics: Conference Series, vol. 2161, p. 012043, 2022.
[47]
M. Zeeshan, Q. Riaz, M. A. Bilal, M. K. Shahzad, H. Jabeen, S. A. Haider, and A. Rahim, Protocol-based deep intrusion detection for DoS and DDoS attacks using UNSW-NB15 and Bot-IoT data-sets, IEEE Access, vol.10, pp. 22692283, 2021.
[48]
M. Shafiq, Z. Tian, A. K. Bashir, X. Du, and M. Guizani, CorrAUC: A malicious Bot-IoT traffic detection method in IoT network using machine-learning techniques, IEEE Internet Things J., vol. 8, no. 5, pp. 32423254, 2021.
[49]
M. Shafiq, Z. Tian, Y. Sun, X. Du, and M. Guizani, Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for Internet of things in smart city, Future Generation Computer Systems, vol. 107, pp. 433442, 2020.
[50]
M. Hossin and M. N. Sulaiman, A review on evaluation metrics for data classification evaluations, International Journal of Data Mining & Knowledge Management Process, .
Big Data Mining and Analytics
Pages 311-320
Cite this article:
Attou H, Guezzaz A, Benkirane S, et al. Cloud-Based Intrusion Detection Approach Using Machine Learning Techniques. Big Data Mining and Analytics, 2023, 6(3): 311-320. https://doi.org/10.26599/BDMA.2022.9020038

5423

Views

1046

Downloads

40

Crossref

17

Web of Science

50

Scopus

0

CSCD

Altmetrics

Received: 07 September 2022
Revised: 27 September 2022
Accepted: 12 October 2022
Published: 07 April 2023
© The author(s) 2023.

The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).

Return